Action not permitted
Modal body text goes here.
cve-2007-4826
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:33.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "quagga-bgpd-dos(36551)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36551" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt" }, { "name": "ADV-2008-1195", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1195/references" }, { "name": "26744", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26744" }, { "name": "236141", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1" }, { "name": "ADV-2007-3129", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3129" }, { "name": "26863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26863" }, { "name": "2007-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2007/0028/" }, { "name": "FEDORA-2007-2196", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/updates/FEDORA-2007-219.shtml" }, { "name": "29743", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29743" }, { "name": "26829", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26829" }, { "name": "RHSA-2010:0785", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0785.html" }, { "name": "USN-512-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-512-1" }, { "name": "MDKSA-2007:182", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:182" }, { "name": "DSA-1382", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1382" }, { "name": "25634", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25634" }, { "name": "[debian-security-announce] 20071003 [SECURITY] [DSA 1379-1] New quagga packages fix denial of service", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html" }, { "name": "27049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "quagga-bgpd-dos(36551)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36551" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt" }, { "name": "ADV-2008-1195", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1195/references" }, { "name": "26744", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26744" }, { "name": "236141", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1" }, { "name": "ADV-2007-3129", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3129" }, { "name": "26863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26863" }, { "name": "2007-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2007/0028/" }, { "name": "FEDORA-2007-2196", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/updates/FEDORA-2007-219.shtml" }, { "name": "29743", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29743" }, { "name": "26829", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26829" }, { "name": "RHSA-2010:0785", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0785.html" }, { "name": "USN-512-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-512-1" }, { "name": "MDKSA-2007:182", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:182" }, { "name": "DSA-1382", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1382" }, { "name": "25634", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25634" }, { "name": "[debian-security-announce] 20071003 [SECURITY] [DSA 1379-1] New quagga packages fix denial of service", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html" }, { "name": "27049", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27049" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-4826", "datePublished": "2007-09-12T10:00:00", "dateReserved": "2007-09-11T00:00:00", "dateUpdated": "2024-08-07T15:08:33.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-4826\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-09-12T10:17:00.000\",\"lastModified\":\"2017-07-29T01:33:14.317\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.\"},{\"lang\":\"es\",\"value\":\"bgpd en Quagga versiones anteriores a 0.99.9, permite que los peers BGP configurados expl\u00edcitamente causen una denegaci\u00f3n de servicio (bloqueo) por medio de (1) mensaje OPEN malformado o (2) un atributo COMMUNITY malformado, que desencadena una desreferencia del puntero NULL. NOTA: el vector 2 solo existe cuando la depuraci\u00f3n est\u00e1 habilitada.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=285691\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.\",\"lastModified\":\"2007-09-18T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":3.5},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.99.8\",\"matchCriteriaId\":\"C3D7AC38-EF8D-474D-9EA1-30B9E58BD744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7A8AD5-A315-4242-960C-05E792B30547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B83BCE2-24D0-4B5B-A034-62BFF1894AE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD63DD9-1809-4CEC-AB69-955A7B127CA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A2AD1AD-DDE2-477B-8EFD-767B6FD8EDBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BD881B-9B53-4E12-B083-87C9C87CDF62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F910313F-FFE1-470A-A9B6-8A854C73DC97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B0A9232-968D-4D3E-82A0-F5CC858EAF48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5F4CFB-BE1F-4424-8D2F-B921704E3AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A55FF13-8E56-4A27-B7FD-A855735E1045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7DDBC3B-99BB-4404-9A73-90ED6581D69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB09A713-E91E-44E7-8B82-F70F655A97B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10173750-690B-4576-AB3F-11A0861AA78B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF8693A-D561-4D2E-BD60-5630601C6A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE43983A-73CB-41A5-889B-1AEA9A27F440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB589E9-85C0-4E87-856B-A2832383B129\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF5EB8A-8E46-4490-BA88-03D4BED3EB84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6445BEF-245C-47CE-9779-96C97CFD4DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D007FD-C1AD-477E-9AA5-DDB4522D3248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6ADB9F6-B519-45D0-966F-F095372FBB49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E914BAF-2E3A-415E-BAA7-FA02B4A22E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55FCB7EC-8060-434B-B485-0DC7DBFE117D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9524E069-2A80-4068-9945-2752EF2126EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E1B30CC-478C-4BD1-AF4C-D126B8CCE8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D713119-F9C6-4656-92C9-A5B863A4B72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A5E99C8-3778-416B-915F-7335C72435B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"578DCE6D-3360-43DA-B22E-E0005A6AF388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D7B93B-0CF5-4CAF-B1F4-8A816A427BC7\"}]}]}],\"references\":[{\"url\":\"http://fedoranews.org/updates/FEDORA-2007-219.shtml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/26744\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26829\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/26863\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27049\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29743\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1382\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:182\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.quagga.net/download/quagga-0.99.9.changelog.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0785.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/25634\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.trustix.org/errata/2007/0028/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-512-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3129\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1195/references\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36551\",\"source\":\"secalert@redhat.com\"}]}}" } }
ghsa-rqhh-9m59-r644
Vulnerability from github
bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.
{ "affected": [], "aliases": [ "CVE-2007-4826" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-09-12T10:17:00Z", "severity": "LOW" }, "details": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.", "id": "GHSA-rqhh-9m59-r644", "modified": "2022-05-01T18:27:37Z", "published": "2022-05-01T18:27:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4826" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36551" }, { "type": "WEB", "url": "http://fedoranews.org/updates/FEDORA-2007-219.shtml" }, { "type": "WEB", "url": "http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html" }, { "type": "WEB", "url": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760" }, { "type": "WEB", "url": "http://secunia.com/advisories/26744" }, { "type": "WEB", "url": "http://secunia.com/advisories/26829" }, { "type": "WEB", "url": "http://secunia.com/advisories/26863" }, { "type": "WEB", "url": "http://secunia.com/advisories/27049" }, { "type": "WEB", "url": "http://secunia.com/advisories/29743" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1382" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:182" }, { "type": "WEB", "url": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0785.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/25634" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2007/0028" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-512-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3129" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1195/references" } ], "schema_version": "1.4.0", "severity": [] }
var-200709-0225
Vulnerability from variot
bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled. Quagga Routing Suite is prone to a multiple denial-of-service vulnerabilities. An attacker can exploit these issues to crash the affected application, denying service to legitimate users. These issues affect versions prior to Quagga Routing Suite 0.99.9.
