You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/cumulus-linux-37/rn.xml
+96Lines changed: 96 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -43,6 +43,12 @@ To work around this issue, run the <tt>apt-get upgrade</tt> command
43
43
<td></td>
44
44
</tr>
45
45
<tr>
46
+
<td>CM-15812</td>
47
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
48
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
49
+
<td></td>
50
+
</tr>
51
+
<tr>
46
52
<td>2595889</td>
47
53
<td>In a traditional bridge configuration with {{ip-forward off}}, neighbors are synchronized to hardware with a {{switchd}} restart but are cleared when you flap the bridge interface.</td>
48
54
<td>3.7.10-4.2.1</td>
@@ -1788,6 +1794,12 @@ To work around this issue, run the <tt>apt-get upgrade</tt> command
1788
1794
<td></td>
1789
1795
</tr>
1790
1796
<tr>
1797
+
<td>CM-15812</td>
1798
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
1799
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
1800
+
<td></td>
1801
+
</tr>
1802
+
<tr>
1791
1803
<td>2595889</td>
1792
1804
<td>In a traditional bridge configuration with {{ip-forward off}}, neighbors are synchronized to hardware with a {{switchd}} restart but are cleared when you flap the bridge interface.</td>
1793
1805
<td>3.7.10-4.2.1</td>
@@ -4209,6 +4221,12 @@ To work around this issue, run the <tt>apt-get upgrade</tt> command
4209
4221
<td></td>
4210
4222
</tr>
4211
4223
<tr>
4224
+
<td>CM-15812</td>
4225
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
4226
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
4227
+
<td></td>
4228
+
</tr>
4229
+
<tr>
4212
4230
<td>2595889</td>
4213
4231
<td>In a traditional bridge configuration with {{ip-forward off}}, neighbors are synchronized to hardware with a {{switchd}} restart but are cleared when you flap the bridge interface.</td>
4214
4232
<td>3.7.10-4.2.1</td>
@@ -6854,6 +6872,12 @@ To work around this issue, run the <tt>apt-get upgrade</tt> command
6854
6872
<td></td>
6855
6873
</tr>
6856
6874
<tr>
6875
+
<td>CM-15812</td>
6876
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
6877
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
6878
+
<td></td>
6879
+
</tr>
6880
+
<tr>
6857
6881
<td>2595889</td>
6858
6882
<td>In a traditional bridge configuration with {{ip-forward off}}, neighbors are synchronized to hardware with a {{switchd}} restart but are cleared when you flap the bridge interface.</td>
6859
6883
<td>3.7.10-4.2.1</td>
@@ -9362,6 +9386,12 @@ To work around this issue, run the <tt>apt-get upgrade</tt> command
9362
9386
<td></td>
9363
9387
</tr>
9364
9388
<tr>
9389
+
<td>CM-15812</td>
9390
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
9391
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
9392
+
<td></td>
9393
+
</tr>
9394
+
<tr>
9365
9395
<td>2595889</td>
9366
9396
<td>In a traditional bridge configuration with {{ip-forward off}}, neighbors are synchronized to hardware with a {{switchd}} restart but are cleared when you flap the bridge interface.</td>
9367
9397
<td>3.7.10-4.2.1</td>
@@ -11573,6 +11603,12 @@ To work around this issue, run the <tt>apt-get upgrade</tt> command
11573
11603
<td></td>
11574
11604
</tr>
11575
11605
<tr>
11606
+
<td>CM-15812</td>
11607
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
11608
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
11609
+
<td></td>
11610
+
</tr>
11611
+
<tr>
11576
11612
<td>2595889</td>
11577
11613
<td>In a traditional bridge configuration with {{ip-forward off}}, neighbors are synchronized to hardware with a {{switchd}} restart but are cleared when you flap the bridge interface.</td>
11578
11614
<td>3.7.10-4.2.1</td>
@@ -13227,6 +13263,12 @@ More information at https://security-tracker.debian.org/tracker/CVE-2018-6594 .<
13227
13263
<td></td>
13228
13264
</tr>
13229
13265
<tr>
13266
+
<td>CM-15812</td>
13267
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
13268
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
13269
+
<td></td>
13270
+
</tr>
13271
+
<tr>
13230
13272
<td>2556037</td>
13231
13273
<td>After you add an interface to the bridge, an OSPF session flap can occur.
