Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-1674 (GCVE-0-2010-1674)
Vulnerability from cvelistv5 – Published: 2011-03-29 18:00 – Updated: 2024-08-07 01:35- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:35:53.351Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "46942",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46942"
},
{
"name": "SUSE-SR:2011:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "GLSA-201202-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"name": "RHSA-2012:1258",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"name": "SUSE-SU-2011:1316",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"name": "43770",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43770"
},
{
"name": "48106",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48106"
},
{
"name": "DSA-2197",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"name": "ADV-2011-0711",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0711"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"name": "MDVSA-2011:058",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"name": "quagga-community-dos(66211)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
},
{
"name": "71259",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/71259"
},
{
"name": "43499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43499"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-03-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-01-05T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "46942",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46942"
},
{
"name": "SUSE-SR:2011:005",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "GLSA-201202-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"name": "RHSA-2012:1258",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"name": "SUSE-SU-2011:1316",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"name": "43770",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43770"
},
{
"name": "48106",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48106"
},
{
"name": "DSA-2197",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"name": "ADV-2011-0711",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0711"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"name": "MDVSA-2011:058",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"name": "quagga-community-dos(66211)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
},
{
"name": "71259",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/71259"
},
{
"name": "43499",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43499"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1674",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "46942",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46942"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "GLSA-201202-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"name": "RHSA-2012:1258",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"name": "SUSE-SU-2011:1316",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=654603",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"name": "43770",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43770"
},
{
"name": "48106",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48106"
},
{
"name": "DSA-2197",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"name": "ADV-2011-0711",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0711"
},
{
"name": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200",
"refsource": "CONFIRM",
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"name": "MDVSA-2011:058",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"name": "quagga-community-dos(66211)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
},
{
"name": "71259",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/71259"
},
{
"name": "43499",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43499"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-1674",
"datePublished": "2011-03-29T18:00:00.000Z",
"dateReserved": "2010-04-30T00:00:00.000Z",
"dateUpdated": "2024-08-07T01:35:53.351Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2010-1674",
"date": "2026-05-21",
"epss": "0.0336",
"percentile": "0.87492"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.99.17\", \"matchCriteriaId\": \"DC571045-E383-4B76-B026-629CFDA1E93F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD7A8AD5-A315-4242-960C-05E792B30547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B83BCE2-24D0-4B5B-A034-62BFF1894AE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDD63DD9-1809-4CEC-AB69-955A7B127CA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A2AD1AD-DDE2-477B-8EFD-767B6FD8EDBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99BD881B-9B53-4E12-B083-87C9C87CDF62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F910313F-FFE1-470A-A9B6-8A854C73DC97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B0A9232-968D-4D3E-82A0-F5CC858EAF48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD5F4CFB-BE1F-4424-8D2F-B921704E3AA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A55FF13-8E56-4A27-B7FD-A855735E1045\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7DDBC3B-99BB-4404-9A73-90ED6581D69A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB09A713-E91E-44E7-8B82-F70F655A97B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10173750-690B-4576-AB3F-11A0861AA78B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EF8693A-D561-4D2E-BD60-5630601C6A94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE43983A-73CB-41A5-889B-1AEA9A27F440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EB589E9-85C0-4E87-856B-A2832383B129\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CF5EB8A-8E46-4490-BA88-03D4BED3EB84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6445BEF-245C-47CE-9779-96C97CFD4DA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48D007FD-C1AD-477E-9AA5-DDB4522D3248\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6ADB9F6-B519-45D0-966F-F095372FBB49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E914BAF-2E3A-415E-BAA7-FA02B4A22E25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55FCB7EC-8060-434B-B485-0DC7DBFE117D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9524E069-2A80-4068-9945-2752EF2126EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E1B30CC-478C-4BD1-AF4C-D126B8CCE8D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D713119-F9C6-4656-92C9-A5B863A4B72F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A5E99C8-3778-416B-915F-7335C72435B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"578DCE6D-3360-43DA-B22E-E0005A6AF388\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4D7B93B-0CF5-4CAF-B1F4-8A816A427BC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FDAF214-1851-4DFC-ACAA-37D8CD83D323\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B41BBCA6-237B-4CB6-9208-571D47251E18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD6CAB29-56F9-4C54-97D8-CBB338658EB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C69C603A-34A1-4EF9-A332-6984928BF72C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8814493-75B4-45DD-886B-054A1C27F870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E98DCCDE-2800-4FC5-BE49-3EC7583F9768\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF2C126C-075D-42F0-B9DD-95267D14C818\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62379505-A869-48AA-8A32-768583F12266\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"737C92B8-185F-4049-A7F4-D9D4DA6DDFDC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.\"}, {\"lang\": \"es\", \"value\": \"El parser \\\"extended-community\\\" de bgpd de Quagga en versiones anteriores a la 0.99.18 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (resoluci\\u00f3n de puntero NULL y ca\\u00edda de la aplicaci\\u00f3n) a trav\\u00e9s de un atributo \\\"Extended Communities\\\" mal formado.\"}]",
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html \r\n\u0027CWE-476: NULL Pointer Dereference\u0027",
"id": "CVE-2010-1674",
