UbuntuUpdates.org

Package "openvswitch"

Name: openvswitch

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Open vSwitch common components
  • Debug symbols for Open vSwitch packages
  • Open vSwitch documentation
  • Open vSwitch switch implementations

Latest version: 2.13.8-0ubuntu1.4
Release: focal (20.04)
Level: updates
Repository: main

Links



Other versions of "openvswitch" in Focal

Repository Area Version
base main 2.13.0-0ubuntu1
base universe 2.13.0-0ubuntu1
security main 2.13.8-0ubuntu1.4
security universe 2.13.8-0ubuntu1.4
updates universe 2.13.8-0ubuntu1.4

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.13.5-0ubuntu1 2022-03-07 12:06:20 UTC

  openvswitch (2.13.5-0ubuntu1) focal; urgency=medium

  * New upstream point release (LP: #1956754).
  * d/p/ovs-dev-ovs-ctl-Allow-recording-hostname-separately.patch: Drop,
    included in release.
  * d/p/py3-compat.patch: Refresh, various fixes included in point
    release.
  * d/p/CVE-2021-36980.patch: Drop, included in release.

 -- James Page <email address hidden> Thu, 13 Jan 2022 10:57:22 +0000

Source diff to previous version
1956754 [SRU] openvswitch 2.13.5
CVE-2021-36980 Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) du

Version: 2.13.3-0ubuntu0.20.04.2 2021-09-08 13:06:52 UTC

  openvswitch (2.13.3-0ubuntu0.20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: use-after-free in decode_NXAST_RAW_ENCAP
    - debian/patches/CVE-2021-36980.patch: get a new pointer before using
      in lib/ofp-actions.c.
    - CVE-2021-36980

 -- Marc Deslauriers <email address hidden> Mon, 26 Jul 2021 13:04:37 -0400

Source diff to previous version
CVE-2021-36980 Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) du

Version: 2.13.3-0ubuntu0.20.04.1 2021-05-18 01:06:25 UTC

  openvswitch (2.13.3-0ubuntu0.20.04.1) focal; urgency=medium

  [ James Page ]
  * New upstream point release (LP: #1920141, LP: #1907686).
  * Dropped security patches, included in release:
    - CVE-2015-8011.patch
    - CVE-2020-27827.patch
    - CVE-2020-35498.patch
  * Add BD on libdbus-1-dev to resolve linking issues for DPDK builds due
    to changes in DPDK.
  * d/control: Set minimum version of libdpdk-dev to avoid build
    failures with 19.11.6-0ubuntu0.20.04.1.

  [ Frode Nordahl ]
  * Fix recording of FQDN/hostname on startup (LP: #1915829):
    - d/p/ovs-dev-ovs-ctl-Allow-recording-hostname-separately.patch: Cherry
      pick of committed upstream fix to support skip of hostname
      configuration on ovs-vswitchd/ovsdb-server startup.
    - d/openvswitch-switch.ovs-record-hostname.service: Record hostname in
      Open vSwitch after network-online.target using new systemd unit.
    - d/openvswitch-switch.ovs-vswitchd.service: Pass `--no-record-hostname`
      option to `ovs-ctl` to delegate recording of hostname to the separate
      service.
    - d/openvswitch-switch.ovsdb-server.service: Pass `--no-record-hostname`
      option to `ovs-ctl` to delegate recording of hostname to the separate
      service.
    - d/openvswitch-switch.service: Add `Also` reference to
      ovs-record-hostname.service so that the service is enabled on install.
    - d/rules: Add `ovs-record-hostname.service` to package build.

 -- James Page <email address hidden> Wed, 24 Mar 2021 08:46:41 +0000

Source diff to previous version
1920141 [SRU] openvswitch 2.13.3 / linking changes in DPDK 19.11.x
1915829 FQDN / hostname recorded in OVSDB is unreliable
CVE-2015-8011 Buffer overflow in the lldp_decode function in daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote attackers to cause a denial of service (da
CVE-2020-27827 RESERVED
CVE-2020-35498 RESERVED

Version: 2.13.1-0ubuntu0.20.04.4 2021-02-10 17:06:26 UTC

  openvswitch (2.13.1-0ubuntu0.20.04.4) focal-security; urgency=medium

  * SECURITY UPDATE: packet parsing vulnerability
    - debian/patches/CVE-2020-35498.patch: support extra padding length in
      lib/conntrack.c, lib/dp-packet.h, lib/flow.c, tests/classifier.at.
    - CVE-2020-35498

 -- Marc Deslauriers <email address hidden> Thu, 28 Jan 2021 14:47:58 -0500

Source diff to previous version
CVE-2020-35498 RESERVED

Version: 2.13.1-0ubuntu0.20.04.3 2021-01-13 20:06:28 UTC

  openvswitch (2.13.1-0ubuntu0.20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: buffer overflow decoding malformed packets in lldp
    - debian/patches/CVE-2015-8011.patch: check lengths in lib/lldp/lldp.c.
    - CVE-2015-8011
  * SECURITY UPDATE: Externally triggered memory leak in lldp
    - debian/patches/CVE-2020-27827.patch: properly free memory in
      lib/lldp/lldp.c.
    - CVE-2020-27827

 -- Marc Deslauriers <email address hidden> Fri, 08 Jan 2021 07:29:51 -0500

CVE-2015-8011 Buffer overflow in the lldp_decode function in daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote attackers to cause a denial of service (da
CVE-2020-27827 RESERVED



About   -   Send Feedback to @ubuntu_updates