Updated packages are available that bring Quagga to version 0.99.9 which provides numerous bugfixes over the previous 0.99.3 version, and also correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4826
Updated Packages:
Corporate 4.0: ab6e0e1d280a6945ce7a5b47d908181c corporate/4.0/i586/libquagga0-0.99.9-0.1.20060mlcs4.i586.rpm f0744b4772d1d15dc5d02d0642e5f0da corporate/4.0/i586/libquagga0-devel-0.99.9-0.1.20060mlcs4.i586.rpm 6d5921788f7a5c169f053013fa4dd0c5 corporate/4.0/i586/quagga-0.99.9-0.1.20060mlcs4.i586.rpm cde3640e96e96e47384181a940a9e8c1 corporate/4.0/i586/quagga-contrib-0.99.9-0.1.20060mlcs4.i586.rpm 5e64b02beff305ba5a37272e13592739 corporate/4.0/SRPMS/quagga-0.99.9-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 24474feed270055ce5e5ed096c227e50 corporate/4.0/x86_64/lib64quagga0-0.99.9-0.1.20060mlcs4.x86_64.rpm cac13525b2e2935e314fe8a8a0dd1626 corporate/4.0/x86_64/lib64quagga0-devel-0.99.9-0.1.20060mlcs4.x86_64.rpm dcb01be5184742e412f99f5fa601f7a7 corporate/4.0/x86_64/quagga-0.99.9-0.1.20060mlcs4.x86_64.rpm c8978f69636129050debd2e721bba887 corporate/4.0/x86_64/quagga-contrib-0.99.9-0.1.20060mlcs4.x86_64.rpm 5e64b02beff305ba5a37272e13592739 corporate/4.0/SRPMS/quagga-0.99.9-0.1.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFG6WgbmqjQ0CJFipgRAoPJAJ9gZxTHQMiR/Z+WjwIErpa/JmMQRwCg4Ckf bzjs45A3TRaGLqsKFHZ9qqQ= =PJRI -----END PGP SIGNATURE-----
.
Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications.
-- Debian GNU/Linux 3.1 alias sarge --
Source archives:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz Size/MD5 checksum: 2118348 68be5e911e4d604c0f5959338263356e http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.diff.gz Size/MD5 checksum: 43910 8bfd06c851172358137d7b67d5f90490 http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.dsc Size/MD5 checksum: 1017 69dc4e5de4de00ec723ecaad6f285af8
Architecture independent packages:
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.5_all.deb Size/MD5 checksum: 488996 4f150df3d0d7c1b26d648590ac02541a
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_alpha.deb Size/MD5 checksum: 1613894 c0064c06d8eeed92b7607bc9d1c03c0f
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_amd64.deb Size/MD5 checksum: 1413484 399d4fe967343eb586eb4f17348d2f4b
arm architecture (ARM)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_arm.deb Size/MD5 checksum: 1291326 cc876fbb2cf8e3602cde4ea1e93e75e0
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_hppa.deb Size/MD5 checksum: 1447854 ae9502f1d97de52c875f0eb82ab8cf3e
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_i386.deb Size/MD5 checksum: 1192432 e3057ed965a580381e7c15dc430df295
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_ia64.deb Size/MD5 checksum: 1829272 e182c3ae76fe84b9b041498aef8807ee
m68k architecture (Motorola Mc680x0)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_m68k.deb Size/MD5 checksum: 1159818 487dd9883427b87d886674996e6850a1
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mips.deb Size/MD5 checksum: 1353182 411564875b0ecb39ffd166865392ed7b
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mipsel.deb Size/MD5 checksum: 1356062 b828e6228e2b8389d61de6b97c1b6b56
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_powerpc.deb Size/MD5 checksum: 1317460 927a1768a1e2449981c0159d974658e8
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_s390.deb Size/MD5 checksum: 1401842 e30e4afa3570324cb913ae0b746f49a3
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_sparc.deb Size/MD5 checksum: 1287860 17ad533f4dfc7b184812ad7634bf215f
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5.orig.tar.gz Size/MD5 checksum: 2311140 3f9c71aca6faa22a889e2f84ecfd0076 http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.dsc Size/MD5 checksum: 1046 3a36e812322157de715626cbe04c519f http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.diff.gz Size/MD5 checksum: 33551 0de3c5021dbed0e4739f88b6f00a9c59
Architecture independent packages:
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.5-5etch3_all.deb Size/MD5 checksum: 720288 2bafee611f8a75fedc07be2224f90922
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_alpha.deb Size/MD5 checksum: 1681786 b98d10ce3b2906b13031f9d09fcdde3c
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_amd64.deb Size/MD5 checksum: 1414716 00846f88e7df3db61001d54fd5647d23
arm architecture (ARM)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_arm.deb Size/MD5 checksum: 1349946 5e8c58f59352222caf345fbf3f1551de
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_hppa.deb Size/MD5 checksum: 1531350 54a89d669ab617597c7abf53eb7c3e6a
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_i386.deb Size/MD5 checksum: 1247076 6334fa5dd1344e6be4bfe77d8f5efba7
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_ia64.deb Size/MD5 checksum: 1955634 6b98821ad60bd0a757b274488f92a50d
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mips.deb Size/MD5 checksum: 1455714 1b8e171cb0b8dd1d5643f4960fb227de
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mipsel.deb Size/MD5 checksum: 1460804 4bbd130c9419f69f6c759c80ec672352
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_powerpc.deb Size/MD5 checksum: 1379640 a0c25edb50d2b0c3ddbcacf96a702b29
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_s390.deb Size/MD5 checksum: 1482930 e22c407cb6fdf8071799d3891de4c12c
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_sparc.deb Size/MD5 checksum: 1348064 843f3b9bcfc7f25f1fe096a0c0f46793
-- Debian GNU/Linux unstable alias sid --
Fixed in version 0.99.9-1. =========================================================== Ubuntu Security Notice USN-512-1 September 15, 2007 quagga vulnerability CVE-2007-4826 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 6.10 Ubuntu 7.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: quagga 0.99.2-1ubuntu3.3
Ubuntu 6.10: quagga 0.99.4-4ubuntu1.2
Ubuntu 7.04: quagga 0.99.6-2ubuntu3.2
In general, a standard system upgrade is sufficient to affect the necessary changes. ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
15 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI) has been available for corporate users for almost 1 year and its been a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the award winning Secunia PSI, which has already been downloaded and installed on more than 400,000 computers world wide.
