From patchwork Mon Jan 13 21:41:06 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 8414 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4YX5LC3Vcwz3xGR for ; Mon, 13 Jan 2025 21:41:23 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "E5" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4YX5LB5fhNz4gf; Mon, 13 Jan 2025 21:41:22 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4YX5LB2KhJz3340; Mon, 13 Jan 2025 21:41:22 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R11" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4YX5L44s07z32Tf for ; Mon, 13 Jan 2025 21:41:16 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4YX5L42h7Xz1wy; Mon, 13 Jan 2025 21:41:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1736804476; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=wAkGywVuGjFWpjHkyF7Ar8+/V6EQ2/6E9euMADz3lYw=; b=ekTWbmllNY/aFeix0fdDloDVolAS9l3IkL+hBZ0U37A+3di3U/MmGA3Ba0SBHVHaAn/Sdc J3z3g5kxQg9telBPP49Wf5onZa+3Ld9iAZxurQdSJkyqy9XVOR9gjGZCV1fSGA7okh9yCX iSS0u2PRuPEp9faN5jDt1a2MVv2qzdEtAFwCYSh3FlZCRwpG2JqGDN8FCkFcePnyr9PiSS /kIoYjqA8uDj8A5NdEjxwUaTXKADc66M2MPx14rIFmCDz5zC8hl3D0EXJS0dhhh1aBChwx HoZ/43akIy0QyV/lBTG1UiCeqqBAv0dYtAsOSio1lUnc/1sqpv4LTgbmVTJ0Jg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1736804476; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=wAkGywVuGjFWpjHkyF7Ar8+/V6EQ2/6E9euMADz3lYw=; b=n44PqzFmgkNzUad3xbVaVekaaT6BNH5w/fa3dqEmrt8miq2pw93ugongCN6LRE3iPyw0EB 6Vur+Jt7q1GmrYCQ== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] frr: Update to version 10.2.1 Date: Mon, 13 Jan 2025 22:41:06 +0100 Message-ID: <20250113214108.2221728-5-adolf.belka@ipfire.org> In-Reply-To: <20250113214108.2221728-1-adolf.belka@ipfire.org> References: <20250113214108.2221728-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: IXZ32GYAWQ3DNLZYH3EEANJ4QI3VZMIR X-Message-ID-Hash: IXZ32GYAWQ3DNLZYH3EEANJ4QI3VZMIR X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - Update from version 10.1 to 10.2.1 - Update of rootfile not required - Changelog 10.2.1 Fixed CVE-2024-55553 More details: https://frrouting.org/security/cve-2024-55553 Bug Fixes bfdd retain remote dplane client socket bgpd Fix to pop items off zebra_announce FIFO for few EVPN triggers Check if as_type is not specified when peer is a peer-group member Do not reset peers on suppress-fib toggling Fix bgp core with a possible Intf delete Fix enforce-first-as per peer-group removal Fix evpn bestpath calculation when path is not established Fix graceful-restart for peer-groups Fix memory leak when creating BMP connection with a source interface Fix memory leak when reconfiguring a route distinguisher Fix unconfigure asdot neighbor Fix use single whitespace when displaying flowspec entries Fix version attribute is an int, not a string Import allowed routes with self AS if desired Initialize as_type for peer-group as AS_UNSPECIFIED Use gracefulRestart JSON field Validate both nexthop information (NEXTHOP and NLRI) Validate only affected RPKI prefixes instead of a full RIB When calling bgp_process, prevent infinite loop lib Allow setsockopt functions to return size set Fix session re-establishment Take ge/le into consideration when checking the prefix with the prefix-list Use backoff setsockopt option for freebsd ospfd OSPF multi-instance default origination fixes pimd Fix access-list memory leak in pimd Free igmp proxy joins on interface deletion igmp proxy joins should not be written as part of config Prevent crash of pim when auto-rp's socket is not initialized Signed-off-by: Adolf Belka --- lfs/frr | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/lfs/frr b/lfs/frr index 95fbdf0f1..b257a2d09 100644 --- a/lfs/frr +++ b/lfs/frr @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2007-2024 IPFire Team # +# Copyright (C) 2007-2025 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -26,7 +26,7 @@ include Config SUMMARY = FRRouting Routing daemon -VER = 10.1 +VER = 10.2.1 THISAPP = frr-frr-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -34,7 +34,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = frr -PAK_VER = 11 +PAK_VER = 12 DEPS = @@ -50,7 +50,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 72dccecd6ad4f64a635d17ca99f2b1583ea83697901a0078270c033effa53ece2a4fe169d1b46d9393000a437bb48e562f49b2a94b48f4d2d013d2204322fde8 +$(DL_FILE)_BLAKE2 = 8bcc8ccf8febee1012d94a9f3de40cc177bec1af464cd935303df8859a72607d03e5f9030f05bed5d56a7a413a0029479f538b3c0b35acc4a66295b4229f6be1 install : $(TARGET)