Skip to navigation

Bug Fix Advisory lldpad bug fix update

Advisory: RHBA-2012:1175-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-08-20
Last updated on: 2012-08-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated lldpad packages that fix a bug are now available for Red Hat Enterprise
Linux 6.

The lldpad packages provide the Linux user space daemon and configuration tool
for Intel's Link Layer Discovery Protocol (LLDP) agent with Enhanced Ethernet
support.

This update fixes the following bug:

* Previously, an error in the DCBX (Data Center Bridging Exchange) version
selection logic could cause LLDPDUs (Link Layer Discovery Protocol Data Units)
to be not encoded in the TLV (Type-Length Value) format during the transition
from IEEE DCBX to the legacy DCBX mode. Consequently, link flaps, a delay, or a
failure in synchronizing up DCBX between the host and a peer device could occur.
In the case of booting from a remote FCoE (Fibre-Channel Over Ethernet) LUN
(Logical Unit Number), this bug could result in a failure to boot. This update
fixes the bug and TLV is now always used in the described scenario. (BZ#844415)

All users of lldpad are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
lldpad-0.9.43-20.el6_3.src.rpm
File outdated by:  RHBA-2013:1637
    MD5: 2a24e3b81f66614211f7a14a7229f5b3
SHA-256: 3a821f8702e0d8ca0291222aca5e7d96b41dd6279b1235fec490ef7a8a963cc7
 
IA-32:
lldpad-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 35cc7b2b79e07bdefdefeffd64f5102d
SHA-256: 98097c455918fbf8991ecc1180803d25f013571107ed7e9b72e3e87712792dae
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-devel-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
 
x86_64:
lldpad-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: a2124f7d491091c08e71e09ef034ebd9
SHA-256: 083aa7b8e0c658e35d17a28caffaa5efec08b2cca46c89b4ce62989159b83d8e
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-debuginfo-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: cdebd1edd9cce700baf2ae673f29c9cb
SHA-256: b795759752544d0f7fa1ae1ae0e0ee0688b11a3a1aa35dd2292a1f9b68f1fba8
lldpad-devel-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
lldpad-devel-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: 441e1160f02da47141068da25996acd1
SHA-256: c4332118c1d9653eec532c73867a7d095623cc1dc117eb7f561c02b8f383ae0a
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
lldpad-0.9.43-20.el6_3.src.rpm
File outdated by:  RHBA-2013:1637
    MD5: 2a24e3b81f66614211f7a14a7229f5b3
SHA-256: 3a821f8702e0d8ca0291222aca5e7d96b41dd6279b1235fec490ef7a8a963cc7
 
IA-32:
lldpad-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 35cc7b2b79e07bdefdefeffd64f5102d
SHA-256: 98097c455918fbf8991ecc1180803d25f013571107ed7e9b72e3e87712792dae
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-devel-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
 
PPC:
lldpad-0.9.43-20.el6_3.ppc64.rpm
File outdated by:  RHBA-2013:1637
    MD5: ffb2e034ba798ceea6544f30af2f227e
SHA-256: 288cde852e70c9c73b6475a8a12d012b0be68eeb60e64a3396f7e5e7645688f8
lldpad-debuginfo-0.9.43-20.el6_3.ppc.rpm
File outdated by:  RHBA-2013:1637
    MD5: 0ad2cf012ddcf4f400a65bc33d3b2a94
SHA-256: 9eaa5ee5c61a535a1db0f1f4b005a3eed4986c74fb671c82b6f40df3e6997813
lldpad-debuginfo-0.9.43-20.el6_3.ppc64.rpm
File outdated by:  RHBA-2013:1637
    MD5: 5b5e1d77013cdfb2c16ccacc993d4ab9
SHA-256: 74bdac06233ed3d3eb54b00d169572dfa4157d3988f308ff7f32bf5d6c17854f
lldpad-devel-0.9.43-20.el6_3.ppc.rpm
File outdated by:  RHBA-2013:1637
    MD5: adfc110d26af831422d6e5ba6701d320
SHA-256: 4d840f5196970fcf28dedcbc011f44893b2bfa17045879ed8b974a829583c1e2
lldpad-devel-0.9.43-20.el6_3.ppc64.rpm
File outdated by:  RHBA-2013:1637
    MD5: f6ea432e36245b90f0c0a112e035e9ec
SHA-256: 0ec7ea895f7db61a7dab9dc71fe3a8d422cc46053c60155bdc006522c229ac73
 