13232
13274
@@ -15207,6 +15249,12 @@ To work around this issue, run the {{sudo ethtool -S swp1}} command to collect i
15207
15249
<td></td>
15208
15250
</tr>
15209
15251
<tr>
15252
+
<td>CM-15812</td>
15253
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
15254
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
15255
+
<td></td>
15256
+
</tr>
15257
+
<tr>
15210
15258
<td>2553887</td>
15211
15259
<td>When using TACACS+ configured with a DEFAULT user providing privilege level lower than 16, TACACS+ configured users with privilege level 16 access might not be able to run privilege level 16 NCLU commands, such as {{net add}} and {{net del}} and see an error similar to the following:
15212
15260
@@ -16645,6 +16693,12 @@ To work around this issue, use {{net show interface}} command for LLDP output wh
16645
16693
<td></td>
16646
16694
</tr>
16647
16695
<tr>
16696
+
<td>CM-15812</td>
16697
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
16698
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
16699
+
<td></td>
16700
+
</tr>
16701
+
<tr>
16648
16702
<td>2553887</td>
16649
16703
<td>When using TACACS+ configured with a DEFAULT user providing privilege level lower than 16, TACACS+ configured users with privilege level 16 access might not be able to run privilege level 16 NCLU commands, such as {{net add}} and {{net del}} and see an error similar to the following:
16650
16704
@@ -18413,6 +18467,12 @@ If you need link pause or PFC functionality, you must use a switch that does not
18413
18467
<td></td>
18414
18468
</tr>
18415
18469
<tr>
18470
+
<td>CM-15812</td>
18471
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
18472
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
18473
+
<td></td>
18474
+
</tr>
18475
+
<tr>
18416
18476
<td>2552739</td>
18417
18477
<td>Counters for IPROUTER rules do not increase when traffic is forwarded to the CPU because there is no IP neighbor.</td>
18418
18478
<td>3.7.2-3.7.14.2</td>
@@ -19925,6 +19985,12 @@ This issue was discovered on the Helix4 switch but applies to all switches.
19925
19985
<td></td>
19926
19986
</tr>
19927
19987
<tr>
19988
+
<td>CM-15812</td>
19989
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
19990
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
19991
+
<td></td>
19992
+
</tr>
19993
+
<tr>
19928
19994
<td>2552739</td>
19929
19995
<td>Counters for IPROUTER rules do not increase when traffic is forwarded to the CPU because there is no IP neighbor.</td>
19930
19996
<td>3.7.2-3.7.14.2</td>
@@ -21089,6 +21155,12 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu
21089
21155
<td></td>
21090
21156
</tr>
21091
21157
<tr>
21158
+
<td>CM-15812</td>
21159
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
21160
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
21161
+
<td></td>
21162
+
</tr>
21163
+
<tr>
21092
21164
<td>2552739</td>
21093
21165
<td>Counters for IPROUTER rules do not increase when traffic is forwarded to the CPU because there is no IP neighbor.</td>
21094
21166
<td>3.7.2-3.7.14.2</td>
@@ -22280,6 +22352,12 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu
22280
22352
<td></td>
22281
22353
</tr>
22282
22354
<tr>
22355
+
<td>CM-15812</td>
22356
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
22357
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
22358
+
<td></td>
22359
+
</tr>
22360
+
<tr>
22283
22361
<td>2552739</td>
22284
22362
<td>Counters for IPROUTER rules do not increase when traffic is forwarded to the CPU because there is no IP neighbor.</td>
22285
22363
<td>3.7.2-3.7.14.2</td>
@@ -23572,6 +23650,12 @@ The NetQ agent has been removed from Cumulus VX 3.7.7. The NetQ agent will be bu
23572
23650
<td></td>
23573
23651
</tr>
23574
23652
<tr>
23653
+
<td>CM-15812</td>
23654
