SHA256
1
0
forked from pool/bird
bird/bird.changes
Tomáš Chvátal ff37b1a6b8 Accepting request 731784 from home:mnhauke:network
- Update to version 1.6.8
  * Fix CVE-2019-16159:
    BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through
    2.0.5 has a stack-based buffer overflow. The BGP daemon's
    support for RFC 8203 administrative shutdown communication
    messages included an incorrect logical expression when checking
    the validity of an input message. Sending a shutdown
    communication with a sufficient message length causes a four-byte
    overflow to occur while processing the message, where two of the
    overflow bytes are attacker-controlled and two are fixed.
  * Several important bugfixes
  * BFD: Support for VRFs

OBS-URL: https://build.opensuse.org/request/show/731784
OBS-URL: https://build.opensuse.org/package/show/network/bird?expand=0&rev=8
2019-09-19 07:28:59 +00:00

139 lines
4.9 KiB
Plaintext

-------------------------------------------------------------------
Wed Sep 18 19:14:22 UTC 2019 - Martin Hauke <mardnh@gmx.de>
- Update to version 1.6.8
* Fix CVE-2019-16159:
BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through
2.0.5 has a stack-based buffer overflow. The BGP daemon's
support for RFC 8203 administrative shutdown communication
messages included an incorrect logical expression when checking
the validity of an input message. Sending a shutdown
communication with a sufficient message length causes a four-byte
overflow to occur while processing the message, where two of the
overflow bytes are attacker-controlled and two are fixed.
* Several important bugfixes
* BFD: Support for VRFs
-------------------------------------------------------------------
Fri Mar 1 19:32:49 UTC 2019 - Martin Hauke <mardnh@gmx.de>
- Update to version 1.6.6
* Several bugfixes related to route propagation
-------------------------------------------------------------------
Sun Feb 3 09:45:27 UTC 2019 - mardnh@gmx.de
- Update to version 1.6.5
* MRT table dumps (RFC 6396)
* BGP Long-lived graceful restart
* Filter: Make ifname attribute modifiable
* Improved keeping track of IPv6 link-local addresses
* Many bugfixes
-------------------------------------------------------------------
Sat Dec 15 17:51:41 UTC 2018 - Jan Engelhardt <jengelh@inai.de>
- Kill off em dashes in summaries. Remove future
aims from descriptions.
-------------------------------------------------------------------
Thu Dec 6 20:30:33 UTC 2018 - mardnh@gmx.de
- Specfile cleanup
-------------------------------------------------------------------
Wed Nov 14 19:22:22 UTC 2018 - mardnh@gmx.de
- Update to version 1.6.4
* Basic VRF support
* Simplified autoconf scripts
* BGP: Shutdown communication (RFC 8203)
* BGP: Allow exchanging LOCAL_PREF with eBGP peers
* BGP: Allow to specify interface for regular sessions
* BGP: New option 'disable after cease'
* RAdv: Support for more specific routes (RFC 4191)
* RAdv: Proper handling of prefix retraction
* Filter: Allow silent filter execution
* Filter: Fixed stack overflow in BGP mask expressions.
* Several bug fixes
-------------------------------------------------------------------
Fri Aug 18 16:41:04 UTC 2017 - mrueckert@suse.de
- added potential fix for the bufferoverflow issue
bufferoverflow.patch
We will keep fortify_source 0 until the patch was discussed with
upstream.
-------------------------------------------------------------------
Fri Aug 18 15:42:27 UTC 2017 - mrueckert@suse.de
- downgrade to _FORTIFY_SOURCE=0 as 1 still fails on TW
-------------------------------------------------------------------
Fri Aug 18 15:36:09 UTC 2017 - mrueckert@suse.de
- ignore some warnings to make the output more readable
-------------------------------------------------------------------
Fri Aug 18 15:23:57 UTC 2017 - mrueckert@suse.de
- added bird-1.6.3_verbose.build.patch:
- no longer print false CC lines
- print the actuall gcc calls instead
- properly fix the FORTIFY_SOURCE fix from the earlier commit.
- we just replace the -D_FORTIFY_SOURCE value with what we want
instead of appending another value which leads to warnings
-------------------------------------------------------------------
Fri Aug 18 15:06:45 UTC 2017 - mrueckert@suse.de
- update to 1.6.3
- Large BGP communities
- BFD authentication (MD5, SHA1)
- SHA1 and SHA2 authentication for RIP and OSPF
- Improved documentation
- Several bug fixes
- changes from version 1.6.2
- Fixes serious bug introduced in the previous version
- changes from version 1.6.1
- Support for IPv6 ECMP
- Better handling of IPv6 tentative addresses
- Several updates and fixes in Babel protocol
- Filter: New !~ operator
- Filter: ASN ranges in bgpmask
- KRT: New kernel protocol option 'metric'
- KRT: New route attribute 'krt_scope'
- Improved BIRD help messages
- Fixes memory leak in BGP multipath
- Fixes handling of empty path segments in BGP AS_PATH
- Several bug fixes
- drop bird-1.5.0-rip_auth_bufferoverflow.patch
-------------------------------------------------------------------
Tue Jun 21 20:19:18 UTC 2016 - mardnh@gmx.de
- update to version 1.6.0
- if possible use /run instead of /var/run for the runtimedir
- removed patch: bird-1.5.0-rip_auth_bufferoverflow.patch
A similar issue still exists but it's a false positive.
-------------------------------------------------------------------
Sat Oct 17 15:56:16 UTC 2015 - mrueckert@suse.de
- add $BIRD_OPTIONS to the service files
-------------------------------------------------------------------
Sat Oct 17 15:42:42 UTC 2015 - mrueckert@suse.de
- no longer run as root but as user/group bird.
- add tmpfiles.d file for /var/run/bird
- merged spec file from bird6 again
-------------------------------------------------------------------
Fri Oct 16 23:24:31 UTC 2015 - mrueckert@suse.de
- initial package