Vyatta documentation

Learn how to install, configure, and operate the Vyatta Network Operating System (Vyatta NOS) and Orchestrator, which help drive our virtual networking and physical platforms portfolio.

Show Page Sections

Patch release notes 1912q

Release notes for Vyatta NOS 1912q, released September 7, 2021.

Issues resolved

Issues resolved in release 1912q.

Issue numberPrioritySummary
VRVDR-54591BlockerTACACS authentications fails when TACACS accounting has a large backlog
VRVDR-52912Criticalservice-user creation fails due to moved SSSD databases
VRVDR-52855CriticalCreating service users fails
VRVDR-52671Criticalsssd_nss crashes on startup if filesystem containing in-memory cache backing files is full
VRVDR-51580CriticalCommand Accounting: Start record support
VRVDR-55753MajorMulticast: eliminate or hide FAL counter logs
VRVDR-55749MajorSwapped in SFP doesn't pick up configured MTU
VRVDR-55569MajorMRIBv6 FIB: Peek error Resource temporarily unavailable
VRVDR-55011MajorCan't log into a SIAD with read-only SSD
VRVDR-53135Major"protocols multicast ip log-warning" doesn't log any warnings
VRVDR-53114MajorTACACS+ session accounting may still use hostname instead of IP address
VRVDR-53099MajorTACACS+ starts only when service is restarted manually
VRVDR-53085MajorMulticast IPv4 and IPv6 is mutually exclusive on SIAD
VRVDR-52997Majortacplusd get_tty_login_addr() may overflow buffer
VRVDR-52842Majorsssd pipes should not be shared with user sandboxes
VRVDR-52730Majorsssd should not run as root
VRVDR-52241MajorTACACS: Sanity Test Command Authorisation fails due to Tacacs+ D-Bus Daemon restart
VRVDR-52120MajorHostname may be sent instead of IP address in TACACS+ accounting requests
VRVDR-52091Majortacplusd should not run as root
VRVDR-51809MajorTACACS+ session accounting: task_id in stop record differs from task_id in start record
VRVDR-50803Majortacplusd logs are very chatty by default
VRVDR-50552Major'TACACS daemon is not running' even with all TACACS config
VRVDR-50310MajorSIAD multicast traffic counted on output interface
VRVDR-50036MajorAdd TACACS+/SSSD information to tech support output
VRVDR-42098MajorTACACS+ Server Connection Timeout
VRVDR-42094MinorTACACS+ Server Enable / Disable

Security vulnerabilities resolved

Security vulnerabilities resolved in release 1912q.

Issue numberCVSSAdvisorySummary
VRVDR-555387.8DLA-2690-1 CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-26139, CVE-2020-26147, CVE-2020-26558, CVE-2020-29374, CVE-2021-0129, CVE-2021-3483, CVE-2021-3506, CVE-2021-3564, CVE-2021-3573, CVE-2021-3587, CVE-2021-23133, CVE-2021-23134, CVE-2021-28688, CVE-2021-28964, CVE-2021-28971, CVE-2021-29154, CVE-2021-29155, CVE-2021-29264, CVE-2021-29647, CVE-2021-29650, CVE-2021-31829, CVE-2021-31916, CVE-2021-32399, CVE-2021-33034: Debian DLA-2690-1: linux LTS security update
VRVDR-557617.8DSA-4941-1 CVE-2020-36311, CVE-2021-3609, CVE-2021-33909, CVE-2021-34693: Debian DSA-4941-1: linux security update
VRVDR-559487.4DLA-2734-1 CVE-2021-22898, CVE-2021-22924: Debian DLA-2734-1: curl – LTS security update
VRVDR-559516.5DLA-2735-1 CVE-2018-14662, CVE-2018-16846, CVE-2020-1760, CVE-2020-10753, CVE-2021-3524: Debian DLA-2735-1: ceph – LTS security update
VRVDR-557925.5DLA-2715-1 CVE-2021-33910: Debian DLA-2715-1: systemd - LTS security update
VRVDR-55648N/ADLA-2703-1 Debian DLA-2703-1 : ieee-data - LTS security update
VRVDR-55979N/ADLA-2738-1 CVE-2021-3672: Debian DLA-2738-1 : c-ares - LTS security update