For more information: SA24808 SA26744
The vulnerabilities have been reported in GNU Zebra and Quagga BGP Routing Daemon included in Solaris 10 for both the SPARC and x86 platforms.
SOLUTION: Apply patches.
-- SPARC Platform --
Apply patch 126206-04 or later.
-- x86 Platform --
Apply patch 126207-04 or later.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
Download the free PSI BETA from the Secunia website: https://psi.secunia.com/
TITLE: Quagga Multiple Denial of Service Vulnerabilities
SECUNIA ADVISORY ID: SA26744
VERIFY ADVISORY: http://secunia.com/advisories/26744/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
SOFTWARE: Quagga 0.x http://secunia.com/product/4731/
DESCRIPTION: Some vulnerabilities have been reported in Quagga, which can be exploited by malicious users to cause a DoS (Denial of Service).
The vulnerabilities are caused due to bgpd improperly handling messages and attributes sent by peers. This can be exploited to crash bgpd by sending a specially crafted "OPEN" message or a specially crafted "COMMUNITY" attribute to the affected server.
Successful exploitation requires that the attacker is configured as peer of the victim system, and that the debugging of BGP updates is on.
The vulnerabilities are reported in versions prior to 0.99.9.
SOLUTION: Fixed in unstable version 0.99.9.
Connect to trusted peers only.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Mu Security.
ORIGINAL ADVISORY: http://www.quagga.net/download/quagga-0.99.9.changelog.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200709-0225", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "quagga", "scope": "lte", "trust": 1.8, "vendor": "quagga", "version": "0.99.8" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.97.5" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.97.2" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.98.0" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.98.3" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.97.3" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.98.1" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.97.4" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.98.4" }, { "model": "quagga", "scope": "eq", "trust": 1.6, "vendor": "quagga", "version": "0.98.2" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.96.3" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.99.2" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.99.4" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.99.1" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.98.5" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.96.2" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.96.1" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.99.5" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.97.0" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.98.6" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.96.5" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.99.6" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.96" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.96.4" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.99.7" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.97.1" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.95" }, { "model": "quagga", "scope": "eq", "trust": 1.0, "vendor": "quagga", "version": "0.99.3" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "quagga", "scope": "eq", "trust": 0.6, "vendor": "quagga", "version": "0.99.8" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0.5" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "3.0" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.2" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 10 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "hat fedora core7", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.8" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.7" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.6" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.5" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.4" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.3" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.2" }, { "model": "routing software suite", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "interactive response", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "routing software suite", "scope": "ne", "trust": 0.3, "vendor": "quagga", "version": "0.99.9" } ], "sources": [ { "db": "BID", "id": "25634" }, { "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "db": "CNNVD", "id": "CNNVD-200709-152" }, { "db": "NVD", "id": "CVE-2007-4826" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.99.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-4826" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mu Security", "sources": [ { "db": "CNNVD", "id": "CNNVD-200709-152" } ], "trust": 0.6 }, "cve": "CVE-2007-4826", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.5, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2007-4826", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 1.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-4826", "trust": 1.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-200709-152", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "db": "CNNVD", "id": "CNNVD-200709-152" }, { "db": "NVD", "id": "CVE-2007-4826" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled. Quagga Routing Suite is prone to a multiple denial-of-service vulnerabilities. \nAn attacker can exploit these issues to crash the affected application, denying service to legitimate users. \nThese issues affect versions prior to Quagga Routing Suite 0.99.9. \n \n Updated packages are available that bring Quagga to version 0.99.9\n which provides numerous bugfixes over the previous 0.99.3 version,\n and also correct this issue. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4826\n _______________________________________________________________________\n \n Updated Packages:\n \n Corporate 4.0:\n ab6e0e1d280a6945ce7a5b47d908181c corporate/4.0/i586/libquagga0-0.99.9-0.1.20060mlcs4.i586.rpm\n f0744b4772d1d15dc5d02d0642e5f0da corporate/4.0/i586/libquagga0-devel-0.99.9-0.1.20060mlcs4.i586.rpm\n 6d5921788f7a5c169f053013fa4dd0c5 corporate/4.0/i586/quagga-0.99.9-0.1.20060mlcs4.i586.rpm\n cde3640e96e96e47384181a940a9e8c1 corporate/4.0/i586/quagga-contrib-0.99.9-0.1.20060mlcs4.i586.rpm \n 5e64b02beff305ba5a37272e13592739 corporate/4.0/SRPMS/quagga-0.99.9-0.1.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 24474feed270055ce5e5ed096c227e50 corporate/4.0/x86_64/lib64quagga0-0.99.9-0.1.20060mlcs4.x86_64.rpm\n cac13525b2e2935e314fe8a8a0dd1626 corporate/4.0/x86_64/lib64quagga0-devel-0.99.9-0.1.20060mlcs4.x86_64.rpm\n dcb01be5184742e412f99f5fa601f7a7 corporate/4.0/x86_64/quagga-0.99.9-0.1.20060mlcs4.x86_64.rpm\n c8978f69636129050debd2e721bba887 corporate/4.0/x86_64/quagga-contrib-0.99.9-0.1.20060mlcs4.x86_64.rpm \n 5e64b02beff305ba5a37272e13592739 corporate/4.0/SRPMS/quagga-0.99.9-0.1.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (GNU/Linux)\n\niD8DBQFG6WgbmqjQ0CJFipgRAoPJAJ9gZxTHQMiR/Z+WjwIErpa/JmMQRwCg4Ckf\nbzjs45A3TRaGLqsKFHZ9qqQ=\n=PJRI\n-----END PGP SIGNATURE-----\n\n. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,700 different Windows applications. \n\n-- Debian GNU/Linux 3.1 alias sarge --\n\nSource archives:\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz\nSize/MD5 checksum: 2118348 68be5e911e4d604c0f5959338263356e\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.diff.gz\nSize/MD5 checksum: 43910 8bfd06c851172358137d7b67d5f90490\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.dsc\nSize/MD5 checksum: 1017 69dc4e5de4de00ec723ecaad6f285af8\n\nArchitecture independent packages:\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.5_all.deb\nSize/MD5 checksum: 488996 4f150df3d0d7c1b26d648590ac02541a\n\nalpha architecture (DEC Alpha)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_alpha.deb\nSize/MD5 checksum: 1613894 c0064c06d8eeed92b7607bc9d1c03c0f\n\namd64 architecture (AMD x86_64 (AMD64))\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_amd64.deb\nSize/MD5 checksum: 1413484 399d4fe967343eb586eb4f17348d2f4b\n\narm architecture (ARM)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_arm.deb\nSize/MD5 checksum: 1291326 cc876fbb2cf8e3602cde4ea1e93e75e0\n\nhppa architecture (HP PA RISC)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_hppa.deb\nSize/MD5 checksum: 1447854 ae9502f1d97de52c875f0eb82ab8cf3e\n\ni386 architecture (Intel ia32)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_i386.deb\nSize/MD5 checksum: 1192432 e3057ed965a580381e7c15dc430df295\n\nia64 architecture (Intel ia64)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_ia64.deb\nSize/MD5 checksum: 1829272 e182c3ae76fe84b9b041498aef8807ee\n\nm68k