Пакет frr-selinux-7.5.1-22.el8.noarch
Имя | frr-selinux |
---|---|
Эпоха | 0 |
Версия | 7.5.1 |
Релиз | 22.el8 |
Архитектура | noarch |
Сайт | http://www.frrouting.org |
Лицензия | GPLv2+ |
Время сборки | 2024-04-11 18:30:02 |
Хост сборки | builder-x86-06.inferitos.ru |
Краткое описание | Selinux policy for FRR |
Репозитории | AppStream |
Полное описание | SELinux policy modules for FRR package |
Эррата | INFSA-2024:2981 |
Размер | 27 КиБ |
Исходный проект | frr-7.5.1-22.el8 |
Контрольная сумма SHA-256 | f79c6a00c75bd33844e496cd1bd5384cec3d5a3b07978e54a1ea8843f00ead81 |
×
* Fri Mar 29 2024 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 7.5.1-22 - Rebuilt for MSVSphere 8.10 beta * Wed Feb 07 2024 Michal Ruprich <mruprich@redhat.com> - 7.5.1-22 - Resolves: RHEL-22303 - Zebra not fetching host routes * Wed Feb 07 2024 Michal Ruprich <mruprich@redhat.com> - 7.5.1-21 - Resolves: RHEL-2216 - NULL pointer dereference * Wed Feb 07 2024 Michal Ruprich <mruprich@redhat.com> - 7.5.1-20 - Resolves: RHEL-4797 - missing length check in bgp_attr_psid_sub() can lead do DoS * Mon Feb 05 2024 Michal Ruprich <mruprich@redhat.com> - 7.5.1-19 - Resolves: RHEL-14824 - crafted BGP UPDATE message leading to a crash * Mon Feb 05 2024 Michal Ruprich <mruprich@redhat.com> - 7.5.1-18 - Resolves: RHEL-14821 - mishandled malformed data leading to a crash * Tue Dec 19 2023 Michal Ruprich <mruprich@redhat.com> - 7.5.1-17 - Resolves: RHEL-6583 - Routes are not refreshed after changing the inbound route rules from deny to permit * Tue Dec 19 2023 Michal Ruprich <mruprich@redhat.com> - 7.5.1-16 - Resolves: RHEL-15916 - Flowspec overflow in bgpd/bgp_flowspec.c - Resolves: RHEL-15919 - Out of bounds read in bgpd/bgp_label.c - Resolves: RHEL-15869 - crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message - Resolves: RHEL-15868 - crash from malformed EOR-containing BGP UPDATE message * Thu Oct 19 2023 Andreas Karis <akaris@redhat.com> - 7.5.1-15 - Resolves: RHEL-12039 - crash in plist update * Fri Oct 13 2023 Michal Ruprich <mruprich@redhat.com> - 7.5.1-14 - Resolves: RHEL-6617 - Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router