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
23655
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
23656
+
<td></td>
23657
+
</tr>
23658
+
<tr>
23575
23659
<td>2552739</td>
23576
23660
<td>Counters for IPROUTER rules do not increase when traffic is forwarded to the CPU because there is no IP neighbor.</td>
23577
23661
<td>3.7.2-3.7.14.2</td>
@@ -24894,6 +24978,12 @@ Permanent MAC address sync between MLAG peers is now supported.</td>
24894
24978
<td></td>
24895
24979
</tr>
24896
24980
<tr>
24981
+
<td>CM-15812</td>
24982
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
24983
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
24984
+
<td></td>
24985
+
</tr>
24986
+
<tr>
24897
24987
<td>2552352</td>
24898
24988
<td>The following security vulnerabilities have been announced in the nss / libnss3 packages:
24899
24989
CVE-2020-6829: Side channel attack on ECDSA signature generation
@@ -25527,6 +25617,12 @@ To work around this issue, remove the matching {{network}} statement. </td>
25527
25617
<td></td>
25528
25618
</tr>
25529
25619
<tr>
25620
+
<td>CM-15812</td>
25621
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
25622
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
25623
+
<td></td>
25624
+
</tr>
25625
+
<tr>
25530
25626
<td>2552352</td>
25531
25627
<td>The following security vulnerabilities have been announced in the nss / libnss3 packages:
25532
25628
CVE-2020-6829: Side channel attack on ECDSA signature generation
Copy file name to clipboardExpand all lines: content/cumulus-linux-40/Whats-New/rn.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -151,8 +151,10 @@ pdfhidden: True
151
151
152
152
| Issue ID | Description | Affects | Fixed |
153
153
|--- |--- |--- |--- |
154
+
| <aname="CM-28249"></a> [CM-28249](#CM-28249) <aname="CM-28249"></a> <br /> | On the Mellanox switch, when you modify the buffer and queue configuration without restarting `switchd`, you might see a one second interruption in forwarding. | 4.0.0-4.3.0 ||
154
155
| <aname="CM-28080"></a> [CM-28080](#CM-28080) <aname="CM-28080"></a> <br /> | TACACS+ through ClearPass is not currently supported. Cumulus Linux sends authorization before authentication, but ClearPass does not accept an authorization before the user is authenticated. | 3.7.11-3.7.14.2, 4.0.0-4.3.0 ||
155
156
| <aname="CM-21678"></a> [CM-21678](#CM-21678) <aname="CM-21678"></a> <br /> | On a Dell switch with a Maverick ASIC, NetQ might receive false alerts like the following via PagerDuty: <br /><br /><pre> <br />cumulus@switch:~$ netq show sensors temp changes \| grep absent \| grep -v psu <br />P2Leaf01 temp9 networking asic die temp sensor absent 43 105 100 5 Unable to find driver path: /cumulu Add 7d:22h:1m:41s <br />P2Leaf01 temp6 networking asic die temp sensor absent 45 105 100 5 Unable to find driver path: /cumulu Add 7d:22h:1m:41s <br />P2Leaf01 temp6 networking asic die temp sensor absent 47 105 100 5 Unable to read temp4_highest Add 9d:23h:26m:6s <br />P2Leaf01 temp6 networking asic die temp sensor absent 45 105 100 5 Unable to read temp4_highest Add 14d:22h:46m:45s <br /></pre></div></div> <br />This message might occur as a result of a timeout at the hardware level, or the switch might be reporting a failure to get a response. | 3.5.3-3.7.14.2, 4.0.0-4.3.0 ||
157
+
| <aname="CM-15812"></a> [CM-15812](#CM-15812) <aname="CM-15812"></a> <br /> | Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs. | 3.2.1-3.7.14.2, 4.0.0-4.3.0 ||
156
158
| <aname="2595889"></a> [2595889](#2595889) <aname="2595889"></a> <br />CM-31120 | In a traditional bridge configuration with <code>ip-forward off</code>, neighbors are synchronized to hardware with a <code>switchd</code> restart but are cleared when you flap the bridge interface. | 3.7.10-4.2.1 | 4.3.0|
157
159
