- Issued:
- 2019-06-05
- Updated:
- 2019-06-05
RHBA-2019:1385 - Bug Fix Advisory
Synopsis
ovn2.11 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovn2.11 packages that fix several bugs and add several enhancements are now available in Fast Datapath for Red Hat Enterprise Linux 7.
Description
OVN, the Open Virtual Network, is a system to support virtual network
abstraction. OVN complements the existing capabilities of OVS to add native
support for virtual network abstractions, such as virtual L2 and L3 overlays and
security groups.
Bug Fix(es) and Enhancement(s):
- OVN - Support Logical ports of type "external" (BZ#1666673)
- Configure the static ipv4 and ipv6 together because port not able to get dynamic mac address. (BZ#1679386)
- Traffic is not distributed from VM1 FIP to VM2 FIP even if DVR is enabled. (BZ#1701183)
- Fragmentation support (BZ#1702331)
- Limit Geneve to within Transport Zones. (BZ#1702550)
Users of ovn2.11 are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Fast Datapath 7 x86_64
- Red Hat Enterprise Linux Fast Datapath (for RHEL Server for IBM Power LE) 7 ppc64le
Fixes
- BZ - 1666673 - RFE: OVN - Support Logical ports of type "external"
- BZ - 1679386 - [ovn]configure the static ipv4 and ipv6 together cause port not able to get dynamic mac address
- BZ - 1701183 - [OVN] Traffic is not distributed from VM1 FIP to VM2 FIP even if DVR is enabled
- BZ - 1702331 - [OVN] Fragmentation support
- BZ - 1702550 - [RFE] Limit Geneve to within Transport Zones
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Fast Datapath 7
SRPM | |
---|---|
ovn2.11-2.11.0-16.el7fdp.src.rpm | SHA-256: 6bf8294b84c9be0fc3e342acf86f5ea2933bfcf07c8c823cb20d46d5d16b7c09 |
x86_64 | |
ovn2.11-2.11.0-16.el7fdp.x86_64.rpm | SHA-256: 3d0c37a14518b5d035e2dc3aeb80eaca74f659125000418c0885ce94d5f9f3e6 |
ovn2.11-central-2.11.0-16.el7fdp.x86_64.rpm | SHA-256: 2574a578880ae97ed99e6b73d9658a633a3cd4a4cda3bf319431124a27758876 |
ovn2.11-debuginfo-2.11.0-16.el7fdp.x86_64.rpm | SHA-256: 08157a9f21e3d2c90478d88dcb0be48e7a734e390077f344e2f0b94f258194df |
ovn2.11-host-2.11.0-16.el7fdp.x86_64.rpm | SHA-256: 90ca5edf6b177a9c2b29c64972d1015134d6c6bb087850fc0499bd0f2f4ed592 |
ovn2.11-vtep-2.11.0-16.el7fdp.x86_64.rpm | SHA-256: 59a98c20b4839d2d6d4988b1d22ff0b468067d0b15680f4c136bd9d7fa5b8271 |
Red Hat Enterprise Linux Fast Datapath (for RHEL Server for IBM Power LE) 7
SRPM | |
---|---|
ovn2.11-2.11.0-16.el7fdp.src.rpm | SHA-256: 6bf8294b84c9be0fc3e342acf86f5ea2933bfcf07c8c823cb20d46d5d16b7c09 |
ppc64le | |
ovn2.11-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: 5c49cb468a18e985638947b968b93b384ac43a28b0cee3cc882ebc45b527d261 |
ovn2.11-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: 5c49cb468a18e985638947b968b93b384ac43a28b0cee3cc882ebc45b527d261 |
ovn2.11-central-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: 1c031fe86f2181541ac1834a69302e9c7e93c9aba17ef87ef9efe415c91034c8 |
ovn2.11-central-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: 1c031fe86f2181541ac1834a69302e9c7e93c9aba17ef87ef9efe415c91034c8 |
ovn2.11-debuginfo-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: 4bd107aea876690add6beb86ba0df28b61cd04a11997a8d08bea715856dc2516 |
ovn2.11-debuginfo-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: 4bd107aea876690add6beb86ba0df28b61cd04a11997a8d08bea715856dc2516 |
ovn2.11-host-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: e19c1c957f32bcb97bd0fe85b82dcf347d5b547fa277fb63f7f8a2cbaacb970a |
ovn2.11-host-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: e19c1c957f32bcb97bd0fe85b82dcf347d5b547fa277fb63f7f8a2cbaacb970a |
ovn2.11-vtep-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: a8e15fe3c1e446fdb8ad2a084d80aac5114034c6f431894f53431c49db30ba6a |
ovn2.11-vtep-2.11.0-16.el7fdp.ppc64le.rpm | SHA-256: a8e15fe3c1e446fdb8ad2a084d80aac5114034c6f431894f53431c49db30ba6a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.