Cumulus Linux 4.4 Release Notes

Download 4.4 Release Notes xls    Download all 4.4 release notes as .xls

4.4.1 Release Notes

Open Issues in 4.4.1

Issue IDDescriptionAffectsFixed
2804044
The SDK process sx_core prints the messages shown below and the switch stops forwarding traffic
kernel: sx_core: Did not receive completion for SDQ dqn (1) idx (849) after 10 secondskernel: sx_core: __sx_core_post_send: Cannot send packet on dqn [1] sdq stuck
4.4.0-4.4.1
2799742
On the Edgecore AS4610 switch, the historic CPU usage displayed in /run/sysmonitor/history sometimes shows as a negative value.3.7.12-3.7.15, 4.2.1-4.4.1
2794747
If you change the clagd-vxlan-anycast-ip setting on both MLAG peers at the same time, both peers use their unique VTEP address indefinitely.4.3.0-4.4.1
2792816
When you enable PTP on an unnumbered interface, the /etc/ptp4l.conf file does not update and ptp4l.service fails.4.4.0-4.4.1
2792616
If a neighbor entry (ARP or NDP) is used as a next hop of a route that is synchronized into hardware, the neighbor entry is not removed from hardware after the neighbor is no longer reachable. As a result, routed traffic matching this prefix is incorrectly hardware-forwarded via the stale neighbor information.4.3.0-4.4.1
2788780
When you enable ARP and ND suppression and the switch forwards ARP and ND packets to the kernel, RX_DRP counters might increment but the packets process as normal.4.4.0-4.4.1
2780915
In NVUE, you can’t deactivate the IPv4 address family per neighbor.4.4.0-4.4.1
2780834
To enable an address family on a peer, you have to enable the address family globally.4.4.0-4.4.1
2780211
When you use the NVUE nv set vrf default router bgp peer local-as asn command to configure a local AS, Cumulus Linux does not update the etc/frr/frr.conf file.4.4.0-4.4.1
2770030
When you modify the default pre-auth policy located in /etc/cumulus/acl/policy.d/dot1x_preauth_dacl, after restarting hostapd the /etc/cumulus/acl/policy.d/dot1x_preauth_dacl directory is deleted and recreated with the default rule set that comes from the hostapd binary.4.3.0-4.4.1
2754791
Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP.3.7.14.2-3.7.15, 4.3.0-4.4.1
2748923
If you include a dash when configuring a bond name, you see an internal server error.4.4.0-4.4.1
2747750
Links connected between a Spectrum 2 switch configured for warm boot and Spectrum 3 switches configured for cold boot might not come up when the switches are booted.4.4.1
2743186
When you use MD5 passwords and you configure a non-default VRF configuration before the default VRF configuration in the /etc/frr/frr.conf file, numbered BGP sessions do not establish.4.4.0-4.4.1
2739648
If you configure BGP graceful restart in the /etc/frr/frr.conf file, then apply the configuration with systemctl reload frr, the configuration fails to apply and you see the following error:
Job for frr.service failed
See “systemctl status frr.service” and “journalctl -xe” for details
4.3.0-4.4.1
2739402
The destination MAC address of ERSPAN GRE packets is set to all zeros.4.3.0-4.4.1
2736249
If you configure BGP graceful restart in the /etc/frr/frr.conf file, then apply the configuration with systemctl reload frr, the configuration fails to apply and you see the following error:
Job for frr.service failed
See “systemctl status frr.service” and “journalctl -xe” for details.
4.3.0-4.4.1
2736244
When you run the vtysh command to enable BGP graceful restart on a peer multiple times, the command fails with the following error:
% The Graceful Restart command used is not valid at this moment.
4.4.0-4.4.1
2736108
When you change the VRRP advertisement interval on the master, the master advertisement interval field in the show vrrp command output does not show the updated value.4.4.0-4.4.1
2734119
The ESI line of show bgp l2vpn evpn route command always shows VNI: 0. This is a cosmetic software issue.4.3.0-4.4.1
2734103
ACL [No More Resources] messages keep appearing and you can’t reinstall the ACL.4.3.0-4.4.1
2732587
The bridge MAC address is updated during a port change on bridge interfaces.4.3.0-4.4.1
2730447
The bridge MAC address is updated during a port change on bridge interfaces.4.3.0-4.4.1
2728119
When VRF devices are deleted and reconfigured (for example, during a networking service restart), dynamic BGP neighbors might fail to reestablish. To work around this issue, restart FRR with the sudo systemctl restart frr command.4.3.0-4.4.1
2724191
On the Celestica Seastone switch, when you run smonctl -v, the DIMM 1 Temp Sensor shows as absent
This is a cosmetic software issue and not indicative of a hardware failure on the system.
4.3.0-4.4.1
2722322
When you change the scaled VLAN configuration, restart networking instead of running the ifreload -a command to make sure that resources are allocated correctly.4.4.0-4.4.1
2710927
With downstream VNI, if you route leak between VRFs across different VTEPs when the same originating and target VRFs exist on both the route receiver and the route originator, you might experience traffic loss. For example, if you route leak from VRF RED on VTEP1 to VRF BLUE and GREEN on VTEP2 and VRFs RED, BLUE, and GREEN are configured both on VTEP1 and VTEP2
To work around this issue, use traditional route leaking with the import vrf command instead of the route-target import asn:vni command used with downstream VNI.
4.4.0-4.4.1
2710208
The net show bgp neighbor command output shows the BFD status as UP even when the BGP neighbor is not established, such as when the interface is down.4.2.1-4.4.1
2705056
SVIs do not inherit the pinned MAC address of the bridge.4.3.0-4.4.1
2701000
A default route learned from DHCP on eth0 in the management VRF might install in the default VRF if eth0 is disconnected and the original next hop is reachable in the default VRF
To work around this issue, delete the DHCP lease file for eth0 with the sudo rm /var/lib/dhcp/dhclient.eth0.leases command.
4.3.0-4.4.1
2700767
Following an event that causes the peerlink bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a “peer-ip-mismatch.” This behavior is seen when you use a “clagd-peer-ip linklocal” configuration.3.7.12-3.7.15, 4.3.0-4.4.1
2699399
When you run the vtysh show ip bgp vrf statistics command, the bgpd service crashes if you use vrf all. For example:
spine01# show ip bgp vrf all statistics vtysh: error reading from bgpd: Success (0)Warning: closing connection to bgpd because of an I/O error!
To workaround this issue, run the command against each VRF independently.
3.7.15, 4.0.0-4.4.1
2699378
Following an event that causes the peerlink bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a “peer-ip-mismatch.” This behavior is seen when you use a “clagd-peer-ip linklocal” configuration.4.3.0-4.4.1
2698649
When configuring a single VXLAN device in the /etc/network/interfaces file, if you edit the multicast group address in vxlan-mcastgrp-map, then revert the change, the change does not take effect.4.4.0-4.4.1
2695314
In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart.4.3.0-4.4.1
2691590
CVE-2021-0089 CVE-2021-26313 CVE-2021-28690 CVE-2021-28692: Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service or information leaks
Vulnerable: <= 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+107-gef32c7afa2-1
4.0.0-4.4.1
2687344
On the NVIDIA SN3700 switch, the decode-syseeprom shows device absent for a PSU that is present.4.4.0-4.4.1
2685994
When you use the NVUE command nv set interface lo router ospf area to configure OSPF on a loopback interface, the configuration fails to apply
To work around this issue, configure the loopback interface in the desired OSPF area with the nv set vrf default router ospf area 0 network command and reference the assigned prefix of the loopback interface. For example:
cumulus@leaf01:~$ nv set vrf default router ospf area 0 network 10.10.10.1/32
4.0.0-4.4.1
2685584
A host migrated to an 802.1x port within the same broadcast domain does not have the correct static FDB entry installed if a dynamic FDB entry for that MAC address exists from previous connectivity in the broadcast domain.4.2.1-4.4.1
2685036
In a PIM configuration where the RP configuration includes an anycast IP address, if the route to that anycast IP address changes while joined to a multicast stream, you might receive the multicast stream from both the old and the new anycast source.4.4.0-4.4.1
2684925
The NVUE nv show vrf default router bgp peer command produces a 404 not found error.4.4.0-4.4.1
2682976
CVE-2021-28902, CVE-2021-28903, CVE-2021-28904, CVE-2021-28905, CVE-2021-28906: Several vulnerabilities have been announced in libyang that can cause a crash
Vulnerable: <= 1.0.184-2+cl4.3.0u1
4.0.0-4.4.1
2669858
CM-32169
OpenSSH is vulnerable to CVE-2020-14145, as described in https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf.
This is an information leak in algorithm negotiation that can allow man-in-the-middle attacks on initial connection attempts without a previously stored server host key on the client. If desired, mitigation using UpdateHostKeys and HostKeyAlgorithms is also given in that paper.
3.7.14-3.7.15, 4.0.0-4.4.1
2663119
If you update the MAC address of an SVI using ifreload and hwaddress, the kernel maintains a stale permanent fdb entry for the old MAC address.4.3.0-4.4.1
2639303
When you use NCLU to delete a bond, then add an interface, NCLU reports an error similar to the following:
ERROR: ‘NoneType’ object has no attribute ‘conf_key_value_multiple_values’See /var/log/netd.log for more details.
4.3.0-4.4.1
2618227
The NCLU net show bridge macs command displays permanent MAC addresses for trunked VLANs.4.3.0-4.4.1
2606326
If the IGMP and MLD querier is configured on only one of the peer switches in an MLAG configuration, when IGMP packets are sent to the peer with no querier, IGMP leave messages have no effect.4.4.0-4.4.1
2596458
When bridge.unreg_v6_mcast_prune = TRUE is configured in the /etc/cumulus/switchd.conf file, traffic destined to IPv6 link-local multicast addresses might not be flooded within the bridge
To work around this issue, disable pruning for IPv6 multicast by setting bridge.unreg_v6_mcast_prune = FALSE in the /etc/cumulus/switchd.conf file.
4.4.0-4.4.1
2578814
On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap.4.3.0-4.4.1
2558184
The Mellanox SN2700 and SN2410 switch intermittently reports PSU fan state changes with Unable to read from device/fan1_input/pwm1 syslog messages.3.7.11-3.7.15, 4.1.1-4.4.1
2556811
CM-33416
Under certain high scale conditions, various modules might experience timetouts during cl-support collection, which results in missing data in the cl-support file.3.7.12-3.7.15, 4.1.1-4.4.1
2556591
CM-33300
After upgrading to Cumulus Linux, MLAG ports might remain down with clagctl and net show clag reporting bridge-priority-mismatch
To work around this issue, run the sudo ifreload -a command on both peers, or configure bridge-bridgeprio to be the same value as mstpctl-treeprio on the bridge interface in the /etc/network/interfaces file, then run sudo ifreload -a.
4.3.0-4.4.1
2556462
CM-33239
When you remove a fan tray, smonctl and sensors display different information about the removed fans.4.2.1-4.4.1
2556369
CM-33196
If you use NCLU to configure an ACL for eth0, you can’t designate it as an INPUT rule; the rule is automatically created as a FORWARD rule in the /etc/cumulus/acl/policy.d/50_nclu_acl.rules file.
To work around this issue, manually create an ACL in the /etc/cumulus/acl/policy.d/ file with “-A INPUT -i eth0”.
4.2.1-4.4.1
2556353
CM-33185
You can enable and disable debugs from either exec mode or global configuration mode (config t) in vtysh. When disabling OSPF debugs from exec mode, the debug is disabled at runtime but left in the running configuration
To work around this issue, disable OSPF debugs from global configuration mode.
4.2.1-4.4.1
2556249
CM-33139
On a Mellanox switch configured with the max acl-heavy or ip-acl-heavy profile, the cl-resource-query -j command takes a long time to run.4.3.0-4.4.1
2556061
CM-33032
On the Edgecore AS4610 switch, the historic CPU usage displayed in /run/sysmonitor/history sometimes shows as a negative value.3.7.12-3.7.15, 4.2.1-4.4.1
2555981
CM-32979
To enable an address family on a peer, you have to enable the address family globally.4.4.0-4.4.1
2555932
CM-32953
On Mellanox switches, you can’t ping the SVI of the MLAG peer over the peer link after the packet is VXLAN decapsulated.4.2.1-4.4.1
2555873
CM-32914
On Mellanox switches, egress ACLs with VLAN keys do not filter layer 2 multicast or broadcast traffic.4.3.0-4.4.1
2555763
CM-32861
The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: — /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor.
4.3.0-4.4.1
2555613
CM-32786
The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen).
4.2.1-4.4.1
2555318
CM-32612
If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact.
4.3.0-4.4.1
2554986
CM-32416
The ethtool utility doesn’t contain the latest values, as a result the Revision Compliance field shows Unallocated.4.2.1-4.4.1
2554812
CM-32296
If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes.4.2.1-4.4.1
2554783
CM-32274
If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes.
4.2.1-4.4.1
2554709
CM-32217
The IP address specified in the ip pim use-source command configured on the loopback interface should be inherited by unnumbered interfaces during their Primary IP address selection process. If ip pim use-source is configured on the loopback after an unnumbered interface has already selected their Primary IP address, the unnumbered interface does not update its Primary IP address to be the new use-source value until after there is a netlink update for that interface.
To work around this issue, configure ip pim use-source on each unnumbered interface directly or ensure ip pim use-source is applied to the loopback before other unnumbered interfaces are enabled for PIM.
3.7.13-3.7.15, 4.2.1-4.4.1
2554582
CM-32144
On switches with the Maverick ASIC, control traffic is dropped due to receive buffering.4.2.0-4.4.1
2554533
CM-32112
On the ARM platform, NTP peer associations slowly increase to larger offsets (~500ms).4.0.0-4.4.1
2554466
CM-32068
Kernel routes added by iproute2 are missing in FRR after an interface flap.
To work around this issue, configure a static route in FRR.
4.2.1-4.4.1
2554261
CM-31948
On Broadcom switches, when you create a VNI interface, switchd might crash with the following log message:
switchd[6628]: log.c:72 CRIT backend/bcm/hal_bcm_vxlan.c:1285: : Assertion ‘0’ failed.
4.3.0-4.4.1
2554222
CM-31921
The NCLU command to enable bridge learning fails.
As a work around, enable bridge learning in the /etc/network/interface file. For example:

auto vni-30
iface vni-30
vxlan-id 30
bridge-access 30
bridge-arp-nd-suppress on
bridge-learning on
vxlan-local-tunnelip 10.10.10.1
mstpctl-bpduguard yes
mstpctl-portbpdufilter yes
mtu 9166
4.2.1-4.4.1
2554218
CM-31917
MLAG packets received on the peer link are dropped instead of routed.4.2.0-4.4.1
2554202
CM-31904
The output of the net show commit command does not show the last commit or the specified commit number but is empty instead.4.2.1-4.4.1
2553887
CM-31700
When using TACACS+ configured with a DEFAULT user providing privilege level lower than 16, TACACS+ configured users with privilege level 16 access might not be able to run privilege level 16 NCLU commands, such as net add and net del and see an error similar to the following:

ERROR: You do not have permission to execute that command.

