libyang (0.16.105+really1.0-0+deb10u1) buster-security; urgency=high * Non-maintainer upload by the LTS team. * Backport Bullseye version of libyang to facilitate security update of frr. * Fix CVE-2019-20391, CVE-2019-20392, CVE-2019-20393, CVE-2019-20394, CVE-2019-20395, CVE-2019-20396, CVE-2019-20397, CVE-2019-20398. Multiple flaws were found in libyang, a parser toolkit for IETF YANG data modeling. Double frees, invalid memory access and Null pointer dereferences may cause a denial of service or potentially code execution. -- Markus Koschany Tue, 19 Sep 2023 17:53:50 +0200 libyang (0.16.105-1+deb10u1) buster; urgency=medium * Fix CVE-2019-19333 & CVE-2019-19334 (Closes: #946217) * Fix cache corruption crash (upstream bug 752) -- Ondřej Surý Tue, 12 May 2020 09:02:56 +0200 libyang (0.16.105-1) unstable; urgency=medium * upstream 0.16.105 (0.16-r3) release -- David Lamparter Wed, 23 Jan 2019 01:32:43 +0100 libyang (0.16.52-2) unstable; urgency=medium * use correct DEB_HOST_GNU_TYPE to fix i386 build * mark non-libyang C++ symbols as optional (fixes build on several arch) * pull in 2 upstraem fixes to get build working on big-endian -- David Lamparter Thu, 06 Dec 2018 13:33:08 +0100 libyang (0.16.52-1) unstable; urgency=medium * Initial release. * Closes: #913219 -- David Lamparter Sun, 18 Nov 2018 19:30:04 +0100