architecture (Motorola Mc680x0)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_m68k.deb\nSize/MD5 checksum: 1159818 487dd9883427b87d886674996e6850a1\n\nmips architecture (MIPS (Big Endian))\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mips.deb\nSize/MD5 checksum: 1353182 411564875b0ecb39ffd166865392ed7b\n\nmipsel architecture (MIPS (Little Endian))\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mipsel.deb\nSize/MD5 checksum: 1356062 b828e6228e2b8389d61de6b97c1b6b56\n\npowerpc architecture (PowerPC)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_powerpc.deb\nSize/MD5 checksum: 1317460 927a1768a1e2449981c0159d974658e8\n\ns390 architecture (IBM S/390)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_s390.deb\nSize/MD5 checksum: 1401842 e30e4afa3570324cb913ae0b746f49a3\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_sparc.deb\nSize/MD5 checksum: 1287860 17ad533f4dfc7b184812ad7634bf215f\n\n-- Debian GNU/Linux 4.0 alias etch --\n\nSource archives:\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5.orig.tar.gz\nSize/MD5 checksum: 2311140 3f9c71aca6faa22a889e2f84ecfd0076\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.dsc\nSize/MD5 checksum: 1046 3a36e812322157de715626cbe04c519f\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.diff.gz\nSize/MD5 checksum: 33551 0de3c5021dbed0e4739f88b6f00a9c59\n\nArchitecture independent packages:\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.5-5etch3_all.deb\nSize/MD5 checksum: 720288 2bafee611f8a75fedc07be2224f90922\n\nalpha architecture (DEC Alpha)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_alpha.deb\nSize/MD5 checksum: 1681786 b98d10ce3b2906b13031f9d09fcdde3c\n\namd64 architecture (AMD x86_64 (AMD64))\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_amd64.deb\nSize/MD5 checksum: 1414716 00846f88e7df3db61001d54fd5647d23\n\narm architecture (ARM)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_arm.deb\nSize/MD5 checksum: 1349946 5e8c58f59352222caf345fbf3f1551de\n\nhppa architecture (HP PA RISC)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_hppa.deb\nSize/MD5 checksum: 1531350 54a89d669ab617597c7abf53eb7c3e6a\n\ni386 architecture (Intel ia32)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_i386.deb\nSize/MD5 checksum: 1247076 6334fa5dd1344e6be4bfe77d8f5efba7\n\nia64 architecture (Intel ia64)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_ia64.deb\nSize/MD5 checksum: 1955634 6b98821ad60bd0a757b274488f92a50d\n\nmips architecture (MIPS (Big Endian))\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mips.deb\nSize/MD5 checksum: 1455714 1b8e171cb0b8dd1d5643f4960fb227de\n\nmipsel architecture (MIPS (Little Endian))\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mipsel.deb\nSize/MD5 checksum: 1460804 4bbd130c9419f69f6c759c80ec672352\n\npowerpc architecture (PowerPC)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_powerpc.deb\nSize/MD5 checksum: 1379640 a0c25edb50d2b0c3ddbcacf96a702b29\n\ns390 architecture (IBM S/390)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_s390.deb\nSize/MD5 checksum: 1482930 e22c407cb6fdf8071799d3891de4c12c\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\nhttp://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_sparc.deb\nSize/MD5 checksum: 1348064 843f3b9bcfc7f25f1fe096a0c0f46793\n\n-- Debian GNU/Linux unstable alias sid --\n\nFixed in version 0.99.9-1. =========================================================== \nUbuntu Security Notice USN-512-1 September 15, 2007\nquagga vulnerability\nCVE-2007-4826\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 6.10\nUbuntu 7.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n quagga 0.99.2-1ubuntu3.3\n\nUbuntu 6.10:\n quagga 0.99.4-4ubuntu1.2\n\nUbuntu 7.04:\n quagga 0.99.6-2ubuntu3.2\n\nIn general, a standard system upgrade is sufficient to affect the\nnecessary changes. ----------------------------------------------------------------------\n\nSecunia Network Software Inspector 2.0 (NSI) - Public Beta\n\n15 days left of beta period. \n\nThe 1st generation of the Secunia Network Software Inspector (NSI)\nhas been available for corporate users for almost 1 year and its been\na tremendous success. \n\nThe 2nd generation Secunia NSI is built on the same technology as the\naward winning Secunia PSI, which has already been downloaded and\ninstalled on more than 400,000 computers world wide. \n\nFor more information:\nSA24808\nSA26744\n\nThe vulnerabilities have been reported in GNU Zebra and Quagga BGP\nRouting Daemon included in Solaris 10 for both the SPARC and x86\nplatforms. \n\nSOLUTION:\nApply patches. \n\n-- SPARC Platform --\n\nApply patch 126206-04 or later. \n\n-- x86 Platform --\n\nApply patch 126207-04 or later. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nQuagga Multiple Denial of Service Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA26744\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26744/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nQuagga 0.x\nhttp://secunia.com/product/4731/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Quagga, which can be\nexploited by malicious users to cause a DoS (Denial of Service). \n\nThe vulnerabilities are caused due to bgpd improperly handling\nmessages and attributes sent by peers. This can be exploited to crash\nbgpd by sending a specially crafted \"OPEN\" message or a specially\ncrafted \"COMMUNITY\" attribute to the affected server. \n\nSuccessful exploitation requires that the attacker is configured as\npeer of the victim system, and that the debugging of BGP updates is\non. \n\nThe vulnerabilities are reported in versions prior to 0.99.9. \n\nSOLUTION:\nFixed in unstable version 0.99.9. \n\nConnect to trusted peers only. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Mu Security. \n\nORIGINAL ADVISORY:\nhttp://www.quagga.net/download/quagga-0.99.9.changelog.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-4826" }, { "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "db": "BID", "id": "25634" }, { "db": "PACKETSTORM", "id": "59307" }, { "db": "PACKETSTORM", "id": "59758" }, { "db": "PACKETSTORM", "id": "59371" }, { "db": "PACKETSTORM", "id": "59341" }, { "db": "PACKETSTORM", "id": "65543" }, { "db": "PACKETSTORM", "id": "59220" }, { "db": "PACKETSTORM", "id": "59440" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-4826", "trust": 2.9 }, { "db": "BID", "id": "25634", "trust": 2.7 }, { "db": "SECUNIA", "id": "26744", "trust": 2.5 }, { "db": "SECUNIA", "id": "27049", "trust": 1.7 }, { "db": "SECUNIA", "id": "26829", "trust": 1.7 }, { "db": "SECUNIA", "id": "29743", "trust": 1.7 }, { "db": "SECUNIA", "id": "26863", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-3129", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-1195", "trust": 1.6 }, { "db": "XF", "id": "36551", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2007-001159", "trust": 0.8 }, { "db": "FEDORA", "id": "FEDORA-2007-2196", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2007:182", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-512-1", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1382", "trust": 0.6 }, { "db": "SUNALERT", "id": "236141", "trust": 0.6 }, { "db": "TRUSTIX", "id": "2007-0028", "trust": 0.6 }, { "db": "MLIST", "id": "[DEBIAN-SECURITY-ANNOUNCE] 20071003 [SECURITY] [DSA 1379-1] NEW QUAGGA PACKAGES FIX DENIAL OF SERVICE", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200709-152", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "59307", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59758", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59371", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59341", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "65543", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59220", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59440", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "25634" }, { "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "db": "PACKETSTORM", "id": "59307" }, { "db": "PACKETSTORM", "id": "59758" }, { "db": "PACKETSTORM", "id": "59371" }, { "db": "PACKETSTORM", "id": "59341" }, { "db": "PACKETSTORM", "id": "65543" }, { "db": "PACKETSTORM", "id": "59220" }, { "db": "PACKETSTORM", "id": "59440" }, { "db": "CNNVD", "id": "CNNVD-200709-152" }, { "db": "NVD", "id": "CVE-2007-4826" } ] }, "id": "VAR-200709-0225", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.1590909 }, "last_update_date": "2022-05-04T07:17:23.402000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "quagga-0.98.6-5.2.0.1.AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1286" }, { "title": "2145", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2145" }, { "title": "Index of /releases/quagga", "trust": 0.8, "url": "http://download.savannah.gnu.org/releases/quagga/" }, { "title": "RHSA-2010:0785", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0785.html" }, { "title": "Multiple Denial of Service vulnerabilities in Quagga", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_denial_of_service_vulnerabilities4" }, { "title": "236141", "trust": 0.8, "url": "http://download.oracle.com/sunalerts/1019153.1.