[SECURITY] Fedora 37 Update: lldpd-1.0.16-1.fc37

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-c0c184a019
2023-04-20 02:53:04.598559
--------------------------------------------------------------------------------

Name        : lldpd
Product     : Fedora 37
Version     : 1.0.16
Release     : 1.fc37
URL         : https://github.com/lldpd/
Summary     : ISC-licensed implementation of LLDP
Description :
LLDP is an industry standard protocol designed to supplant proprietary
Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide
an inter-vendor compatible mechanism to deliver Link-Layer notifications
to adjacent network devices.

--------------------------------------------------------------------------------
Update Information:

Update to the latest 1.0.16:  * Lots of updates, enhancements and fixes from
1.0.4 * CVEs: CVE-2020-27827, CVE-2021-43612
--------------------------------------------------------------------------------
ChangeLog:

* Tue Apr 11 2023 Peter Robinson <pbrobinson@xxxxxxxxxxxxxxxxx> - 1.0.16-1
- Update to 1.0.16
- Modernise spec file
- CVEs: CVE-2020-27827, CVE-2020-27827, CVE-2021-43612
* Thu Jan 19 2023 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 1.0.4-12
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Thu Dec  8 2022 Florian Weimer <fweimer@xxxxxxxxxx> - 1.0.4-11
- Port configure script to C99
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1797336 - lldpd-1.0.16 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1797336
  [ 2 ] Bug #1921441 - CVE-2020-27827 lldpd: lldp/openvswitch: denial of service via externally triggered memory leak [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1921441
  [ 3 ] Bug #2040390 - CVE-2021-43612 lldpd: heap-based buffer overflow [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2040390
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-c0c184a019' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux