Package: lldpd / 0.7.11-2+deb8u1

Metadata

Package Version Patches format
lldpd 0.7.11-2+deb8u1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
0001 systemd fix systemd unit file.patch | (download)

edit.am | 1 1 + 0 - 0 !
1 file changed, 1 insertion(+)

 [patch] systemd: fix systemd unit file

@sbindir@ was not properly replaced.

0001 lib fix pkgconfig file substitutions.patch | (download)

src/lib/lldpctl.pc.in | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 [patch] lib: fix pkgconfig file substitutions


0001 lldp fix a buffer overflow when handling management .patch | (download)

src/daemon/lldp.c | 7 6 + 1 - 0 !
1 file changed, 6 insertions(+), 1 deletion(-)

 [patch 1/2] lldp: fix a buffer overflow when handling management
 address TLV

When a remote device was advertising a too large management address
while still respecting TLV boundaries, lldpd would crash due to a buffer
overflow. However, the buffer being a static one, this buffer overflow
is not exploitable if hardening was not disabled. This bug exists since
version 0.5.6.

0002 protocols don t use assert on paths that can be reac.patch | (download)

src/daemon/cdp.c | 10 7 + 3 - 0 !
src/daemon/edp.c | 1 0 + 1 - 0 !
src/daemon/lldp.c | 14 8 + 6 - 0 !
src/daemon/lldpd.c | 1 0 + 1 - 0 !
src/daemon/sonmp.c | 8 5 + 3 - 0 !
5 files changed, 20 insertions(+), 14 deletions(-)

 [patch 2/2] protocols: don't use assert on paths that can be reached

Malformed packets should not make lldpd crash. Ensure we can handle them
by not using assert() in this part.