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-4826" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://secunia.com/advisories/26744" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/25634" }, { "trust": 2.0, "url": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt" }, { "trust": 1.7, "url": "http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-512-1" }, { "trust": 1.6, "url": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760" }, { "trust": 1.6, "url": "http://www.trustix.org/errata/2007/0028/" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:182" }, { "trust": 1.6, "url": "http://www.debian.org/security/2007/dsa-1382" }, { "trust": 1.6, "url": "http://secunia.com/advisories/27049" }, { "trust": 1.6, "url": "http://secunia.com/advisories/26863" }, { "trust": 1.6, "url": "http://secunia.com/advisories/26829" }, { "trust": 1.6, "url": "http://fedoranews.org/updates/fedora-2007-219.shtml" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1" }, { "trust": 1.6, "url": "http://secunia.com/advisories/29743" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/3129" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/36551" }, { "trust": 1.0, "url": "http://www.redhat.com/support/errata/rhsa-2010-0785.html" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/3129" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/1195/references" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36551" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4826" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4826" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1195/references" }, { "trust": 0.5, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.5, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.5, "url": "http://secunia.com/advisories/26744/" }, { "trust": 0.5, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.4, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-236141-1" }, { "trust": 0.3, "url": "http://www.quagga.net/" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2008-176.htm" }, { "trust": 0.3, "url": "https://psi.secunia.com/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4826" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.6-2ubuntu3.2.diff.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.2-1ubuntu3.3_all.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.4-4ubuntu1.2.diff.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.3_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.6-2ubuntu3.2_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.6-2ubuntu3.2_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.4.orig.tar.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.3.dsc" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.3.diff.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.4-4ubuntu1.2_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.6-2ubuntu3.2_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.4-4ubuntu1.2_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.3_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.3_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2.orig.tar.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.4-4ubuntu1.2_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.6-2ubuntu3.2_all.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.4-4ubuntu1.2_all.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.3_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.4-4ubuntu1.2.dsc" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.6-2ubuntu3.2_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.6-2ubuntu3.2.dsc" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.4-4ubuntu1.2_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.6.orig.tar.gz" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_i386.deb" }, { "trust": 0.1, "url": "http://secunia.com/network_software_inspector/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_s390.deb" }, { "trust": 0.1, "url": "http://secunia.com/product/13844/" }, { "trust": 0.1, "url": "http://secunia.com/product/5307/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.5-5etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27049/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_mipsel.deb" }, { "trust": 0.1, "url": "http://secunia.com/product/530/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.5_alpha.deb" }, { "trust": 0.1, "url": "http://secunia.com/product/12470/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26829/" }, { "trust": 0.1, "url": "http://secunia.com/product/10611/" }, { "trust": 0.1, "url": "http://secunia.com/product/14068/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29743/" }, { "trust": 0.1, "url": "http://secunia.com/network_software_inspector_2/" }, { "trust": 0.1, "url": "http://secunia.com/product/4813/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/24808/" }, { "trust": 0.1, "url": "http://secunia.com/product/4731/" }, { "trust": 0.1, "url": "http://secunia.com/product/15552/" }, { "trust": 0.1, "url": "https://www.redhat.com/archives/fedora-package-announce/2007-september/msg00304.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26863/" } ], "sources": [ { "db": "BID", "id": "25634" }, { "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "db": "PACKETSTORM", "id": "59307" }, { "db": "PACKETSTORM", "id": "59758" }, { "db": "PACKETSTORM", "id": "59371" }, { "db": "PACKETSTORM", "id": "59341" }, { "db": "PACKETSTORM", "id": "65543" }, { "db": "PACKETSTORM", "id": "59220" }, { "db": "PACKETSTORM", "id": "59440" }, { "db": "CNNVD", "id": "CNNVD-200709-152" }, { "db": "NVD", "id": "CVE-2007-4826" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "25634" }, { "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "db": "PACKETSTORM", "id": "59307" }, { "db": "PACKETSTORM", "id": "59758" }, { "db": "PACKETSTORM", "id": "59371" }, { "db": "PACKETSTORM", "id": "59341" }, { "db": "PACKETSTORM", "id": "65543" }, { "db": "PACKETSTORM", "id": "59220" }, { "db": "PACKETSTORM", "id": "59440" }, { "db": "CNNVD", "id": "CNNVD-200709-152" }, { "db": "NVD", "id": "CVE-2007-4826" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-09-11T00:00:00", "db": "BID", "id": "25634" }, { "date": "2008-05-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "date": "2007-09-13T23:56:50", "db": "PACKETSTORM", "id": "59307" }, { "date": "2007-10-03T20:39:01", "db": "PACKETSTORM", "id": "59758" }, { "date": "2007-09-18T16:48:01", "db": "PACKETSTORM", "id": "59371" }, { "date": "2007-09-18T14:57:19", "db": "PACKETSTORM", "id": "59341" }, { "date": "2008-04-15T23:22:47", "db": "PACKETSTORM", "id": "65543" }, { "date": "2007-09-11T22:19:30", "db": "PACKETSTORM", "id": "59220" }, { "date": "2007-09-20T08:11:10", "db": "PACKETSTORM", "id": "59440" }, { "date": "2007-09-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200709-152" }, { "date": "2007-09-12T10:17:00", "db": "NVD", "id": "CVE-2007-4826" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-09-13T17:20:00", "db": "BID", "id": "25634" }, { "date": "2012-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001159" }, { "date": "2007-09-17T00:00:00", "db": "CNNVD", "id": "CNNVD-200709-152" }, { "date": "2017-07-29T01:33:00", "db": "NVD", "id": "CVE-2007-4826" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "59307" }, { "db": "PACKETSTORM", "id": "59371" }, { "db": "CNNVD", "id": "CNNVD-200709-152" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Quagga of bgpd Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001159" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200709-152" } ], "trust": 0.6 } }
gsd-2007-4826
