DSA 1787-1: New quagga packages fix denial of service
Posted on: 05/04/2009 09:30 PM

The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1788-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
May 04, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : quagga
Vulnerability : improper assertion
Problem type : remote
Debian-specific: no
Debian Bug : 526311

It was discovered that Quagga, an IP routing daemon, could no longer
process the Internet routing table due to broken handling of multiple
4-byte AS numbers in an AS path. If such a prefix is received, the
BGP daemon crashes with an assert failure, leading to a denial of
service.

The old stable distribution (etch) is not affected by this issue.

For the stable distribution (lenny), this problem has been fixed in
version 0.99.10-1lenny2.

For the unstable distribution (sid), this problem has been fixed in
version 0.99.11-2.

We recommend that you upgrade your quagga package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10.orig.tar.gz
Size/MD5 checksum: 2424191 c7a2d92e1c42214afef9b2e1cd4b5d06
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2.diff.gz
Size/MD5 checksum: 40070 b72e19ed913b32923cf4ef293c67f71c
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2.dsc
Size/MD5 checksum: 1651 a8ef80d57fd5a5a5b08c7ccc70e6a179

Architecture independent packages:

http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.10-1lenny2_all.deb
Size/MD5 checksum: 661226 720947423143cb35eb5c26a0d420066b

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_alpha.deb
Size/MD5 checksum: 1902736 570becd04ecb3dd8a0581010884928df

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_amd64.deb
Size/MD5 checksum: 1748838 f3fcd731d119c422463c36bb4f08be1a

arm architecture (ARM)

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_arm.deb
Size/MD5 checksum: 1449222 6b654e2d4e1a4f00169309ebbbd3dbf9

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_hppa.deb
Size/MD5 checksum: 1681872 8894106d57df0a3d92bb84f148150c2d

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_i386.deb
Size/MD5 checksum: 1606310 80046937a2da8a949a8167f753a583ce

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_mipsel.deb
Size/MD5 checksum: 1600660 716f61415932929c2f668f99faea448e

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_powerpc.deb
Size/MD5 checksum: 1715848 995194031d563994b7d77018d8a4ca3e

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_s390.deb
Size/MD5 checksum: 1794568 b1b47e8dae153461f73c98a61c653e1e

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.10-1lenny2_sparc.deb
Size/MD5 checksum: 1670342 18f98f0978f510ac18636ca1ccc9dfe7


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show lt;pkggt;' and http://packages.debian.org/lt;pkggt;
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJ/08zAAoJEL97/wQC1SS+0U4H/ArnEIvYBJjOsUJ/nKZ8q/Vw
sAGVI8TJjbrjuE/28vFyiJbT4qb977i9W4lgHiCtpCSaKo3YermLUZ+NSFxP280n
czPtpIcq2lmOwdasq5xueH57cYztP9MdWTKlts79rfDjlK6T5o7dO9bN5iCKsgW9
GCC2ZeJqdY20NTtoSz8OHb9DLljnrvXxPtwv5Z7UPBaHvamvH41oxKLpdE1u274Y
xt5XJ5xiqqxKWxRHNYk0sINTqOiR0eHDIEXwUBM7XOu4GL1CIK7kz4/V+b8H+y+3
g8bxPXFVOcG6KTglwwsUf2utOuFKyrBryXUcwW1ZsF2BGVDuS8LoAaACpuO6mII=
=Eb+C
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/dsa_1787_1_new_quagga_packages_fix_denial_of_service.html)