s390x:
lldpad-0.9.43-20.el6_3.s390x.rpm
File outdated by:  RHBA-2013:1637
    MD5: dc7332bd89cc37086f0c6f4cefea876c
SHA-256: 4890a0074ea0b80678667941eeea528bf2f644f8901da528cf96cb17d416acf3
lldpad-debuginfo-0.9.43-20.el6_3.s390.rpm
File outdated by:  RHBA-2013:1637
    MD5: 6db23a23cf555bfeaf4bf4aea2f28e86
SHA-256: 95960ce40921f57cf55db5fed50aa9bd82e048f0ad34a179c2338dcac6d2fb57
lldpad-debuginfo-0.9.43-20.el6_3.s390x.rpm
File outdated by:  RHBA-2013:1637
    MD5: 19d750d1e2f2740895ca91883714ba69
SHA-256: e325de8e332780a7858dfb62a93b925a33f92e021542995ae856c17b1e462b55
lldpad-devel-0.9.43-20.el6_3.s390.rpm
File outdated by:  RHBA-2013:1637
    MD5: b3dcc4b17d7dac95efa7dea01e1fbc95
SHA-256: b1662951303d3cb9d9c8f5973504bddc5252c7e6f34d52a46fbf6dbfadf95004
lldpad-devel-0.9.43-20.el6_3.s390x.rpm
File outdated by:  RHBA-2013:1637
    MD5: 3ccd22417e6f246464efeef61ea25c21
SHA-256: 1850ac1fb94f6b88683bf18fcbba3c618c3aa42f427e1367b52eade4ecbcb115
 
x86_64:
lldpad-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: a2124f7d491091c08e71e09ef034ebd9
SHA-256: 083aa7b8e0c658e35d17a28caffaa5efec08b2cca46c89b4ce62989159b83d8e
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-debuginfo-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: cdebd1edd9cce700baf2ae673f29c9cb
SHA-256: b795759752544d0f7fa1ae1ae0e0ee0688b11a3a1aa35dd2292a1f9b68f1fba8
lldpad-devel-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
lldpad-devel-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: 441e1160f02da47141068da25996acd1
SHA-256: c4332118c1d9653eec532c73867a7d095623cc1dc117eb7f561c02b8f383ae0a
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
lldpad-0.9.43-20.el6_3.src.rpm
File outdated by:  RHBA-2013:1637
    MD5: 2a24e3b81f66614211f7a14a7229f5b3
SHA-256: 3a821f8702e0d8ca0291222aca5e7d96b41dd6279b1235fec490ef7a8a963cc7
 
IA-32:
lldpad-0.9.43-20.el6_3.i686.rpm     MD5: 35cc7b2b79e07bdefdefeffd64f5102d
SHA-256: 98097c455918fbf8991ecc1180803d25f013571107ed7e9b72e3e87712792dae
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm     MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-devel-0.9.43-20.el6_3.i686.rpm     MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
 
PPC:
lldpad-0.9.43-20.el6_3.ppc64.rpm     MD5: ffb2e034ba798ceea6544f30af2f227e
SHA-256: 288cde852e70c9c73b6475a8a12d012b0be68eeb60e64a3396f7e5e7645688f8
lldpad-debuginfo-0.9.43-20.el6_3.ppc.rpm     MD5: 0ad2cf012ddcf4f400a65bc33d3b2a94
SHA-256: 9eaa5ee5c61a535a1db0f1f4b005a3eed4986c74fb671c82b6f40df3e6997813
lldpad-debuginfo-0.9.43-20.el6_3.ppc64.rpm     MD5: 5b5e1d77013cdfb2c16ccacc993d4ab9
SHA-256: 74bdac06233ed3d3eb54b00d169572dfa4157d3988f308ff7f32bf5d6c17854f
lldpad-devel-0.9.43-20.el6_3.ppc.rpm     MD5: adfc110d26af831422d6e5ba6701d320
SHA-256: 4d840f5196970fcf28dedcbc011f44893b2bfa17045879ed8b974a829583c1e2
lldpad-devel-0.9.43-20.el6_3.ppc64.rpm     MD5: f6ea432e36245b90f0c0a112e035e9ec
SHA-256: 0ec7ea895f7db61a7dab9dc71fe3a8d422cc46053c60155bdc006522c229ac73
 
s390x:
lldpad-0.9.43-20.el6_3.s390x.rpm     MD5: dc7332bd89cc37086f0c6f4cefea876c
SHA-256: 4890a0074ea0b80678667941eeea528bf2f644f8901da528cf96cb17d416acf3
lldpad-debuginfo-0.9.43-20.el6_3.s390.rpm     MD5: 6db23a23cf555bfeaf4bf4aea2f28e86
SHA-256: 95960ce40921f57cf55db5fed50aa9bd82e048f0ad34a179c2338dcac6d2fb57
lldpad-debuginfo-0.9.43-20.el6_3.s390x.rpm     MD5: 19d750d1e2f2740895ca91883714ba69
SHA-256: e325de8e332780a7858dfb62a93b925a33f92e021542995ae856c17b1e462b55
lldpad-devel-0.9.43-20.el6_3.s390.rpm     MD5: b3dcc4b17d7dac95efa7dea01e1fbc95
SHA-256: b1662951303d3cb9d9c8f5973504bddc5252c7e6f34d52a46fbf6dbfadf95004
lldpad-devel-0.9.43-20.el6_3.s390x.rpm     MD5: 3ccd22417e6f246464efeef61ea25c21
SHA-256: 1850ac1fb94f6b88683bf18fcbba3c618c3aa42f427e1367b52eade4ecbcb115
 
x86_64:
lldpad-0.9.43-20.el6_3.x86_64.rpm     MD5: a2124f7d491091c08e71e09ef034ebd9
SHA-256: 083aa7b8e0c658e35d17a28caffaa5efec08b2cca46c89b4ce62989159b83d8e
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm     MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-debuginfo-0.9.43-20.el6_3.x86_64.rpm     MD5: cdebd1edd9cce700baf2ae673f29c9cb
SHA-256: b795759752544d0f7fa1ae1ae0e0ee0688b11a3a1aa35dd2292a1f9b68f1fba8
lldpad-devel-0.9.43-20.el6_3.i686.rpm     MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
lldpad-devel-0.9.43-20.el6_3.x86_64.rpm     MD5: 441e1160f02da47141068da25996acd1
SHA-256: c4332118c1d9653eec532c73867a7d095623cc1dc117eb7f561c02b8f383ae0a
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
lldpad-0.9.43-20.el6_3.src.rpm
File outdated by:  RHBA-2013:1637
    MD5: 2a24e3b81f66614211f7a14a7229f5b3
SHA-256: 3a821f8702e0d8ca0291222aca5e7d96b41dd6279b1235fec490ef7a8a963cc7
 
IA-32:
lldpad-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 35cc7b2b79e07bdefdefeffd64f5102d
SHA-256: 98097c455918fbf8991ecc1180803d25f013571107ed7e9b72e3e87712792dae
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-devel-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
 
x86_64:
lldpad-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: a2124f7d491091c08e71e09ef034ebd9
SHA-256: 083aa7b8e0c658e35d17a28caffaa5efec08b2cca46c89b4ce62989159b83d8e
lldpad-debuginfo-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: 59706272b43de0622e51531ad7d09eed
SHA-256: b1552cc5edebdd0959cc3b102010527ceca83ca3fe82070993012a7db0a3acb4
lldpad-debuginfo-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: cdebd1edd9cce700baf2ae673f29c9cb
SHA-256: b795759752544d0f7fa1ae1ae0e0ee0688b11a3a1aa35dd2292a1f9b68f1fba8
lldpad-devel-0.9.43-20.el6_3.i686.rpm
File outdated by:  RHBA-2013:1637
    MD5: cddf243cca0713c1d67657d15b4037ed
SHA-256: 24f2e3f754e39bafa29a48650cb14b3323782a5d4c9a0eccafbbb7854d2ec41b
lldpad-devel-0.9.43-20.el6_3.x86_64.rpm
File outdated by:  RHBA-2013:1637
    MD5: 441e1160f02da47141068da25996acd1
SHA-256: c4332118c1d9653eec532c73867a7d095623cc1dc117eb7f561c02b8f383ae0a
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

dcbx,, flap, link, lldpad,


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/