Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

bird-2.0.8-bp154.2.25 RPM for ppc64le

From OpenSuSE Leap 15.4 for ppc64le

Name: bird Distribution: SUSE Linux Enterprise 15 SP4
Version: 2.0.8 Vendor: openSUSE
Release: bp154.2.25 Build date: Thu May 12 03:09:19 2022
Group: Productivity/Networking/Routing Build host: obs-power9-07
Size: 1216979 Source RPM: bird-2.0.8-bp154.2.25.src.rpm
Summary: The BIRD Internet Routing Daemon
BIRD is an implementation for routing Internet Protocol packets. IPv4
and IPv6 are supported by running separate daemons. It establishes
multiple routing tables, and uses BGP, RIP, and OSPF routing
protocols, as well as statically defined routes.

This package holds the IPv4+IPv6 binaries.

This package holds common files and directories.






* Fri Oct 15 2021 Johannes Segitz <>
  - Drop ProtectClock hardening, can cause issues if other device acceess is needed
* Wed Aug 25 2021 Johannes Segitz <>
  - Added hardening to systemd service(s). Modified:
    * bird.service
* Mon Mar 22 2021 Martin Hauke <>
  - Update to version 2.0.8
    * Automatic channel reloads based on RPKI changes
    * Multiple static routes with the same network
    * Use bitmaps to keep track of exported routes
    * Per-channel debug flags
    * CLI commands show info from multiple protocols
    * Linux: IPv4 routes with IPv6 nexthops
    * Filter: Optimized redesign of prefix sets
    * Filter: Improved type checking of user filters
    * Filter: New src/dst accessors for Flowspec and SADR
    * Filter: New 'weight' route attribute
    * Filter: BGP path mask loop operator
    * Filter: Remove quitbird command
    * RIP: Demand circuit support (RFC 2091)
    * BGP: New 'allow as sets' and 'enforce first as' options
    * BGP: Support for BGP hostname capability
    * BGP: Support for MD5SIG with dynamic BGP
    * BFD: Optional separation of IPv4 / IPv6 BFD instances
    * BFD: Per-peer session options
    * RPKI: Allow build without libSSH
    * RPKI: New 'ignore max length' option
    * OSPF: Redesign of handling of unnumbered PtPs
    * OSPF: Allow key id 0 in authentication
    * Babel: Use onlink flag for routes with unreachable next hop
    * Many bugfixes
    * Automatic channel reloads based on RPKI changes are enabled
      by default, but require import table enabled when used in
      BGP import filter.
    * BIRD now uses bitmaps to keep track of exported routes
      instead of re-evaluation of export filters. That should
      improve speed and accuracy in route export handling during
      reconfiguration, but takes some more memory.
    * Per-channel debug logging and some CLI commands (like 'show
      ospf neighbors') defaulting to all protocol instances lead to
      some minor changes in log and CLI output. Caution is
      recommended when logs or CLI output are monitored by scripts.
  - Drop not longer needed patches:
    * gcc10.patch
    * fix_test_for_bigendian_arch.patch
* Mon Nov 16 2020 Mark Stopka <>
  - Add patch to fix test on Big Endian architectures
    * fix_test_for_bigendian_arch.patch
* Fri Sep 11 2020 Dirk Mueller <>
  - update to 2.0.2:
    o Integrated IPv4 + IPv6 design
    * many changes, see included NEWS for details
    * obsoletes separate bird6/bird-common subpackages
  - remove bufferoverflow.patch: obsolete
  - add gcc10.patch (fix build with gcc 10), disable -fcommon again
  - reenable fortify-source
* Wed Jun 17 2020 Paolo Stivanin <>
  - Add -fcommon to allow building against GCC10
* Wed Sep 18 2019 Martin Hauke <>
  - Update to version 1.6.8
    * Fix CVE-2019-16159:
      BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through
      2.0.5 has a stack-based buffer overflow. The BGP daemon's
      support for RFC 8203 administrative shutdown communication
      messages included an incorrect logical expression when checking
      the validity of an input message. Sending a shutdown
      communication with a sufficient message length causes a four-byte
      overflow to occur while processing the message, where two of the
      overflow bytes are attacker-controlled and two are fixed.
    * Several important bugfixes
    * BFD: Support for VRFs
* Fri Mar 01 2019 Martin Hauke <>
  - Update to version 1.6.6
    * Several bugfixes related to route propagation
* Sun Feb 03 2019
  - Update to version 1.6.5
    * MRT table dumps (RFC 6396)
    * BGP Long-lived graceful restart
    * Filter: Make ifname attribute modifiable
    * Improved keeping track of IPv6 link-local addresses
    * Many bugfixes
* Sat Dec 15 2018 Jan Engelhardt <>
  - Kill off em dashes in summaries. Remove future
    aims from descriptions.
* Thu Dec 06 2018
  - Specfile cleanup
* Wed Nov 14 2018
  - Update to version 1.6.4
    * Basic VRF support
    * Simplified autoconf scripts
    * BGP: Shutdown communication (RFC 8203)
    * BGP: Allow exchanging LOCAL_PREF with eBGP peers
    * BGP: Allow to specify interface for regular sessions
    * BGP: New option 'disable after cease'
    * RAdv: Support for more specific routes (RFC 4191)
    * RAdv: Proper handling of prefix retraction
    * Filter: Allow silent filter execution
    * Filter: Fixed stack overflow in BGP mask expressions.
    * Several bug fixes
* Fri Aug 18 2017
  - added potential fix for the bufferoverflow issue
    We will keep fortify_source 0 until the patch was discussed with
* Fri Aug 18 2017
  - downgrade to _FORTIFY_SOURCE=0 as 1 still fails on TW
* Fri Aug 18 2017
  - ignore some warnings to make the output more readable
* Fri Aug 18 2017
  - added
    - no longer print false CC lines
    - print the actuall gcc calls instead
  - properly fix the FORTIFY_SOURCE fix from the earlier commit.
    - we just replace the -D_FORTIFY_SOURCE value with what we want
      instead of appending another value which leads to warnings
* Fri Aug 18 2017
  - update to 1.6.3
    - Large BGP communities
    - BFD authentication (MD5, SHA1)
    - SHA1 and SHA2 authentication for RIP and OSPF
    - Improved documentation
    - Several bug fixes
  - changes from version 1.6.2
    - Fixes serious bug introduced in the previous version
  - changes from version 1.6.1
    - Support for IPv6 ECMP
    - Better handling of IPv6 tentative addresses
    - Several updates and fixes in Babel protocol
    - Filter: New !~ operator
    - Filter: ASN ranges in bgpmask
    - KRT: New kernel protocol option 'metric'
    - KRT: New route attribute 'krt_scope'
    - Improved BIRD help messages
    - Fixes memory leak in BGP multipath
    - Fixes handling of empty path segments in BGP AS_PATH
    - Several bug fixes
  - drop bird-1.5.0-rip_auth_bufferoverflow.patch
* Tue Jun 21 2016
  - update to version 1.6.0
  - if possible use /run instead of /var/run for the runtimedir
  - removed patch: bird-1.5.0-rip_auth_bufferoverflow.patch
    A similar issue still exists but it's a false positive.
* Sat Oct 17 2015
  - add $BIRD_OPTIONS to the service files
* Sat Oct 17 2015
  - no longer run as root but as user/group bird.
  - add tmpfiles.d file for /var/run/bird
  - merged spec file from bird6 again
* Fri Oct 16 2015
  - initial package



Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Sep 9 17:07:23 2023