Routing daemon
Go to file
2023-10-17 10:08:17 +02:00
.fmf Resolves: #2081304 - Enhanced TMT testing for centos-stream 2022-05-24 08:03:20 +02:00
plans Update of fmf plans 2023-10-10 12:04:14 +02:00
.gitignore Resolves: #2129731 - Rebase FRR to the latest version 2022-10-13 14:17:46 +02:00
0000-remove-babeld-and-ldpd.patch Resolves: #1958155 - Upgrading frr unconditionally creates /etc/frr/frr.conf, breaking existing configuration 2021-06-04 09:05:04 +02:00
0002-enable-openssl.patch Resolves: #2069563 - Rebase frr to version 8.2.2 2022-05-02 10:32:18 +02:00
0003-disable-eigrp-crypto.patch RHEL 9.0.0 Alpha bootstrap 2020-10-15 00:37:34 +02:00
0004-fips-mode.patch Resolves: #2184870 - Reachable assertion in peek_for_as4_capability function 2023-05-23 13:55:46 +02:00
0005-ospf-api.patch Resolves: #2129731 - Rebase FRR to the latest version 2022-10-13 14:17:46 +02:00
0006-graceful-restart.patch Resolves: #2129731 - Rebase FRR to the latest version 2022-10-13 14:17:46 +02:00
0007-cve-2022-37032.patch Resolves: #2128738 - out-of-bounds read in the BGP daemon may lead to information disclosure or denial of service 2022-10-17 09:37:25 +02:00
0008-frr-non-root-user.patch Resolves: #2147522 - It is not possible to run FRR as a non-root user 2022-11-28 13:48:35 +01:00
0009-CVE-2022-36440-40302.patch Resolves: #2184870 - Reachable assertion in peek_for_as4_capability function 2023-05-23 13:55:46 +02:00
0010-CVE-2022-43681.patch Resolves: #2184870 - Reachable assertion in peek_for_as4_capability function 2023-05-23 13:55:46 +02:00
0011-CVE-2022-40318.patch Resolves: #2184870 - Reachable assertion in peek_for_as4_capability function 2023-05-23 13:55:46 +02:00
0012-bfd-not-working-in-vrf.patch Resolves: #2168855 - BFD not working through VRF 2023-06-07 11:52:08 +02:00
0013-bgpd-maxttl-ebgp-multihop.patch Resolves: RHEL-11664 - bgpd: Do not explicitly print MAXTTL value for ebgp-multihop vty output 2023-10-09 14:20:02 +02:00
0014-CVE-2023-38802.patch Resolves: RHEL-3541 - Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router 2023-10-13 09:11:25 +02:00
ci.fmf Resolves: #2081304 - Enhanced TMT testing for centos-stream 2022-05-24 08:03:20 +02:00
frr-sysusers.conf Resolves: #2095404 - frr use systemd-sysusers 2022-06-14 09:37:25 +02:00
frr-tmpfiles.conf RHEL 9.0.0 Alpha bootstrap 2020-10-15 00:37:34 +02:00
frr.fc Resolves: #2144500 - AVC error when reloading FRR with provided reload script 2022-11-24 10:50:53 +01:00
frr.if Resolves: #2216912 - SELinux is preventing FRR-Zebra to access to network namespaces 2023-08-07 14:51:11 +02:00
frr.spec Resolves: RHEL-3541 - Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router 2023-10-13 09:11:25 +02:00
frr.te Related: #2216912 - adding sys_admin to capabilities 2023-08-10 10:56:34 +02:00
gating.yaml Fixing wrong test plan name in the gating file 2023-10-17 10:08:17 +02:00
README.md RHEL 9.0.0 Alpha bootstrap 2020-10-15 00:37:34 +02:00
rpminspect.yaml Related: #1939456 - adding rpminspect file to pass gating 2021-04-30 13:03:19 +02:00
sources Resolves: #2129731 - Rebase FRR to the latest version 2022-10-13 14:17:46 +02:00

frr

The frr package