Vyatta documentation

Learn how to install, configure, and operate the Vyatta Network Operating System (Vyatta NOS) and Orchestrator, which help drive our virtual networking and physical platforms portfolio.

Show Page Sections

Patch release notes 2308b

Release notes for Vyatta NOS 2308b, released February 2, 2024.

Issues resolved

Issues resolved in 2308b.

Key Priority Summary
VRVDR-63348CriticalAdding attributes to the routemap configuration does not result in changes to the routemap after a neighbor reset
VRVDR-63301CriticalBGP: Routemaps with continue <rule#> do not take effect on a match
VRVDR-63281CriticalDPI/AAR: Traffic is ignored
VRVDR-63246CriticalGRE: Having an incorrect ttl value and setting the ignore-df flag does not ignore the DF bit of the payload when encapsulating IP traffic
VRVDR-63245CriticalGRE: The ttl ip parameter is ineffective
VRVDR-63188CriticalNetflow export probably causes Vyatta to lose connection.
VRVDR-63054CriticalEnables support for AS path lists
VRVDR-63289MajorBGP and OSPF: Provisioning errors seen in logs
VRVDR-62724MajorIPsec fails with the following errors in logs:
  • Fatal error: No netlink response from dataplane
  • peer too aggressive
VRVDR-62687MinorVRRP RFC-compatibility produces the following error in the log:
  • received an unexpected ip number count 2, expected 1!

Security vulnerabilities resolved

Security vulnerabilities resolved in 2308b.

Key CVSS Advisory Summary
VRVDR-635909.8DSA-5586-1CVE-2021-41617 CVE-2023-28531 CVE-2023-48795 CVE-2023-51384CVE-2023-51385: Debian DSA-5586-1: openssh — security update
VRVDR-623429.8DSA-5523-1CVE-2023-38545 CVE-2023-38546: [DSA 5523-1] curl — security update
VRVDR-626719.1DSA-5533-1[DSA 5533-1] gst-plugins-bad1.0 — security update
VRVDR-633638.3DSA-5565-1[DSA 5565-1] gst-plugins-bad1.0 — security update
VRVDR-580818.1DSA-5150-1CVE-2022-24903: Debian DSA-5150-1: rsyslog — security update
VRVDR-634167.5DSA-5570-1CVE-2023-44487: Debian DSA-5570-1: nghttp2 — security update
VRVDR-585497.5DSA-5209-1CVE-2022-24805, CVE-2022-24806, CVE-2022-24807, CVE-2022-24808, CVE-2022-24809, CVE-2022-24810: Debian DSA-5209-1: net-snmp — security update
VRVDR-635957.2DSA-5591-1[DSA 5591-1] libssh — security update
VRVDR-635877.2DSA-5583-1[DSA 5583-1] gst-plugins-bad1.0 — security update
VRVDR-572736.8DSA-5105-1CVE-2021-25220, CVE-2022-0396: Debian DSA-5105-1: bind9 — security update
VRVDR-635916.5DSA-5587-1CVE-2023-46218, CVE-2023-46219: Debian DSA-5587-1: curl — security update
VRVDR-633656.5DSA-5567-1CVE-2023-3576 CVE-2023-40745 CVE-2023-41175: Debian DSA-5567-1: tiff — security update
VRVDR-589436.5DSA-5251-1CVE-2022-2928, CVE-2022-2929: Debian DSA-5251-1: isc-dhcp — security update
VRVDR-635355.9CVE-2023-48795CVE-2023-48795: prefix truncation attack targeting the SSH protocol (Terrapin Attack)

New features

New features introduced in 2308b.

Issue numberPrioritySummary
VRVDR-63108CriticalEnables support for ibgp local-as