SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for bird-1.6.8-13.2.x86_64.rpm :

* Wed Jun 17 2020 infoAATTpaolostivanin.com- Add -fcommon to allow building against GCC10
* Wed Sep 18 2019 mardnhAATTgmx.de- Update to version 1.6.8
* Fix CVE-2019-16159: BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5 has a stack-based buffer overflow. The BGP daemon\'s support for RFC 8203 administrative shutdown communication messages included an incorrect logical expression when checking the validity of an input message. Sending a shutdown communication with a sufficient message length causes a four-byte overflow to occur while processing the message, where two of the overflow bytes are attacker-controlled and two are fixed.
* Several important bugfixes
* BFD: Support for VRFs
* Fri Mar 01 2019 mardnhAATTgmx.de- Update to version 1.6.6
* Several bugfixes related to route propagation
* Sun Feb 03 2019 mardnhAATTgmx.de- Update to version 1.6.5
* MRT table dumps (RFC 6396)
* BGP Long-lived graceful restart
* Filter: Make ifname attribute modifiable
* Improved keeping track of IPv6 link-local addresses
* Many bugfixes
* Sat Dec 15 2018 jengelhAATTinai.de- Kill off em dashes in summaries. Remove future aims from descriptions.
* Thu Dec 06 2018 mardnhAATTgmx.de- Specfile cleanup
* Wed Nov 14 2018 mardnhAATTgmx.de- Update to version 1.6.4
* Basic VRF support
* Simplified autoconf scripts
* BGP: Shutdown communication (RFC 8203)
* BGP: Allow exchanging LOCAL_PREF with eBGP peers
* BGP: Allow to specify interface for regular sessions
* BGP: New option \'disable after cease\'
* RAdv: Support for more specific routes (RFC 4191)
* RAdv: Proper handling of prefix retraction
* Filter: Allow silent filter execution
* Filter: Fixed stack overflow in BGP mask expressions.
* Several bug fixes
* Fri Aug 18 2017 mrueckertAATTsuse.de- added potential fix for the bufferoverflow issue bufferoverflow.patch We will keep fortify_source 0 until the patch was discussed with upstream.
* Fri Aug 18 2017 mrueckertAATTsuse.de- downgrade to _FORTIFY_SOURCE=0 as 1 still fails on TW
* Fri Aug 18 2017 mrueckertAATTsuse.de- ignore some warnings to make the output more readable
* Fri Aug 18 2017 mrueckertAATTsuse.de- added bird-1.6.3_verbose.build.patch: - no longer print false CC lines - print the actuall gcc calls instead- properly fix the FORTIFY_SOURCE fix from the earlier commit. - we just replace the -D_FORTIFY_SOURCE value with what we want instead of appending another value which leads to warnings
* Fri Aug 18 2017 mrueckertAATTsuse.de- update to 1.6.3 - Large BGP communities - BFD authentication (MD5, SHA1) - SHA1 and SHA2 authentication for RIP and OSPF - Improved documentation - Several bug fixes- changes from version 1.6.2 - Fixes serious bug introduced in the previous version- changes from version 1.6.1 - Support for IPv6 ECMP - Better handling of IPv6 tentative addresses - Several updates and fixes in Babel protocol - Filter: New !~ operator - Filter: ASN ranges in bgpmask - KRT: New kernel protocol option \'metric\' - KRT: New route attribute \'krt_scope\' - Improved BIRD help messages - Fixes memory leak in BGP multipath - Fixes handling of empty path segments in BGP AS_PATH - Several bug fixes- drop bird-1.5.0-rip_auth_bufferoverflow.patch
* Tue Jun 21 2016 mardnhAATTgmx.de- update to version 1.6.0- if possible use /run instead of /var/run for the runtimedir- removed patch: bird-1.5.0-rip_auth_bufferoverflow.patch A similar issue still exists but it\'s a false positive.
* Sat Oct 17 2015 mrueckertAATTsuse.de- add $BIRD_OPTIONS to the service files
* Sat Oct 17 2015 mrueckertAATTsuse.de- no longer run as root but as user/group bird.- add tmpfiles.d file for /var/run/bird- merged spec file from bird6 again
* Fri Oct 16 2015 mrueckertAATTsuse.de- initial package
 
ICM