Package "openvswitch-dbg"
Name: |
openvswitch-dbg
|
Description: |
Debug symbols for Open vSwitch packages
|
Latest version: |
2.13.8-0ubuntu1.4 |
Release: |
focal (20.04) |
Level: |
updates |
Repository: |
main |
Head package: |
openvswitch |
Homepage: |
http://openvswitch.org/ |
Links
Download "openvswitch-dbg"
Other versions of "openvswitch-dbg" in Focal
Changelog
openvswitch (2.13.5-0ubuntu1) focal; urgency=medium
* New upstream point release (LP: #1956754).
* d/p/ovs-dev-ovs-ctl-Allow-recording-hostname-separately.patch: Drop,
included in release.
* d/p/py3-compat.patch: Refresh, various fixes included in point
release.
* d/p/CVE-2021-36980.patch: Drop, included in release.
-- James Page <email address hidden> Thu, 13 Jan 2022 10:57:22 +0000
|
Source diff to previous version |
1956754 |
[SRU] openvswitch 2.13.5 |
CVE-2021-36980 |
Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) du |
|
openvswitch (2.13.3-0ubuntu0.20.04.2) focal-security; urgency=medium
* SECURITY UPDATE: use-after-free in decode_NXAST_RAW_ENCAP
- debian/patches/CVE-2021-36980.patch: get a new pointer before using
in lib/ofp-actions.c.
- CVE-2021-36980
-- Marc Deslauriers <email address hidden> Mon, 26 Jul 2021 13:04:37 -0400
|
Source diff to previous version |
CVE-2021-36980 |
Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) du |
|
openvswitch (2.13.3-0ubuntu0.20.04.1) focal; urgency=medium
[ James Page ]
* New upstream point release (LP: #1920141, LP: #1907686).
* Dropped security patches, included in release:
- CVE-2015-8011.patch
- CVE-2020-27827.patch
- CVE-2020-35498.patch
* Add BD on libdbus-1-dev to resolve linking issues for DPDK builds due
to changes in DPDK.
* d/control: Set minimum version of libdpdk-dev to avoid build
failures with 19.11.6-0ubuntu0.20.04.1.
[ Frode Nordahl ]
* Fix recording of FQDN/hostname on startup (LP: #1915829):
- d/p/ovs-dev-ovs-ctl-Allow-recording-hostname-separately.patch: Cherry
pick of committed upstream fix to support skip of hostname
configuration on ovs-vswitchd/ovsdb-server startup.
- d/openvswitch-switch.ovs-record-hostname.service: Record hostname in
Open vSwitch after network-online.target using new systemd unit.
- d/openvswitch-switch.ovs-vswitchd.service: Pass `--no-record-hostname`
option to `ovs-ctl` to delegate recording of hostname to the separate
service.
- d/openvswitch-switch.ovsdb-server.service: Pass `--no-record-hostname`
option to `ovs-ctl` to delegate recording of hostname to the separate
service.
- d/openvswitch-switch.service: Add `Also` reference to
ovs-record-hostname.service so that the service is enabled on install.
- d/rules: Add `ovs-record-hostname.service` to package build.
-- James Page <email address hidden> Wed, 24 Mar 2021 08:46:41 +0000
|
Source diff to previous version |
1920141 |
[SRU] openvswitch 2.13.3 / linking changes in DPDK 19.11.x |
1915829 |
FQDN / hostname recorded in OVSDB is unreliable |
CVE-2015-8011 |
Buffer overflow in the lldp_decode function in daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote attackers to cause a denial of service (da |
CVE-2020-27827 |
RESERVED |
CVE-2020-35498 |
RESERVED |
|
openvswitch (2.13.1-0ubuntu0.20.04.4) focal-security; urgency=medium
* SECURITY UPDATE: packet parsing vulnerability
- debian/patches/CVE-2020-35498.patch: support extra padding length in
lib/conntrack.c, lib/dp-packet.h, lib/flow.c, tests/classifier.at.
- CVE-2020-35498
-- Marc Deslauriers <email address hidden> Thu, 28 Jan 2021 14:47:58 -0500
|
Source diff to previous version |
|
openvswitch (2.13.1-0ubuntu0.20.04.3) focal-security; urgency=medium
* SECURITY UPDATE: buffer overflow decoding malformed packets in lldp
- debian/patches/CVE-2015-8011.patch: check lengths in lib/lldp/lldp.c.
- CVE-2015-8011
* SECURITY UPDATE: Externally triggered memory leak in lldp
- debian/patches/CVE-2020-27827.patch: properly free memory in
lib/lldp/lldp.c.
- CVE-2020-27827
-- Marc Deslauriers <email address hidden> Fri, 08 Jan 2021 07:29:51 -0500
|
CVE-2015-8011 |
Buffer overflow in the lldp_decode function in daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote attackers to cause a denial of service (da |
CVE-2020-27827 |
RESERVED |
|
About
-
Send Feedback to @ubuntu_updates