To work around this issue, remove the DEFAULT user from the TACACS+ server.
3.7.7-3.7.15, 4.0.0-4.4.1
2553237
CM-31418
The default NTP configuration is to use eth0 as the NTP source interface. In Cumulus Linux 4.0 and later, eth0 is in the management VRF by default; therefore the NTP service runs automatically in the management VRF.
NVIDIA does not recommend running NTP with a source interface other than eth0 as this can expose a security vulnerability. Changing the NTP source interface name with NCLU to a non-management VRF interface might result in NTP not functioning because the NTP service is still running in the management VRF.

4.2.0-4.4.1
2553116
CM-31357
When you manually set the link speed or duplex mode with ethtool to an unsupported value, then run a TDR check against the interface, you encounter a switchd service heartbeat failure.
To work around this issue, reboot the switch to clear the condition. Avoid setting the interface speed or duplex mode directly with ethtool.
3.7.12-3.7.15, 4.0.0-4.4.1
2553015
CM-31300
If a neighbour contains a special character in PortID for LLDP, the net show interface command does not display the LLDP information or the command might fail.3.7.10-3.7.15, 4.2.0-4.4.1
2552691
CM-31111
On the EdgeCore AS4610 switch, the eth0 interface remains down when physically connected to a 1G interface.
To work around this issue, configure the link speed to 1000 and set auto-negotiation on for the eth0 interface, then flap eth0 with the ip link set eth0 down/up command to bring up the port.
4.2.0-4.4.1
2552453
CM-30987
On the Mellanox switch, RoCE with PFC configuration is not applied to all ports in hardware when a range is used in the traffic.conf file.
To work around this issue, use NCLU to configure RoCE with PFC or list individual ports in the traffic.conf file.
4.2.0-4.4.1
2552309
CM-30889
The following messages are seen on an Edgecord Minipack-AS8000 running Cumulus Linux 4.2.0:


Hal_bcm_console.c:294 MMU config profile 0 prigroup 0: Service Pool 0 has no space and cannot be assigned
Hal_bcm_console.c:294 MMU config port 0 idx 0: Pool 0 has no space and cannot be assigned


These messages are for internal validation purposes only and can be safely ignored.

4.2.0-4.4.1
2552294
CM-30879
NCLU restarts FRR when removing a BGP VRF IPv4 aggregate-address command.
3.7.12-3.7.15, 4.0.0-4.4.1
2552266
CM-30863
OpenSSH scp is vulnerable to CVE-2020-15778, where clients that have authorized access to the SSH server can execute commands on the server by copying maliciously named files.
The two scenarios where an exploit may be useful to an attacker:
-The user is authorized to scp but not ssh (based on the command option in the authorized_keys file), so this vulnerability can allow executing a remote command on the target computer when not authorized to do so.
-An attacker plants a maliciously named file in a directory tree that someone later uses scp -r to copy over to the target computer.
Be aware that restricting users to scp by using the command option in the authorized_keys file is not effective in preventing those users from executing arbitrary commands on the server.
If you want to use scp -r to copy directory trees, avoid copying directory trees to which attackers may have added maliciously-named files. Archiving the directory tree with tar, zip, or a similar program, then copying the archive over to be extracted on the server avoids having to use scp -r altogether. In addition, OpenSSH provides sftp, which you can use instead of scp to copy files.
To disable scp completely, use /bin/chmod 0 /usr/bin/scp .
3.7.14-3.7.15, 4.0.0-4.4.1
2552214
The Mellanox SN2700 and SN2410 switch intermittently reports PSU fan state changes with Unable to read from device/fan1_input/pwm1 syslog messages.3.7.11-3.7.14, 4.1.1-4.4.13.7.14.2-3.7.15
2552213
The Mellanox SN2700 and SN2410 switch intermittently reports PSU fan state changes with Unable to read from device/fan1_input/pwm1 syslog messages.3.7.11-3.7.14.2, 4.1.1-4.4.13.7.15
2551565
CM-30414
If you toggle VRRP priority values between VRRP routers, then restart switchd, a few IPv6 VRRP instances might not converge. As a result, both the VRRP routers act as master routers for the impacted IPv6 VRRP instances. IPv4 VRRP instances are not affected
To work around this issue, remove, then add back the VRRP configuration with NCLU or vtysh commands.
3.7.13-3.7.15, 4.2.0-4.4.1
2551335
CM-30312
When TACACS+ is configured and the management VRF is enabled, users with privilege level 13 are prevented from running ip and cat commands.4.0.0-4.4.1
2551305
CM-30296
The net show configuration command provides the wrong net add command for ACL under the VLAN interface.

3.7.12-3.7.15, 4.1.0-4.4.1
2551273
CM-30280
On a Mellanox SN2010 switch, the Locator LED is on after you upgrade Cumulus Linux.4.1.0-4.4.1
2550974
CM-30195
On the Dell S3000 switch, after installing the Cumulus Linux 4.1.1 disk image without a license, the switch sends a link beat if a remote host port is configured.3.7.11-3.7.15, 4.1.1-4.4.1
2550950
CM-30182
The net show time ntp servers command does not show any output with management VRF.4.1.1-4.4.1
2550793
CM-30101
The NCLU net show bridge spanning-tree command displays the aging timer incorrectly.3.7.12-3.7.15, 4.0.0-4.4.1
2550713
CM-30052
Configuring the subinterface of a VXLAN uplink under another traditional bridge, which also has the VXLAN VNI enslaved, causes switchd to use high CPU due to very frequent VXLAN tunnel sync events.
To work around this issue, do not enslave the subinterface of a VXLAN layer 3 uplink under a traditional bridge in a VXLAN configuration.
4.1.1-4.4.1
2550444
CM-29872
Tab completion for the net show rollback description command returns information about a snapshot instead of context help.
To work around this issue, run the net show commit history command to find descriptions instead of the net show rollback description command.
3.7.12-3.7.15, 4.0.0-4.4.1
2550443
CM-29871
The net show rollback description command returns an error even if the string matches a commit description.
To work around this issue, look for your string in the output of the net show commit history command (or grep for it there) instead.
3.7.12-3.7.15, 4.0.0-4.4.1
2550243
CM-29759
When you use nginx and restserver in management VRF to provide a REST API for the switch, nginx starts but restserver fails to start.
To work around this issue, comment out the Requires= line in the /lib/systemd/system/restserver.service. For example:

#Requires=nginx.service restserver.socket
3.7.12-3.7.15, 4.0.0-4.4.1
2550056
CM-29652
The ACCTON-DIAG option under the Cumulus Linux GRUB menu does not work. When you select this option, you see the following error:

error: invalid signature.
Press any key to continue…
3.7.12-3.7.15, 4.1.1-4.4.1
2549782
CM-29519
The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state.3.7.12-3.7.15, 4.0.0-4.4.1
2549731
CM-29492
When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD –in-interface swp10 -j span –dport swp1
3.7.12-3.7.15, 4.1.1-4.4.1
2549392
CM-29319
When you configure an RD or RT with NCLU, you see duplicate VNI stanzas in the /etc/frr/frr.conf file.
To work around this issue, manually edit the etc/frr/frr.conf file to define advertise-all-vni before the RD or RT configuration within the l2vpn EVPN address family, then reload the FRR service with the sudo systemctl reload frr command.
4.1.0-4.4.1
2548924
CM-29146
On the EdgeCore Minipack AS8000, storm control does not restrict unknown unicast, broadcast, or multicast traffic.4.1.1-4.4.1
2548315
CM-28816
The following security advisory has been announced for bash:
CVE-2019-18276 Qualys scan QID 372268 setuid vulnerability
When bash or bash scripts are run setuid, bash is supposed to drop privileges, but does so incorrectly, so that an attacker with command access to the shell can use enable -f for runtime loading of a new builtin that calls setuid() to regain dropped privileges.
To work around this issue, do not make bash or bash scripts setuid.
3.7.12-3.7.15, 4.0.0-4.4.1
2548260
CM-28770
The net add routing route-map permit set community command does not add the set statement into the /etc/frr/frr.conf file.4.0.0-4.4.1
2548243
CM-28754
On switches with the Trident2+ ASIC, adding SPAN rules disables PBR rules.3.7.3-3.7.15, 4.0.0-4.4.1
2548117
CM-28659
In OVSDB traditional bridge mode, adding or removing a VLAN binding causes a traffic forwarding outage for around 20 seconds or more on adjacent VLAN bindings. Cumulus Linux does not support traditional bridge mode with VMware NSX.3.7.12-3.7.15, 4.0.0-4.4.1
2548062
CM-28622
When ports are split to 4x25G, RS FEC needs to explicitly configured on both ends (especially when interoperating with non-Mellanox switches).4.1.0-4.4.1
2548044
CM-28608
When a remote VTEP withdraws a type-3 EVPN route, Cumulus Linux purges all MAC address and neighbor entries installed in the corresponding layer 2 VNI through that remote VTEP from the local EVPN and kernel forwarding tables. This purge occurs even if the remote VTEP does not withdraw type-2 routes carrying the MAC address or neighbor entries. The entries stay missing from the local EVPN and kernel forwarding tables until BGP updates the MAC address and neighbor.3.7.12-3.7.15, 4.0.0-4.4.1
2547903
CM-28506
CVE-2019-19956: xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs
Vulnerable: 2.9.4+dfsg1-7Fixed: 2.9.4+dfsg1-7+deb10u1
4.0.0-4.4.1
2547890
CM-28497
QinQ across VXLAN on a traditional bridge does not work.4.1.0-4.4.1
2547706
CM-28397
When you configure ganged ports in the ports.conf file, the change does not take effect after you restart switchd.
To work around this issue, reboot the switch.
3.7.11-3.7.15, 4.0.0-4.4.1
2547405
CM-28226
When you restart the hsflowd service, you see a systemd warning message similar to the following:

Warning: The unit file, source configuration file or drop-ins of hsflowd@mgmt.service changed on disk. Run ‘systemctl daemon-reload’.
4.0.0-4.4.1
2546991
CM-28003
The FRR service does not provide a way for automation to know if the configuration applied properly.
To work around this issue, execute the vtysh -f command in the automation file before starting the FRR service to validate the functional configuration and return an error code.
3.7.11-3.7.15, 4.0.0-4.4.1
2546895
CM-27957
If you have configured a higher number of ports and VLANs (ports x VLANs) or the switch is a lower-powered (CPU) platform, the switchd service might fail to send a systemd keepalive within the watchdog timeout value (2 minutes by default) and you see an error similar to the following:
bq. systemd[1]: switchd.service watchdog timeout (limit 2min)!
To workaround this issue, either reduce the number of configured interfaces and, or VLANs, or increase the systemd timeout for switchd.service
To increase the systemd timeout:1.Edit the /etc/systemd/system/switchd.service.d/override.conf file and increase the WatchdogSec parameter
2.Restart the switchd service with the sudo systemctl restart switchd.service command
systemd attempts to restart the switchd service automatically (after the watchdog timeout). If the restart fails multiple times in a short time period, run the sudo systemctl reset-failed command followed by the sudo systemctl restart switchd command.
3.7.11-3.7.15, 4.0.0-4.4.1
2546874
CM-27950
On the Dell S5232F, S5248F, S5296F, and S3048 switch, using the poweroff or halt commands does not fully power off the switch.4.0.0-4.4.1
2545837
CM-27444
If you use the NCLU commands to configure NTP and run the net add time ntp source command before you run the net add time ntp server iburst command, the /etc/ntp.conf file is misconfigured.
To work around this issue, run the net add time ntp server iburst command before you run the net add time ntp source command.
3.7.10-3.7.11, 4.0.0-4.4.13.7.12-3.7.15
2545520
CM-27243
The length of the netlink message is not set properly for non-bridge family type messages. The same length is used for both bridge and non-bridge even though the bridge family type message has an extra attribute. This causes extra bytes to be left over in non-bridge family type netlink messages.3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2545233
CM-27094
On the Delta AG9032v1 switch, smonctl and sensors report inaccurate PSU current and power.4.0.0-4.4.1
2545125
CM-27018
If you configure more than one VRR interface on an SVI interface, deleting one of the VRR addresses does not remove the interface/address.3.7.10-3.7.15, 4.0.0-4.4.1
2544978
CM-26921
If you delete an undefined bond, then add a bond slave, the net commit command fails.3.7.9-3.7.15, 4.0.0-4.4.1
2544968
CM-26913
FRR configuration commands for an SVI interface might have the \n misplaced in the output. For example:

sudo sh -c “printf ‘interface 50\nvrf TEST description L3 routing interface\n’ » /etc/frr/frr.conf”

should be:

sudo sh -c “printf ‘interface 50 vrf TEST\ndescription L3 routing interface\n’ » /etc/frr/frr.conf”

To work around this issue, configure the interface manually in the /etc/frr/frr.conf file.
3.7.9-3.7.15, 4.0.0-4.4.1
2544957
CM-26907
NCLU incorrectly allows you to apply port security configuration on layer 2 and layer 3 ports that are not part of a bridge.4.0.0-4.4.1
2544953
CM-26905
When you update the hostname of a switch with the NCLU net add hostname command, then run net commit, the lldpd service does not restart and other devices still see the old hostname.
To work around this issue, run the sudo systemctl restart lldpd.service command.
3.7.10-3.7.15, 4.0.0-4.4.1
2544880
CM-26860
When you run the NCLU net show commit last or net show commit command, where is the last commit, no output is shown.4.0.0-4.4.1
2544723
CM-26769
Setting ProtoDown on ports populated with SFP modules providing RJ-45 1000BASE-T interfaces does not cause the carrier to be dropped. The kernel shows carrier down; however, the remote device still shows a link.3.7.6-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2544463
CM-26599
Auto-negotiation does not work with the QSFP28 cables and a remote system operating at 10G. Attempting to enable auto-negotiation with ethtool -s swp<#> autoneg on returns Operation not supported.
To work around this issue, do not use auto-negotiation and set the local port speed to 10G.
3.7.9-3.7.15, 4.0.0-4.4.1
2544456
CM-26595
The NCLU net show lldp command displays the speed of a ganged port group as the speed of one of the individual links, rather than the sum of their speeds.3.7.9-3.7.15, 4.0.0-4.4.1
2544311
CM-26516
Applying a policy-based routing (PBR) rule for all traffic from a host might disrupt ARP refresh for that connected host.3.7.5-3.7.15, 4.0.0-4.4.1
2544155
CM-26423
NCLU requires you to specify an interface with multiple address-virtual statements in ascending MAC address order.

