From: Vincent Bernat Date: Fri, 2 Apr 2021 07:48:50 +0000 (+0200) Subject: security: more security fixes X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=50ee672485b2d0f2236d1d27bb962e12745afccd;p=thirdparty%2Flldpd.git security: more security fixes --- diff --git a/content/security.html b/content/security.html index e745a9a9..f2af67bb 100644 --- a/content/security.html +++ b/content/security.html @@ -14,8 +14,8 @@ directly. duplicate port description, system name, or system description TLV and trigger a memory leak. The vulnerability does not allow arbitrary code execution. This bug is present since the initial - release. It has been fixed in commit [a8d3c90f][] and in version - 1.0.8. + release. It has been fixed in commits [a8d3c90f][] (1.0.8), and + [7d60bf30][] (1.0.9) * [CVE-2015-8011][]: buffer overflow when handling management address TLV for LLDP. When a remote device was advertising a too large @@ -43,6 +43,7 @@ directly. [dd4f16e7]: https://github.com/lldpd/lldpd/commit/dd4f16e7e816f2165fba76e3d162cd8d2978dcb2 [793526f8]: https://github.com/lldpd/lldpd/commit/793526f8884455f43daecd0a2c46772388417a00 [a8d3c90f]: https://github.com/lldpd/lldpd/commit/a8d3c90feca548fc0656d95b5d278713db86ff61 +[7d60bf30]: https://github.com/lldpd/lldpd/commit/7d60bf30effc4c88f17f3d58ecaa72479f16d4be {# Local Variables: #} {# mode: markdown #}