"lastModified": "2024-11-21T01:14:58.020",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-03-29T18:55:01.127",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1258.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/43499\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/43770\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/48106\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201202-02.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2197\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:058\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/71259\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/46942\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0711\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=654603\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66211\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1258.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43499\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/43770\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/48106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201202-02.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2197\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:058\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/71259\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/46942\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0711\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=654603\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/66211\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-1674\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-03-29T18:55:01.127\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.\"},{\"lang\":\"es\",\"value\":\"El parser \\\"extended-community\\\" de bgpd de Quagga en versiones anteriores a la 0.99.18 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (resoluci\u00f3n de puntero NULL y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un atributo \\\"Extended Communities\\\" mal formado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.99.17\",\"matchCriteriaId\":\"DC571045-E383-4B76-B026-629CFDA1E93F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7A8AD5-A315-4242-960C-05E792B30547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B83BCE2-24D0-4B5B-A034-62BFF1894AE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD63DD9-1809-4CEC-AB69-955A7B127CA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A2AD1AD-DDE2-477B-8EFD-767B6FD8EDBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BD881B-9B53-4E12-B083-87C9C87CDF62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F910313F-FFE1-470A-A9B6-8A854C73DC97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B0A9232-968D-4D3E-82A0-F5CC858EAF48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5F4CFB-BE1F-4424-8D2F-B921704E3AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A55FF13-8E56-4A27-B7FD-A855735E1045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DDBC3B-99BB-4404-9A73-90ED6581D69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB09A713-E91E-44E7-8B82-F70F655A97B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10173750-690B-4576-AB3F-11A0861AA78B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF8693A-D561-4D2E-BD60-5630601C6A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE43983A-73CB-41A5-889B-1AEA9A27F440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB589E9-85C0-4E87-856B-A2832383B129\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF5EB8A-8E46-4490-BA88-03D4BED3EB84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6445BEF-245C-47CE-9779-96C97CFD4DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D007FD-C1AD-477E-9AA5-DDB4522D3248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6ADB9F6-B519-45D0-966F-F095372FBB49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E914BAF-2E3A-415E-BAA7-FA02B4A22E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55FCB7EC-8060-434B-B485-0DC7DBFE117D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9524E069-2A80-4068-9945-2752EF2126EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E1B30CC-478C-4BD1-AF4C-D126B8CCE8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D713119-F9C6-4656-92C9-A5B863A4B72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A5E99C8-3778-416B-915F-7335C72435B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578DCE6D-3360-43DA-B22E-E0005A6AF388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D7B93B-0CF5-4CAF-B1F4-8A816A427BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FDAF214-1851-4DFC-ACAA-37D8CD83D323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B41BBCA6-237B-4CB6-9208-571D47251E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6CAB29-56F9-4C54-97D8-CBB338658EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C69C603A-34A1-4EF9-A332-6984928BF72C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8814493-75B4-45DD-886B-054A1C27F870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E98DCCDE-2800-4FC5-BE49-3EC7583F9768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2C126C-075D-42F0-B9DD-95267D14C818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62379505-A869-48AA-8A32-768583F12266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"737C92B8-185F-4049-A7F4-D9D4DA6DDFDC\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1258.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/43499\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43770\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48106\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201202-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2197\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:058\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/71259\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/46942\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0711\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=654603\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66211\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1258.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43499\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201202-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2197\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:058\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/71259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46942\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=654603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66211\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Per: http://cwe.mitre.org/data/definitions/476.html \\r\\n\u0027CWE-476: NULL Pointer Dereference\u0027\"}}"
}
}
CERTA-2011-AVI-168
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités permettant un déni de service à distance ont été corrigées dans la dernière version de Quagga.
Description
Deux vulnérabilités permettant un déni de service à distance ont été corrigées dans le démon bgpd de Quagga.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Quagga versions antérieures à 0.99.18.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eQuagga versions ant\u00e9rieures \u00e0 0.99.18.\u003c/p\u003e",
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s permettant un d\u00e9ni de service \u00e0 distance ont \u00e9t\u00e9\ncorrig\u00e9es dans le d\u00e9mon bgpd de Quagga.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1675"
},
{
"name": "CVE-2010-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1674"
}
],
"links": [],
"reference": "CERTA-2011-AVI-168",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s permettant un d\u00e9ni de service \u00e0 distance ont \u00e9t\u00e9\ncorrig\u00e9es dans la derni\u00e8re version de Quagga.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Quagga",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de version Quagga du 21 mars 2011",
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
}
]
}
CERTA-2011-AVI-168
Vulnerability from certfr_avis - Published: - Updated:
Deux vulnérabilités permettant un déni de service à distance ont été corrigées dans la dernière version de Quagga.
Description
Deux vulnérabilités permettant un déni de service à distance ont été corrigées dans le démon bgpd de Quagga.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Quagga versions antérieures à 0.99.18.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eQuagga versions ant\u00e9rieures \u00e0 0.99.18.\u003c/p\u003e",
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s permettant un d\u00e9ni de service \u00e0 distance ont \u00e9t\u00e9\ncorrig\u00e9es dans le d\u00e9mon bgpd de Quagga.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1675"
},
{
"name": "CVE-2010-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1674"
}
],
"links": [],
"reference": "CERTA-2011-AVI-168",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s permettant un d\u00e9ni de service \u00e0 distance ont \u00e9t\u00e9\ncorrig\u00e9es dans la derni\u00e8re version de Quagga.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Quagga",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de version Quagga du 21 mars 2011",
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
}
]
}
FKIE_CVE-2010-1674
Vulnerability from fkie_nvd - Published: 2011-03-29 18:55 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| quagga | quagga | * | |
| quagga | quagga | 0.95 | |
| quagga | quagga | 0.96 | |
| quagga | quagga | 0.96.1 | |
| quagga | quagga | 0.96.2 | |
| quagga | quagga | 0.96.3 | |
