Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 2129731

Summary: [RFE] Rebase FRR to the latest version
Product: Red Hat Enterprise Linux 9 Reporter: Michal Ruprich <mruprich>
Component: frrAssignee: Michal Ruprich <mruprich>
Status: CLOSED ERRATA QA Contact: František Hrdina <fhrdina>
Severity: unspecified Docs Contact: Šárka Jana <sjanderk>
Priority: unspecified    
Version: 9.2CC: fhrdina, jorton, pasik, sjanderk
Target Milestone: rcKeywords: FutureFeature, Rebase, Triaged
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: frr-8.3.1-1.el9 Doc Type: Enhancement
Doc Text:
.`frr` rebased to version 8.3.1 The `frr` package for managing dynamic routing stack has been updated to version 8.3.1. Notable changes over version 8.2.2 include: * Added a new set of commands to interact with the Border Gateway Protocol (BGP): ** the `set as-path replace` command to replace the Autonomous System (AS) path attribute of a BGP route with a new value. ** the `match peer` command to match a specific BGP peer or group when configuring a BGP route map. ** the `ead-es-frag evi-limit` command to set a limit on the number of Ethernet A-D per EVI fragments that can be sent in a given period of time in EVPN. ** the `match evpn route-type` command to take specific actions on certain types of EVPN routes, such as route-target, route-distinguisher, or MAC/IP routes. * Added the `show thread timers` command in the VTYSH command-line interface for interacting with FRR daemons. * Added the `show ip ospf reachable-routers` command to display a list of routers that are currently reachable through the OSPF protocol. * Added new commands to interact with the Protocol Independent Multicast (PIM) daemon: ** the `debug igmp trace detail` command to enable debugging for Internet Group Management Protocol (IGMP) messages with detailed tracing. ** the `ip pim passive` command to to configure the interface as passive, not sending PIM messages. * Added new outputs for the `show zebra` command, such as ECMP, EVPN, MPLS statuses. * Added the `show ip nht mrib` command to the ZEBRA component to display multicast-related information from the `mroute` table in the kernel.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-09 07:32:39 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Comment 15 errata-xmlrpc 2023-05-09 07:32:39 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: frr security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2023:2202