3.7.5-3.7.15, 4.0.0-4.4.1
2544113
CM-26412
Mac learning is not disabled by default on a double tagged peer link interface resulting in the MAC address changing between the MLAG bond and the peer link.
To work around this issue, disable MAC learning on QinQ VLANs by adding bridge-learning off to the VLAN stanza in the etc/network/interfaces file.
3.7.9-3.7.15, 4.0.0-4.4.1
2543937
CM-26308
An interface alias configured outside FRR using iproute2 is imported into the FRR running configuration and overrides the internal description. After an FRR reload, this causes FRR to delete the interface alias in an inefficient way. Depending on how many interfaces with aliases you have configured, this can cause a FRR reload to time out.
To work around this issue, remove the interface alias description from iproute2.
3.7.8-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2543900
CM-26288
On the Mellanox switch, static VXLAN tunnels incorrectly allow traffic from any remote tunnel IP address.3.7.8-3.7.15, 4.0.0-4.4.1
2543841
CM-26256
The net show evpn vni detail json command includes an extra empty dictionary at the end of the output.
3.7.8-3.7.15, 4.0.0-4.4.1
2543816
CM-26241
On the Dell S5248F-ON switch, smond might generate syslog messages indicating that the fan input RPM is lower than the normal low speed of 2500 RPM. Speeds as low as 1700 RPM are acceptable in normal thermal environments; therefore, you can ignore these messages.
3.7.6-3.7.11, 4.0.0-4.4.13.7.12-3.7.15
2543781
CM-26217
NCLU does not allow you to configure OSPF NSSAs. For example:

cumulus@switch:~$ net add ospf area 0.0.0.1 nssa
ERROR: Command not found.
net add ospf area 0.0.0.1 nssa

To work around this issue, use FRR instead. For example:

switch# configure terminal
switch(config)# router ospf
switch(config-router)# area 0.0.0.1 nssa
3.7.7-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2543724
CM-26179
If a hostname contains utf-8 characters, the NCLU net show lldp command outputs the following error:

ERROR: ‘ascii’ codec can’t encode character u’\xe9' in position 3: ordinal not in range(128)
See /var/log/netd.log for more details.
3.7.7-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2543646
CM-26136
In an ebtables rule, ERSPAN (upper case) does not work. You need to specify erspan (lower case).3.7.6-3.7.15, 4.0.0-4.4.1
2543211
CM-25890
In some cases, the switchd service might warn of excessive MAC moves from one switch port to itself (for example, from swp18 to swp18).
3.7.0-3.7.15, 4.0.0-4.4.1
2543164
CM-25859
The MTU of an SVI cannot be higher than the MTU on the bridge. Changing the MTU on the SVI with NCLU does not update the bridge MTU. The net commit command succeeds even though the MTU is not changed as expected.
To work around this issue, change the MTU on all SVIs and the bridge manually in the /etc/network/interfaces file, then apply the change with the ifreload -a command.
3.7.7-3.7.15, 4.0.0-4.4.1
2543096
CM-25815
When an SVI with a virtual MAC is configured with a layer 2 VNI in an EVPN environment, if you replace the /etc/network/interfaces file with a different file that does not have the SVI and layer 2 VNI configuration, the original virtual MAC is not populated through the EVPN route until FRR is restarted.
3.7.6-3.7.15, 4.0.0-4.4.1
2542945
CM-25740
On the Broadcom Maverick switch with a QinQ configuration, the packets coming into the CPU might be tagged incorrectly; for example, 802.1ad + 802.1q tags are expected in the packets but the packets have 802.1q + 802.1q tags.
To work around this issue, configure the bridge with bridge-vlan-protocol 802.1ad:

cumulus@switch:~$ net add bridge mybridge vlan-protocol 802.1ad
3.7.6-3.7.15, 4.0.0-4.4.1
2542837
CM-25674
On Mellanox switches, policer iptables are not working as expected. For example, when using a policer with mode KB/MB/GB to rate-limit interfaces, the syntax is accepted but the data plane transfer speed is not affected by the rule.3.7.6-3.7.8, 4.0.0-4.4.13.7.9-3.7.15
2542305
CM-25400
If an SVI exists in the configuration before you assign it an IP address, when you do assign the IP address with the NCLU command, the vlan-id and the raw-device bridge stanzas are not added automatically.
3.7.6-3.7.15, 4.0.0-4.4.1
2542301
CM-25397
When first creating a bond and enslaving an interface, NCLU hides some of the bridge command suggestions, although they are still accepted.
3.7.3-3.7.15, 4.0.0-4.4.1
2541212
CM-24894
The maximum-prefix configuration under the IPv4 address family has an optional restart value, which you can configure. This configuration is ignored and, instead of restarting the sessions every x minutes, the peer constantly changes between established and idle due to the prefix count being exceeded.3.7.5-3.7.15, 4.0.0-4.4.1
2541029
CM-24799
On switches with the Trident2 ASIC, 802.1Q-encapsulated control plane traffic received on an interface with 802.1AD configured subinterfaces might be dropped.
This issue only affects QinQ configurations.
3.7.5-3.7.15, 4.0.0-4.4.1
2540753
CM-24618
If the interface alias contains a single or double quotation mark, or an apostrophe, the net show configuration commands fail with the following error:
 
ERROR: No closing quotation
See /var/log/netd.log for more details.

3.7.5-3.7.15, 4.0.0-4.4.1
2540444
CM-24473
SNMP incorrectly requires engine ID specification.
3.7.4-3.7.15, 4.0.0-4.4.1
2540352
CM-24435
When you use NCLU to configure a route map, the parser allows for glob matching of interfaces for a match interface condition when there can only be a single interface matched. The proper syntax is to use multiple route map clauses, each matching a single interface, instead of a single clause matching multiple interfaces.
For example, this command is incorrect:
 
net add routing route-map Proxy-ARP permit 25 match interface swp9-10

These commands are correct:
 
net add routing route-map Proxy-ARP permit 25 match interface swp9
net add routing route-map Proxy-ARP permit 30 match interface swp10

3.7.2-3.7.15, 4.0.0-4.4.1
2540340
CM-24426
NCLU allows for the configuration of addresses on VRF interfaces, but tab completion for the net add vrf command just displays . For example:
 
cumulus@switch:~$ net add vrf mgmt


Tab completion for the net add vrf ip address
command works correctly.
3.7.4-3.7.15, 4.0.0-4.4.1
2540274
CM-24379
On the Maverick switch, CPU forwarded packets might be dropped when there is no route to a leaked host route.3.7.5-3.7.15, 4.0.0-4.4.1
2540204
CM-24350
When links come up after FRR is started, VRF connected routes do not get redistributed.3.7.4-3.7.15, 4.0.0-4.4.1
2540192
CM-24343
The net del bridge bridge mcsnoop yes command does not return the value to the default of disabled.
To work around this issue, use the net add bridge bridge mcsnoop no command to delete the mcsnoop attribute and return to the default value.
3.7.4-3.7.15, 4.0.0-4.4.1
2540155
CM-24332
On the Broadcom switch, when moving configuration from bridged to routed (or toggling from routed to bridged to routed), some traffic is not seen by the kernel. This can cause BGP to not establish on a transit node.
3.7.3-3.7.15, 4.0.0-4.4.1
2540042
CM-24272
When you try to configure the VRRP priority and advertisement-interval with NCLU on a traditional mode bridge, the net commit command fails.
To work around this issue, use the vtysh command (inside FRR) to change the VRRP priority or advertisement-interval on traditional bridges. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface br0.100
switch(config-if)# vrrp 1 priority 110
switch(config-if)# vrrp 1 advertisement-interval
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

3.7.4-3.7.15, 4.0.0-4.4.1
2540041
CM-24271
On SVIs in a VLAN-aware bridge, you cannot change the VRRP priority with NCLU.
To work around this issue, run the vtysh command inside FRR to change the default priority. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface vlan100
switch(config-if)# vrrp 1 priority 110
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

3.7.4-3.7.15, 4.0.0-4.4.1
2540040
CM-24270
Cumulus Linux uses VRRPv3 as the default version, and enables both preempt and accept mode by default. You cannot change these default values with NCLU. To work around this issue, run the vtysh commands (inside FRR) to change the default values. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface swp4
switch(config-if)# vrrp 1 version 2
switch(config-if)# no vrrp 1 preempt
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

3.7.4-3.7.15, 4.0.0-4.4.1
2540031
CM-24262
NCLU does not honor auto all in the /etc/network/interfaces file and removes the existing configuration if no individual auto lines exist.
3.7.3-3.7.15, 4.0.0-4.4.1
2539994
CM-24241
When you try to remove a BGP peer group configuration with NCLU, the command fails but no warning message is shown. For example:
 
cumulus@switch:~$ net del bgp neighbor fabric peer-group
‘router bgp 65001’ configuration does not have ‘neighbor fabric peer-group’

3.7.2-3.7.15, 4.0.0-4.4.1
2539962
CM-24222
When an LDAP user that does not have NCLU privileges (either in the netshow or netedit group, or in the /etc/netd.conf file) runs an NCLU command, a traceback occurs instead of a permissions error.
3.7.0-3.7.15, 4.0.0-4.4.1
2539670
CM-24035
On the Edgecore 4610-54P switch, automatic medium-dependent interface crossover (auto-MDIX) stops working on a 100M full duplex interface and does not detect the required cable connection type.
3.7.2-3.7.15, 4.0.0-4.4.1
2539124
CM-23825
The net add interface ptm-enable command adds no ptm-enable for that interface in the frr.conf file.
Running the net add or the net del command does not remove no ptm-enable from the frr.conf file. You have to remove it manually using vtysh.
3.7.2-3.7.15, 4.0.0-4.4.1
2538790
CM-23665
NCLU automatically adds the VLAN ID (for the layer 3 VNI/SVI) to the bridge when you run net add vxlan bridge access . This configuration breaks network connectivity in an EVPN symmetric routing configuration using MLAG.
To restore connectivity, remove the VLAN ID from the bridge.
3.7.2-3.7.15, 4.0.0-4.4.1
2538590
CM-23584
When you configure a control plane ACL to define permit and deny rules destined to the local switch, NCLU programs the control plane ACL rules into the FORWARD chain.
3.7.2-3.7.15, 4.0.0-4.4.1
2538562
CM-23570
On an RMP/1G-T switch, when you remove link-speed 100 with the NCLU command or by editing the etc/network/interfaces file to revert the 100M interface to the default (1G auto), the interface fails to recover and does not come back up.
After you remove the link-speed, ethtool shows the advertised link modes as not reported and Speed/Duplex as unknown.
To work around this issue and bring the interface back up, either restart switchd or use ethtool to configure the speed, advertised, duplex or MDI-X settings.
Note: The advertised link mode gets set incorrectly if you include 1000baseT/Half. The port will come up successfully at 1G.
3.7.2-3.7.15, 4.0.0-4.4.1
2538294
CM-23417
If you use NCLU to create an iBGP peering across the peer link, running the net add bgp l2vpn evpn neighbor peerlink.4094 activate command creates a new eBGP neighborship when one has already been configured for iBGP. This is unexpected; the existing iBGP configuration is valid.3.7.0-3.7.15, 4.0.0-4.4.1
2537699
CM-23075
There is a limitation on the number of SVI interfaces you can specify as DHCP relay interfaces in the /etc/default/isc-dhcp-relay file. For example, 1500 SVI interfaces causes the dhcrelay service to exit without a core file and logs similar to the following are generated for the interfaces:
 
2018-11-10T23:35:30.992370-08:00 Dev dhcrelay: Listening on LPF/vlan.101/a0:00:00:00:00:51
2018-11-10T23:35:30.993472-08:00 Dev dhcrelay: Sending on LPF/vlan.101/a0:00:00:00:00:51

Eventually the dhcrelay service stops.
3.7.1-3.7.15, 4.0.0-4.4.1
2536576
CM-22554
If you try to bring down several members of a bond remotely at the same time, the link state of one of the interfaces might not transition correctly to the down state; however, all links show down in hardware.
4.0.0-4.4.1
2536384
CM-22386
The BFD packet redirection logic used by OVSDB server high availability mode redirects BUM packets across the peer link. The iptables rule for redirection does differentiate between BFD and non-BFD VXLAN inner packets because the service node sends all frames with its own IP address as the tunnel source IP address. The VXLAN encapsulated BUM packets do not get forwarded to the CPU and do not go through the iptable redirection rule; only VXLAN encapsulated BFD packets get forwarded to the CPU due to the inner MAC DA lookup in hardware.
3.7.0-3.7.15, 4.0.0-4.4.1
2536256
CM-22301
For an unresolved address, the IPROUTER default policer rule has been modified to not match on packets exiting a TUNNEL and headed to the CPU to resolve the address via ARP. As a result, the following default rule no longer matches TUNNEL ingress packets.
 
A $INGRESS_CHAIN –in-interface $INGRESS_INTF -m addrtype –dst-type
IPROUTER -j POLICE –set-mode pkt –set-rate 400 –set-burst 100

These packets are now policed by catch all rules.
To work around this issue, the VPORT value on a TRIDENT switch must be changed from binary 011 to 100.
4.0.0-4.4.1
2536242
CM-22287
On the EdgeCore AS7712 (Tomahawk) switch running in atomic mode, when a layer 3 ECMP path is brought down, traffic traversing the path stops working for about four seconds. When the switch is changed to non-atomic mode, the delay is less than one second. This issue is seen across OSPF and static ECMP routes.4.0.0-4.4.1
2536179
CM-22228
On switches with the Trident 2+ ASIC, counters associated with VLANs and VRFs are not working.3.7.0-3.7.15, 4.0.0-4.4.1
2535986
CM-22041
At a high CPU transmit traffic rate (for example, if there is unexpected CPU generated flooding or replication in software), when the ASIC packet driver cannot keep up with the transmit rate because there are no free DMA buffers, it can back pressure by suspending the switch port transmit queues. This can fill up the application socket buffers resulting in No buffer space available error messages on protocol sockets.
When the driver recovers, it automatically resumes the transmit queues. In most cases these error messages are transient. In rare cases, the hardware queues might get stuck, which you can recover with a switchd restart.
3.7.0-3.7.15, 4.0.0-4.4.1
2535965
CM-22020
On the Trident3 switch, static PIM with IIF based on a layer 2 bridge does not work reliably. PIM Join via signaling is required for IPMC to work properly.
To work around this issue, use dynamic signaling (joins) to manage IP multicast traffic.
3.7.0-3.7.15, 4.0.0-4.4.1
2535723
CM-21785
The source address of the ICMPv6 time exceeded message (traceroute hop) is sourced from the wrong VRF when the traceroute target resides on the same switch but in a different VRF.4.0.0-4.4.1
2535605
CM-21667
FRR does not add BGP ttl-security to either the running configuration or to the /etc/frr/frr.conf file when configured on a peer group instead of a specific neighbor.
To work around this issue, add ttl-security to individual neighbors instead of the peer group.
4.0.0-4.4.1
2535209
CM-21278
The net show lldp command sometimes shows the port description in the Remote Port field. The net show interface command shows the correct value in the Remote Host field.
To work around this issue, use net show interface command for LLDP output when connected to Cisco equipment.
3.7.5-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2534734
CM-20813
Span rules matching the out-interface as a bond do not mirror packets.4.0.0-4.4.1
2533691
CM-19788
If you configure a VLAN under a VLAN-aware bridge and create a subinterface of the same VLAN on one of the bridge ports, the bridge and interface compete for the same VLAN and if the interface is flapped, it stops working. Correcting the configuration and running the ifreload command does not resolve the conflict.
To work around this issue, correct the bridge VIDs and restart switchd or delete the subinterface.
3.7.12-3.7.15, 4.0.0-4.4.1
2533625
CM-19724
PIM and MSDP entries are set to the internal COS value of 6 so they are grouped together with the bulk traffic priority group in the default traffic.conf file. However, PIM, IGMP, and MSDP are considered control-plane and should be set to the internal COS value of 7.4.0.0-4.4.1
2533337
CM-19454
When you use NCLU to bring a bond admin down (net add bond link down), the bond interface goes into admin down state but the switch ports enslaved to the bond remain UP. If you are using bond-lacp-bypass-allow or balance-xor mode, the host might continue to send traffic. This traffic will be dropped because although the bond slaves are UP, they are not members of the bridge.
To work around this issue, use the sudo ifdown command.
4.0.0-4.4.1
2531273
CM-17494
In certain cases, a peer device sends an ARP request from a source IP address that is not on the connected subnet and the switch creates a STALE neighbor entry. Eventually, the switch attempts to keep the entry fresh and sends ARP requests to the host. If the host responds, the switch has REACHABLE neighbor entries for hosts that are not on the connected subnet.
To work around this issue, change the value of arp_ignore to 2. See [Address Resolution Protocol in the Cumulus Linux user guide|https://docs.cumulusnetworks.com/cumulus-linux/Layer-3/Address-Resolution-Protocol-ARP/] for more information.
4.0.0-4.4.1