| quagga | quagga | 0.96.4 | |
| quagga | quagga | 0.96.5 | |
| quagga | quagga | 0.97.0 | |
| quagga | quagga | 0.97.1 | |
| quagga | quagga | 0.97.2 | |
| quagga | quagga | 0.97.3 | |
| quagga | quagga | 0.97.4 | |
| quagga | quagga | 0.97.5 | |
| quagga | quagga | 0.98.0 | |
| quagga | quagga | 0.98.1 | |
| quagga | quagga | 0.98.2 | |
| quagga | quagga | 0.98.3 | |
| quagga | quagga | 0.98.4 | |
| quagga | quagga | 0.98.5 | |
| quagga | quagga | 0.98.6 | |
| quagga | quagga | 0.99.1 | |
| quagga | quagga | 0.99.2 | |
| quagga | quagga | 0.99.3 | |
| quagga | quagga | 0.99.4 | |
| quagga | quagga | 0.99.5 | |
| quagga | quagga | 0.99.6 | |
| quagga | quagga | 0.99.7 | |
| quagga | quagga | 0.99.8 | |
| quagga | quagga | 0.99.9 | |
| quagga | quagga | 0.99.10 | |
| quagga | quagga | 0.99.11 | |
| quagga | quagga | 0.99.12 | |
| quagga | quagga | 0.99.13 | |
| quagga | quagga | 0.99.14 | |
| quagga | quagga | 0.99.15 | |
| quagga | quagga | 0.99.16 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC571045-E383-4B76-B026-629CFDA1E93F",
"versionEndIncluding": "0.99.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "CD7A8AD5-A315-4242-960C-05E792B30547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*",
"matchCriteriaId": "6B83BCE2-24D0-4B5B-A034-62BFF1894AE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD63DD9-1809-4CEC-AB69-955A7B127CA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2AD1AD-DDE2-477B-8EFD-767B6FD8EDBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*",
"matchCriteriaId": "99BD881B-9B53-4E12-B083-87C9C87CDF62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F910313F-FFE1-470A-A9B6-8A854C73DC97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9B0A9232-968D-4D3E-82A0-F5CC858EAF48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD5F4CFB-BE1F-4424-8D2F-B921704E3AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3A55FF13-8E56-4A27-B7FD-A855735E1045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DDBC3B-99BB-4404-9A73-90ED6581D69A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB09A713-E91E-44E7-8B82-F70F655A97B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*",
"matchCriteriaId": "10173750-690B-4576-AB3F-11A0861AA78B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0EF8693A-D561-4D2E-BD60-5630601C6A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE43983A-73CB-41A5-889B-1AEA9A27F440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB589E9-85C0-4E87-856B-A2832383B129",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CF5EB8A-8E46-4490-BA88-03D4BED3EB84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6445BEF-245C-47CE-9779-96C97CFD4DA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*",
"matchCriteriaId": "48D007FD-C1AD-477E-9AA5-DDB4522D3248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D6ADB9F6-B519-45D0-966F-F095372FBB49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E914BAF-2E3A-415E-BAA7-FA02B4A22E25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55FCB7EC-8060-434B-B485-0DC7DBFE117D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9524E069-2A80-4068-9945-2752EF2126EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1B30CC-478C-4BD1-AF4C-D126B8CCE8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1D713119-F9C6-4656-92C9-A5B863A4B72F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5E99C8-3778-416B-915F-7335C72435B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*",
"matchCriteriaId": "578DCE6D-3360-43DA-B22E-E0005A6AF388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D7B93B-0CF5-4CAF-B1F4-8A816A427BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5FDAF214-1851-4DFC-ACAA-37D8CD83D323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B41BBCA6-237B-4CB6-9208-571D47251E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FD6CAB29-56F9-4C54-97D8-CBB338658EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C69C603A-34A1-4EF9-A332-6984928BF72C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E8814493-75B4-45DD-886B-054A1C27F870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E98DCCDE-2800-4FC5-BE49-3EC7583F9768",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2C126C-075D-42F0-B9DD-95267D14C818",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*",
"matchCriteriaId": "62379505-A869-48AA-8A32-768583F12266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*",
"matchCriteriaId": "737C92B8-185F-4049-A7F4-D9D4DA6DDFDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute."
},
{
"lang": "es",
"value": "El parser \"extended-community\" de bgpd de Quagga en versiones anteriores a la 0.99.18 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (resoluci\u00f3n de puntero NULL y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un atributo \"Extended Communities\" mal formado."
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html \r\n\u0027CWE-476: NULL Pointer Dereference\u0027",
"id": "CVE-2010-1674",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-03-29T18:55:01.127",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43499"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43770"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/48106"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/71259"
},
{
"source": "cve@mitre.org",
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/46942"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0711"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43499"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43770"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/71259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/46942"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-P35H-H7X4-JC7G
Vulnerability from github – Published: 2022-05-14 03:53 – Updated: 2022-05-14 03:53The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
{
"affected": [],
"aliases": [
"CVE-2010-1674"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-03-29T18:55:00Z",
"severity": "MODERATE"
},
"details": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"id": "GHSA-p35h-h7x4-jc7g",
"modified": "2022-05-14T03:53:36Z",
"published": "2022-05-14T03:53:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43499"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43770"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48106"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/71259"
},
{
"type": "WEB",
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/46942"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0711"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2010-1674
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2010-1674",
"description": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"id": "GSD-2010-1674",
"references": [
"https://www.suse.com/security/cve/CVE-2010-1674.html",
"https://www.debian.org/security/2011/dsa-2197",
"https://access.redhat.com/errata/RHSA-2012:1258",
"https://access.redhat.com/errata/RHSA-2011:0406",
"https://linux.oracle.com/cve/CVE-2010-1674.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-1674"
],
"details": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"id": "GSD-2010-1674",
"modified": "2023-12-13T01:21:32.758119Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1674",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "46942",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46942"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "GLSA-201202-02",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"name": "RHSA-2012:1258",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"name": "SUSE-SU-2011:1316",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=654603",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"name": "43770",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43770"
},
{
"name": "48106",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48106"
},
{
"name": "DSA-2197",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"name": "ADV-2011-0711",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0711"
},
{
"name": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200",
"refsource": "CONFIRM",
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"name": "MDVSA-2011:058",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"name": "quagga-community-dos(66211)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
},
{
"name": "71259",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/71259"
},
{
"name": "43499",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43499"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.99.17",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1674"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2011-0711",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0711"
},
{
