-
Mon Feb 19 2018 Ondřej Lysoněk <olysonek@redhat.com> - 0.99.22.4-5
- Fixed CVE-2018-5379 - Double free vulnerability in bgpd when processing
certain forms of UPDATE message allowing to crash or potentially execute
arbitrary code
- Resolves: rhbz#1546015
-
Thu Feb 13 2014 Michal Sekletar <msekleta@redhat.com> - 0.99.22.4-4
- fix link to upstream tarball (#1059219)
- reference pidfiles of quagga daemons in service files (#842309)
-
Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 0.99.22.4-3
- Mass rebuild 2014-01-24
-
Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 0.99.22.4-2
- Mass rebuild 2013-12-27
-
Fri Sep 13 2013 Michal Sekletar <msekleta@redhat.com> - 0.99.22.4-1
- update to 0.99.22.4
-
Sat Aug 03 2013 Petr Pisar <ppisar@redhat.com> - 0.99.22.3-2
- Perl 5.18 rebuild
-
Tue Jul 30 2013 Michal Sekletar <msekleta@redhat.com> - 0.99.22.3-1
- update to 0.99.22.3
- disable ospfapi and ospfclient
- fix bogus dates in changelog
- resolves : #984532
-
Fri Jul 12 2013 Jan Safranek <jsafrane@redhat.com> - 0.99.22.1-9
- Rebuilt for new net-snmp
-
Thu Jul 11 2013 Than Ngo <than@redhat.com> - 0.99.22.1-8
- drop unused BR in tetex
-
Fri Jun 21 2013 Michal Sekletar <msekleta@redhat.com> - 0.99.22.1-7
- quagga is service which might implement networking, thus it should not have
WantedBy=network.target in its systemd configuration
- resolves: #976883