Fedora Linux 8781 Published by

A frr security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: frr-8.5-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-14ec79ae02
2023-04-21 01:23:34.069315
--------------------------------------------------------------------------------

Name : frr
Product : Fedora 36
Version : 8.5
Release : 1.fc36
URL :   http://www.frrouting.org
Summary : Routing daemon
Description :
FRRouting is free software that manages TCP/IP based routing protocols. It takes
a multi-server and multi-threaded approach to resolve the current complexity
of the Internet.

FRRouting supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.

FRRouting is a fork of Quagga.

--------------------------------------------------------------------------------
Update Information:

New version 8.5
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 12 2023 Michal Ruprich - 8.5-1
- New version 8.5
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2177783 - New versions of frr available
  https://bugzilla.redhat.com/show_bug.cgi?id=2177783
[ 2 ] Bug #2184469 - CVE-2022-36440 frr: Reachable assertion in peek_for_as4_capability function [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2184469
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-14ec79ae02' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________