Fixed Issues in 4.4.1

Issue IDDescriptionAffects
2783611
If you remove ports from a bridge and add IP addresses in one ifreload, connected routes are bound to the wrong routing information field.4.3.0-4.4.0
2782033
The following vulnerabilities have been announced in the openssl packages:CVE-2021-3711: buffer overflow vulnerability in SM2 decryption
CVE-2021-3712: buffer overrun when processing ASN.1 strings in the X509_aux_print() function
More details at https://www.openssl.org/news/secadv/20210824.txt
Vulnerable: <= 1.1.1d-0+deb10u6Fixed: 1.1.1d-0+deb10u7
4.0.0-4.4.0
2771871
IPv4 and IPv6 neighbor entries in a FAILED state are incorrectly programmed into hardware as FORWARD entries instead of TRAP entries. Traffic is forwarded to these neighbors with a destination MAC address of 00:00:00:00:00:00 instead of trapping them to the CPU to resolve the correct MAC address
This affects failed neighbor entries on routed interfaces that are not SVIs.
4.3.0-4.4.0
2755614
Host routes (/32 or /128) are used for forwarding in hardware instead of a local neighbor entry when route_preferred_over_neigh is set to FALSE in /etc/cumulus/switchd.conf4.0.0-4.4.0
2754691
CVE-2021-3672: in c-ares, a library that performs DNS requests and name resolution asynchronously, missing input validation of hostnames returned by DNS servers can lead to output of wrong hostnames (leading to Domain Hijacking)
Vulnerable: 1.14.0-1Fixed: 1.14.0-1+deb10u1
4.0.0-4.4.0
2754685
CVE-2021-38165: lynx, a non-graphical (text-mode) web browser, does not properly handle the userinfo subcomponent of a URI, which can lead to leaking of credential in cleartext in SNI data
Vulnerable: 2.8.9rel.1-3Fixed: 2.8.9rel.1-3+deb10u1
4.0.0-4.4.0
2754679
CVE-2020-26558 / CVE-2021-0129: Bluez does not properly check permissions during pairing operation, which could allow an attacker to impersonate the initiating device
CVE-2020-27153: a double free flaw in the disconnect_cb() routine in the gattool. A remote attacker can take advantage of this flaw during service discovery for denial of service, or potentially, execution of arbitrary code
Vulnerable: <= 5.50-1.2~deb10u1Fixed: 5.50-1.2~deb10u2
4.0.0-4.4.0
2747605
CVE-2021-3246: a buffer overflow in libsndfile, a libraryfor reading/writing audio files, which could result in denial of serviceor potentially the execution of arbitrary code when processing amalformed audio file
Vulnerable: 1.0.28-6Fixed: 1.0.28-6+deb10u1
4.0.0-4.4.0
2739690
CVE-2021-22918: An out-of-bounds read was discovered in the uv__idna_to_ascii() function of Libuv, an asynchronous event notification library, which could result in denial of service or information disclosure
Vulnerable: 1.24.1-1Fixed: 1.24.1-1+deb 10u1
4.0.0-4.4.0
2739647
In an EVPN multihoming configuration, unicast ARP requests are not forwarded when the local Ethernet segment is down.4.4.0
2739639
CVE-2021-36222: It was discovered that the Key Distribution Center (KDC) in krb5, the MIT implementation of Kerberos, is prone to a NULL pointer dereference flaw. An unauthenticated attacker can take advantage of this flaw to cause a denial of service (KDC crash) by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST
Vulnerable: <= 1.17-3+deb10u1Fixed: 1.17-3+deb10u2
4.0.0-4.4.0
2734122
CVE-2021-33910: The Qualys Research Labs discovered that an attacker-controlled allocation using the alloca() function could result in memorycorruption, allowing to crash systemd and hence the entire operating system. Details can be found at https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
Vulnerable: <= 241-7~deb10u7Fixed: 241-7~deb10u8
4.0.0-4.4.0
2734107
When withdrawal and advertisement processing occurs in short succession, type-2 routes with an IP are not imported into layer 2 VNIs.4.3.0-4.4.0
2728205
CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.3.7.0-4.4.0
2723603
In a static VXLAN configuration, the bridge-learning on setting does not turn on VXLAN-learning.4.4.0
2719356
If you reduce the reserved VLAN range in the /etc/cumulus/switchd.conf file to below 32 and you make multiple VLAN or bridge configuration changes, the VLANs might not be created in hardware and you might see the log message hal_mlx_l2.c:3045 ERR vlan create failed
The minimum supported size of the reserved VLAN range in the /etc/cumulus/switchd.conf file is 32 VLANs for single VLAN-aware bridge configurations.
4.4.0
2706744
In an EVPN multihoming configuration, the VTEP continues to advertise a stale route after an extended MAC mobility event.4.3.0-4.4.0

