jca
10084a7e9e
Fix quagga ospfd
...
Upstream assumes that they can pass an interface index instead of an ip
address in struct ip_mreq.imr_interface. We do not support this.
ok sthen@ (maintainer)
2016-03-31 22:42:00 +00:00
jca
326ff97ca4
Fix quagga/ospfd.
...
Upstream assumes that we support passing an interface index instead of
an address in struct ip_mreq.imr_interface (hack supported by FreeBSD &
NetBSD).
ok sthen@ (maintainer)
2016-03-31 22:35:41 +00:00
jca
2886733742
Update to 1.0.20160315, ok sthen@ (maintainer)
...
Announce:
https://lists.quagga.net/pipermail/quagga-users/2016-March/014293.html
ChangeLog:
http://savannah.spinellicreations.com/quagga/quagga-1.0.20160315.changelog.txt
http://savannah.spinellicreations.com/quagga/quagga-1.0.20160309.changelog.txt
Note that this update brings a fix for CVE-2016-2342. This vulnerability
affects quagga MPLS VPN setups which probably aren't possible on OpenBSD.
2016-03-22 12:57:54 +00:00
sthen
691c83f9b2
Bump some ports which reference if_msghdr in their source, so that package
...
updates are triggered. This is following the struct if_data ABI change a few
days ago; if_msghdr has an embedded if_data. Some may be unnecessary, but
some are definitely needed and bumps are cheaper than debugging.
Problem reported with wpa_supplicant by Mikolaj Kucharski.
2015-10-08 21:19:21 +00:00
sthen
391dc93fe7
REVISION bumps following the additional member in struct if_data,
...
to make sure packages get updated
2015-10-05 16:29:01 +00:00
sthen
885e4fc550
-RTF_XRESOLVE
2015-09-11 20:56:10 +00:00
sthen
d8e747ddd7
bump; ifmedia64
2015-09-11 16:15:31 +00:00
sthen
7526aab381
Pass --disable-pie to configure all the time and rely on the compiler using
...
PIE by default where supported.
2015-07-15 22:55:06 +00:00
sthen
be3b4cc4dd
update to quagga 0.99.24.1, from Brad
2015-04-18 10:39:34 +00:00
sthen
5f24ef1539
build isisd in quagga, not tested but no reason not to build
2015-01-19 15:44:12 +00:00
sthen
f7f2ca03c8
update to quagga-0.99.23.1
2014-09-23 23:06:18 +00:00
sthen
c496c04b9e
update to quagga-0.99.23
2014-06-27 00:06:42 +00:00
ajacoutot
cfe4be35c5
No need to explicitely SUBST_VARS LOCALSTATEDIR anymore.
2014-04-15 08:53:04 +00:00
sthen
27f03b1c52
bump REVISION for any ports using route messages. regen some distinfos and
...
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
sthen
a6ca9046a3
update to quagga 0.9.22.4, including a security fix for an issue with
...
OSPF-API, and discard malformed LSAs which don't cause a problem for
quagga itself but when passed to other implementations can trigger
http://www.kb.cert.org/vuls/id/229804 (i.e. to limit the distribution
of such bad LSAs).
2013-10-19 13:26:56 +00:00
brad
bcc6825212
Update to Quagga 0.99.22.1.
...
ok sthen@
2013-05-14 18:41:14 +00:00
sthen
0ced1886e6
Update to quagga 0.99.22, merged from diffs from myself and Brad. Also:
...
- replace MESSAGE with some @sample'd config files
- install rc.d scripts
- multicast code still ported from older version (new one needs RFC3678)
2013-04-18 20:29:08 +00:00
ajacoutot
58f1a6f9f6
USE_LIBTOOL=Yes is the default now.
2013-03-21 08:45:11 +00:00
espie
eae66e4a7b
PERMIT_* / REGRESS->TEST sweep
2013-03-11 11:35:43 +00:00
sthen
f5a323c546
Don't use ${FLAVOR:L}, we only support lower-case flavours now.
...
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
sthen
1931eaa0b1
revert multicast changes in last upstream release, they do not work on OS
...
which require the interface IP address for IP_{ADD,DROP}_MEMBERSHIP
reported by Raphael Mazelier
2013-01-04 00:24:10 +00:00
brad
3343f77fdb
Fix a BGP DoS issue in bgp_capability_orf(). CVE-2012-1820
...
ok sthen@
2012-12-08 18:42:43 +00:00
sthen
46b6a18c80
update to Quagga 0.99.21
2012-09-19 16:35:06 +00:00
dcoppa
862fb57f81
Remove this; committed by mistake.
...
ok ajacoutot@, sthen@
2012-08-05 08:14:56 +00:00
espie
39ab78796c
... and some of the patches I forgot to add
2012-08-04 14:25:33 +00:00
espie
6fdca43594
fix non-sensible libtool parameters, allows us to drop some very weird
...
libtool code.
