Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

quagga-0.99.9-1tr RPM for i586

From Trustix 3.0 for i586

Name: quagga Distribution: Trustix Secure Linux
Version: 0.99.9 Vendor: Comodo Trustix
Release: 1tr Build date: Thu Sep 20 09:27:47 2007
Group: Trustix Official Build host: ttrmgtnived.comodo.net
Size: 3629751 Source RPM: quagga-0.99.9-1tr.src.rpm
Packager: Comodo Trustix <http://www.trustix.com>
Url: http://www.quagga.net
Summary: Routing daemon
Quagga is a free software that manages TCP/IP based routing
protocol. It takes multi-server and multi-thread approach to resolve
the current complexity of the Internet.

Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.

Quagga is intended to be used as a Route Server and a Route Reflector.
It is not a toolkit, it provides full routing power under a new
architecture. Quagga by design has a process for each protocol.

Quagga is a fork of GNU Zebra.

Provides

Requires

License

GPL

Changelog

* Thu Sep 20 2007 Nived Gopalan <nived at trustix dot org> 0.99.9-1tr
  - New Upstream.
  - SECURITY Fix: A vulnerability have been reported in Quagga, caused
    due to bgpd improperly handling messages sent by peers. This can be
    exploited to crash bgpd by sending a specially crafted "OPEN"
    message with an invalid message length or an invalid parameter
    length, or a specially crafted "UPDATE" message with a malformed
    "COMMUNITY" attribute.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2007-4826 to this issue.
* Thu May 03 2007 Nived Gopalan <nived at trustix dot org> 0.99.7-1tr
  - New Upstream.
  - SECURITY Fix: Paul Jakma has reported a vulnerability in Quagga,
    caused due to bgpd not checking the length information of the
    "MP_UNREACH_NLRI" and "MP_REACH_NLRI" attributes. This can be
    exploited to cause an assertion error or out of bounds read by
    sending a specially crafted UPDATE message.
  
    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the name CVE-2007-1995 to this issue.
* Tue Jun 27 2006 Bipin S <bipin at trustix dot org> 0.98.6-2tr
  - Added condition checking for %preun. Bug #1820.
* Tue May 23 2006 Nived Gopalan <nived at trustix dot org> 0.98.6-1tr
  - New Upstream. 
  - SECURITY Fix: Konstantin V. Gavrilenko has reported two security issues
    in Quagga, which can be exploited by malicious people to bypass certain
    security restrictions and to disclose system information.
  - An error in RIPd does not properly implement configurations that 1) 
    disable RIPv1 or 2) require plaintext or MD5 authentication. This allows 
    remote attackers to obtain sensitive information via REQUEST packets 
    such as SEND UPDATE.
  - An error in RIPd does not properly enforce RIPv2 authentication 
    requirements. This allows remote attackers to modify routing state via
    RIPv1 RESPONSE packets.
  - Fredrik Widell has reported a vulnerability in Quagga caused due to an
    infinite loop error in bgpd within the "community_str2com()" function.
    This can be exploited to cause the process to consume large amounts of
    CPU resources by issuing the "sh ip bgp command" command via the telnet
    management interface.
   	
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the names CVE-2006-2223, CVE-2006-2224 and CVE-2006-2276 to
    these issues.
* Tue Jan 17 2006 Ajith Thampi <ajith at trustix dot org> 0.98.5-2tr
  - Rebuilt
* Tue Sep 20 2005 Ajith Thampi <ajith at comodo dot com> 0.98.5-1tr
  - Initial Entry into TSL 3.0

Files

/etc/init.d/bgpd
/etc/init.d/isisd
/etc/init.d/ospf6d
/etc/init.d/ospfd
/etc/init.d/ripd
/etc/init.d/ripngd
/etc/init.d/watchquagga
/etc/init.d/zebra
/etc/logrotate.d/quagga
/etc/pam.d/quagga
/etc/quagga
/etc/quagga/vtysh.conf
/etc/quagga/zebra.conf
/etc/sysconfig/quagga
/usr/bin/vtysh
/usr/lib/libospf.so
/usr/lib/libospf.so.0
/usr/lib/libospf.so.0.0.0
/usr/lib/libospfapiclient.so
/usr/lib/libospfapiclient.so.0
/usr/lib/libospfapiclient.so.0.0.0
/usr/lib/libzebra.so
/usr/lib/libzebra.so.0
/usr/lib/libzebra.so.0.0.0
/usr/sbin/bgpd
/usr/sbin/ospf6d
/usr/sbin/ospfclient
/usr/sbin/ospfd
/usr/sbin/ripd
/usr/sbin/ripngd
/usr/sbin/watchquagga
/usr/sbin/zebra
/usr/share/doc/quagga-0.99.9
/usr/share/doc/quagga-0.99.9/AUTHORS
/usr/share/doc/quagga-0.99.9/COPYING
/usr/share/doc/quagga-0.99.9/ChangeLog
/usr/share/doc/quagga-0.99.9/INSTALL
/usr/share/doc/quagga-0.99.9/NEWS
/usr/share/doc/quagga-0.99.9/README
/usr/share/doc/quagga-0.99.9/REPORTING-BUGS
/usr/share/doc/quagga-0.99.9/SERVICES
/usr/share/doc/quagga-0.99.9/TODO
/usr/share/doc/quagga-0.99.9/bgpd.conf.sample
/usr/share/doc/quagga-0.99.9/bgpd.conf.sample2
/usr/share/doc/quagga-0.99.9/isisd.conf.sample
/usr/share/doc/quagga-0.99.9/mpls
/usr/share/doc/quagga-0.99.9/mpls/ChangeLog.opaque.txt
/usr/share/doc/quagga-0.99.9/mpls/cli_summary.txt
/usr/share/doc/quagga-0.99.9/mpls/opaque_lsa.txt
/usr/share/doc/quagga-0.99.9/mpls/ospfd.conf
/usr/share/doc/quagga-0.99.9/ospf6d.conf.sample
/usr/share/doc/quagga-0.99.9/ospfd.conf.sample
/usr/share/doc/quagga-0.99.9/ripd.conf.sample
/usr/share/doc/quagga-0.99.9/ripngd.conf.sample
/usr/share/doc/quagga-0.99.9/vtysh.conf.sample
/usr/share/doc/quagga-0.99.9/zebra.conf.sample
/usr/share/man/man1/vtysh.1.gz
/usr/share/man/man8/bgpd.8.gz
/usr/share/man/man8/isisd.8.gz
/usr/share/man/man8/ospf6d.8.gz
/usr/share/man/man8/ospfd.8.gz
/usr/share/man/man8/ripd.8.gz
/usr/share/man/man8/ripngd.8.gz
/usr/share/man/man8/zebra.8.gz
/var/log/quagga
/var/run/quagga


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Oct 10 11:45:38 2014