4.4.0 Release Notes

Open Issues in 4.4.0

Issue IDDescriptionAffectsFixed
2804044
The SDK process sx_core prints the messages shown below and the switch stops forwarding traffic
kernel: sx_core: Did not receive completion for SDQ dqn (1) idx (849) after 10 secondskernel: sx_core: __sx_core_post_send: Cannot send packet on dqn [1] sdq stuck
4.4.0-4.4.1
2799742
On the Edgecore AS4610 switch, the historic CPU usage displayed in /run/sysmonitor/history sometimes shows as a negative value.3.7.12-3.7.15, 4.2.1-4.4.1
2794747
If you change the clagd-vxlan-anycast-ip setting on both MLAG peers at the same time, both peers use their unique VTEP address indefinitely.4.3.0-4.4.1
2792816
When you enable PTP on an unnumbered interface, the /etc/ptp4l.conf file does not update and ptp4l.service fails.4.4.0-4.4.1
2792616
If a neighbor entry (ARP or NDP) is used as a next hop of a route that is synchronized into hardware, the neighbor entry is not removed from hardware after the neighbor is no longer reachable. As a result, routed traffic matching this prefix is incorrectly hardware-forwarded via the stale neighbor information.4.3.0-4.4.1
2788780
When you enable ARP and ND suppression and the switch forwards ARP and ND packets to the kernel, RX_DRP counters might increment but the packets process as normal.4.4.0-4.4.1
2783611
If you remove ports from a bridge and add IP addresses in one ifreload, connected routes are bound to the wrong routing information field.4.3.0-4.4.04.4.1
2782033
The following vulnerabilities have been announced in the openssl packages:CVE-2021-3711: buffer overflow vulnerability in SM2 decryption
CVE-2021-3712: buffer overrun when processing ASN.1 strings in the X509_aux_print() function
More details at https://www.openssl.org/news/secadv/20210824.txt
Vulnerable: <= 1.1.1d-0+deb10u6Fixed: 1.1.1d-0+deb10u7
4.0.0-4.4.1
2780915
In NVUE, you can’t deactivate the IPv4 address family per neighbor.4.4.0-4.4.1
2780834
To enable an address family on a peer, you have to enable the address family globally.4.4.0-4.4.1
2780211
When you use the NVUE nv set vrf default router bgp peer local-as asn command to configure a local AS, Cumulus Linux does not update the etc/frr/frr.conf file.4.4.0-4.4.1
2771871
IPv4 and IPv6 neighbor entries in a FAILED state are incorrectly programmed into hardware as FORWARD entries instead of TRAP entries. Traffic is forwarded to these neighbors with a destination MAC address of 00:00:00:00:00:00 instead of trapping them to the CPU to resolve the correct MAC address
This affects failed neighbor entries on routed interfaces that are not SVIs.
4.3.0-4.4.04.4.1
2770030
When you modify the default pre-auth policy located in /etc/cumulus/acl/policy.d/dot1x_preauth_dacl, after restarting hostapd the /etc/cumulus/acl/policy.d/dot1x_preauth_dacl directory is deleted and recreated with the default rule set that comes from the hostapd binary.4.3.0-4.4.1
2755614
Host routes (/32 or /128) are used for forwarding in hardware instead of a local neighbor entry when route_preferred_over_neigh is set to FALSE in /etc/cumulus/switchd.conf4.0.0-4.4.1
2754791
Remote MAC addreses in zebra are out of sync with bgpd. The zebra MAC addresses point to an incorrect (old) VTEP IP address and the sequence number is one higher than in BGP.3.7.14.2-3.7.15, 4.3.0-4.4.1
2754691
CVE-2021-3672: in c-ares, a library that performs DNS requests and name resolution asynchronously, missing input validation of hostnames returned by DNS servers can lead to output of wrong hostnames (leading to Domain Hijacking)
Vulnerable: 1.14.0-1Fixed: 1.14.0-1+deb10u1
4.0.0-4.4.1
2754685
CVE-2021-38165: lynx, a non-graphical (text-mode) web browser, does not properly handle the userinfo subcomponent of a URI, which can lead to leaking of credential in cleartext in SNI data
Vulnerable: 2.8.9rel.1-3Fixed: 2.8.9rel.1-3+deb10u1
4.0.0-4.4.1
2754679
CVE-2020-26558 / CVE-2021-0129: Bluez does not properly check permissions during pairing operation, which could allow an attacker to impersonate the initiating device
CVE-2020-27153: a double free flaw in the disconnect_cb() routine in the gattool. A remote attacker can take advantage of this flaw during service discovery for denial of service, or potentially, execution of arbitrary code
Vulnerable: <= 5.50-1.2~deb10u1Fixed: 5.50-1.2~deb10u2
4.0.0-4.4.1
2748923
If you include a dash when configuring a bond name, you see an internal server error.4.4.0-4.4.1
2747605
CVE-2021-3246: a buffer overflow in libsndfile, a libraryfor reading/writing audio files, which could result in denial of serviceor potentially the execution of arbitrary code when processing amalformed audio file
Vulnerable: 1.0.28-6Fixed: 1.0.28-6+deb10u1
4.0.0-4.4.1
2743186
When you use MD5 passwords and you configure a non-default VRF configuration before the default VRF configuration in the /etc/frr/frr.conf file, numbered BGP sessions do not establish.4.4.0-4.4.1
2739690
CVE-2021-22918: An out-of-bounds read was discovered in the uv__idna_to_ascii() function of Libuv, an asynchronous event notification library, which could result in denial of service or information disclosure
Vulnerable: 1.24.1-1Fixed: 1.24.1-1+deb 10u1
4.0.0-4.4.04.4.1
2739648
If you configure BGP graceful restart in the /etc/frr/frr.conf file, then apply the configuration with systemctl reload frr, the configuration fails to apply and you see the following error:
Job for frr.service failed
See “systemctl status frr.service” and “journalctl -xe” for details
4.3.0-4.4.1
2739647
In an EVPN multihoming configuration, unicast ARP requests are not forwarded when the local Ethernet segment is down.4.4.04.4.1
2739639
CVE-2021-36222: It was discovered that the Key Distribution Center (KDC) in krb5, the MIT implementation of Kerberos, is prone to a NULL pointer dereference flaw. An unauthenticated attacker can take advantage of this flaw to cause a denial of service (KDC crash) by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST
Vulnerable: <= 1.17-3+deb10u1Fixed: 1.17-3+deb10u2
4.0.0-4.4.1
2739402
The destination MAC address of ERSPAN GRE packets is set to all zeros.4.3.0-4.4.1
2736249
If you configure BGP graceful restart in the /etc/frr/frr.conf file, then apply the configuration with systemctl reload frr, the configuration fails to apply and you see the following error:
Job for frr.service failed
See “systemctl status frr.service” and “journalctl -xe” for details.
4.3.0-4.4.1
2736244
When you run the vtysh command to enable BGP graceful restart on a peer multiple times, the command fails with the following error:
% The Graceful Restart command used is not valid at this moment.
4.4.0-4.4.1
2736108
When you change the VRRP advertisement interval on the master, the master advertisement interval field in the show vrrp command output does not show the updated value.4.4.0-4.4.1
2734122
CVE-2021-33910: The Qualys Research Labs discovered that an attacker-controlled allocation using the alloca() function could result in memorycorruption, allowing to crash systemd and hence the entire operating system. Details can be found at https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
Vulnerable: <= 241-7~deb10u7Fixed: 241-7~deb10u8
4.0.0-4.4.1
2734119
The ESI line of show bgp l2vpn evpn route command always shows VNI: 0. This is a cosmetic software issue.4.3.0-4.4.1
2734107
When withdrawal and advertisement processing occurs in short succession, type-2 routes with an IP are not imported into layer 2 VNIs.4.3.0-4.4.04.4.1
2734103
ACL [No More Resources] messages keep appearing and you can’t reinstall the ACL.4.3.0-4.4.1
2732587
The bridge MAC address is updated during a port change on bridge interfaces.4.3.0-4.4.1
2730447
The bridge MAC address is updated during a port change on bridge interfaces.4.3.0-4.4.1
2728207
CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.3.7.0-3.7.15, 4.0.0-4.4.1
2728206
CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.3.7.0-3.7.15, 4.0.0-4.4.1
2728205
CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.3.7.0-4.4.04.4.1
2728119
When VRF devices are deleted and reconfigured (for example, during a networking service restart), dynamic BGP neighbors might fail to reestablish. To work around this issue, restart FRR with the sudo systemctl restart frr command.4.3.0-4.4.1
2724191
On the Celestica Seastone switch, when you run smonctl -v, the DIMM 1 Temp Sensor shows as absent
This is a cosmetic software issue and not indicative of a hardware failure on the system.
4.3.0-4.4.1
2723603
In a static VXLAN configuration, the bridge-learning on setting does not turn on VXLAN-learning.4.4.04.4.1
2722322
When you change the scaled VLAN configuration, restart networking instead of running the ifreload -a command to make sure that resources are allocated correctly.4.4.0-4.4.1
2719356
If you reduce the reserved VLAN range in the /etc/cumulus/switchd.conf file to below 32 and you make multiple VLAN or bridge configuration changes, the VLANs might not be created in hardware and you might see the log message hal_mlx_l2.c:3045 ERR vlan create failed
The minimum supported size of the reserved VLAN range in the /etc/cumulus/switchd.conf file is 32 VLANs for single VLAN-aware bridge configurations.
4.4.04.4.1
2710927
With downstream VNI, if you route leak between VRFs across different VTEPs when the same originating and target VRFs exist on both the route receiver and the route originator, you might experience traffic loss. For example, if you route leak from VRF RED on VTEP1 to VRF BLUE and GREEN on VTEP2 and VRFs RED, BLUE, and GREEN are configured both on VTEP1 and VTEP2
To work around this issue, use traditional route leaking with the import vrf command instead of the route-target import asn:vni command used with downstream VNI.
4.4.0-4.4.1
2710208
The net show bgp neighbor command output shows the BFD status as UP even when the BGP neighbor is not established, such as when the interface is down.4.2.1-4.4.1
2706744
In an EVPN multihoming configuration, the VTEP continues to advertise a stale route after an extended MAC mobility event.4.3.0-4.4.1
2705056
SVIs do not inherit the pinned MAC address of the bridge.4.3.0-4.4.1
2701000
A default route learned from DHCP on eth0 in the management VRF might install in the default VRF if eth0 is disconnected and the original next hop is reachable in the default VRF
To work around this issue, delete the DHCP lease file for eth0 with the sudo rm /var/lib/dhcp/dhclient.eth0.leases command.
4.3.0-4.4.1
2700767
Following an event that causes the peerlink bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a “peer-ip-mismatch.” This behavior is seen when you use a “clagd-peer-ip linklocal” configuration.3.7.12-3.7.15, 4.3.0-4.4.1
2699399
When you run the vtysh show ip bgp vrf statistics command, the bgpd service crashes if you use vrf all. For example:
spine01# show ip bgp vrf all statistics vtysh: error reading from bgpd: Success (0)Warning: closing connection to bgpd because of an I/O error!
To workaround this issue, run the command against each VRF independently.
3.7.15, 4.0.0-4.4.1
2699378
Following an event that causes the peerlink bond MAC address to change, such as a slave port state change, MLAG interfaces might be suspended due to a “peer-ip-mismatch.” This behavior is seen when you use a “clagd-peer-ip linklocal” configuration.4.3.0-4.4.1
2698649
When configuring a single VXLAN device in the /etc/network/interfaces file, if you edit the multicast group address in vxlan-mcastgrp-map, then revert the change, the change does not take effect.4.4.0-4.4.1
2695314
In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart.4.3.0-4.4.1
2691590
CVE-2021-0089 CVE-2021-26313 CVE-2021-28690 CVE-2021-28692: Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service or information leaks
Vulnerable: <= 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+107-gef32c7afa2-1
4.0.0-4.4.1
2687344
On the NVIDIA SN3700 switch, the decode-syseeprom shows device absent for a PSU that is present.4.4.0-4.4.1
2685994
When you use the NVUE command nv set interface lo router ospf area to configure OSPF on a loopback interface, the configuration fails to apply
To work around this issue, configure the loopback interface in the desired OSPF area with the nv set vrf default router ospf area 0 network command and reference the assigned prefix of the loopback interface. For example:
cumulus@leaf01:~$ nv set vrf default router ospf area 0 network 10.10.10.1/32
4.0.0-4.4.1
2685584
A host migrated to an 802.1x port within the same broadcast domain does not have the correct static FDB entry installed if a dynamic FDB entry for that MAC address exists from previous connectivity in the broadcast domain.4.2.1-4.4.1
2685036
In a PIM configuration where the RP configuration includes an anycast IP address, if the route to that anycast IP address changes while joined to a multicast stream, you might receive the multicast stream from both the old and the new anycast source.4.4.0-4.4.1
2684925
The NVUE nv show vrf default router bgp peer command produces a 404 not found error.4.4.0-4.4.1
2682976
CVE-2021-28902, CVE-2021-28903, CVE-2021-28904, CVE-2021-28905, CVE-2021-28906: Several vulnerabilities have been announced in libyang that can cause a crash
Vulnerable: <= 1.0.184-2+cl4.3.0u1
4.0.0-4.4.1
2669858
CM-32169
OpenSSH is vulnerable to CVE-2020-14145, as described in https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf.
This is an information leak in algorithm negotiation that can allow man-in-the-middle attacks on initial connection attempts without a previously stored server host key on the client. If desired, mitigation using UpdateHostKeys and HostKeyAlgorithms is also given in that paper.
3.7.14-3.7.15, 4.0.0-4.4.1
2663119
If you update the MAC address of an SVI using ifreload and hwaddress, the kernel maintains a stale permanent fdb entry for the old MAC address.4.3.0-4.4.1
2639303
When you use NCLU to delete a bond, then add an interface, NCLU reports an error similar to the following:
ERROR: ‘NoneType’ object has no attribute ‘conf_key_value_multiple_values’See /var/log/netd.log for more details.
4.3.0-4.4.1
2618227
The NCLU net show bridge macs command displays permanent MAC addresses for trunked VLANs.4.3.0-4.4.1
2606326
If the IGMP and MLD querier is configured on only one of the peer switches in an MLAG configuration, when IGMP packets are sent to the peer with no querier, IGMP leave messages have no effect.4.4.0-4.4.1
2596458
When bridge.unreg_v6_mcast_prune = TRUE is configured in the /etc/cumulus/switchd.conf file, traffic destined to IPv6 link-local multicast addresses might not be flooded within the bridge
To work around this issue, disable pruning for IPv6 multicast by setting bridge.unreg_v6_mcast_prune = FALSE in the /etc/cumulus/switchd.conf file.
4.4.0-4.4.1
2578814
On NVIDIA Spectrum switches, BUM traffic might be dropped during VXLAN decapsulation in an EVPN multihoming environment after multiple PIM uplink interfaces flap.4.3.0-4.4.1
2558184
The Mellanox SN2700 and SN2410 switch intermittently reports PSU fan state changes with Unable to read from device/fan1_input/pwm1 syslog messages.3.7.11-3.7.15, 4.1.1-4.4.1
2556811
CM-33416
Under certain high scale conditions, various modules might experience timetouts during cl-support collection, which results in missing data in the cl-support file.3.7.12-3.7.15, 4.1.1-4.4.1
2556659
CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Vulnerable: <= 2.8.90-1-cl4u5
4.0.0-4.4.1
2556591
CM-33300
After upgrading to Cumulus Linux, MLAG ports might remain down with clagctl and net show clag reporting bridge-priority-mismatch
To work around this issue, run the sudo ifreload -a command on both peers, or configure bridge-bridgeprio to be the same value as mstpctl-treeprio on the bridge interface in the /etc/network/interfaces file, then run sudo ifreload -a.
4.3.0-4.4.1
2556462
CM-33239
When you remove a fan tray, smonctl and sensors display different information about the removed fans.4.2.1-4.4.1
2556369
CM-33196
If you use NCLU to configure an ACL for eth0, you can’t designate it as an INPUT rule; the rule is automatically created as a FORWARD rule in the /etc/cumulus/acl/policy.d/50_nclu_acl.rules file.
To work around this issue, manually create an ACL in the /etc/cumulus/acl/policy.d/ file with “-A INPUT -i eth0”.
4.2.1-4.4.1
2556353
CM-33185
You can enable and disable debugs from either exec mode or global configuration mode (config t) in vtysh. When disabling OSPF debugs from exec mode, the debug is disabled at runtime but left in the running configuration
To work around this issue, disable OSPF debugs from global configuration mode.
4.2.1-4.4.1
2556249
CM-33139
On a Mellanox switch configured with the max acl-heavy or ip-acl-heavy profile, the cl-resource-query -j command takes a long time to run.4.3.0-4.4.1
2556061
CM-33032
On the Edgecore AS4610 switch, the historic CPU usage displayed in /run/sysmonitor/history sometimes shows as a negative value.3.7.12-3.7.15, 4.2.1-4.4.1
2555981
CM-32979
To enable an address family on a peer, you have to enable the address family globally.4.4.0-4.4.1
2555932
CM-32953
On Mellanox switches, you can’t ping the SVI of the MLAG peer over the peer link after the packet is VXLAN decapsulated.4.2.1-4.4.1
2555873
CM-32914
On Mellanox switches, egress ACLs with VLAN keys do not filter layer 2 multicast or broadcast traffic.4.3.0-4.4.1
2555763
CM-32861
The NCLU net del bgp neighbor command does not delete the neighbor and displays an error similar to the following:

ERROR: — /run/nclu/frr/frr.conf.scratchpad.baseline 2021-01-04 17:23:59.250463331 +0000
+++ /run/nclu/frr/frr.conf.scratchpad 2021-01-04 17:25:59.213673980 +0000

To work around this issue, use the FRR command to delete a neighbor.
4.3.0-4.4.1
2555613
CM-32786
The net show configuration commands command incorrectly displays the NCLU syntax to disable IPv6 forwarding on interfaces. For example:

# net show configuration commands
net add vlan 1 ip6-forward off

The correct NCLU command to disable IPv6 forwarding is net add vlan 1 ipv6 forward off (without the hyphen).
4.2.1-4.4.1
2555318
CM-32612
If you try to enable BGP graceful restart when it is already enabled, you see an error similar to the following in the frr.log file:

2020-12-07T19:20:26.004333+00:00 cumulus bgpd[4954]: VRF default: Handle GR command GLOBAL_GR_CMD, current GR state GLOBAL_GR, new GR state GLOBAL_INVALID

This error has no functional impact.
4.3.0-4.4.1
2554986
CM-32416
The ethtool utility doesn’t contain the latest values, as a result the Revision Compliance field shows Unallocated.4.2.1-4.4.1
2554812
CM-32296
If the RMAC of a layer 3 SVI changes, the show vrf vni command is not updated with the new value. However, the new RMAC is seen in the show evpn vni command and is present on self-originated EVPN routes.4.2.1-4.4.1
2554783
CM-32274
If you apply an outbound route map to a BGP peer that uses set as-path prepend last-as, advertised locally-originated routes have the ASN of the peer prepended to the AS path.
This might trigger AS path loop prevention on the peer, where the peer ignores locally-originated prefixes.
4.2.1-4.4.1
2554709
CM-32217
The IP address specified in the ip pim use-source command configured on the loopback interface should be inherited by unnumbered interfaces during their Primary IP address selection process. If ip pim use-source is configured on the loopback after an unnumbered interface has already selected their Primary IP address, the unnumbered interface does not update its Primary IP address to be the new use-source value until after there is a netlink update for that interface.
To work around this issue, configure ip pim use-source on each unnumbered interface directly or ensure ip pim use-source is applied to the loopback before other unnumbered interfaces are enabled for PIM.
3.7.13-3.7.15, 4.2.1-4.4.1
2554582
CM-32144
On switches with the Maverick ASIC, control traffic is dropped due to receive buffering.4.2.0-4.4.1
2554533
CM-32112
On the ARM platform, NTP peer associations slowly increase to larger offsets (~500ms).4.0.0-4.4.1
2554466
CM-32068
Kernel routes added by iproute2 are missing in FRR after an interface flap.
To work around this issue, configure a static route in FRR.
4.2.1-4.4.1
2554261
CM-31948
On Broadcom switches, when you create a VNI interface, switchd might crash with the following log message:
switchd[6628]: log.c:72 CRIT backend/bcm/hal_bcm_vxlan.c:1285: : Assertion ‘0’ failed.
4.3.0-4.4.1
2554222
CM-31921
The NCLU command to enable bridge learning fails.
As a work around, enable bridge learning in the /etc/network/interface file. For example:

auto vni-30
iface vni-30
vxlan-id 30
bridge-access 30
bridge-arp-nd-suppress on
bridge-learning on
vxlan-local-tunnelip 10.10.10.1
mstpctl-bpduguard yes
mstpctl-portbpdufilter yes
mtu 9166
4.2.1-4.4.1
2554218
CM-31917
MLAG packets received on the peer link are dropped instead of routed.4.2.0-4.4.1
2554202
CM-31904
The output of the net show commit command does not show the last commit or the specified commit number but is empty instead.4.2.1-4.4.1
2553887
CM-31700
When using TACACS+ configured with a DEFAULT user providing privilege level lower than 16, TACACS+ configured users with privilege level 16 access might not be able to run privilege level 16 NCLU commands, such as net add and net del and see an error similar to the following:

ERROR: You do not have permission to execute that command.

To work around this issue, remove the DEFAULT user from the TACACS+ server.
3.7.7-3.7.15, 4.0.0-4.4.1
2553237
CM-31418
The default NTP configuration is to use eth0 as the NTP source interface. In Cumulus Linux 4.0 and later, eth0 is in the management VRF by default; therefore the NTP service runs automatically in the management VRF.
NVIDIA does not recommend running NTP with a source interface other than eth0 as this can expose a security vulnerability. Changing the NTP source interface name with NCLU to a non-management VRF interface might result in NTP not functioning because the NTP service is still running in the management VRF.

4.2.0-4.4.1
2553116
CM-31357
When you manually set the link speed or duplex mode with ethtool to an unsupported value, then run a TDR check against the interface, you encounter a switchd service heartbeat failure.
To work around this issue, reboot the switch to clear the condition. Avoid setting the interface speed or duplex mode directly with ethtool.
3.7.12-3.7.15, 4.0.0-4.4.1
2553015
CM-31300
If a neighbour contains a special character in PortID for LLDP, the net show interface command does not display the LLDP information or the command might fail.3.7.10-3.7.15, 4.2.0-4.4.1
2552691
CM-31111
On the EdgeCore AS4610 switch, the eth0 interface remains down when physically connected to a 1G interface.
To work around this issue, configure the link speed to 1000 and set auto-negotiation on for the eth0 interface, then flap eth0 with the ip link set eth0 down/up command to bring up the port.
4.2.0-4.4.1
2552453
CM-30987
On the Mellanox switch, RoCE with PFC configuration is not applied to all ports in hardware when a range is used in the traffic.conf file.
To work around this issue, use NCLU to configure RoCE with PFC or list individual ports in the traffic.conf file.
4.2.0-4.4.1
2552309
CM-30889
The following messages are seen on an Edgecord Minipack-AS8000 running Cumulus Linux 4.2.0:


Hal_bcm_console.c:294 MMU config profile 0 prigroup 0: Service Pool 0 has no space and cannot be assigned
Hal_bcm_console.c:294 MMU config port 0 idx 0: Pool 0 has no space and cannot be assigned


These messages are for internal validation purposes only and can be safely ignored.