"name": "43499",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43499"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=654603",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"name": "DSA-2197",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2197"
},
{
"name": "46942",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/46942"
},
{
"name": "43770",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43770"
},
{
"name": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.quagga.net/news2.php?y=2011\u0026m=3\u0026d=21#id1300723200"
},
{
"name": "71259",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/71259"
},
{
"name": "MDVSA-2011:058",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:058"
},
{
"name": "SUSE-SU-2011:1316",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html"
},
{
"name": "RHSA-2012:1258",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2012-1258.html"
},
{
"name": "SUSE-SR:2011:005",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"name": "quagga-community-dos(66211)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66211"
},
{
"name": "GLSA-201202-02",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201202-02.xml"
},
{
"name": "48106",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48106"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-01-06T02:29Z",
"publishedDate": "2011-03-29T18:55Z"
}
}
}
OPENSUSE-SU-2024:10362-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libospf0-1.0.20160315-5.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libospf0-1.0.20160315-5.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10362",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10362-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1674 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1675 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2236 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1245 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2342 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4049 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4049/"
}
],
"title": "libospf0-1.0.20160315-5.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10362-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libospf0-1.0.20160315-5.1.aarch64",
"product": {
"name": "libospf0-1.0.20160315-5.1.aarch64",
"product_id": "libospf0-1.0.20160315-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libospfapiclient0-1.0.20160315-5.1.aarch64",
"product": {
"name": "libospfapiclient0-1.0.20160315-5.1.aarch64",
"product_id": "libospfapiclient0-1.0.20160315-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libzebra0-1.0.20160315-5.1.aarch64",
"product": {
"name": "libzebra0-1.0.20160315-5.1.aarch64",
"product_id": "libzebra0-1.0.20160315-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "quagga-1.0.20160315-5.1.aarch64",
"product": {
"name": "quagga-1.0.20160315-5.1.aarch64",
"product_id": "quagga-1.0.20160315-5.1.aarch64"
}
},
{
"category": "product_version",
"name": "quagga-devel-1.0.20160315-5.1.aarch64",
"product": {
"name": "quagga-devel-1.0.20160315-5.1.aarch64",
"product_id": "quagga-devel-1.0.20160315-5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libospf0-1.0.20160315-5.1.ppc64le",
"product": {
"name": "libospf0-1.0.20160315-5.1.ppc64le",
"product_id": "libospf0-1.0.20160315-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libospfapiclient0-1.0.20160315-5.1.ppc64le",
"product": {
"name": "libospfapiclient0-1.0.20160315-5.1.ppc64le",
"product_id": "libospfapiclient0-1.0.20160315-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libzebra0-1.0.20160315-5.1.ppc64le",
"product": {
"name": "libzebra0-1.0.20160315-5.1.ppc64le",
"product_id": "libzebra0-1.0.20160315-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "quagga-1.0.20160315-5.1.ppc64le",
"product": {
"name": "quagga-1.0.20160315-5.1.ppc64le",
"product_id": "quagga-1.0.20160315-5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "quagga-devel-1.0.20160315-5.1.ppc64le",
"product": {
"name": "quagga-devel-1.0.20160315-5.1.ppc64le",
"product_id": "quagga-devel-1.0.20160315-5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libospf0-1.0.20160315-5.1.s390x",
"product": {
"name": "libospf0-1.0.20160315-5.1.s390x",
"product_id": "libospf0-1.0.20160315-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libospfapiclient0-1.0.20160315-5.1.s390x",
"product": {
"name": "libospfapiclient0-1.0.20160315-5.1.s390x",
"product_id": "libospfapiclient0-1.0.20160315-5.1.s390x"
}
},
{
"category": "product_version",
"name": "libzebra0-1.0.20160315-5.1.s390x",
"product": {
"name": "libzebra0-1.0.20160315-5.1.s390x",
"product_id": "libzebra0-1.0.20160315-5.1.s390x"
}
},
{
"category": "product_version",
"name": "quagga-1.0.20160315-5.1.s390x",
"product": {
"name": "quagga-1.0.20160315-5.1.s390x",
"product_id": "quagga-1.0.20160315-5.1.s390x"
}
},
{
"category": "product_version",
"name": "quagga-devel-1.0.20160315-5.1.s390x",
"product": {
"name": "quagga-devel-1.0.20160315-5.1.s390x",
"product_id": "quagga-devel-1.0.20160315-5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libospf0-1.0.20160315-5.1.x86_64",
"product": {
"name": "libospf0-1.0.20160315-5.1.x86_64",
"product_id": "libospf0-1.0.20160315-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libospfapiclient0-1.0.20160315-5.1.x86_64",
"product": {
"name": "libospfapiclient0-1.0.20160315-5.1.x86_64",
"product_id": "libospfapiclient0-1.0.20160315-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libzebra0-1.0.20160315-5.1.x86_64",
"product": {
"name": "libzebra0-1.0.20160315-5.1.x86_64",
"product_id": "libzebra0-1.0.20160315-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "quagga-1.0.20160315-5.1.x86_64",
"product": {
"name": "quagga-1.0.20160315-5.1.x86_64",
"product_id": "quagga-1.0.20160315-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "quagga-devel-1.0.20160315-5.1.x86_64",
"product": {
"name": "quagga-devel-1.0.20160315-5.1.x86_64",
"product_id": "quagga-devel-1.0.20160315-5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libospf0-1.0.20160315-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64"
},
"product_reference": "libospf0-1.0.20160315-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libospf0-1.0.20160315-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le"
},
"product_reference": "libospf0-1.0.20160315-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libospf0-1.0.20160315-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x"
},
"product_reference": "libospf0-1.0.20160315-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libospf0-1.0.20160315-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64"
},
"product_reference": "libospf0-1.0.20160315-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libospfapiclient0-1.0.20160315-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64"
},
"product_reference": "libospfapiclient0-1.0.20160315-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libospfapiclient0-1.0.20160315-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le"
},
"product_reference": "libospfapiclient0-1.0.20160315-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libospfapiclient0-1.0.20160315-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x"
},
"product_reference": "libospfapiclient0-1.0.20160315-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libospfapiclient0-1.0.20160315-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64"
},
"product_reference": "libospfapiclient0-1.0.20160315-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzebra0-1.0.20160315-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64"
},
"product_reference": "libzebra0-1.0.20160315-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzebra0-1.0.20160315-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le"
},
"product_reference": "libzebra0-1.0.20160315-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzebra0-1.0.20160315-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x"
},
"product_reference": "libzebra0-1.0.20160315-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libzebra0-1.0.20160315-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64"
},
"product_reference": "libzebra0-1.0.20160315-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-1.0.20160315-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64"
},
"product_reference": "quagga-1.0.20160315-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-1.0.20160315-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le"
},
"product_reference": "quagga-1.0.20160315-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-1.0.20160315-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x"
},
"product_reference": "quagga-1.0.20160315-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-1.0.20160315-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64"
},
