~xnox/ubuntu-z-systems/+git/ovs:branch-2.8

Last commit made on 2021-09-30
Get this branch:
git clone -b branch-2.8 https://git.launchpad.net/~xnox/ubuntu-z-systems/+git/ovs

Branch merges

Branch information

Name:
branch-2.8
Repository:
lp:~xnox/ubuntu-z-systems/+git/ovs

Recent commits

a46eaac... by wilsonpeng <email address hidden>

datapath-windows:adjust Offset when processing packet in POP_VLAN action

In one typical setup, on the Windows VM running OVS Windows Kernel, a Geneva
packet with 8021.q VLAN tag is received. Then it may do POP_VLAN action
processing in Actions.c, if the packet does not have Ieee8021QNetBufferListInfo
in the oob of the packet, it will be processed by function OvsPopVlanInPktBuf().
In the function it will go on remove VLAN header present in the nbl, but related
layers is never readjusted for the offset value at this moment. As a result, it
will cause function OvsValidateIPChecksum drop the packet.

Reported-at:https://github.com/openvswitch/ovs-issues/issues/225
Signed-off-by: wilsonpeng <email address hidden>
Signed-off-by: Alin-Gabriel Serdean <email address hidden>

9d6a2b1... by Ilya Maximets

Prepare for 2.8.12.

Acked-by: Flavio Leitner <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>

cadf779... by Ilya Maximets

Set release date for 2.8.11.

Acked-by: Flavio Leitner <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>

35c2800... by Flavio Leitner <email address hidden>

flow: Support extra padding length.

Although not required, padding can be optionally added until
the packet length is MTU bytes. A packet with extra padding
currently fails sanity checks.

Vulnerability: CVE-2020-35498
Fixes: fa8d9001a624 ("miniflow_extract: Properly handle small IP packets.")
Reported-by: Joakim Hindersson <email address hidden>
Acked-by: Ilya Maximets <email address hidden>
Signed-off-by: Flavio Leitner <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>

abb67c7... by Ilya Maximets

dist-docs: Include manpages generated from rST.

Some manpages are generated from rST, but these are not included
in 'dist-docs' make target.

Fixes: fd0837a76f4c ("doc: Convert ovs-vlan-test to rST")
Acked-by: Ben Pfaff <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>

9b411bf... by David Marchand

github: Fix Ubuntu package installation.

Before trying to install a package, APT cache must be updated to avoid
asking for an unavailable version of a package.

Fixes: 6cb2f5a630e3 ("github: Add GitHub Actions workflow.")
Signed-off-by: David Marchand <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>

fe6be66... by Ilya Maximets

odp-util: Fix abort while formatting nsh actions.

OVS should not exit if it cannot format NSH actions for the user.
It should just report the error like the other formatting functions do.

Credit to OSS-Fuzz.

Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21509
Fixes: 1fc11c5948cf ("Generic encap and decap support for NSH")
Signed-off-by: Ilya Maximets <email address hidden>
Acked-by: Mark Gray <email address hidden>

659f835... by Ilya Maximets

Prepare for 2.8.11.

Acked-by: Aaron Conole <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>

938626b... by Ilya Maximets

Set release date for 2.8.10.

Acked-by: Aaron Conole <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>

a731d12... by aconole

lldp: do not leak memory on multiple instances of TLVs

Upstream commit:
    commit a8d3c90feca548fc0656d95b5d278713db86ff61
    Date: Tue, 17 Nov 2020 09:28:17 -0500

    lldp: avoid memory leak from bad packets

    A packet that contains multiple instances of certain TLVs will cause
    lldpd to continually allocate memory and leak the old memory. As an
    example, multiple instances of system name TLV will cause old values
    to be dropped by the decoding routine.

    Reported-at: https://github.com/openvswitch/ovs/pull/337
    Reported-by: Jonas Rudloff <email address hidden>
    Signed-off-by: Aaron Conole <email address hidden>

Vulnerability: CVE-2020-27827
Signed-off-by: Aaron Conole <email address hidden>
Signed-off-by: Ilya Maximets <email address hidden>