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2007-4826", "description": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.", "id": "GSD-2007-4826", "references": [ "https://www.suse.com/security/cve/CVE-2007-4826.html", "https://www.debian.org/security/2007/dsa-1382", "https://access.redhat.com/errata/RHSA-2010:0785", "https://linux.oracle.com/cve/CVE-2007-4826.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-4826" ], "details": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.", "id": "GSD-2007-4826", "modified": "2023-12-13T01:21:36.401546Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-4826", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://fedoranews.org/updates/FEDORA-2007-219.shtml", "refsource": "MISC", "url": "http://fedoranews.org/updates/FEDORA-2007-219.shtml" }, { "name": "http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html", "refsource": "MISC", "url": "http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html" }, { "name": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760", "refsource": "MISC", "url": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760" }, { "name": "http://secunia.com/advisories/26744", "refsource": "MISC", "url": "http://secunia.com/advisories/26744" }, { "name": "http://secunia.com/advisories/26829", "refsource": "MISC", "url": "http://secunia.com/advisories/26829" }, { "name": "http://secunia.com/advisories/26863", "refsource": "MISC", "url": "http://secunia.com/advisories/26863" }, { "name": "http://secunia.com/advisories/27049", "refsource": "MISC", "url": "http://secunia.com/advisories/27049" }, { "name": "http://secunia.com/advisories/29743", "refsource": "MISC", "url": "http://secunia.com/advisories/29743" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1" }, { "name": "http://www.debian.org/security/2007/dsa-1382", "refsource": "MISC", "url": "http://www.debian.org/security/2007/dsa-1382" }, { "name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:182", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:182" }, { "name": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt", "refsource": "MISC", "url": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0785.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0785.html" }, { "name": "http://www.securityfocus.com/bid/25634", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/25634" }, { "name": "http://www.trustix.org/errata/2007/0028/", "refsource": "MISC", "url": "http://www.trustix.org/errata/2007/0028/" }, { "name": "http://www.ubuntu.com/usn/usn-512-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-512-1" }, { "name": "http://www.vupen.com/english/advisories/2007/3129", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2007/3129" }, { "name": "http://www.vupen.com/english/advisories/2008/1195/references", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/1195/references" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36551", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36551" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.99.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-4826" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://quagga.net/news2.php?y=2007\u0026m=9\u0026d=7#id1189190760" }, { "name": "25634", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25634" }, { "name": "26744", "refsource": "SECUNIA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26744" }, { "name": "[debian-security-announce] 20071003 [SECURITY] [DSA 1379-1] New quagga packages fix denial of service", "refsource": "MLIST", "tags": [], "url": "http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html" }, { "name": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt", "refsource": "CONFIRM", "tags": [], "url": "http://www.quagga.net/download/quagga-0.99.9.changelog.txt" }, { "name": "DSA-1382", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2007/dsa-1382" }, { "name": "FEDORA-2007-2196", "refsource": "FEDORA", "tags": [], "url": "http://fedoranews.org/updates/FEDORA-2007-219.shtml" }, { "name": "MDKSA-2007:182", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:182" }, { "name": "2007-0028", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2007/0028/" }, { "name": "USN-512-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-512-1" }, { "name": "26829", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26829" }, { "name": "26863", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26863" }, { "name": "27049", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27049" }, { "name": "236141", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1" }, { "name": "29743", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29743" }, { "name": "RHSA-2010:0785", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0785.html" }, { "name": "ADV-2007-3129", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/3129" }, { "name": "ADV-2008-1195", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1195/references" }, { "name": "quagga-bgpd-dos(36551)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36551" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-07-29T01:33Z", "publishedDate": "2007-09-12T10:17Z" } } }
rhsa-2010_0785
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated quagga packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Quagga is a TCP/IP based routing software suite. The Quagga bgpd daemon\nimplements the BGP (Border Gateway Protocol) routing protocol.\n\nA stack-based buffer overflow flaw was found in the way the Quagga bgpd\ndaemon processed certain BGP Route Refresh (RR) messages. A configured BGP\npeer could send a specially-crafted BGP message, causing bgpd on a target\nsystem to crash or, possibly, execute arbitrary code with the privileges of\nthe user running bgpd. (CVE-2010-2948)\n\nNote: On Red Hat Enterprise Linux 5 it is not possible to exploit\nCVE-2010-2948 to run arbitrary code as the overflow is blocked by\nFORTIFY_SOURCE.\n\nMultiple NULL pointer dereference flaws were found in the way the Quagga\nbgpd daemon processed certain specially-crafted BGP messages. A configured\nBGP peer could crash bgpd on a target system via specially-crafted BGP\nmessages. (CVE-2007-4826)\n\nUsers of quagga should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the bgpd daemon must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0785", "url": "https://access.redhat.com/errata/RHSA-2010:0785" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "285691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=285691" }, { "category": "external", "summary": "626783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=626783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0785.json" } ], "title": "Red Hat Security Advisory: quagga security update", "tracking": { "current_release_date": "2024-11-22T03:43:33+00:00", "generator": { "date": "2024-11-22T03:43:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0785", "initial_release_date": "2010-10-20T16:19:00+00:00", "revision_history": [ { "date": "2010-10-20T16:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-20T12:24:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:43:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "product": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "product_id": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.3-4.el4_8.1?arch=ia64" } } }, { "category": "product_version", "name": "quagga-0:0.98.3-4.el4_8.1.ia64", "product": { "name": "quagga-0:0.98.3-4.el4_8.1.ia64", "product_id": "quagga-0:0.98.3-4.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.3-4.el4_8.1?arch=ia64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "product": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "product_id": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.3-4.el4_8.1?arch=ia64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.3-4.el4_8.1.ia64", "product": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ia64", "product_id": "quagga-devel-0:0.98.3-4.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.3-4.el4_8.1?arch=ia64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "product": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "product_id": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-5.el5_5.2?arch=ia64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.6-5.el5_5.2.ia64", "product": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ia64", "product_id": "quagga-devel-0:0.98.6-5.el5_5.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.6-5.el5_5.2?arch=ia64" } } }, { "category": "product_version", "name": "quagga-0:0.98.6-5.el5_5.2.ia64", "product": { "name": "quagga-0:0.98.6-5.el5_5.2.ia64", "product_id": "quagga-0:0.98.6-5.el5_5.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.6-5.el5_5.2?arch=ia64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "product": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "product_id": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-5.el5_5.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "product": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "product_id": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.3-4.el4_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-0:0.98.3-4.el4_8.1.x86_64", "product": { "name": "quagga-0:0.98.3-4.el4_8.1.x86_64", "product_id": "quagga-0:0.98.3-4.