"product_reference": "quagga-1.0.20160315-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-1.0.20160315-5.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64"
},
"product_reference": "quagga-devel-1.0.20160315-5.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-1.0.20160315-5.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le"
},
"product_reference": "quagga-devel-1.0.20160315-5.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-1.0.20160315-5.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x"
},
"product_reference": "quagga-devel-1.0.20160315-5.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-1.0.20160315-5.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
},
"product_reference": "quagga-devel-1.0.20160315-5.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1674"
}
],
"notes": [
{
"category": "general",
"text": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1674",
"url": "https://www.suse.com/security/cve/CVE-2010-1674"
},
{
"category": "external",
"summary": "SUSE Bug 654270 for CVE-2010-1674",
"url": "https://bugzilla.suse.com/654270"
},
{
"category": "external",
"summary": "SUSE Bug 685558 for CVE-2010-1674",
"url": "https://bugzilla.suse.com/685558"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1674"
},
{
"cve": "CVE-2010-1675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1675"
}
],
"notes": [
{
"category": "general",
"text": "bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1675",
"url": "https://www.suse.com/security/cve/CVE-2010-1675"
},
{
"category": "external",
"summary": "SUSE Bug 654270 for CVE-2010-1675",
"url": "https://bugzilla.suse.com/654270"
},
{
"category": "external",
"summary": "SUSE Bug 685558 for CVE-2010-1675",
"url": "https://bugzilla.suse.com/685558"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1675"
},
{
"cve": "CVE-2013-2236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2236"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2236",
"url": "https://www.suse.com/security/cve/CVE-2013-2236"
},
{
"category": "external",
"summary": "SUSE Bug 828117 for CVE-2013-2236",
"url": "https://bugzilla.suse.com/828117"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-2236"
},
{
"cve": "CVE-2016-1245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1245"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1245",
"url": "https://www.suse.com/security/cve/CVE-2016-1245"
},
{
"category": "external",
"summary": "SUSE Bug 1005258 for CVE-2016-1245",
"url": "https://bugzilla.suse.com/1005258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1245"
},
{
"cve": "CVE-2016-2342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2342"
}
],
"notes": [
{
"category": "general",
"text": "The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2342",
"url": "https://www.suse.com/security/cve/CVE-2016-2342"
},
{
"category": "external",
"summary": "SUSE Bug 970952 for CVE-2016-2342",
"url": "https://bugzilla.suse.com/970952"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2342"
},
{
"cve": "CVE-2016-4049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4049"
}
],
"notes": [
{
"category": "general",
"text": "The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4049",
"url": "https://www.suse.com/security/cve/CVE-2016-4049"
},
{
"category": "external",
"summary": "SUSE Bug 977012 for CVE-2016-4049",
"url": "https://bugzilla.suse.com/977012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospf0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libospfapiclient0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:libzebra0-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-1.0.20160315-5.1.x86_64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.aarch64",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.ppc64le",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.s390x",
"openSUSE Tumbleweed:quagga-devel-1.0.20160315-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-4049"
}
]
}
RHSA-2011:0406
Vulnerability from csaf_redhat - Published: 2011-03-31 15:04 - Updated: 2025-11-21 17:37The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated quagga packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Quagga is a TCP/IP based routing software suite. The Quagga bgpd daemon\nimplements the BGP (Border Gateway Protocol) routing protocol.\n\nA denial of service flaw was found in the way the Quagga bgpd daemon\nprocessed certain route metrics information. A BGP message with a\nspecially-crafted path limit attribute would cause the bgpd daemon to reset\nits session with the peer through which this message was received.\n(CVE-2010-1675)\n\nA NULL pointer dereference flaw was found in the way the Quagga bgpd daemon\nprocessed malformed route extended communities attributes. A configured BGP\npeer could crash bgpd on a target system via a specially-crafted BGP\nmessage. (CVE-2010-1674)\n\nUsers of quagga should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the bgpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0406",
"url": "https://access.redhat.com/errata/RHSA-2011:0406"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "654614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654614"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0406.json"
}
],
"title": "Red Hat Security Advisory: quagga security update",
"tracking": {
"current_release_date": "2025-11-21T17:37:58+00:00",
"generator": {
"date": "2025-11-21T17:37:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:0406",
"initial_release_date": "2011-03-31T15:04:00+00:00",
"revision_history": [
{
"date": "2011-03-31T15:04:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-03-31T11:06:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:37:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.src",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.src",
"product_id": "quagga-0:0.99.15-5.el6_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1674",
"discovery_date": "2010-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "654603"
}
],
"notes": [
{
"category": "description",
"text": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quagga: DoS (crash) by processing malformed extended community attribute in a route",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Vulnerable. This issue affects quagga packages in Red Hat Enterprise\nLinux 4 and 5. The Red Hat Security Response Team has rated this issue\nas having low security impact, a future update may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1674"
},
{
"category": "external",
"summary": "RHBZ#654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674"
}
],
"release_date": "2011-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-03-31T15:04:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0406"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "quagga: DoS (crash) by processing malformed extended community attribute in a route"
},
{
"cve": "CVE-2010-1675",
"discovery_date": "2010-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "654614"
}
],
"notes": [
{
"category": "description",
"text": "bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quagga: BGP session reset by processing BGP Update message with malformed AS-path attributes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1675"
},
{
"category": "external",
"summary": "RHBZ#654614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654614"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1675"
}
],
"release_date": "2011-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-03-31T15:04:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0406"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "quagga: BGP session reset by processing BGP Update message with malformed AS-path attributes"
}
]
}
RHSA-2011_0406
Vulnerability from csaf_redhat - Published: 2011-03-31 15:04 - Updated: 2024-11-22 04:15The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated quagga packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Quagga is a TCP/IP based routing software suite. The Quagga bgpd daemon\nimplements the BGP (Border Gateway Protocol) routing protocol.\n\nA denial of service flaw was found in the way the Quagga bgpd daemon\nprocessed certain route metrics information. A BGP message with a\nspecially-crafted path limit attribute would cause the bgpd daemon to reset\nits session with the peer through which this message was received.\n(CVE-2010-1675)\n\nA NULL pointer dereference flaw was found in the way the Quagga bgpd daemon\nprocessed malformed route extended communities attributes. A configured BGP\npeer could crash bgpd on a target system via a specially-crafted BGP\nmessage. (CVE-2010-1674)\n\nUsers of quagga should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the bgpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0406",
