Package Release Info

bird-2.0.12-bp155.1.6

Update Info: Base Release
Available in Package Hub : 15 SP5

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

bird
bird-doc

Change Logs

* Mon Jan 23 2023 Martin Hauke <mardnh@gmx.de>
- Update to version 2.0.12
  * Filter: New 'onlink' route attribute.
  * Compile-time option to use 4-way tries instead of 16-way ones.
  * Important bugfixes.
* Sun Dec 11 2022 Martin Hauke <mardnh@gmx.de>
- Update to version 2.0.11
  * BGP roles (RFC 9234)
  * BGP: Keepalive time scaling
  * BGP: New 'min hold time' and 'min keepalive time' options
  * BGP: New 'next hop prefer global' option
  * Filter: For loops and direct recursion
  * Filter: Mixed declarations of local variables
  * Filter: Improved static type checks
  * Filter: Literal [] for empty set
  * Linux: Netlink KRT improvements
  * Memory management improvements
  * Many bugfixes
* Mon Jun 27 2022 Martin Hauke <mardnh@gmx.de>
- Update to version 2.0.10
  * BGP performance improvements
  * BFD: New 'strict bind' option
  * RPKI: VRF support
  * Allow use of 240.0.0.0/4 as a private range
  * BIRD client uses exit status to report errors
  * Important bugfixes
* Thu Feb 24 2022 Martin Hauke <mardnh@gmx.de>
- Update to version 2.0.9
  * BGP: Flowspec validation procedure
  * Babel: MAC authentication support
  * Routing table configuration blocks
  * Optional prefix trie in routing table for faster LPM/interval
    queries
  * CLI: New 'show route in <prefix>' command
  * Filter: Faster (16-way) prefix sets
  * Filter: MPLS label route attribute
  * Filter: Operators to pick community components
  * Filter: Operators to find minimum and maximum element of lists
  * BGP: New 'free bind' option
  * BGP: Log route updates that were changed to withdraws
  * BGP: Improved 'invalid next hop' error reporting
  * OSPF: Allow ifaces with host address as unnumbered PtP or PtMP
    ifaces
  * OSPF: All packets on PtP networks should be sent to
    AllSPFRouters address
  * Support for Blake2s and Blake2b hash functions
  * Security keys / passwords can be entered in hexadecimal digits
  * Memory statistics split into Effective and Overhead
  * New option 'netlink rx buffer' to specify netlink socket buffer
    size
  * Many bugfixes
Version: 1.6.8-bp151.2.3.1
* Wed Sep 18 2019 Martin Hauke <mardnh@gmx.de>
- Update to version 1.6.8
  * Fix CVE-2019-16159:
    BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through
    2.0.5 has a stack-based buffer overflow. The BGP daemon's
    support for RFC 8203 administrative shutdown communication
    messages included an incorrect logical expression when checking
    the validity of an input message. Sending a shutdown
    communication with a sufficient message length causes a four-byte
    overflow to occur while processing the message, where two of the
    overflow bytes are attacker-controlled and two are fixed.
  * Several important bugfixes
  * BFD: Support for VRFs
Version: 1.6.6-bp151.1.1
* Fri Mar 01 2019 Martin Hauke <mardnh@gmx.de>
- Update to version 1.6.6
  * Several bugfixes related to route propagation
* Sun Feb 03 2019 mardnh@gmx.de
- Update to version 1.6.5
  * MRT table dumps (RFC 6396)
  * BGP Long-lived graceful restart
  * Filter: Make ifname attribute modifiable
  * Improved keeping track of IPv6 link-local addresses
  * Many bugfixes
* Sat Dec 15 2018 Jan Engelhardt <jengelh@inai.de>
- Kill off em dashes in summaries. Remove future
  aims from descriptions.
* Thu Dec 06 2018 mardnh@gmx.de
- Specfile cleanup
* Wed Nov 14 2018 mardnh@gmx.de
- Update to version 1.6.4
  * Basic VRF support
  * Simplified autoconf scripts
  * BGP: Shutdown communication (RFC 8203)
  * BGP: Allow exchanging LOCAL_PREF with eBGP peers
  * BGP: Allow to specify interface for regular sessions
  * BGP: New option 'disable after cease'
  * RAdv: Support for more specific routes (RFC 4191)
  * RAdv: Proper handling of prefix retraction
  * Filter: Allow silent filter execution
  * Filter: Fixed stack overflow in BGP mask expressions.
  * Several bug fixes
* Fri Aug 18 2017 mrueckert@suse.de
- added potential fix for the bufferoverflow issue
  bufferoverflow.patch
  We will keep fortify_source 0 until the patch was discussed with
  upstream.
* Fri Aug 18 2017 mrueckert@suse.de
- added potential fix for the bufferoverflow issue
  bufferoverflow.patch
  We will keep fortify_source 0 until the patch was discussed with
  upstream.
* Fri Aug 18 2017 mrueckert@suse.de
- downgrade to _FORTIFY_SOURCE=0 as 1 still fails on TW
* Fri Aug 18 2017 mrueckert@suse.de
- ignore some warnings to make the output more readable
* Fri Aug 18 2017 mrueckert@suse.de
- added potential fix for the bufferoverflow issue
  bufferoverflow.patch
  We will keep fortify_source 0 until the patch was discussed with
  upstream.
* Tue Jun 21 2016 mardnh@gmx.de
- update to version 1.6.0
- if possible use /run instead of /var/run for the runtimedir
- removed patch: bird-1.5.0-rip_auth_bufferoverflow.patch
  A similar issue still exists but it's a false positive.
* Sat Oct 17 2015 mrueckert@suse.de
- add $BIRD_OPTIONS to the service files
* Sat Oct 17 2015 mrueckert@suse.de
- no longer run as root but as user/group bird.
- add tmpfiles.d file for /var/run/bird
- merged spec file from bird6 again
* Fri Oct 16 2015 mrueckert@suse.de
- initial package