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.3-4.el4_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "product": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "product_id": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.3-4.el4_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "product": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "product_id": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.3-4.el4_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "product": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "product_id": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.6-5.el5_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-0:0.98.6-5.el5_5.2.x86_64", "product": { "name": "quagga-0:0.98.6-5.el5_5.2.x86_64", "product_id": "quagga-0:0.98.6-5.el5_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.6-5.el5_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "product": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "product_id": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-5.el5_5.2?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "product": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "product_id": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-5.el5_5.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "quagga-contrib-0:0.98.3-4.el4_8.1.i386", "product": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.i386", "product_id": "quagga-contrib-0:0.98.3-4.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.3-4.el4_8.1?arch=i386" } } }, { "category": "product_version", "name": "quagga-0:0.98.3-4.el4_8.1.i386", "product": { "name": "quagga-0:0.98.3-4.el4_8.1.i386", "product_id": "quagga-0:0.98.3-4.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.3-4.el4_8.1?arch=i386" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "product": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "product_id": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.3-4.el4_8.1?arch=i386" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.3-4.el4_8.1.i386", "product": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.i386", "product_id": "quagga-devel-0:0.98.3-4.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.3-4.el4_8.1?arch=i386" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.6-5.el5_5.2.i386", "product": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.i386", "product_id": "quagga-devel-0:0.98.6-5.el5_5.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.6-5.el5_5.2?arch=i386" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "product": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "product_id": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-5.el5_5.2?arch=i386" } } }, { "category": "product_version", "name": "quagga-0:0.98.6-5.el5_5.2.i386", "product": { "name": "quagga-0:0.98.6-5.el5_5.2.i386", "product_id": "quagga-0:0.98.6-5.el5_5.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.6-5.el5_5.2?arch=i386" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.98.6-5.el5_5.2.i386", "product": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.i386", "product_id": "quagga-contrib-0:0.98.6-5.el5_5.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-5.el5_5.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.98.3-4.el4_8.1.src", "product": { "name": "quagga-0:0.98.3-4.el4_8.1.src", "product_id": "quagga-0:0.98.3-4.el4_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.3-4.el4_8.1?arch=src" } } }, { "category": "product_version", "name": "quagga-0:0.98.6-5.el5_5.2.src", "product": { "name": "quagga-0:0.98.6-5.el5_5.2.src", "product_id": "quagga-0:0.98.6-5.el5_5.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.6-5.el5_5.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "product": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "product_id": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.3-4.el4_8.1?arch=ppc" } } }, { "category": "product_version", "name": "quagga-0:0.98.3-4.el4_8.1.ppc", "product": { "name": "quagga-0:0.98.3-4.el4_8.1.ppc", "product_id": "quagga-0:0.98.3-4.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.3-4.el4_8.1?arch=ppc" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "product": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "product_id": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.3-4.el4_8.1?arch=ppc" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.3-4.el4_8.1.ppc", "product": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ppc", "product_id": "quagga-devel-0:0.98.3-4.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.3-4.el4_8.1?arch=ppc" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "product": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "product_id": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-5.el5_5.2?arch=ppc" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc", "product": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc", "product_id": "quagga-devel-0:0.98.6-5.el5_5.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.6-5.el5_5.2?arch=ppc" } } }, { "category": "product_version", "name": "quagga-0:0.98.6-5.el5_5.2.ppc", "product": { "name": "quagga-0:0.98.6-5.el5_5.2.ppc", "product_id": "quagga-0:0.98.6-5.el5_5.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.6-5.el5_5.2?arch=ppc" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "product": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "product_id": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-5.el5_5.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "product": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "product_id": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.3-4.el4_8.1?arch=s390x" } } }, { "category": "product_version", "name": "quagga-0:0.98.3-4.el4_8.1.s390x", "product": { "name": "quagga-0:0.98.3-4.el4_8.1.s390x", "product_id": "quagga-0:0.98.3-4.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.3-4.el4_8.1?arch=s390x" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "product": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "product_id": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.3-4.el4_8.1?arch=s390x" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390x", "product": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390x", "product_id": "quagga-devel-0:0.98.3-4.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.3-4.el4_8.1?arch=s390x" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "product": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "product_id": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.6-5.el5_5.2?arch=s390x" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390x", "product": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390x", "product_id": "quagga-devel-0:0.98.6-5.el5_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.6-5.el5_5.2?arch=s390x" } } }, { "category": "product_version", "name": "quagga-0:0.98.6-5.el5_5.2.s390x", "product": { "name": "quagga-0:0.98.6-5.el5_5.2.s390x", "product_id": "quagga-0:0.98.6-5.el5_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.6-5.el5_5.2?arch=s390x" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "product": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "product_id": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-5.el5_5.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390", "product": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390", "product_id": "quagga-contrib-0:0.98.3-4.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.98.3-4.el4_8.1?arch=s390" } } }, { "category": "product_version", "name": "quagga-0:0.98.3-4.el4_8.1.s390", "product": { "name": "quagga-0:0.98.3-4.el4_8.1.s390", "product_id": "quagga-0:0.98.3-4.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.98.3-4.el4_8.1?arch=s390" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "product": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "product_id": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.3-4.el4_8.1?arch=s390" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390", "product": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390", "product_id": "quagga-devel-0:0.98.3-4.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.3-4.el4_8.1?arch=s390" } } }, { "category": "product_version", "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390", "product": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390", "product_id": "quagga-devel-0:0.98.6-5.el5_5.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.6-5.el5_5.2?arch=s390" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "product": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "product_id": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-5.el5_5.2?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "product": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "product_id": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.98.6-5.el5_5.2?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "product": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "product_id": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.98.6-5.el5_5.