v6.48.7 [long-term] is released!

RouterOS version 6.48.7 has been released in the “v6 long-term” channel!
Before an upgrade:

  1. Remember to make backup/export files before an upgrade and save them on another storage device;
  2. Make sure the device will not lose power during upgrade process;
  3. Device has enough free storage space for all RouterOS packages to be downloaded.

What’s new in 6.48.7 (2023-May-23 08:27):
!) ipv6 - fixed DNS server processing by IPv6/ND services (CVE-2023-32154);
*) capsman - improved stability when running background scan on CAP;
*) console - updated copyright notice;
*) firewall - fixed IRC NAT helper (CVE-2022-2663);
*) hotspot - improved stability when receiving bogus packets;
*) smb - fixed SMB2 file list reporting;
*) snmp - fixed IPsec-SA byte and packet counter reporting;

To upgrade, click “Check for updates” at /system package in your RouterOS configuration interface, or head to our download page: http://www.mikrotik.com/download

If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while a router is not working as suspected or after some problem has appeared on the device

Please keep this forum topic strictly related to this particular RouterOS release.

Works perfectly: upgraded a few dozen CPEs in production that were shut down because customers were away from home, they all work fine as expected.
(yes, these customers acted as a guinea pig…)

Thank you.

Updated RB4011 (non-wifi) and hap ac2. No issues so far.

I have updated my two hAPac2’s running as capsman AP’s with 6.48.7 (previously running 6.48.6) found the long term 6 branch to be the most stable on these devices with wireless regularly slowing to a crawl within a few days on the 7.x branch, not sure why, main capsman controller / router is running 7.8 quite happily without issue (RB3011-RM)

So far so good, 6.48.7 is consistently stable and delivering good solid reliable wifi on both APs.

Running om my HAPac2 and my two CAP AC, no issues so far.

INFO ONLY:

MS Win 10.0.19045.3086
sigcheck -s -e -u -c .

Sigcheck v2.90 - File version and signature viewer
Copyright (C) 2004-2022 Mark Russinovich
Sysinternals - www.sysinternals.com

EXPIRED = A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file

Publisher, Date, Verified, Path
Mikrotikls SIA, 23.05.2023 07:57, EXPIRED, .\routeros\6.48.7\btest.exe
Mikrotikls SIA, 05.01.2012 20:21, EXPIRED, .\routeros\6.48.7\dude-install-6.48.7.exe
Mikrotikls SIA, 23.05.2023 07:57, EXPIRED, .\routeros\6.48.7\flashfig.exe
Mikrotikls SIA, 23.05.2023 07:56, EXPIRED, .\routeros\6.48.7\unpacked\netinstall.exe
Mikrotikls SIA, 01.01.1970 02:00, EXPIRED, .\routeros\6.48.7\unpacked\netinstall64.exe

Mikrotikls SIA, 22.05.2023 15:44, EXPIRED, .\routeros\6.49.8\btest.exe
Mikrotikls SIA, 05.01.2012 20:21, EXPIRED, .\routeros\6.49.8\dude-install-6.49.8.exe
Mikrotikls SIA, 22.05.2023 15:45, EXPIRED, .\routeros\6.49.8\flashfig.exe
Mikrotikls SIA, 22.05.2023 15:44, EXPIRED, .\routeros\6.49.8\unpacked\netinstall.exe
Mikrotikls SIA, 01.01.1970 02:00, EXPIRED, .\routeros\6.49.8\unpacked\netinstall64.exe

EDIT: formatting changed to not appear as an alert and appear more as an info

A file signed in the past, with a certificate that was valid at the time, but has now expired, does not mean that the file is corrupted or that the signature is forged…

You are creating Alerts for nothing…

is this version include the fix of #[SUP-92244] regarding max active session of the dude ?

thank you

P

ROS 6 CVE-2023-30799
https://nvd.nist.gov/vuln/detail/CVE-2023-30799
Actual ???

Why duplicate posts?

For Mikrotik employees to pay attention

New version v6.49.8 has been released:
http://forum.mikrotik.com/t/v6-49-8-long-term-is-released/166879/1