| <aname="2595816"></a> [2595816](#2595816) <aname="2595816"></a> <br />CM-31222 | Tenant VRF BGP peers appear in the EVPN RMAC and nexthop tables, which causes the kernel RMAC to point at invalid IP address. | 3.7.12-4.2.1 | 4.3.0|
158
160
| <aname="2589747"></a> [2589747](#2589747) <aname="2589747"></a> <br />CM-32226 | If <code>switchd</code> successfully signals <code>clagd</code> that it is going down, <code>clagd</code> stops responding to keepalive echo requests from the peer instead of sending a good bye to the peer over both the peerlink and the backup switch. Eventually, the keepalive timer expires and the secondary switch becomes the primary, and brings the bonds and VNIs back up. However, if <code>switchd</code> does not successfully signal it is going down, (in the event of a crash), the primary switch continues to respond to keepalives, and the bonds and VNIs are down on both peers. | 3.7.12-4.2.1 | 4.3.0|
@@ -323,7 +325,6 @@ pdfhidden: True
323
325
| <aname="2547573"></a> [2547573](#2547573) <aname="2547573"></a> <br />CM-28322 | On Tomahawk switches, when the <code>vxlan_tnl_arp_punt_disable</code> option is set to FALSE, ARP packets are not forwarded to the CPU. | 3.7.9-4.0.1 | 4.1.0-4.3.0|
324
326
| <aname="2547558"></a> [2547558](#2547558) <aname="2547558"></a> <br />CM-28313 | On the EdgeCore Wedge100 and Facebook Wedge-100S switch, certain physical ports are not correctly mapped to the logical ones. For example:<br />Logical swp39 controls physical swp41<br />Logical swp40 controls physical swp42<br />Logical swp43 controls physical swp45<br />Logical swp44 controls physical swp46<br />This might causes incorrect forwarding behavior. | 3.7.11, 4.0.0-4.0.1 | 3.7.12-3.7.14, 4.1.0-4.3.0|
325
327
| <aname="2547509"></a> [2547509](#2547509) <aname="2547509"></a> <br />CM-28276 | When a Trident3 switch receives packets containing an IP checksum value that is not compliant with RFC 1624, the TTL is decremented after a routing operation but the checksum is not recalculated. This results in the IP checksum value being invalid as the packet leaves the switch. | 3.7.10-3.7.11, 4.0.0-4.0.1 | 3.7.12-3.7.14, 4.1.0-4.3.0|
326
-
| <aname="2547445"></a> [2547445](#2547445) <aname="2547445"></a> <br />CM-28249 | On the Mellanox switch, when you modify the buffer and queue configuration without restarting <code>switchd</code>, you might see a one second interruption in forwarding. | 4.0.0-4.3.0 ||
327
328
| <aname="2547443"></a> [2547443](#2547443) <aname="2547443"></a> <br />CM-28248 | On the Dell N3248PXE-ON switch, 25G SFP ports do not work in 10G mode. | 3.7.11-4.0.1 | 4.1.0-4.3.0|
328
329
| <aname="2547405"></a> [2547405](#2547405) <aname="2547405"></a> <br />CM-28226 | When you restart the <code>hsflowd</code> service, you see a <code>systemd</code> warning message similar to the following:<br /><pre><br />Warning: The unit file, source configuration file or drop-ins of hsflowd@mgmt.service changed on disk. Run 'systemctl daemon-reload'.<br /></pre> | 4.0.0-4.3.0 ||
329
330
| <aname="2547399"></a> [2547399](#2547399) <aname="2547399"></a> <br />CM-28221 | The following security vulnerabilities have been announced in qemu, which is not installed by default on Cumulus Linux but is available in the repository for optional installation:<br />CVE-2019-15890 CVE-2020-7039 CVE-2020-1711: security issues have been found in the SLiRP networking implementation of QEMU, a fast processor emulator, which could result in the execution of arbitrary code or denial of service.<br />https://security-tracker.debian.org/tracker/source-package/qemu<br />Vulnerable: <= 3.1+dfsg-8+deb10u3<br />Fixed: 3.1+dfsg-8+deb10u4 | 4.0.0-4.0.1 | 4.1.0-4.3.0|
@@ -510,7 +511,6 @@ pdfhidden: True
510
511