"url": "https://access.redhat.com/errata/RHSA-2011:0406"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "654614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654614"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0406.json"
}
],
"title": "Red Hat Security Advisory: quagga security update",
"tracking": {
"current_release_date": "2024-11-22T04:15:05+00:00",
"generator": {
"date": "2024-11-22T04:15:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0406",
"initial_release_date": "2011-03-31T15:04:00+00:00",
"revision_history": [
{
"date": "2011-03-31T15:04:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-03-31T11:06:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:15:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.i686",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686",
"product_id": "quagga-0:0.99.15-5.el6_0.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"product_id": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"product_id": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.99.15-5.el6_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.s390x",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x",
"product_id": "quagga-0:0.99.15-5.el6_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"product": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"product_id": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.15-5.el6_0.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"product": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"product_id": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.99.15-5.el6_0.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-0:0.99.15-5.el6_0.2.src",
"product": {
"name": "quagga-0:0.99.15-5.el6_0.2.src",
"product_id": "quagga-0:0.99.15-5.el6_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.99.15-5.el6_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.src"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
},
"product_reference": "quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1674",
"discovery_date": "2010-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "654603"
}
],
"notes": [
{
"category": "description",
"text": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quagga: DoS (crash) by processing malformed extended community attribute in a route",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Vulnerable. This issue affects quagga packages in Red Hat Enterprise\nLinux 4 and 5. The Red Hat Security Response Team has rated this issue\nas having low security impact, a future update may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1674"
},
{
"category": "external",
"summary": "RHBZ#654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674"
}
],
"release_date": "2011-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-03-31T15:04:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0406"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "quagga: DoS (crash) by processing malformed extended community attribute in a route"
},
{
"cve": "CVE-2010-1675",
"discovery_date": "2010-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "654614"
}
],
"notes": [
{
"category": "description",
"text": "bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quagga: BGP session reset by processing BGP Update message with malformed AS-path attributes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1675"
},
{
"category": "external",
"summary": "RHBZ#654614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654614"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1675"
}
],
"release_date": "2011-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-03-31T15:04:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0406"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Server-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-0:0.99.15-5.el6_0.2.src",
"6Server:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Server:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation-optional:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation-optional:quagga-devel-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.src",
"6Workstation:quagga-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-contrib-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-debuginfo-0:0.99.15-5.el6_0.2.x86_64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.i686",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.ppc64",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.s390x",
"6Workstation:quagga-devel-0:0.99.15-5.el6_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "quagga: BGP session reset by processing BGP Update message with malformed AS-path attributes"
}
]
}
RHSA-2012:1258
Vulnerability from csaf_redhat - Published: 2012-09-12 19:56 - Updated: 2025-11-21 17:41The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated quagga packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Quagga is a TCP/IP based routing software suite. The Quagga bgpd daemon\nimplements the BGP (Border Gateway Protocol) routing protocol. The Quagga\nospfd and ospf6d daemons implement the OSPF (Open Shortest Path First)\nrouting protocol.\n\nA heap-based buffer overflow flaw was found in the way the bgpd daemon\nprocessed malformed Extended Communities path attributes. An attacker could\nsend a specially-crafted BGP message, causing bgpd on a target system to\ncrash or, possibly, execute arbitrary code with the privileges of the user\nrunning bgpd. The UPDATE message would have to arrive from an explicitly\nconfigured BGP peer, but could have originated elsewhere in the BGP\nnetwork. (CVE-2011-3327)\n\nA NULL pointer dereference flaw was found in the way the bgpd daemon\nprocessed malformed route Extended Communities attributes. A configured\nBGP peer could crash bgpd on a target system via a specially-crafted BGP\nmessage. (CVE-2010-1674)\n\nA stack-based buffer overflow flaw was found in the way the ospf6d daemon\nprocessed malformed Link State Update packets. An OSPF router could use\nthis flaw to crash ospf6d on an adjacent router. (CVE-2011-3323)\n\nA flaw was found in the way the ospf6d daemon processed malformed link\nstate advertisements. An OSPF neighbor could use this flaw to crash\nospf6d on a target system. (CVE-2011-3324)\n\nA flaw was found in the way the ospfd daemon processed malformed Hello\npackets. An OSPF neighbor could use this flaw to crash ospfd on a\ntarget system. (CVE-2011-3325)\n\nA flaw was found in the way the ospfd daemon processed malformed link state\nadvertisements. An OSPF router in the autonomous system could use this flaw\nto crash ospfd on a target system. (CVE-2011-3326)\n\nAn assertion failure was found in the way the ospfd daemon processed\ncertain Link State Update packets. An OSPF router could use this flaw to\ncause ospfd on an adjacent router to abort. (CVE-2012-0249)\n\nA buffer overflow flaw was found in the way the ospfd daemon processed\ncertain Link State Update packets. An OSPF router could use this flaw to\ncrash ospfd on an adjacent router. (CVE-2012-0250)\n\nRed Hat would like to thank CERT-FI for reporting CVE-2011-3327,\nCVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and CVE-2011-3326; and the\nCERT/CC for reporting CVE-2012-0249 and CVE-2012-0250. CERT-FI acknowledges\nRiku Hietam\u00e4ki, Tuomo Untinen and Jukka Taimisto of the Codenomicon CROSS\nproject as the original reporters of CVE-2011-3327, CVE-2011-3323,\nCVE-2011-3324, CVE-2011-3325, and CVE-2011-3326. The CERT/CC acknowledges\nMartin Winter at OpenSourceRouting.org as the original reporter of\nCVE-2012-0249 and CVE-2012-0250.\n\nUsers of quagga should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the bgpd, ospfd, and ospf6d daemons will be restarted\nautomatically.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:1258",
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "738393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738393"
},
{
"category": "external",
"summary": "738394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738394"
},
{
"category": "external",
"summary": "738396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738396"
},
{
"category": "external",
"summary": "738398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738398"
},
{
"category": "external",
"summary": "738400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738400"
},
{
"category": "external",
"summary": "802827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802827"
},
{
"category": "external",
"summary": "802829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802829"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1258.json"
}
],
"title": "Red Hat Security Advisory: quagga security update",
"tracking": {
"current_release_date": "2025-11-21T17:41:13+00:00",
"generator": {