4.2.0-4.4.1
2552294
CM-30879
NCLU restarts FRR when removing a BGP VRF IPv4 aggregate-address command.
3.7.12-3.7.15, 4.0.0-4.4.1
2552266
CM-30863
OpenSSH scp is vulnerable to CVE-2020-15778, where clients that have authorized access to the SSH server can execute commands on the server by copying maliciously named files.
The two scenarios where an exploit may be useful to an attacker:
-The user is authorized to scp but not ssh (based on the command option in the authorized_keys file), so this vulnerability can allow executing a remote command on the target computer when not authorized to do so.
-An attacker plants a maliciously named file in a directory tree that someone later uses scp -r to copy over to the target computer.
Be aware that restricting users to scp by using the command option in the authorized_keys file is not effective in preventing those users from executing arbitrary commands on the server.
If you want to use scp -r to copy directory trees, avoid copying directory trees to which attackers may have added maliciously-named files. Archiving the directory tree with tar, zip, or a similar program, then copying the archive over to be extracted on the server avoids having to use scp -r altogether. In addition, OpenSSH provides sftp, which you can use instead of scp to copy files.
To disable scp completely, use /bin/chmod 0 /usr/bin/scp .
3.7.14-3.7.15, 4.0.0-4.4.1
2552214
The Mellanox SN2700 and SN2410 switch intermittently reports PSU fan state changes with Unable to read from device/fan1_input/pwm1 syslog messages.3.7.11-3.7.14, 4.1.1-4.4.13.7.14.2-3.7.15
2552213
The Mellanox SN2700 and SN2410 switch intermittently reports PSU fan state changes with Unable to read from device/fan1_input/pwm1 syslog messages.3.7.11-3.7.14.2, 4.1.1-4.4.13.7.15
2551565
CM-30414
If you toggle VRRP priority values between VRRP routers, then restart switchd, a few IPv6 VRRP instances might not converge. As a result, both the VRRP routers act as master routers for the impacted IPv6 VRRP instances. IPv4 VRRP instances are not affected
To work around this issue, remove, then add back the VRRP configuration with NCLU or vtysh commands.
3.7.13-3.7.15, 4.2.0-4.4.1
2551335
CM-30312
When TACACS+ is configured and the management VRF is enabled, users with privilege level 13 are prevented from running ip and cat commands.4.0.0-4.4.1
2551305
CM-30296
The net show configuration command provides the wrong net add command for ACL under the VLAN interface.

3.7.12-3.7.15, 4.1.0-4.4.1
2551273
CM-30280
On a Mellanox SN2010 switch, the Locator LED is on after you upgrade Cumulus Linux.4.1.0-4.4.1
2550974
CM-30195
On the Dell S3000 switch, after installing the Cumulus Linux 4.1.1 disk image without a license, the switch sends a link beat if a remote host port is configured.3.7.11-3.7.15, 4.1.1-4.4.1
2550950
CM-30182
The net show time ntp servers command does not show any output with management VRF.4.1.1-4.4.1
2550793
CM-30101
The NCLU net show bridge spanning-tree command displays the aging timer incorrectly.3.7.12-3.7.15, 4.0.0-4.4.1
2550713
CM-30052
Configuring the subinterface of a VXLAN uplink under another traditional bridge, which also has the VXLAN VNI enslaved, causes switchd to use high CPU due to very frequent VXLAN tunnel sync events.
To work around this issue, do not enslave the subinterface of a VXLAN layer 3 uplink under a traditional bridge in a VXLAN configuration.
4.1.1-4.4.1
2550444
CM-29872
Tab completion for the net show rollback description command returns information about a snapshot instead of context help.
To work around this issue, run the net show commit history command to find descriptions instead of the net show rollback description command.
3.7.12-3.7.15, 4.0.0-4.4.1
2550443
CM-29871
The net show rollback description command returns an error even if the string matches a commit description.
To work around this issue, look for your string in the output of the net show commit history command (or grep for it there) instead.
3.7.12-3.7.15, 4.0.0-4.4.1
2550243
CM-29759
When you use nginx and restserver in management VRF to provide a REST API for the switch, nginx starts but restserver fails to start.
To work around this issue, comment out the Requires= line in the /lib/systemd/system/restserver.service. For example:

#Requires=nginx.service restserver.socket
3.7.12-3.7.15, 4.0.0-4.4.1
2550056
CM-29652
The ACCTON-DIAG option under the Cumulus Linux GRUB menu does not work. When you select this option, you see the following error:

error: invalid signature.
Press any key to continue…
3.7.12-3.7.15, 4.1.1-4.4.1
2549782
CM-29519
The JSON format output of the net show bgp l2vpn evpn summary command shows the incorrect neighbour state.3.7.12-3.7.15, 4.0.0-4.4.1
2549731
CM-29492
When you create SPAN or ERSPAN rules in ebtables, the action fails to install if it is not in lowercase. Make sure that the SPAN or ERSPAN action is all lowercase; for example:

[ebtables]
-A FORWARD –in-interface swp10 -j span –dport swp1
3.7.12-3.7.15, 4.1.1-4.4.1
2549392
CM-29319
When you configure an RD or RT with NCLU, you see duplicate VNI stanzas in the /etc/frr/frr.conf file.
To work around this issue, manually edit the etc/frr/frr.conf file to define advertise-all-vni before the RD or RT configuration within the l2vpn EVPN address family, then reload the FRR service with the sudo systemctl reload frr command.
4.1.0-4.4.1
2548924
CM-29146
On the EdgeCore Minipack AS8000, storm control does not restrict unknown unicast, broadcast, or multicast traffic.4.1.1-4.4.1
2548315
CM-28816
The following security advisory has been announced for bash:
CVE-2019-18276 Qualys scan QID 372268 setuid vulnerability
When bash or bash scripts are run setuid, bash is supposed to drop privileges, but does so incorrectly, so that an attacker with command access to the shell can use enable -f for runtime loading of a new builtin that calls setuid() to regain dropped privileges.
To work around this issue, do not make bash or bash scripts setuid.
3.7.12-3.7.15, 4.0.0-4.4.1
2548260
CM-28770
The net add routing route-map permit set community command does not add the set statement into the /etc/frr/frr.conf file.4.0.0-4.4.1
2548243
CM-28754
On switches with the Trident2+ ASIC, adding SPAN rules disables PBR rules.3.7.3-3.7.15, 4.0.0-4.4.1
2548117
CM-28659
In OVSDB traditional bridge mode, adding or removing a VLAN binding causes a traffic forwarding outage for around 20 seconds or more on adjacent VLAN bindings. Cumulus Linux does not support traditional bridge mode with VMware NSX.3.7.12-3.7.15, 4.0.0-4.4.1
2548062
CM-28622
When ports are split to 4x25G, RS FEC needs to explicitly configured on both ends (especially when interoperating with non-Mellanox switches).4.1.0-4.4.1
2548044
CM-28608
When a remote VTEP withdraws a type-3 EVPN route, Cumulus Linux purges all MAC address and neighbor entries installed in the corresponding layer 2 VNI through that remote VTEP from the local EVPN and kernel forwarding tables. This purge occurs even if the remote VTEP does not withdraw type-2 routes carrying the MAC address or neighbor entries. The entries stay missing from the local EVPN and kernel forwarding tables until BGP updates the MAC address and neighbor.3.7.12-3.7.15, 4.0.0-4.4.1
2547903
CM-28506
CVE-2019-19956: xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs
Vulnerable: 2.9.4+dfsg1-7Fixed: 2.9.4+dfsg1-7+deb10u1
4.0.0-4.4.1
2547890
CM-28497
QinQ across VXLAN on a traditional bridge does not work.4.1.0-4.4.1
2547706
CM-28397
When you configure ganged ports in the ports.conf file, the change does not take effect after you restart switchd.
To work around this issue, reboot the switch.
3.7.11-3.7.15, 4.0.0-4.4.1
2547405
CM-28226
When you restart the hsflowd service, you see a systemd warning message similar to the following:

Warning: The unit file, source configuration file or drop-ins of hsflowd@mgmt.service changed on disk. Run ‘systemctl daemon-reload’.
4.0.0-4.4.1
2546991
CM-28003
The FRR service does not provide a way for automation to know if the configuration applied properly.
To work around this issue, execute the vtysh -f command in the automation file before starting the FRR service to validate the functional configuration and return an error code.
3.7.11-3.7.15, 4.0.0-4.4.1
2546895
CM-27957
If you have configured a higher number of ports and VLANs (ports x VLANs) or the switch is a lower-powered (CPU) platform, the switchd service might fail to send a systemd keepalive within the watchdog timeout value (2 minutes by default) and you see an error similar to the following:
bq. systemd[1]: switchd.service watchdog timeout (limit 2min)!
To workaround this issue, either reduce the number of configured interfaces and, or VLANs, or increase the systemd timeout for switchd.service
To increase the systemd timeout:1.Edit the /etc/systemd/system/switchd.service.d/override.conf file and increase the WatchdogSec parameter
2.Restart the switchd service with the sudo systemctl restart switchd.service command
systemd attempts to restart the switchd service automatically (after the watchdog timeout). If the restart fails multiple times in a short time period, run the sudo systemctl reset-failed command followed by the sudo systemctl restart switchd command.
3.7.11-3.7.15, 4.0.0-4.4.1
2546874
CM-27950
On the Dell S5232F, S5248F, S5296F, and S3048 switch, using the poweroff or halt commands does not fully power off the switch.4.0.0-4.4.1
2545837
CM-27444
If you use the NCLU commands to configure NTP and run the net add time ntp source command before you run the net add time ntp server iburst command, the /etc/ntp.conf file is misconfigured.
To work around this issue, run the net add time ntp server iburst command before you run the net add time ntp source command.
3.7.10-3.7.11, 4.0.0-4.4.13.7.12-3.7.15
2545520
CM-27243
The length of the netlink message is not set properly for non-bridge family type messages. The same length is used for both bridge and non-bridge even though the bridge family type message has an extra attribute. This causes extra bytes to be left over in non-bridge family type netlink messages.3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2545233
CM-27094
On the Delta AG9032v1 switch, smonctl and sensors report inaccurate PSU current and power.4.0.0-4.4.1
2545125
CM-27018
If you configure more than one VRR interface on an SVI interface, deleting one of the VRR addresses does not remove the interface/address.3.7.10-3.7.15, 4.0.0-4.4.1
2544978
CM-26921
If you delete an undefined bond, then add a bond slave, the net commit command fails.3.7.9-3.7.15, 4.0.0-4.4.1
2544968
CM-26913
FRR configuration commands for an SVI interface might have the \n misplaced in the output. For example:

sudo sh -c “printf ‘interface 50\nvrf TEST description L3 routing interface\n’ » /etc/frr/frr.conf”

should be:

sudo sh -c “printf ‘interface 50 vrf TEST\ndescription L3 routing interface\n’ » /etc/frr/frr.conf”

To work around this issue, configure the interface manually in the /etc/frr/frr.conf file.
3.7.9-3.7.15, 4.0.0-4.4.1
2544957
CM-26907
NCLU incorrectly allows you to apply port security configuration on layer 2 and layer 3 ports that are not part of a bridge.4.0.0-4.4.1
2544953
CM-26905
When you update the hostname of a switch with the NCLU net add hostname command, then run net commit, the lldpd service does not restart and other devices still see the old hostname.
To work around this issue, run the sudo systemctl restart lldpd.service command.
3.7.10-3.7.15, 4.0.0-4.4.1
2544880
CM-26860
When you run the NCLU net show commit last or net show commit command, where is the last commit, no output is shown.4.0.0-4.4.1
2544723
CM-26769
Setting ProtoDown on ports populated with SFP modules providing RJ-45 1000BASE-T interfaces does not cause the carrier to be dropped. The kernel shows carrier down; however, the remote device still shows a link.3.7.6-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2544463
CM-26599
Auto-negotiation does not work with the QSFP28 cables and a remote system operating at 10G. Attempting to enable auto-negotiation with ethtool -s swp<#> autoneg on returns Operation not supported.
To work around this issue, do not use auto-negotiation and set the local port speed to 10G.
3.7.9-3.7.15, 4.0.0-4.4.1
2544456
CM-26595
The NCLU net show lldp command displays the speed of a ganged port group as the speed of one of the individual links, rather than the sum of their speeds.3.7.9-3.7.15, 4.0.0-4.4.1
2544311
CM-26516
Applying a policy-based routing (PBR) rule for all traffic from a host might disrupt ARP refresh for that connected host.3.7.5-3.7.15, 4.0.0-4.4.1
2544155
CM-26423
NCLU requires you to specify an interface with multiple address-virtual statements in ascending MAC address order.

3.7.5-3.7.15, 4.0.0-4.4.1
2544113
CM-26412
Mac learning is not disabled by default on a double tagged peer link interface resulting in the MAC address changing between the MLAG bond and the peer link.
To work around this issue, disable MAC learning on QinQ VLANs by adding bridge-learning off to the VLAN stanza in the etc/network/interfaces file.
3.7.9-3.7.15, 4.0.0-4.4.1
2543937
CM-26308
An interface alias configured outside FRR using iproute2 is imported into the FRR running configuration and overrides the internal description. After an FRR reload, this causes FRR to delete the interface alias in an inefficient way. Depending on how many interfaces with aliases you have configured, this can cause a FRR reload to time out.
To work around this issue, remove the interface alias description from iproute2.
3.7.8-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2543900
CM-26288
On the Mellanox switch, static VXLAN tunnels incorrectly allow traffic from any remote tunnel IP address.3.7.8-3.7.15, 4.0.0-4.4.1
2543841
CM-26256
The net show evpn vni detail json command includes an extra empty dictionary at the end of the output.
3.7.8-3.7.15, 4.0.0-4.4.1
2543816
CM-26241
On the Dell S5248F-ON switch, smond might generate syslog messages indicating that the fan input RPM is lower than the normal low speed of 2500 RPM. Speeds as low as 1700 RPM are acceptable in normal thermal environments; therefore, you can ignore these messages.
3.7.6-3.7.11, 4.0.0-4.4.13.7.12-3.7.15
2543781
CM-26217
NCLU does not allow you to configure OSPF NSSAs. For example:

cumulus@switch:~$ net add ospf area 0.0.0.1 nssa
ERROR: Command not found.
net add ospf area 0.0.0.1 nssa

To work around this issue, use FRR instead. For example:

switch# configure terminal
switch(config)# router ospf
switch(config-router)# area 0.0.0.1 nssa
3.7.7-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2543724
CM-26179
If a hostname contains utf-8 characters, the NCLU net show lldp command outputs the following error:

