Amazon Linux 2 Security Advisory: ALAS-2021-1637
Advisory Release Date: 2021-05-20 15:56 Pacific
Advisory Updated Date: 2021-05-24 17:55 Pacific
lldptool can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal. (CVE-2018-10932)
Affected Packages:
lldpad
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update lldpad to update your system.
aarch64:
lldpad-1.0.1-5.git036e314.amzn2.0.1.aarch64
lldpad-devel-1.0.1-5.git036e314.amzn2.0.1.aarch64
lldpad-debuginfo-1.0.1-5.git036e314.amzn2.0.1.aarch64
i686:
lldpad-1.0.1-5.git036e314.amzn2.0.1.i686
lldpad-devel-1.0.1-5.git036e314.amzn2.0.1.i686
lldpad-debuginfo-1.0.1-5.git036e314.amzn2.0.1.i686
src:
lldpad-1.0.1-5.git036e314.amzn2.0.1.src
x86_64:
lldpad-1.0.1-5.git036e314.amzn2.0.1.x86_64
lldpad-devel-1.0.1-5.git036e314.amzn2.0.1.x86_64
lldpad-debuginfo-1.0.1-5.git036e314.amzn2.0.1.x86_64