"date": "2025-11-21T17:41:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:1258",
"initial_release_date": "2012-09-12T19:56:00+00:00",
"revision_history": [
{
"date": "2012-09-12T19:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-09-12T20:02:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:41:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.src",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.src",
"product_id": "quagga-0:0.98.6-7.el5_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.src",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.src",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.src",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1674",
"discovery_date": "2010-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "654603"
}
],
"notes": [
{
"category": "description",
"text": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quagga: DoS (crash) by processing malformed extended community attribute in a route",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Vulnerable. This issue affects quagga packages in Red Hat Enterprise\nLinux 4 and 5. The Red Hat Security Response Team has rated this issue\nas having low security impact, a future update may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1674"
},
{
"category": "external",
"summary": "RHBZ#654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674"
}
],
"release_date": "2011-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "quagga: DoS (crash) by processing malformed extended community attribute in a route"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3323",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738393"
}
],
"notes": [
{
"category": "description",
"text": "The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3323"
},
{
"category": "external",
"summary": "RHBZ#738393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3323",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3323"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3324",
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738394"
}
],
"notes": [
{
"category": "description",
"text": "The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospf6d): Denial of service by decoding malformed Database Description packet headers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3324"
},
{
"category": "external",
"summary": "RHBZ#738394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738394"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3324"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3324",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3324"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospf6d): Denial of service by decoding malformed Database Description packet headers"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3325",
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738396"
}
],
"notes": [
{
"category": "description",
"text": "ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3325"
},
{
"category": "external",
"summary": "RHBZ#738396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738396"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3325",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3325"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3326",
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738398"
}
],
"notes": [
{
"category": "description",
"text": "The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Denial of service by decoding Link State Update LSAs of unknown type",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3326"
},
{
"category": "external",
"summary": "RHBZ#738398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3326"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Denial of service by decoding Link State Update LSAs of unknown type"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3327",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738400"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3327"
},
{
"category": "external",
"summary": "RHBZ#738400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738400"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3327",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3327"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3327",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3327"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "(bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes"
},
{
"acknowledgments": [
{
"names": [
"CERT/CC"
]
}
],
"cve": "CVE-2012-0249",
"discovery_date": "2012-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "802827"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0249"
},
{
"category": "external",
"summary": "RHBZ#802827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802827"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0249"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0249",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0249"
}
],
"release_date": "2012-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet"
},
{
"acknowledgments": [
{
"names": [
"CERT/CC"
]
}
],
"cve": "CVE-2012-0250",
"discovery_date": "2012-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "802829"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0250"
},
{
"category": "external",
"summary": "RHBZ#802829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0250",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0250"
}
],
"release_date": "2012-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures"
}
]
}
RHSA-2012_1258
Vulnerability from csaf_redhat - Published: 2012-09-12 19:56 - Updated: 2024-11-22 05:38The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated quagga packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Quagga is a TCP/IP based routing software suite. The Quagga bgpd daemon\nimplements the BGP (Border Gateway Protocol) routing protocol. The Quagga\nospfd and ospf6d daemons implement the OSPF (Open Shortest Path First)\nrouting protocol.\n\nA heap-based buffer overflow flaw was found in the way the bgpd daemon\nprocessed malformed Extended Communities path attributes. An attacker could\nsend a specially-crafted BGP message, causing bgpd on a target system to\ncrash or, possibly, execute arbitrary code with the privileges of the user\nrunning bgpd. The UPDATE message would have to arrive from an explicitly\nconfigured BGP peer, but could have originated elsewhere in the BGP\nnetwork. (CVE-2011-3327)\n\nA NULL pointer dereference flaw was found in the way the bgpd daemon\nprocessed malformed route Extended Communities attributes. A configured\nBGP peer could crash bgpd on a target system via a specially-crafted BGP\nmessage. (CVE-2010-1674)\n\nA stack-based buffer overflow flaw was found in the way the ospf6d daemon\nprocessed malformed Link State Update packets. An OSPF router could use\nthis flaw to crash ospf6d on an adjacent router. (CVE-2011-3323)\n\nA flaw was found in the way the ospf6d daemon processed malformed link\nstate advertisements. An OSPF neighbor could use this flaw to crash\nospf6d on a target system. (CVE-2011-3324)\n\nA flaw was found in the way the ospfd daemon processed malformed Hello\npackets. An OSPF neighbor could use this flaw to crash ospfd on a\ntarget system. (CVE-2011-3325)\n\nA flaw was found in the way the ospfd daemon processed malformed link state\nadvertisements. An OSPF router in the autonomous system could use this flaw\nto crash ospfd on a target system. (CVE-2011-3326)\n\nAn assertion failure was found in the way the ospfd daemon processed\ncertain Link State Update packets. An OSPF router could use this flaw to\ncause ospfd on an adjacent router to abort. (CVE-2012-0249)\n\nA buffer overflow flaw was found in the way the ospfd daemon processed\ncertain Link State Update packets. An OSPF router could use this flaw to\ncrash ospfd on an adjacent router. (CVE-2012-0250)\n\nRed Hat would like to thank CERT-FI for reporting CVE-2011-3327,\nCVE-2011-3323, CVE-2011-3324, CVE-2011-3325, and CVE-2011-3326; and the\nCERT/CC for reporting CVE-2012-0249 and CVE-2012-0250. CERT-FI acknowledges\nRiku Hietam\u00e4ki, Tuomo Untinen and Jukka Taimisto of the Codenomicon CROSS\nproject as the original reporters of CVE-2011-3327, CVE-2011-3323,\nCVE-2011-3324, CVE-2011-3325, and CVE-2011-3326. The CERT/CC acknowledges\nMartin Winter at OpenSourceRouting.org as the original reporter of\nCVE-2012-0249 and CVE-2012-0250.\n\nUsers of quagga should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the bgpd, ospfd, and ospf6d daemons will be restarted\nautomatically.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:1258",
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "738393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738393"
},
{
"category": "external",
