Debian Security Advisory
DSA-1382-1 quagga -- null pointer dereference
- Date Reported:
- 01 Oct 2007
- Affected Packages:
- quagga
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 442133.
In Mitre's CVE dictionary: CVE-2007-4826. - More information:
-
It was discovered that BGP peers can trigger a NULL pointer dereference in the BGP daemon if debug logging is enabled, causing the BGP daemon to crash.
For the old stable distribution (sarge), this problem has been fixed in version 0.98.3-7.5.
For the stable distribution (etch), this problem has been fixed in version 0.99.5-5etch3.
For the unstable distribution (sid), this problem has been fixed in version 0.99.9-1.
We recommend that you upgrade your quagga packages.
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.diff.gz
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.dsc
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.diff.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.5_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_m68k.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_sparc.deb
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5.orig.tar.gz
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.dsc
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.diff.gz
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.dsc
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.5-5etch3_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_sparc.deb
MD5 checksums of the listed files are available in the original advisory.