2012-08-04 14:24:23 +00:00
ajacoutot
acaaa6fdba
Use LOCALSTATEDIR instead of local variables.
2012-04-28 11:06:12 +00:00
ajacoutot
3f0ee525f1
Use LOCALSTATEDIR.
2012-04-28 10:51:44 +00:00
sthen
3721be5ee4
update to quagga 0.99.20.1 rolling in the security fixes which we had as
...
separate patches.
multicast support changed in 0.99.20 and not fully tested, no response to
my ports@ call for testing, so if this breaks things send me a mail with
details.
2012-03-31 10:51:47 +00:00
sthen
88ea72915d
Change SEPARATE_BUILD=(concurrent|simple) to Yes; bsd.port.mk doesn't
...
make a distinction between these. ok aja@ dcoppa@
2012-03-29 13:38:12 +00:00
sthen
3a547a5052
add SECURITY patches from quagga 0.99.20.1
...
CVE-2012-0249 - Quagga ospfd DoS on malformed LS-Update packet
CVE-2012-0250 - Quagga ospfd DoS on malformed Network-LSA data
CVE-2012-0255 - Quagga bgpd DoS on malformed OPEN message
2012-03-20 20:56:26 +00:00
sthen
c598d08ea3
use SYSCONFDIR/BASESYSCONFDIR to avoid "CONFIGURE_STYLE=gnu old" hack
2012-01-17 17:22:56 +00:00
sthen
52c177c5ac
bumps; net/if.h
2011-11-16 00:20:08 +00:00
sthen
56616ca74e
fix ospf segfault introduced in 0.99.19, backported from 0.99.20
2011-10-02 02:01:07 +00:00
sthen
87d697fd01
SECURITY update to quagga 0.99.19
...
CVE-2011-3323: ospf6d *stack-based buffer overflow*, inter-area-prefix LSAs
CVE-2011-3324: ospf6d assertion failure; DD LSAs with over-length header
CVE-2011-3325: ospf crash(?) if a hello has a truncated header or invalid type
CVE-2011-3326: ospf null deref if a link state update LSA has an unknown type
CVE-2011-3327: bgp buffer overflow with malformed UPDATE (extended communities)
2011-09-27 09:45:53 +00:00
jasper
4fee5ffce0
Sanitize some @unexec/@extraunexec calls to rm: move them up in the
...
PLIST and delete everything under the @sample'd directory instead of the
directory itself to prevent a warning from pkg_delete(1) trying to
remove a non existing directory and to help preventing left-over files
and directories.
ok aja@
2011-05-11 12:03:19 +00:00
sthen
ef738c2300
- SECURITY update to 0.99.18 (pointed out by Brad)
...
CVE-2010-1674 null pointer deref with malformed BGP Extended Communities
CVE-2010-1675 BGP session reset with malformed AS-path
- install info documentation
- patches added: build fixes from upstream
2011-03-26 12:00:53 +00:00
espie
0397d65db0
new depends
2010-11-19 22:31:32 +00:00
espie
47ff75aa46
USE_GROFF=Yes
2010-10-18 18:36:45 +00:00
sthen
0f4ed1bf33
update to 0.99.17
2010-09-24 09:30:04 +00:00
sthen
46626dc2f9
update to 0.99.16
2010-07-09 11:46:02 +00:00
sthen
a4b4ab60a8
bugfix update to 0.99.12; rolls in patches for the problem where 4-byte
...
ASNs with long prepends are seen.
2009-05-12 12:18:04 +00:00
sthen
fe74d76cfe
fix 4-byte ASN related crash in quaggga's bgpd. from upstream repo.
2009-05-01 13:48:26 +00:00
sthen
be64909751
update quagga to 0.99.11. the SNMP flavour was already broken,
...
disable it for now.
2009-02-18 00:37:53 +00:00
claudio
55ed8e1d9a
quagga does not handel multiple RTM_VERSIONs gracefully. Patch it to ignore
...
messages with wrong RTM_VERSION instead of trying to parse them and crashing
doing so. OK rui@, jasper@, looks good mbalmer@
2008-05-23 12:55:58 +00:00
merdely
241b722760
Remove surrounding quotes in COMMENT*/PERMIT_*/BROKEN/ERRORS
...
Add $OpenBSD$ to p5-SNMP-Info/Makefile (ok kili@, simon@)
2007-09-15 22:36:51 +00:00
rui
0f87571adf
SECURITY: update quagga to 0.99.9 which fixes some DoS vulnerabilities.
...
Reference: http://secunia.com/advisories/26744/
ok pyr@
2007-09-12 20:31:17 +00:00
rui
445fdc8f47
update quagga to 0.99.7
...
help and ok pyr@
2007-06-20 18:05:36 +00:00
espie
9eafbbfb35
base64 checksums.
2007-04-05 16:19:55 +00:00
david
adbd88b406
remove myself from MAINTAINER
2006-04-12 21:01:45 +00:00