Vyatta documentation

Learn how to install, configure, and operate the Vyatta Network Operating System (Vyatta NOS) and Orchestrator, which help drive our virtual networking and physical platforms portfolio.

Show Page Sections

Patch release notes 2204g

Release notes for Vyatta NOS 2204g released February 29, 2024.

Issues resolved

Issues resolved in 2204g.

Issue numberPrioritySummary
VRVDR-62364CriticalMellanox MT28800 ConnectX-5 SR-IOV: interface is down after configuring jumbo MTU
VRVDR-60048CriticalFlapping BGP Default route during IPv6 Failure
VRVDR-63709MajorUpgrade from 2012g to 2204f causes error querying policy failed: Invalid argument (22)
VRVDR-63659MajorMellanox MT28800 ConnectX-5 SR-IOV: interface is down with configured jumbo MTU
VRVDR-62355MajorMellanox MT28800 ConnectX-5: receiving jumbo frame on non-jumbo configured interface causes data plane crash
VRVDR-61066MajorCommunity list configuration accepts alphanumeric community values

Security vulnerabilities resolved

Security vulnerabilities resolved in 2204g.

Issue numberCVSSAdvisorySummary
VRVDR-637189.8 DLA-3711-1Debian dla-3711 : linux-config-5.10 – security update
VRVDR-623789.8 DLA-3614-1CVE-2022-48560, CVE-2022-48564, CVE-2022-48565, CVE-2022-48566, CVE-2023-40217: Debian DLA-3614-1: python3.7 – LTS security update
VRVDR-623329.8 DLA-3610-1CVE-2018-20060, CVE-2019-9740, CVE-2019-11236, CVE-2019-11324, CVE-2020-26116, CVE-2020-26137, CVE-2023-43804: Debian DLA-3610-1: python-urllib3 – LTS security update
VRVDR-623199.8 DLA-3605-1CVE-2023-4692, CVE-2023-4693: Debian DLA-3605-1 : grub2 – LTS – security update
VRVDR-638788.8 DLA-3732-1CVE-2023-7090, CVE-2023-28486, CVE-2023-28487: Debian dla-3732: sudo – security update
VRVDR-623218.1DLA-3604-1 CVE-2020-24165, CVE-2023-0330, CVE-2023-3180: Debian DLA-3604-1: qemu – security update
VRVDR-622827.8 DLA-3588-1CVE-2023-4752, CVE-2023-4781: Debian DLA-3588-1: vim – LTS security update
VRVDR-638667.5 DLA-3726-1CVE-2023-3341: Debian dla-3726: bind9 – security update
VRVDR-633587.5 DLA-3660-1CVE-2023-5981: Debian DLA-3660-1: gnutls28 – LTS security update
VRVDR-631337.5 DLA-3646-1CVE-2023-34058, CVE-2023-34059: Debian DLA-3646-1: open-vm-tools – LTS security update
VRVDR-627087.5 DLA-3634-1CVE-2020-25648, CVE-2023-4421: Debian DLA-3634-1: nss – LTS security update
VRVDR-624667.5 DLA-3621-1CVE-2020-11080, CVE-2023-44487: Debian DLA-3621-1: nghttp2 – LTS security update
VRVDR-622907.5 DLA-3597-1CVE-2023-20900: Debian DLA-3597-1: open-vm-tools – LTS – security update
VRVDR-589057.5 CVE-2022-40617strongSwan: CVE-2022-40617/Untrusted URLs for Revocation Checking might lead to DoS
VRVDR-630217.2 DLA-3639-1Debian DLA-3639-1: distro-info-data – LTS database update
VRVDR-626757.2 DLA-3629-1CVE-2019-10222, CVE-2020-1700, CVE-2020-1760, CVE-2020-10753, CVE-2020-12059, CVE-2020-25678, CVE-2020-27781, CVE-2021-3524, CVE-2021-3531, CVE-2021-3979, CVE-2021-20288, CVE-2023-43040: Debian DLA-3629-1: ceph – LTS security update
VRVDR-636007.1 DLA-3689-1CVE-2020-0556, CVE-2023-45866: Debian DLA-3689-1: bluez – LTS security update
VRVDR-631757.1 DLA-3649-1CVE-2023-43803: Debian DLA-3649-1: python-urllib3 – LTS security update
VRVDR-634326.7 DLA-3682-1CVE-2021-39537, CVE-2023-29491: Debian DLA-3682-1: ncurses – LTS security update
VRVDR-636016.5 DLA-3692-1CVE-2023-28322, CVE-2023-46218: Debian DLA-3692-1: curl – LTS security update
VRVDR-626746.5 DLA-3628-1CVE-2023-34969: Debian DLA-3628-1: dbus – LTS security update
VRVDR-625116.5 DLA-3626-1CVE-2023-36054: Debian DLA-3626-1: krb5 – LTS security update
VRVDR-622816.5 DLA-3586-1CVE-2020-19189: Debian DLA-3586-1: ncurses – LTS security update
VRVDR-638076.1 DLA-3715-1CVE-2024-22195: Debian dla-3715: python-jinja2 – security update
VRVDR-623775.9 DLA-3613-1CVE-2023-28321, CVE-2023-38546: Debian DLA-3613-1: curl – LTS security update
VRVDR-623205.3 DLA-3602-1CVE-2023-43785 CVE-2023-43786 CVE-2023-43787: Debian DLA-3602-1: libx11 – LTS security update
VRVDR-638084.9 DLA-3722-1CVE-2023-22084: Debian dla-3722: libmariadb-dev – security update

New features

New features introduced in 2204g.

Feature numberPrioritySummary
VRVDR-62366MajorVRRP: Adding or Removing VRRP causes all virtual routers to change the state with preempt: true

Limitations, restrictions, or behavior changes

Limitations, restrictions, or behavior changes introduced in release notes for Vyatta NOS 2204g.

BGP

VRVDR-60048: Flapping BGP Default route during IPv6 failure.

  • Avoids resolving the BGP nexthop using the default route or through a unicast BGP route, as this can lead to constant BGP route installation churn in the RIB, due to alternative BGP bestpath selection.

VRRP

VRVDR-62366: VRRP — Adding or removing VRRP causes all virtual routers to change the state with preempt: true.

  • VRRP now preserves the state of VRRP groups across configuration changes regardless of preempt setting. Previously, this preservation was only applied to VRRP groups configured with preempt set to false.