ERROR: ‘ascii’ codec can’t encode character u’\xe9' in position 3: ordinal not in range(128)
See /var/log/netd.log for more details.
3.7.7-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2543646
CM-26136
In an ebtables rule, ERSPAN (upper case) does not work. You need to specify erspan (lower case).3.7.6-3.7.15, 4.0.0-4.4.1
2543211
CM-25890
In some cases, the switchd service might warn of excessive MAC moves from one switch port to itself (for example, from swp18 to swp18).
3.7.0-3.7.15, 4.0.0-4.4.1
2543164
CM-25859
The MTU of an SVI cannot be higher than the MTU on the bridge. Changing the MTU on the SVI with NCLU does not update the bridge MTU. The net commit command succeeds even though the MTU is not changed as expected.
To work around this issue, change the MTU on all SVIs and the bridge manually in the /etc/network/interfaces file, then apply the change with the ifreload -a command.
3.7.7-3.7.15, 4.0.0-4.4.1
2543096
CM-25815
When an SVI with a virtual MAC is configured with a layer 2 VNI in an EVPN environment, if you replace the /etc/network/interfaces file with a different file that does not have the SVI and layer 2 VNI configuration, the original virtual MAC is not populated through the EVPN route until FRR is restarted.
3.7.6-3.7.15, 4.0.0-4.4.1
2542945
CM-25740
On the Broadcom Maverick switch with a QinQ configuration, the packets coming into the CPU might be tagged incorrectly; for example, 802.1ad + 802.1q tags are expected in the packets but the packets have 802.1q + 802.1q tags.
To work around this issue, configure the bridge with bridge-vlan-protocol 802.1ad:

cumulus@switch:~$ net add bridge mybridge vlan-protocol 802.1ad
3.7.6-3.7.15, 4.0.0-4.4.1
2542837
CM-25674
On Mellanox switches, policer iptables are not working as expected. For example, when using a policer with mode KB/MB/GB to rate-limit interfaces, the syntax is accepted but the data plane transfer speed is not affected by the rule.3.7.6-3.7.8, 4.0.0-4.4.13.7.9-3.7.15
2542305
CM-25400
If an SVI exists in the configuration before you assign it an IP address, when you do assign the IP address with the NCLU command, the vlan-id and the raw-device bridge stanzas are not added automatically.
3.7.6-3.7.15, 4.0.0-4.4.1
2542301
CM-25397
When first creating a bond and enslaving an interface, NCLU hides some of the bridge command suggestions, although they are still accepted.
3.7.3-3.7.15, 4.0.0-4.4.1
2541212
CM-24894
The maximum-prefix configuration under the IPv4 address family has an optional restart value, which you can configure. This configuration is ignored and, instead of restarting the sessions every x minutes, the peer constantly changes between established and idle due to the prefix count being exceeded.3.7.5-3.7.15, 4.0.0-4.4.1
2541029
CM-24799
On switches with the Trident2 ASIC, 802.1Q-encapsulated control plane traffic received on an interface with 802.1AD configured subinterfaces might be dropped.
This issue only affects QinQ configurations.
3.7.5-3.7.15, 4.0.0-4.4.1
2540753
CM-24618
If the interface alias contains a single or double quotation mark, or an apostrophe, the net show configuration commands fail with the following error:
 
ERROR: No closing quotation
See /var/log/netd.log for more details.

3.7.5-3.7.15, 4.0.0-4.4.1
2540444
CM-24473
SNMP incorrectly requires engine ID specification.
3.7.4-3.7.15, 4.0.0-4.4.1
2540352
CM-24435
When you use NCLU to configure a route map, the parser allows for glob matching of interfaces for a match interface condition when there can only be a single interface matched. The proper syntax is to use multiple route map clauses, each matching a single interface, instead of a single clause matching multiple interfaces.
For example, this command is incorrect:
 
net add routing route-map Proxy-ARP permit 25 match interface swp9-10

These commands are correct:
 
net add routing route-map Proxy-ARP permit 25 match interface swp9
net add routing route-map Proxy-ARP permit 30 match interface swp10

3.7.2-3.7.15, 4.0.0-4.4.1
2540340
CM-24426
NCLU allows for the configuration of addresses on VRF interfaces, but tab completion for the net add vrf command just displays . For example:
 
cumulus@switch:~$ net add vrf mgmt


Tab completion for the net add vrf ip address
command works correctly.
3.7.4-3.7.15, 4.0.0-4.4.1
2540274
CM-24379
On the Maverick switch, CPU forwarded packets might be dropped when there is no route to a leaked host route.3.7.5-3.7.15, 4.0.0-4.4.1
2540204
CM-24350
When links come up after FRR is started, VRF connected routes do not get redistributed.3.7.4-3.7.15, 4.0.0-4.4.1
2540192
CM-24343
The net del bridge bridge mcsnoop yes command does not return the value to the default of disabled.
To work around this issue, use the net add bridge bridge mcsnoop no command to delete the mcsnoop attribute and return to the default value.
3.7.4-3.7.15, 4.0.0-4.4.1
2540155
CM-24332
On the Broadcom switch, when moving configuration from bridged to routed (or toggling from routed to bridged to routed), some traffic is not seen by the kernel. This can cause BGP to not establish on a transit node.
3.7.3-3.7.15, 4.0.0-4.4.1
2540042
CM-24272
When you try to configure the VRRP priority and advertisement-interval with NCLU on a traditional mode bridge, the net commit command fails.
To work around this issue, use the vtysh command (inside FRR) to change the VRRP priority or advertisement-interval on traditional bridges. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface br0.100
switch(config-if)# vrrp 1 priority 110
switch(config-if)# vrrp 1 advertisement-interval
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

3.7.4-3.7.15, 4.0.0-4.4.1
2540041
CM-24271
On SVIs in a VLAN-aware bridge, you cannot change the VRRP priority with NCLU.
To work around this issue, run the vtysh command inside FRR to change the default priority. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface vlan100
switch(config-if)# vrrp 1 priority 110
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

3.7.4-3.7.15, 4.0.0-4.4.1
2540040
CM-24270
Cumulus Linux uses VRRPv3 as the default version, and enables both preempt and accept mode by default. You cannot change these default values with NCLU. To work around this issue, run the vtysh commands (inside FRR) to change the default values. For example:
 
cumulus@switch:~$ sudo vtysh
switch# configure terminal
switch(config)# interface swp4
switch(config-if)# vrrp 1 version 2
switch(config-if)# no vrrp 1 preempt
switch(config-if)# end
switch# write memory
switch# exit
cumulus@switch:~

3.7.4-3.7.15, 4.0.0-4.4.1
2540031
CM-24262
NCLU does not honor auto all in the /etc/network/interfaces file and removes the existing configuration if no individual auto lines exist.
3.7.3-3.7.15, 4.0.0-4.4.1
2539994
CM-24241
When you try to remove a BGP peer group configuration with NCLU, the command fails but no warning message is shown. For example:
 
cumulus@switch:~$ net del bgp neighbor fabric peer-group
‘router bgp 65001’ configuration does not have ‘neighbor fabric peer-group’

3.7.2-3.7.15, 4.0.0-4.4.1
2539962
CM-24222
When an LDAP user that does not have NCLU privileges (either in the netshow or netedit group, or in the /etc/netd.conf file) runs an NCLU command, a traceback occurs instead of a permissions error.
3.7.0-3.7.15, 4.0.0-4.4.1
2539670
CM-24035
On the Edgecore 4610-54P switch, automatic medium-dependent interface crossover (auto-MDIX) stops working on a 100M full duplex interface and does not detect the required cable connection type.
3.7.2-3.7.15, 4.0.0-4.4.1
2539124
CM-23825
The net add interface ptm-enable command adds no ptm-enable for that interface in the frr.conf file.
Running the net add or the net del command does not remove no ptm-enable from the frr.conf file. You have to remove it manually using vtysh.
3.7.2-3.7.15, 4.0.0-4.4.1
2538790
CM-23665
NCLU automatically adds the VLAN ID (for the layer 3 VNI/SVI) to the bridge when you run net add vxlan bridge access . This configuration breaks network connectivity in an EVPN symmetric routing configuration using MLAG.
To restore connectivity, remove the VLAN ID from the bridge.
3.7.2-3.7.15, 4.0.0-4.4.1
2538590
CM-23584
When you configure a control plane ACL to define permit and deny rules destined to the local switch, NCLU programs the control plane ACL rules into the FORWARD chain.
3.7.2-3.7.15, 4.0.0-4.4.1
2538562
CM-23570
On an RMP/1G-T switch, when you remove link-speed 100 with the NCLU command or by editing the etc/network/interfaces file to revert the 100M interface to the default (1G auto), the interface fails to recover and does not come back up.
After you remove the link-speed, ethtool shows the advertised link modes as not reported and Speed/Duplex as unknown.
To work around this issue and bring the interface back up, either restart switchd or use ethtool to configure the speed, advertised, duplex or MDI-X settings.
Note: The advertised link mode gets set incorrectly if you include 1000baseT/Half. The port will come up successfully at 1G.
3.7.2-3.7.15, 4.0.0-4.4.1
2538294
CM-23417
If you use NCLU to create an iBGP peering across the peer link, running the net add bgp l2vpn evpn neighbor peerlink.4094 activate command creates a new eBGP neighborship when one has already been configured for iBGP. This is unexpected; the existing iBGP configuration is valid.3.7.0-3.7.15, 4.0.0-4.4.1
2537699
CM-23075
There is a limitation on the number of SVI interfaces you can specify as DHCP relay interfaces in the /etc/default/isc-dhcp-relay file. For example, 1500 SVI interfaces causes the dhcrelay service to exit without a core file and logs similar to the following are generated for the interfaces:
 
2018-11-10T23:35:30.992370-08:00 Dev dhcrelay: Listening on LPF/vlan.101/a0:00:00:00:00:51
2018-11-10T23:35:30.993472-08:00 Dev dhcrelay: Sending on LPF/vlan.101/a0:00:00:00:00:51

Eventually the dhcrelay service stops.
3.7.1-3.7.15, 4.0.0-4.4.1
2536576
CM-22554
If you try to bring down several members of a bond remotely at the same time, the link state of one of the interfaces might not transition correctly to the down state; however, all links show down in hardware.
4.0.0-4.4.1
2536384
CM-22386
The BFD packet redirection logic used by OVSDB server high availability mode redirects BUM packets across the peer link. The iptables rule for redirection does differentiate between BFD and non-BFD VXLAN inner packets because the service node sends all frames with its own IP address as the tunnel source IP address. The VXLAN encapsulated BUM packets do not get forwarded to the CPU and do not go through the iptable redirection rule; only VXLAN encapsulated BFD packets get forwarded to the CPU due to the inner MAC DA lookup in hardware.
3.7.0-3.7.15, 4.0.0-4.4.1
2536256
CM-22301
For an unresolved address, the IPROUTER default policer rule has been modified to not match on packets exiting a TUNNEL and headed to the CPU to resolve the address via ARP. As a result, the following default rule no longer matches TUNNEL ingress packets.
 
A $INGRESS_CHAIN –in-interface $INGRESS_INTF -m addrtype –dst-type
IPROUTER -j POLICE –set-mode pkt –set-rate 400 –set-burst 100

These packets are now policed by catch all rules.
To work around this issue, the VPORT value on a TRIDENT switch must be changed from binary 011 to 100.
4.0.0-4.4.1
2536242
CM-22287
On the EdgeCore AS7712 (Tomahawk) switch running in atomic mode, when a layer 3 ECMP path is brought down, traffic traversing the path stops working for about four seconds. When the switch is changed to non-atomic mode, the delay is less than one second. This issue is seen across OSPF and static ECMP routes.4.0.0-4.4.1
2536179
CM-22228
On switches with the Trident 2+ ASIC, counters associated with VLANs and VRFs are not working.3.7.0-3.7.15, 4.0.0-4.4.1
2535986
CM-22041
At a high CPU transmit traffic rate (for example, if there is unexpected CPU generated flooding or replication in software), when the ASIC packet driver cannot keep up with the transmit rate because there are no free DMA buffers, it can back pressure by suspending the switch port transmit queues. This can fill up the application socket buffers resulting in No buffer space available error messages on protocol sockets.
When the driver recovers, it automatically resumes the transmit queues. In most cases these error messages are transient. In rare cases, the hardware queues might get stuck, which you can recover with a switchd restart.
3.7.0-3.7.15, 4.0.0-4.4.1
2535965
CM-22020
On the Trident3 switch, static PIM with IIF based on a layer 2 bridge does not work reliably. PIM Join via signaling is required for IPMC to work properly.
To work around this issue, use dynamic signaling (joins) to manage IP multicast traffic.
3.7.0-3.7.15, 4.0.0-4.4.1
2535723
CM-21785
The source address of the ICMPv6 time exceeded message (traceroute hop) is sourced from the wrong VRF when the traceroute target resides on the same switch but in a different VRF.4.0.0-4.4.1
2535605
CM-21667
FRR does not add BGP ttl-security to either the running configuration or to the /etc/frr/frr.conf file when configured on a peer group instead of a specific neighbor.
To work around this issue, add ttl-security to individual neighbors instead of the peer group.
4.0.0-4.4.1
2535209
CM-21278
The net show lldp command sometimes shows the port description in the Remote Port field. The net show interface command shows the correct value in the Remote Host field.
To work around this issue, use net show interface command for LLDP output when connected to Cisco equipment.
3.7.5-3.7.10, 4.0.0-4.4.13.7.11-3.7.15
2534734
CM-20813
Span rules matching the out-interface as a bond do not mirror packets.4.0.0-4.4.1
2533691
CM-19788
If you configure a VLAN under a VLAN-aware bridge and create a subinterface of the same VLAN on one of the bridge ports, the bridge and interface compete for the same VLAN and if the interface is flapped, it stops working. Correcting the configuration and running the ifreload command does not resolve the conflict.
To work around this issue, correct the bridge VIDs and restart switchd or delete the subinterface.
3.7.12-3.7.15, 4.0.0-4.4.1
2533625
CM-19724
PIM and MSDP entries are set to the internal COS value of 6 so they are grouped together with the bulk traffic priority group in the default traffic.conf file. However, PIM, IGMP, and MSDP are considered control-plane and should be set to the internal COS value of 7.4.0.0-4.4.1
2533337
CM-19454
When you use NCLU to bring a bond admin down (net add bond link down), the bond interface goes into admin down state but the switch ports enslaved to the bond remain UP. If you are using bond-lacp-bypass-allow or balance-xor mode, the host might continue to send traffic. This traffic will be dropped because although the bond slaves are UP, they are not members of the bridge.
To work around this issue, use the sudo ifdown command.
4.0.0-4.4.1
2531273
CM-17494
In certain cases, a peer device sends an ARP request from a source IP address that is not on the connected subnet and the switch creates a STALE neighbor entry. Eventually, the switch attempts to keep the entry fresh and sends ARP requests to the host. If the host responds, the switch has REACHABLE neighbor entries for hosts that are not on the connected subnet.
To work around this issue, change the value of arp_ignore to 2. See [Address Resolution Protocol in the Cumulus Linux user guide|https://docs.cumulusnetworks.com/cumulus-linux/Layer-3/Address-Resolution-Protocol-ARP/] for more information.
4.0.0-4.4.1