| <aname="2532017"></a> [2532017](#2532017) <aname="2532017"></a> <br />CM-18192 | In FRR, <code>bgp_snmp</code> does not show all BGP peers when peer groups used. | 3.7.11-4.0.1 | 4.1.0-4.3.0|
511
512
| <aname="2531273"></a> [2531273](#2531273) <aname="2531273"></a> <br />CM-17494 | In certain cases, a peer device sends an ARP request from a source IP address that is not on the connected subnet and the switch creates a STALE neighbor entry. Eventually, the switch attempts to keep the entry fresh and sends ARP requests to the host. If the host responds, the switch has REACHABLE neighbor entries for hosts that are not on the connected subnet. <br />To work around this issue, change the value of <code>arp_ignore</code> to 2. See [Address Resolution Protocol in the Cumulus Linux user guide\|https://docs.cumulusnetworks.com/cumulus-linux/Layer-3/Address-Resolution-Protocol-ARP/] for more information. | 4.0.0-4.3.0 ||
512
513
| <aname="2530322"></a> [2530322](#2530322) <aname="2530322"></a> <br />CM-16571 | NCLU cannot manage <code>rsyslog</code> to addresses routed via a VRF. In Cumulus Linux 4.0.0 and later, management VRF is enabled by default. To work around this issue, update the <code>/etc/network/interfaces</code> file to disable management VRF. | 4.0.0-4.3.0 ||
513
-
| <aname="2529544"></a> [2529544](#2529544) <aname="2529544"></a> <br />CM-15812 | Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs. | 4.0.0-4.3.0 ||
Copy file name to clipboardExpand all lines: content/cumulus-linux-40/rn.xml
+12-12Lines changed: 12 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -1086,6 +1086,12 @@ To work around this issue, change the value of <tt>arp_ignore</tt> t
1086
1086
<th> Fixed </th>
1087
1087
</tr>
1088
1088
<tr>
1089
+
<td>CM-28249</td>
1090
+
<td><p>On the Mellanox switch, when you modify the buffer and queue configuration without restarting <tt>switchd</tt>, you might see a one second interruption in forwarding.</p></td>
1091
+
<td>4.0.0-4.3.0</td>
1092
+
<td></td>
1093
+
</tr>
1094
+
<tr>
1089
1095
<td>CM-28080</td>
1090
1096
<td><p>TACACS+ through ClearPass is not currently supported. Cumulus Linux sends authorization before authentication, but ClearPass does not accept an authorization before the user is authenticated.</p></td>
1091
1097
<td>3.7.11-3.7.14.2, 4.0.0-4.3.0</td>
@@ -1109,6 +1115,12 @@ To work around this issue, change the value of <tt>arp_ignore</tt> t
1109
1115
<td></td>
1110
1116
</tr>
1111
1117
<tr>
1118
+
<td>CM-15812</td>
1119
+
<td><p>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</p></td>
1120
+
<td>3.2.1-3.7.14.2, 4.0.0-4.3.0</td>
1121
+
<td></td>
1122
+
</tr>
1123
+
<tr>
1112
1124
<td>2595889</td>
1113
1125
<td>In a traditional bridge configuration with {{ip-forward off}}, neighbors are synchronized to hardware with a {{switchd}} restart but are cleared when you flap the bridge interface.</td>
1114
1126
<td>3.7.10-4.2.1</td>
@@ -2558,12 +2570,6 @@ This might causes incorrect forwarding behavior.</td>
2558
2570
<td>3.7.12-3.7.14, 4.1.0-4.3.0</td>
2559
2571
</tr>
2560
2572
<tr>
2561
-
<td>2547445</td>
2562
-
<td>On the Mellanox switch, when you modify the buffer and queue configuration without restarting {{switchd}}, you might see a one second interruption in forwarding.</td>
2563
-
<td>4.0.0-4.3.0</td>
2564
-
<td></td>
2565
-
</tr>
2566
-
<tr>
2567
2573
<td>2547443</td>
2568
2574
<td>On the Dell N3248PXE-ON switch, 25G SFP ports do not work in 10G mode.</td>
2569
2575
<td>3.7.11-4.0.1</td>
@@ -4065,12 +4071,6 @@ To work around this issue, change the value of {{arp_ignore}} to 2. See [Address
4065
4071
<td>4.0.0-4.3.0</td>
4066
4072
<td></td>
4067
4073
</tr>
4068
-
<tr>
4069
-
<td>2529544</td>
4070
-
<td>Multicast forwarding fails for IP addresses whose DMAC overlaps with reserved DIPs.</td>
0 commit comments