"summary": "738394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738394"
},
{
"category": "external",
"summary": "738396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738396"
},
{
"category": "external",
"summary": "738398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738398"
},
{
"category": "external",
"summary": "738400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738400"
},
{
"category": "external",
"summary": "802827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802827"
},
{
"category": "external",
"summary": "802829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802829"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1258.json"
}
],
"title": "Red Hat Security Advisory: quagga security update",
"tracking": {
"current_release_date": "2024-11-22T05:38:15+00:00",
"generator": {
"date": "2024-11-22T05:38:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2012:1258",
"initial_release_date": "2012-09-12T19:56:00+00:00",
"revision_history": [
{
"date": "2012-09-12T19:56:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-09-12T20:02:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T05:38:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.i386",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386",
"product_id": "quagga-0:0.98.6-7.el5_8.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"product_id": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.src",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.src",
"product_id": "quagga-0:0.98.6-7.el5_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-devel@0.98.6-7.el5_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-7.el5_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga@0.98.6-7.el5_8.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"product": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"product_id": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-7.el5_8.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.src",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.src",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.src",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.i386",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"relates_to_product_reference": "5Server-5.8.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
},
"product_reference": "quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"relates_to_product_reference": "5Server-5.8.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1674",
"discovery_date": "2010-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "654603"
}
],
"notes": [
{
"category": "description",
"text": "The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "quagga: DoS (crash) by processing malformed extended community attribute in a route",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Vulnerable. This issue affects quagga packages in Red Hat Enterprise\nLinux 4 and 5. The Red Hat Security Response Team has rated this issue\nas having low security impact, a future update may address this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1674"
},
{
"category": "external",
"summary": "RHBZ#654603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=654603"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1674"
}
],
"release_date": "2011-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "quagga: DoS (crash) by processing malformed extended community attribute in a route"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3323",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738393"
}
],
"notes": [
{
"category": "description",
"text": "The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3323"
},
{
"category": "external",
"summary": "RHBZ#738393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3323",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3323"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospf6d): Stack-based buffer overflow while decoding Link State Update packet with malformed Inter Area Prefix LSA"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3324",
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738394"
}
],
"notes": [
{
"category": "description",
"text": "The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospf6d): Denial of service by decoding malformed Database Description packet headers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3324"
},
{
"category": "external",
"summary": "RHBZ#738394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738394"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3324"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3324",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3324"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospf6d): Denial of service by decoding malformed Database Description packet headers"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3325",
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738396"
}
],
"notes": [
{
"category": "description",
"text": "ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3325"
},
{
"category": "external",
"summary": "RHBZ#738396",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738396"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3325",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3325"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Denial of service by decoding too short Hello packet or Hello packet with invalid OSPFv2 header type"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3326",
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738398"
}
],
"notes": [
{
"category": "description",
"text": "The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Denial of service by decoding Link State Update LSAs of unknown type",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3326"
},
{
"category": "external",
"summary": "RHBZ#738398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3326"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Denial of service by decoding Link State Update LSAs of unknown type"
},
{
"acknowledgments": [
{
"names": [
"CERT-FI"
]
}
],
"cve": "CVE-2011-3327",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "738400"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3327"
},
{
"category": "external",
"summary": "RHBZ#738400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738400"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3327",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3327"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3327",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3327"
}
],
"release_date": "2011-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "(bgpd): Heap-based buffer overflow by decoding BGP UPDATE message with unknown AS_PATH attributes"
},
{
"acknowledgments": [
{
"names": [
"CERT/CC"
]
}
],
"cve": "CVE-2012-0249",
"discovery_date": "2012-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "802827"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0249"
},
{
"category": "external",
"summary": "RHBZ#802827",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802827"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0249"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0249",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0249"
}
],
"release_date": "2012-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Assertion failure due improper length check for a received LS-Update OSPF packet"
},
{
"acknowledgments": [
{
"names": [
"CERT/CC"
]
}
],
"cve": "CVE-2012-0250",
"discovery_date": "2012-03-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "802829"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0250"
},
{
"category": "external",
"summary": "RHBZ#802829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0250",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0250"
}
],
"release_date": "2012-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-09-12T19:56:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:1258"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Client-Workstation-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Client-Workstation-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.src",
"5Server-5.8.Z:quagga-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-contrib-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-debuginfo-0:0.98.6-7.el5_8.1.x86_64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.i386",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ia64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.ppc64",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.s390x",
"5Server-5.8.Z:quagga-devel-0:0.98.6-7.el5_8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "(ospfd): Crash by processing LS-Update OSPF packet due improper length check of the Network-LSA structures"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.