SHA256
1
0
forked from pool/bird
bird/bird.changes
Martin Hauke 7792ee7ff9 Accepting request 833673 from home:dirkmueller:branches:network
- update to 2.0.2:
  o Integrated IPv4 + IPv6 design
  * many changes, see included NEWS for details
  * obsoletes separate bird6/bird-common subpackages
- remove bird-1.6.3_verbose.build.patch bufferoverflow.patch: obsolete
- add gcc10.patch (fix build with gcc 10), disable -fcommon again
- reenable fortify-source

OBS-URL: https://build.opensuse.org/request/show/833673
OBS-URL: https://build.opensuse.org/package/show/network/bird?expand=0&rev=12
2020-09-25 22:54:13 +00:00

156 lines
5.5 KiB
Plaintext

-------------------------------------------------------------------
Fri Sep 11 07:16:11 UTC 2020 - Dirk Mueller <dmueller@suse.com>
- update to 2.0.2:
o Integrated IPv4 + IPv6 design
* many changes, see included NEWS for details
* obsoletes separate bird6/bird-common subpackages
- remove bird-1.6.3_verbose.build.patch bufferoverflow.patch: obsolete
- add gcc10.patch (fix build with gcc 10), disable -fcommon again
- reenable fortify-source
-------------------------------------------------------------------
Wed Jun 17 11:26:13 UTC 2020 - Paolo Stivanin <info@paolostivanin.com>
- Add -fcommon to allow building against GCC10
-------------------------------------------------------------------
Wed Sep 18 19:14:22 UTC 2019 - Martin Hauke <mardnh@gmx.de>
- Update to version 1.6.8
* Fix CVE-2019-16159:
BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through
2.0.5 has a stack-based buffer overflow. The BGP daemon's
support for RFC 8203 administrative shutdown communication
messages included an incorrect logical expression when checking
the validity of an input message. Sending a shutdown
communication with a sufficient message length causes a four-byte
overflow to occur while processing the message, where two of the
overflow bytes are attacker-controlled and two are fixed.
* Several important bugfixes
* BFD: Support for VRFs
-------------------------------------------------------------------
Fri Mar 1 19:32:49 UTC 2019 - Martin Hauke <mardnh@gmx.de>
- Update to version 1.6.6
* Several bugfixes related to route propagation
-------------------------------------------------------------------
Sun Feb 3 09:45:27 UTC 2019 - mardnh@gmx.de
- Update to version 1.6.5
* MRT table dumps (RFC 6396)
* BGP Long-lived graceful restart
* Filter: Make ifname attribute modifiable
* Improved keeping track of IPv6 link-local addresses
* Many bugfixes
-------------------------------------------------------------------
Sat Dec 15 17:51:41 UTC 2018 - Jan Engelhardt <jengelh@inai.de>
- Kill off em dashes in summaries. Remove future
aims from descriptions.
-------------------------------------------------------------------
Thu Dec 6 20:30:33 UTC 2018 - mardnh@gmx.de
- Specfile cleanup
-------------------------------------------------------------------
Wed Nov 14 19:22:22 UTC 2018 - mardnh@gmx.de
- Update to version 1.6.4
* Basic VRF support
* Simplified autoconf scripts
* BGP: Shutdown communication (RFC 8203)
* BGP: Allow exchanging LOCAL_PREF with eBGP peers
* BGP: Allow to specify interface for regular sessions
* BGP: New option 'disable after cease'
* RAdv: Support for more specific routes (RFC 4191)
* RAdv: Proper handling of prefix retraction
* Filter: Allow silent filter execution
* Filter: Fixed stack overflow in BGP mask expressions.
* Several bug fixes
-------------------------------------------------------------------
Fri Aug 18 16:41:04 UTC 2017 - mrueckert@suse.de
- added potential fix for the bufferoverflow issue
bufferoverflow.patch
We will keep fortify_source 0 until the patch was discussed with
upstream.
-------------------------------------------------------------------
Fri Aug 18 15:42:27 UTC 2017 - mrueckert@suse.de
- downgrade to _FORTIFY_SOURCE=0 as 1 still fails on TW
-------------------------------------------------------------------
Fri Aug 18 15:36:09 UTC 2017 - mrueckert@suse.de
- ignore some warnings to make the output more readable
-------------------------------------------------------------------
Fri Aug 18 15:23:57 UTC 2017 - mrueckert@suse.de
- added bird-1.6.3_verbose.build.patch:
- no longer print false CC lines
- print the actuall gcc calls instead
- properly fix the FORTIFY_SOURCE fix from the earlier commit.
- we just replace the -D_FORTIFY_SOURCE value with what we want
instead of appending another value which leads to warnings
-------------------------------------------------------------------
Fri Aug 18 15:06:45 UTC 2017 - mrueckert@suse.de
- update to 1.6.3
- Large BGP communities
- BFD authentication (MD5, SHA1)
- SHA1 and SHA2 authentication for RIP and OSPF
- Improved documentation
- Several bug fixes
- changes from version 1.6.2
- Fixes serious bug introduced in the previous version
- changes from version 1.6.1
- Support for IPv6 ECMP
- Better handling of IPv6 tentative addresses
- Several updates and fixes in Babel protocol
- Filter: New !~ operator
- Filter: ASN ranges in bgpmask
- KRT: New kernel protocol option 'metric'
- KRT: New route attribute 'krt_scope'
- Improved BIRD help messages
- Fixes memory leak in BGP multipath
- Fixes handling of empty path segments in BGP AS_PATH
- Several bug fixes
- drop bird-1.5.0-rip_auth_bufferoverflow.patch
-------------------------------------------------------------------
Tue Jun 21 20:19:18 UTC 2016 - mardnh@gmx.de
- update to version 1.6.0
- if possible use /run instead of /var/run for the runtimedir
- removed patch: bird-1.5.0-rip_auth_bufferoverflow.patch
A similar issue still exists but it's a false positive.
-------------------------------------------------------------------
Sat Oct 17 15:56:16 UTC 2015 - mrueckert@suse.de
- add $BIRD_OPTIONS to the service files
-------------------------------------------------------------------
Sat Oct 17 15:42:42 UTC 2015 - mrueckert@suse.de
- no longer run as root but as user/group bird.
- add tmpfiles.d file for /var/run/bird
- merged spec file from bird6 again
-------------------------------------------------------------------
Fri Oct 16 23:24:31 UTC 2015 - mrueckert@suse.de
- initial package