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-0:0.98.3-4.el4_8.1.src" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-devel-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-0:0.98.3-4.el4_8.1.src" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-0:0.98.3-4.el4_8.1.src" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-devel-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:quagga-devel-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-0:0.98.3-4.el4_8.1.src" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-devel-0:0.98.3-4.el4_8.1.i386" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ia64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ppc" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390x" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64" }, "product_reference": "quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.src" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-0:0.98.6-5.el5_5.2.src" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-devel-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-0:0.98.6-5.el5_5.2.src" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-devel-0:0.98.6-5.el5_5.2.i386" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ia64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390x" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" }, "product_reference": "quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4826", "discovery_date": "2007-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "285691" } ], "notes": [ { "category": "description", "text": "bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.", "title": "Vulnerability description" }, { "category": "summary", "text": "quagga bgpd DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=285691\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:quagga-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-0:0.98.3-4.el4_8.1.src", "4AS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-0:0.98.3-4.el4_8.1.src", "4Desktop:quagga-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-0:0.98.3-4.el4_8.1.src", "4ES:quagga-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-0:0.98.3-4.el4_8.1.src", "4WS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.src", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-0:0.98.6-5.el5_5.2.src", "5Client:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-0:0.98.6-5.el5_5.2.src", "5Server:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4826" }, { "category": "external", "summary": "RHBZ#285691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=285691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4826", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4826" } ], "release_date": "2007-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-20T16:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:quagga-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-0:0.98.3-4.el4_8.1.src", "4AS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-0:0.98.3-4.el4_8.1.src", "4Desktop:quagga-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-0:0.98.3-4.el4_8.1.src", "4ES:quagga-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-0:0.98.3-4.el4_8.1.src", "4WS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.src", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-0:0.98.6-5.el5_5.2.src", "5Client:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-0:0.98.6-5.el5_5.2.src", "5Server:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0785" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS:quagga-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-0:0.98.3-4.el4_8.1.src", "4AS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-0:0.98.3-4.el4_8.1.src", "4Desktop:quagga-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-0:0.98.3-4.el4_8.1.src", "4ES:quagga-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-0:0.98.3-4.el4_8.1.src", "4WS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.src", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-0:0.98.6-5.el5_5.2.src", "5Client:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-0:0.98.6-5.el5_5.2.src", "5Server:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "quagga bgpd DoS" }, { "cve": "CVE-2010-2948", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2010-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "626783" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.", "title": "Vulnerability description" }, { "category": "summary", "text": "(bgpd): Stack buffer overflow by processing certain Route-Refresh messages", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 3\ndue to this product being in Production 3 of its maintenance\nlife-cycle, where only qualified security errata of important and\ncritical impact are addressed.\n\nFor further information about the Errata Support Policy, visit:\nhttp://www.redhat.com/security/updates/errata\n\nA future update in Red Hat Enterprise Linux 4 and\nRed Hat Enterprise Linux 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:quagga-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-0:0.98.3-4.el4_8.1.src", "4AS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-0:0.98.3-4.el4_8.1.src", "4Desktop:quagga-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-0:0.98.3-4.el4_8.1.src", "4ES:quagga-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-0:0.98.3-4.el4_8.1.src", "4WS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.src", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-0:0.98.6-5.el5_5.2.src", "5Client:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-0:0.98.6-5.el5_5.2.src", "5Server:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2948" }, { "category": "external", "summary": "RHBZ#626783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=626783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2948", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2948" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2948", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2948" } ], "release_date": "2010-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-20T16:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:quagga-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-0:0.98.3-4.el4_8.1.src", "4AS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-0:0.98.3-4.el4_8.1.src", "4Desktop:quagga-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-0:0.98.3-4.el4_8.1.src", "4ES:quagga-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-0:0.98.3-4.el4_8.1.src", "4WS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.src", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-0:0.98.6-5.el5_5.2.src", "5Client:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-0:0.98.6-5.el5_5.2.src", "5Server:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0785" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:quagga-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-0:0.98.3-4.el4_8.1.src", "4AS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4AS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-0:0.98.3-4.el4_8.1.src", "4Desktop:quagga-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4Desktop:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-0:0.98.3-4.el4_8.1.src", "4ES:quagga-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4ES:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-0:0.98.3-4.el4_8.1.src", "4WS:quagga-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-contrib-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-debuginfo-0:0.98.3-4.el4_8.1.x86_64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.i386", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ia64", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.ppc", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.s390x", "4WS:quagga-devel-0:0.98.3-4.el4_8.1.x86_64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.src", "5Client-Workstation:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client-Workstation:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-0:0.98.6-5.el5_5.2.src", "5Client:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Client:quagga-devel-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-0:0.98.6-5.el5_5.2.src", "5Server:quagga-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-contrib-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-debuginfo-0:0.98.6-5.el5_5.2.x86_64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.i386", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ia64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.ppc64", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.s390x", "5Server:quagga-devel-0:0.98.6-5.el5_5.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "(bgpd): Stack buffer overflow by processing certain Route-Refresh messages" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.