-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2459-2 security@xxxxxxxxxx http://www.debian.org/security/ Florian Weimer May 04, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : quagga Vulnerability : regression Problem type : remote Debian-specific: no The recent quagga update, DSA-2459-1, introduced a memory leak in the bgpd process in some configurations. For the stable distribution (squeeze), this problem has been fixed in version 0.99.20.1-0+squeeze2. We recommend that you upgrade your quagga packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJPpFAgAAoJEL97/wQC1SS+HzgH/ikUoSRCeVqx2664IJklSEin 1Yi/dcKS1zUM9fk7nNlIk7NSpRXGBFhQ72QSo7PKCXw4FmglZXJCn5i7rnMv2/xT nxFsUtnrk6L25X12V0vlTws15t/04iHE2nmuOhqy1rOIxlq91T6ngrilr4+ZpMVp ePvKpRQBjqPIOd+8HFtHsmcrEkCpkOHupvUZ3rTIIs+rIs1ijZP3j+PzJbIDkqLR GhQEShktIrQ8HD1mq+eIw7AQ5dWPctwLT0ZmuLLU5nS9BP3j5BQM/syHKDQEhdfj BbCudBN0sjt8kK3Rvyu9Lw7ByCj/7RSSRzkyVT/+VmGCgojJ0Xw1nkFCJ/o3wd4= =xo1n -----END PGP SIGNATURE-----