Fixed Issues in 4.4.0

Issue IDDescriptionAffects
2734173
The Mellanox 100G transceiver MMA1L30-CM is not recognized on the SN4600 switch even though the link is up. The ethtool output shows the error Cannot get Module EEPROM data: Invalid argument.
2728138
CM-33237
CVE-2020-36221, CVE-2020-36222, CVE-2020-36223, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226, CVE-2020-36227, CVE-2020-36228, CVE-2020-36229, CVE-2020-36230: Several vulnerabilities were discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of these flaws to cause a denial of service (slapd daemon crash, infinite loops) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u4
Fixed: 2.4.47+dfsg-3+deb10u5
4.0.0-4.3.0
2728134
CM-33394
CVE-2021-27212: A vulnerability in the Certificate List Exact Assertion validation was discovered in OpenLDAP, a free implementation of the Lightweight Directory Access Protocol. An unauthenticated remote attacker can take advantage of this flaw to cause a denial of service (slapd daemon crash) via specially crafted packets.
Vulnerable: <= 2.4.47+dfsg-3+deb10u5
Fixed: 2.4.47+dfsg-3+deb10u6
4.0.0-4.3.0
2695526
CVE-2021-3580 CVE-2021-20305: Multiple vulnerabilities were discovered in nettle, a low level cryptographic library, which could result in denial of service (remote crash in RSA decryption via specially crafted ciphertext, crash on ECDSA signature verification) or incorrect verification of ECDSA signatures
Vulnerable: 3.4.1-1Fixed: 3.4.1-1+deb10u1
4.0.0-4.3.0
2687159
CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332: Multiple vulnerabilities were discovered in libwebp, the implementation of the WebP image format, which could result in denial of service, memory disclosure or potentially the execution of arbitrary code if malformed images are processed
Vulnerable: 0.6.1-2Fixed: 0.6.1-2+deb10u1
4.0.0-4.3.0
2684418
If you configure items in a VRF that has been created, deleted, then re-created, staticd crashes.4.3.0
2682971
CVE-2020-12762: integer overflow in the json-c JSON library, which could result in denial of service or potentially the execution of arbitrary code if large malformed JSON files are processed
Vulnerable: 0.12.2+cl4u1
4.0.0-4.3.0
2682780
Adding a route map configuration after a MAC access list configuration line causes the route map configuration to be applied incorrectly
To work around this issue, add the MAC access list configuration to the end of the /etc/frr/frr.conf file.
4.2.0-4.3.0
2679948
CVE-2021-25217: parsing of stored leases by dhclient or dhcpd has an incorrect length check that may cause a crash
Vulnerable: <= 4.3.1-6-cl3.7.14u1Fixed: 4.3.1-6-cl3.7.16u1
3.7.0-4.3.0
2677049
CM-33247
CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 CVE-2020-25687: Several vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP server, could result in denial of service, cache poisoning or the execution of arbitrary code.4.0.0-4.3.0
2671667
CVE-2021-23017: off-by-one in Nginx, a high-performance web and reverse proxy server, which couldresult in denial of service and potentially the execution of arbitrary code
Vulnerable: <= 1.14.2-2+deb10u3Fixed: 1.14.2-2+deb10u4
4.0.0-4.3.0
2669073
On Spectrum, Spectrum-2, and Spectrum-3 switches, the l1-show command shows the wrong data when the MST service is stopped
To work around this issue, start the MST service with the sudo mst start command.
4.3.0
2666838
CVE-2021-31535: missing length validation in various functions provided by libx11, the X11 client-side library, allow to inject X11 protocol commands on X clients, leading to authentication bypass, denial of service or potentially the execution of arbitrary code
Vulnerable: <= 1.6.7-1+deb10u1Fixed: 1.6.7-1+deb10u2
4.0.0-4.3.0
2663479
CVE-2021-3520: integer overflow flaw in lz4, a fast LZ compression algorithm library, resulting in memory corruption
Vulnerable: 1.8.3-1Fixed: 1.8.3-1+deb10u1
4.0.0-4.3.0
2658021
In an MLAG configuration, the secondary MLAG switch does not use a unique address instead of the MLAG system MAC address when there is a double-failure (peer link failure and backup IP failure)3.7.14-4.3.0
2656527
CVE-2020-18032: A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file
Vulnerable: 2.40.1-6Fixed: 2.40.1-6+deb10u1
4.0.0-4.3.0
2648658
If you try to use more than one percent of max-ecmp-nexthops, you get an error indicating a failure.3.7.15-4.3.0
2648587
CM-29978
The received PVST BPDU for a VLAN is flooded even though the ingress port doesn’t have the VLAN tagged.3.7.8-3.7.14.2, 4.0.0-4.3.0
2644053
The following vulnerabilities have been announced in BIND:CVE-2021-25214: a malformed incoming IXFR transfer could trigger an assertion failure in named, resulting in denial of service
CVE-2021-25215: named could crash when a DNAME record placed in the ANSWER section during DNAME chasing turned out to be the final answer to a client query
CVE-2021-25216: the SPNEGO implementation used by BIND is prone to a buffer overflow vulnerability. This update switches to use the SPNEGO implementation from the Kerberos libraries
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u4Fixed: 9.11.5.P4+dfsg-5.1+deb10u5
4.0.0-4.3.0
2643822
After running the systemctl restart networking service command on the MLAG primary switch, the secondary switch also closes its ports
To work around this issue, run the ifreload -a command to restart networking.
4.2.1-4.3.0
2638106
The NCLU net show route vrf summary and vtysh show ip route vrf summary commands don’t return any output.4.3.0
2637554
The cl-acltool takes a significant amount of time to run, which can slow down automation scripts.4.2.0-4.3.0
2633061
The following vulnerability affects the libgstreamer-plugins-base1.0-0 package. There is no CVE yet; the Debian advisory number is DSA-4903-1
Multiple vulnerabilities were discovered in plugins for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened
Vulnerable: 1.14.4-2Fixed: 1.14.4-2+deb10u1
4.0.0-4.3.0
2632379
When you upgrade the switch with apt-get upgrade, the kexec-tools package is not installed, which causes the Smart System Manager fast restart mode to work incorrectly.4.3.0
2628693
After an apt upgrade, the OPTIONS configuration line in /etc/default/isc-dhcp-relay might be removed. To work around this issue, reconfigure the desired options in the file after the upgrade completes.3.7.12-4.3.0
2628588
After rebooting a switch with PFC configurations, non-PFC enabled ports might not send or receive traffic correctly.
2628513
CVE-2020-12695: hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service
Vulnerable: <= 2.8.0-cl3.7.15u2Fixed: 2.8.0-cl3.7.15u3
3.7.14-3.7.14.2, 4.3.0
2617000
CVE-2021-26933 CVE-2021-27379Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or memory disclosure
Vulnerable: < 4.11.4+99-g8bce4698f6-1Fixed: 4.11.4+99-g8bce4698f6-1
4.0.0-4.3.0
2616998
CVE-2021-23358: missing input sanitising in the template() function of the Underscore JavaScript library could result in the execution of arbitrary code
Vulnerable: 1.9.1~dfsg-1Fixed: 1.9.1~dfsg-1+deb10u1
4.0.0-4.3.0
2616987
CVE-2020-6851 CVE-2020-8112 CVE-2020-15389 CVE-2020-27814 CVE-2020-27823 CVE-2020-27824 CVE-2020-27841 CVE-2020-27842 CVE-2020-27843 CVE-2020-27845: Multiple vulnerabilities have been discovered in openjpeg2, the open-source JPEG 2000 codec, which could result in denial of service or the execution of arbitrary code when opening a malformed image
Vulnerable: <= 2.3.0-2+deb10u1Fixed: 2.3.0-2+deb10u2
4.0.0-4.3.0
2616976
Multiple vulnerabilities were discovered in cURL, an URL transfer library:CVE-2020-8169: partial password leak to DNS servers
CVE-2020-8177: malicious server could cause curl -J -i to overwrite a local file
CVE-2020-8231: libcurl with CURLOPT_CONNECT_ONLY information leak due to wrong connection
CVE-2020-8284: PASV response could trick curl into connecting back to an arbitrary IP address and port
CVE-2020-8285: libcurl could run out of stack space using FTP wildcard matching (CURLOPT_CHUNK_BGN_FUNCTION)
CVE-2020-8286: failure to verify that OSCP response matches intended certificate
CVE-2021-22876: libcurl did not strip user credentials from URL when populating Referer HTTP request header
CVE-2021-22890: libcurl using HTTPS proxy with TLS1.3 could use the wrong session ticket and bypass server TLS certificate check
Vulnerable: <= 7.64.0-4+deb10u1Fixed: 7.64.0-4+deb10u2
4.0.0-4.3.0
2616967
CVE-2021-28957: lxml, a Python binding for the libxml2 and libxslt libraries, did not properly sanitize its input. This would allow a malicious user to mount a cross-site scripting attack
Vulnerable: <= 4.3.2-1+deb10u2Fixed: 4.3.2-1+deb10u3
4.0.0-4.3.0
2616964
CVE-2021-27291: Pygments, a syntax highlighting package written in Python 3, used regular expressions which could result in denial of service
Vulnerable: <= 2.3.1+dfsg-1+deb10u1Fixed: 2.3.1+dfsg-1+deb10u2
4.0.0-4.3.0
2616954
CVE-2021-3449: A NULL pointer dereference was found in the signature_algorithms processing in OpenSSL, a Secure Sockets Layer toolkit, which could result in denial of service
Vulnerable: <= 1.1.1d-0+deb10u5Fixed: 1.1.1d-0+deb10u6
4.0.0-4.3.0
2614016
The switch firmware incorrectly identifies Lenovo LR4 transceivers (part number 00YD278) and does not set the laser levels properly, which can prevent the link from coming up or might cause the transceiver to be identified as a 1G module.4.2.0-4.3.0
2578872
CVE-2021-20270: It was discovered that Pygments, a syntax highlighting package written in Python, could be forced into an infinite loop, resulting in denial of service
Vulnerable: 2.3.1+dfsg-1Fixed: 2.3.1+dfsg-1+deb10u1
4.0.0-4.3.0
2578870
CVE-2020-35523 CVE-2020-35524: Two vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code if malformed image files are processed
Vulnerable: <= 4.1.0+git191117-2~deb10u1Fixed: 4.1.0+git191117-2~deb10u2
4.0.0-4.3.0
2577499
Arista QSFP-40G-SRBD optics do not work on Spectrum platforms.4.3.0
2566878
CVE-2021-27803: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.3.7.14-3.7.14.2, 4.0.0-4.3.0
2564534
Several vulnerabilities have been discovered in the GRUB2 bootloader:CVE-2020-14372: It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled
CVE-2020-25632: A use-after-free vulnerability was found in the rmmod command
CVE-2020-25647: An out-of-bound write vulnerability was found in the grub_usb_device_initialize() function, which is called to handle USB device initialization
CVE-2020-27749: A stack buffer overflow flaw was found in grub_parser_split_cmdline
CVE-2020-27779: It was discovered that the cutmem command allows a privileged user to remove memory regions when Secure Boot is enabled
CVE-2021-20225: A heap out-of-bounds write vulnerability was found in the short form option parser
CVE-2021-20233: A heap out-of-bound write flaw was found caused by mis-calculation of space required for quoting in the menu rendering.
4.0.0-4.3.0
2556814
CM-33419
When ARP suppression is enabled, RARP packets sometimes get dropped and are not flooded by the local VTEP.
To work around this issue, disable ARP suppression.
3.7.14-3.7.14.2, 4.3.0
2556781
CM-33398
CVE-2021-0326: An issue has been found in wpa, a set of tools to support WPA and WPA2 (IEEE 802.11i). Missing validation of data can result in a buffer over-write, which might lead to a DoS of the wpa_supplicant process or potentially arbitrary code execution.
Vulnerable: <= 2.8.0-cl3.7.14u1, <= 2.8.0-cl4.2.1u1
3.7.14-3.7.14.2, 4.0.0-4.3.0
2556777
CM-33395
CVE-2021-26937: A flaw in the handling of combining characters in screen, a terminal multiplexer with VT100/ANSI terminal emulation can result in denial of service, or potentially the execution of arbitrary code via a specially crafted UTF-8 character sequence.
Vulnerable: 4.6.2-3
Fixed: 4.6.2-3+deb10u1
4.0.0-4.3.0
2556774
CM-33393
DSA-4859-1 (no CVE): zstd, a compression utility, was vulnerable to a race condition: it temporarily exposed, during a very short timeframe, a world-readable version of its input even if the original file had restrictive permissions.
Vulnerable: <= 1.3.8+dfsg-3+deb10u1
Fixed: 1.3.8+dfsg-3+deb10u2
4.0.0-4.3.0
2556762
CM-33385
In a configuration with both traditional and vlan-aware bridges, the VLAN membership check on a vlan-aware switch does not drop PVST BPBUs that come from a traditional bridge.3.7.14-3.7.14.2, 4.0.0-4.3.0
2556730
CM-33359
CVE-2020-8625: A buffer overflow vulnerability was discovered in the SPNEGO implementation affecting the GSSAPI security policy negotiation in BIND, a DNS server implementation, which could result in denial of service (daemon crash), or potentially the execution of arbitrary code.
Vulnerable: <= 9.11.5.P4+dfsg-5.1+deb10u2
Fixed: 9.11.5.P4+dfsg-5.1+deb10u3
4.0.0-4.3.0
2556690
CM-33334
The following vulnerabilities have been announced in the openssl packages:
CVE-2021-23840: Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.
CVE-2021-23841: The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained
within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.
CVE-2019-1551: There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME.
Vulnerable: <= 1.1.1d-0+deb10u4
Fixed: 1.1.1d-0+deb10u5
4.0.0-4.3.0
2556658
CM-33315
CVE-2020-35498: A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Vulnerable: <= 2.8.90-1-cl4u5
4.0.0-4.3.0
2556568
CM-33283
DSA-4850-1 (no CVE): libzstd adds read permissions to files while being compressed or uncompressed.
Vulnerable: 1.3.8+dfsg-3
Fixed: 1.3.8+dfsg-3+deb10u1
4.0.0-4.3.0
2556499
CM-33258
Cumulus Linux does not support bond members at 200G or greater.4.0.0-4.3.0
2554797
CM-32286
On the Mellanox SN3700C switch, PIM multicast packets are duplicated at the egress VTEP.4.2.0-4.3.0
2554299
CM-31962
In a VRRP configuration, BGP unnumbered sessions for VRFs fail to establish after a networking restart.4.2.0-4.3.0
2550704
On the Mellanox SN3420 switch, 25G SR optics only link up in force mode.4.3.0
2549371
CM-29309
When Optimized Multicast Flooding (OMF) is enabled with the bridge.optimized_mcast_flood = TRUE setting in the /etc/cumulus/switchd.conf file, the switch continues to flood IPv6 multicast traffic to all slave ports when there is no MLD join receive.3.7.11-4.3.0
2545239
CM-27099
On the Mellanox switch with the Spectrum-2 ASIC, Precision Time Protocol (PTP) is not currently supported.4.0.0-4.3.0