Debian Patches
Status for ovn/26.03.0-4
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| lp-2066194-tests-Ignore-ovs-vswitchd-received-packet-on-unknown.patch | tests: Ignore ovs-vswitchd received packet on unknown port. The ovs-vswitchd daemon may in some situations, typically during teardown, log a warning level message 'received packet on unknown port ...'. Ignore this message. |
Frode Nordahl <fnordahl@ubuntu.com> | no | 2024-05-20 | ||
| fix-nonascii-in-ovn-nb.xml.patch | Fix non-ascii in ovn-nb.xml | Thomas Goirand <zigo@debian.org> | no | debian | 2026-05-11 | |
| CVE-2026-5265_pinctrl_Limit_the_IP_packet_size_to_buffer_size_for_ICMP_Need_Frag.patch | CVE-2026-5265 pinctrl: Limit the IP packet size to buffer size for ICMP Need Frag. The ICMP need frag copies part of the IP packet, which is limited by the space after ICMP header. However the packet size would be taken from the IP header itself. That is problematic because we could receive empty packet with the IP header packet size set to arbitrary number. To prevent that limit the size to the buffer size so we will never copy more than what is in the packet data. . Fixes: c2339d87268d ("ovn: Add a new OVN action 'icmp4_error'") diff --git a/controller/pinctrl.c b/controller/pinctrl.c index 18b7b0df2e..682b88b1ab 100644 |
Ales Musil <amusil@redhat.com> | no | upstream, https://github.com/ovn-org/ovn/commit/9d674c684a56aef12c53b1e4596b6eded23a0402.patch | 2026-05-11 | |
| CVE-2026-5367_pinctrl_Unify_handling_of_DHCPv6_options.patch | CVE-2026-5367 pinctrl: Unify handling of DHCPv6 options. Unify the handling of DHCPv6 options. This is addressing several problems that were present in the DHCPv6 handling: . 1) There were inconsistent length checks for the packet length. It would be possible to craft a packet that had an option header without any data which could lead to a crash because we would attempt to deref data after the packet buffer. . 2) We could end up reading data after the packet buffer. This could happen when the option header would lie about the data length in the option. . 3) Unbounded strcmp for a string created by user. . 4) The parsing was inconsistent and very hard to read. . Make sure the parsing is done using helpers that should prevent the mentioned issues. diff --git a/controller/pinctrl.c b/controller/pinctrl.c index 682b88b1ab..de52ac87f7 100644 |
Ales Musil <amusil@redhat.com> | no | debian | upstream, https://github.com/ovn-org/ovn/commit/78f6ce612403d6343f1e3782cbfff691d411dee4.patch | 2026-05-11 |
All known versions for source package 'ovn'
- 26.03.0-4 (sid)
- 26.03.0-2 (forky)
- 25.03.0-1 (trixie)
- 23.03.1-1~deb12u2 (bookworm)
