- Issued:
- 2018-06-21
- Updated:
- 2018-06-21
RHBA-2018:1962 - Bug Fix Advisory
Synopsis
openvswitch bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openvswitch packages that fix several bugs and add various enhancements are now available in the Fast Datapath channel of Red Hat Enterprise Linux 7.
Description
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
The openvswitch packages have been upgraded to upstream version 2.9.0, which provides a number of bug fixes and enhancements over the previous version.
(BZ#1335825, BZ#1494616, BZ#1540012, BZ#1541144, BZ#1547065, BZ#1552465, BZ#1558143, BZ#1559222, BZ#1559374, BZ#1560728, BZ#1568908, BZ#1575016, BZ#1575067, BZ#1576725, BZ#1578003, BZ#1578324, BZ#1578590, BZ#1578981, BZ#1581230, BZ#1583161, BZ#1583670, BZ#1589866)
Users of openvswitch are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization Manager 4.2 x86_64
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Enterprise Linux Fast Datapath 7 x86_64
Fixes
- BZ - 1335825 - [RFE] IOMMU support in DPDK for Vhost-user using IOTLB caching
- BZ - 1494616 - OVS daemon got seqfaults inside qede set mtu
- BZ - 1540012 - Cisco system add dpdk port to ovs bridge failed when configure mtu_request to be a jumbo frame
- BZ - 1547065 - Failed to create OVN Logical Switch names with unicode characters 2.9.0
- BZ - 1552465 - High TRex packets loss during live migration over ovs+dpdk+vhost-user
- BZ - 1559222 - [ovn]fail to ping remote hv after two chassis claim lsp at the same time
- BZ - 1559374 - ovs package update complains openvswitch user not exist
- BZ - 1560728 - Assertion auxv_fd != -1 failed in DPDK. openvswitch.service will not start
- BZ - 1575016 - ovs-vswitchd mempool free race condition
- BZ - 1575067 - Backport "net/nfp: fix mbufs releasing when stop or close"
- BZ - 1576725 - ovn-nbctl command showing the gateway chassis not accounting for priority
- BZ - 1578003 - [fdProd] Enable QEDE PMD on x86_64
- BZ - 1578324 - Backport "netdev-dpdk: don't enable scatter for jumbo RX support for nfp "
- BZ - 1578590 - [OVS] [qede] Got ERR when configuring OVS-dpdk with qede NIC
- BZ - 1578981 - [OVS] [qede] OVS daemon crashed in qede_rss_hash_update while configuring OVS-dpdk with qede dpdk interface
- BZ - 1583670 - Backport NFP PMD's "net/nfp: fix lock file usage"
- BZ - 1589866 - [OVS] [qede] OVS daemon got segfault while repeatedly configuring OVS-dpdk bridge
CVEs
(none)
References
(none)
Red Hat Virtualization Manager 4.2
SRPM | |
---|---|
openvswitch-2.9.0-47.el7fdp.1.src.rpm | SHA-256: c5ca6df3574400b93182ce2bc73885e0cc9ee8c19030a9ec6c3cb563c1fc0cef |
x86_64 | |
openvswitch-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 277a3daf3f81182ebb545f3d77f3263459b2186689d1dc39b8fc2925d9daae0e |
openvswitch-debuginfo-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: bb72b1047c2780b0940cb7036bd4e45671bf6509398b27678960e363fe539e42 |
openvswitch-devel-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: ff41eefd8f1f0edf82eef13c4c008c2dd9a6030d2d6ab6f617fbb0464c197dd0 |
openvswitch-ovn-central-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: de8c5bbafb7daf6ce1e8e0f7e40699e48ffbef0dd1848d15232100bd1c4b56ee |
openvswitch-ovn-common-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 79657193f64c8647937c8a401f727cda8f6da4854dba1c4b440e41de3e62601f |
openvswitch-ovn-host-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 3b6627aa375df25acabbc39be6e70204fc7c4659c4b023fe5309fa0b98fbc7f3 |
python-openvswitch-2.9.0-47.el7fdp.1.noarch.rpm | SHA-256: 5221d802d9485ed27de6f29736bf6141acaa84887d9fd8ae7c784f3fa6cac331 |
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
openvswitch-2.9.0-47.el7fdp.1.src.rpm | SHA-256: c5ca6df3574400b93182ce2bc73885e0cc9ee8c19030a9ec6c3cb563c1fc0cef |
x86_64 | |
openvswitch-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 277a3daf3f81182ebb545f3d77f3263459b2186689d1dc39b8fc2925d9daae0e |
openvswitch-debuginfo-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: bb72b1047c2780b0940cb7036bd4e45671bf6509398b27678960e363fe539e42 |
openvswitch-devel-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: ff41eefd8f1f0edf82eef13c4c008c2dd9a6030d2d6ab6f617fbb0464c197dd0 |
openvswitch-ovn-common-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 79657193f64c8647937c8a401f727cda8f6da4854dba1c4b440e41de3e62601f |
openvswitch-ovn-host-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 3b6627aa375df25acabbc39be6e70204fc7c4659c4b023fe5309fa0b98fbc7f3 |
python-openvswitch-2.9.0-47.el7fdp.1.noarch.rpm | SHA-256: 5221d802d9485ed27de6f29736bf6141acaa84887d9fd8ae7c784f3fa6cac331 |
Red Hat Enterprise Linux Fast Datapath 7
SRPM | |
---|---|
openvswitch-2.9.0-47.el7fdp.1.src.rpm | SHA-256: c5ca6df3574400b93182ce2bc73885e0cc9ee8c19030a9ec6c3cb563c1fc0cef |
x86_64 | |
openvswitch-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 277a3daf3f81182ebb545f3d77f3263459b2186689d1dc39b8fc2925d9daae0e |
openvswitch-debuginfo-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: bb72b1047c2780b0940cb7036bd4e45671bf6509398b27678960e363fe539e42 |
openvswitch-devel-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: ff41eefd8f1f0edf82eef13c4c008c2dd9a6030d2d6ab6f617fbb0464c197dd0 |
openvswitch-ovn-central-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: de8c5bbafb7daf6ce1e8e0f7e40699e48ffbef0dd1848d15232100bd1c4b56ee |
openvswitch-ovn-common-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 79657193f64c8647937c8a401f727cda8f6da4854dba1c4b440e41de3e62601f |
openvswitch-ovn-host-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 3b6627aa375df25acabbc39be6e70204fc7c4659c4b023fe5309fa0b98fbc7f3 |
openvswitch-ovn-vtep-2.9.0-47.el7fdp.1.x86_64.rpm | SHA-256: 55127dc4500b93126150f4c3284c6ffd32ae206c81c2bbb6327cd7855c1b4d49 |
openvswitch-test-2.9.0-47.el7fdp.1.noarch.rpm | SHA-256: d1a964a5c5f50e9a90451ce9307b26331cb4f07b259d5a5e8b0740de3cac392d |
python-openvswitch-2.9.0-47.el7fdp.1.noarch.rpm | SHA-256: 5221d802d9485ed27de6f29736bf6141acaa84887d9fd8ae7c784f3fa6cac331 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.