-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sat, 22 Nov 2003 13:27:57 +0100 Source: quagga Binary: quagga quagga-doc Architecture: source i386 all Version: 0.96.4x-4 Distribution: unstable Urgency: high Maintainer: Christian Hammers <[EMAIL PROTECTED]> Changed-By: Christian Hammers <[EMAIL PROTECTED]> Description: quagga - Unoff. successor of the Zebra BGP/OSPF/RIP routing daemon quagga-doc - Documentation files for quagga Closes: 220938 Changes: quagga (0.96.4x-4) unstable; urgency=high . * SECURITY: Fixes another bug that was originally reported against Zebra. . http://rhn.redhat.com/errata/RHSA-2003-307.html Herbert Xu reported that Zebra can accept spoofed messages sent on the kernel netlink interface by other users on the local machine. This could lead to a local denial of service attack. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0858 to this issue. . * Minor improvements to init script (thanks to Iustin Pop). Closes: #220938 Files: 4062a9651692760a729ea5a59385a5dd 679 net optional quagga_0.96.4x-4.dsc dfe1e024f6c4919e6605bf6afbb6a028 285071 net optional quagga_0.96.4x-4.diff.gz 4976e61cba3d7282508afe1b4c645f9a 337642 net optional quagga-doc_0.96.4x-4_all.deb fa2bb4d964231c30eb3482f5d84e8477 1627616 net optional quagga_0.96.4x-4_i386.deb
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iEYEARECAAYFAj+/au4ACgkQkR9K5oahGObAHQCeJgGwNvgodvytNUIu5pkg+sDg uOsAn0oMU71A1VDsiiWbUfNCiX3Wp0OG =xE2W -----END PGP SIGNATURE----- Accepted: quagga-doc_0.96.4x-4_all.deb to pool/main/q/quagga/quagga-doc_0.96.4x-4_all.deb quagga_0.96.4x-4.diff.gz to pool/main/q/quagga/quagga_0.96.4x-4.diff.gz quagga_0.96.4x-4.dsc to pool/main/q/quagga/quagga_0.96.4x-4.dsc quagga_0.96.4x-4_i386.deb to pool/main/q/quagga/quagga_0.96.4x-4_i386.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]