Package Release Info


Update Info: Base Release
Available in Package Hub : 15 SP3





Change Logs

* Mon Mar 22 2021 Martin Hauke <>
- Update to version 2.0.8
  * Automatic channel reloads based on RPKI changes
  * Multiple static routes with the same network
  * Use bitmaps to keep track of exported routes
  * Per-channel debug flags
  * CLI commands show info from multiple protocols
  * Linux: IPv4 routes with IPv6 nexthops
  * Filter: Optimized redesign of prefix sets
  * Filter: Improved type checking of user filters
  * Filter: New src/dst accessors for Flowspec and SADR
  * Filter: New 'weight' route attribute
  * Filter: BGP path mask loop operator
  * Filter: Remove quitbird command
  * RIP: Demand circuit support (RFC 2091)
  * BGP: New 'allow as sets' and 'enforce first as' options
  * BGP: Support for BGP hostname capability
  * BGP: Support for MD5SIG with dynamic BGP
  * BFD: Optional separation of IPv4 / IPv6 BFD instances
  * BFD: Per-peer session options
  * RPKI: Allow build without libSSH
  * RPKI: New 'ignore max length' option
  * OSPF: Redesign of handling of unnumbered PtPs
  * OSPF: Allow key id 0 in authentication
  * Babel: Use onlink flag for routes with unreachable next hop
  * Many bugfixes
  * Automatic channel reloads based on RPKI changes are enabled
    by default, but require import table enabled when used in
    BGP import filter.
  * BIRD now uses bitmaps to keep track of exported routes
    instead of re-evaluation of export filters. That should
    improve speed and accuracy in route export handling during
    reconfiguration, but takes some more memory.
  * Per-channel debug logging and some CLI commands (like 'show
    ospf neighbors') defaulting to all protocol instances lead to
    some minor changes in log and CLI output. Caution is
    recommended when logs or CLI output are monitored by scripts.
- Drop not longer needed patches:
  * gcc10.patch
  * fix_test_for_bigendian_arch.patch
* Mon Nov 16 2020 Mark Stopka <>
- Add patch to fix test on Big Endian architectures
  * fix_test_for_bigendian_arch.patch
* Fri Sep 11 2020 Dirk Mueller <>
- update to 2.0.2:
  o Integrated IPv4 + IPv6 design
  * many changes, see included NEWS for details
  * obsoletes separate bird6/bird-common subpackages
- remove bufferoverflow.patch: obsolete
- add gcc10.patch (fix build with gcc 10), disable -fcommon again
- reenable fortify-source
* Wed Jun 17 2020 Paolo Stivanin <>
- Add -fcommon to allow building against GCC10
Version: 1.6.6-bp151.1.1
* Fri Mar 01 2019 Martin Hauke <>
- Update to version 1.6.6
  * Several bugfixes related to route propagation
* Sun Feb 03 2019
- Update to version 1.6.5
  * MRT table dumps (RFC 6396)
  * BGP Long-lived graceful restart
  * Filter: Make ifname attribute modifiable
  * Improved keeping track of IPv6 link-local addresses
  * Many bugfixes
* Sat Dec 15 2018 Jan Engelhardt <>
- Kill off em dashes in summaries. Remove future
  aims from descriptions.
* Thu Dec 06 2018
- Specfile cleanup
* Wed Nov 14 2018
- Update to version 1.6.4
  * Basic VRF support
  * Simplified autoconf scripts
  * BGP: Shutdown communication (RFC 8203)
  * BGP: Allow exchanging LOCAL_PREF with eBGP peers
  * BGP: Allow to specify interface for regular sessions
  * BGP: New option 'disable after cease'
  * RAdv: Support for more specific routes (RFC 4191)
  * RAdv: Proper handling of prefix retraction
  * Filter: Allow silent filter execution
  * Filter: Fixed stack overflow in BGP mask expressions.
  * Several bug fixes
* Fri Aug 18 2017
- added potential fix for the bufferoverflow issue
  We will keep fortify_source 0 until the patch was discussed with
* Fri Aug 18 2017
- downgrade to _FORTIFY_SOURCE=0 as 1 still fails on TW
* Fri Aug 18 2017
- ignore some warnings to make the output more readable
* Fri Aug 18 2017
- added
  - no longer print false CC lines
  - print the actuall gcc calls instead
- properly fix the FORTIFY_SOURCE fix from the earlier commit.
  - we just replace the -D_FORTIFY_SOURCE value with what we want
    instead of appending another value which leads to warnings
* Fri Aug 18 2017
- update to 1.6.3
  - Large BGP communities
  - BFD authentication (MD5, SHA1)
  - SHA1 and SHA2 authentication for RIP and OSPF
  - Improved documentation
  - Several bug fixes
- changes from version 1.6.2
  - Fixes serious bug introduced in the previous version
- changes from version 1.6.1
  - Support for IPv6 ECMP
  - Better handling of IPv6 tentative addresses
  - Several updates and fixes in Babel protocol
  - Filter: New !~ operator
  - Filter: ASN ranges in bgpmask
  - KRT: New kernel protocol option 'metric'
  - KRT: New route attribute 'krt_scope'
  - Improved BIRD help messages
  - Fixes memory leak in BGP multipath
  - Fixes handling of empty path segments in BGP AS_PATH
  - Several bug fixes
- drop bird-1.5.0-rip_auth_bufferoverflow.patch
* Tue Jun 21 2016
- update to version 1.6.0
- if possible use /run instead of /var/run for the runtimedir
- removed patch: bird-1.5.0-rip_auth_bufferoverflow.patch
  A similar issue still exists but it's a false positive.
* Sat Oct 17 2015
- add $BIRD_OPTIONS to the service files
* Sat Oct 17 2015
- no longer run as root but as user/group bird.
- add tmpfiles.d file for /var/run/bird
- merged spec file from bird6 again
* Fri Oct 16 2015
- initial package
Version: 1.6.8-bp151.2.3.1
* Wed Sep 18 2019 Martin Hauke <>
- Update to version 1.6.8
  * Fix CVE-2019-16159:
    BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through
    2.0.5 has a stack-based buffer overflow. The BGP daemon's
    support for RFC 8203 administrative shutdown communication
    messages included an incorrect logical expression when checking
    the validity of an input message. Sending a shutdown
    communication with a sufficient message length causes a four-byte
    overflow to occur while processing the message, where two of the
    overflow bytes are attacker-controlled and two are fixed.
  * Several important bugfixes
  * BFD: Support for VRFs