version channel
6.49.18 Stable
6.49.17 Stable
6.49.15 Stable
6.49.14 Stable
6.49.13 Long-Term
6.49.12 Stable
6.49.11 Stable
6.49.10 Long-Term
6.49.9 Long-Term
6.49.8 Long-Term
6.49.7 Long-Term
6.49.6 Stable
6.49.5 Stable
6.49.4 Stable
6.49.3 Stable
6.49.2 Stable
6.49.1 Stable
6.49 Stable
*) system - improved system stability;
Hey @EdPa... I'm here to make the same request I made in the v7.17 thread.Hey @normis and @EdPa, I bet no customer of MikroTik would be upset if you assume some compromise in bringing minimal references of what is being done on release notes.
Maybe a good idea would be if they waited about 3 weeks, and if no monstrous bugs appeared, then they could define that this same version 6.49.18, in addition to being Stable, will also become Long-Term.why is it not Long Term?
How long is "after a while"? Last long-term is 6.49.13. Previous stable was 6.49.17, released on 2024-08-07 ... which is quite a bit longer than half a year ago. Are you saying that half a year is not long enough to assess whether 6.49.17 is fit to be long-term? Or are there some bugs in it which make it unsuitable for long-term? If so, can you highlight changelog entry (for 6.49.18) which fixes the "show stopping bug"? (my impression when reading 6.49.18 change log is that only entry, which might excuse the whole ordeal, is *) system - improved system stability; ... which, as quite often with changelog entries, doesn't tell anything in particular).As always - if a stable version is "okay", then after a while it is re-published as long-term.
That's because "long term" is meant to refer to an update channel rather than an individual version. Long term does not mean "old". A long term channel should be supported in the long term with bug and security fixes, but not introduce any new features. If you identify a critical issue in a long term version, you will of course release a new long time version asap. "Stable" is normally the default channel, which does get new features and, as the name implies, is stable thanks to sufficient testing. Mixing stable and long term is what defeats the purpose of having distribution channels.Publishing a new version right away as long-term would beat the purpose of the long-term. As always - if a stable version is "okay", then after a while it is re-published as long-term.
😍🙏🙇♂️Publishing a new version right away as long-term would beat the purpose of the long-term.
In light of a history that I have been following for about 8 years (trying to understand MikroTik world, having come from hardware-based world), I say that using "as always", is pushing the limits of the interpretation of "always" a little.As always
Please do this! The v6 widows need to understand that it is time to abandon the legacy.if a stable version is "okay", then after a while it is re-published as long-term.
This happens because you already know which features don't work, which scenarios will cause problems when used.I prefer to stay on version 6, where I don't need to report issues in the first place.
What does that exactly mean?*) wireless - fixed antenna gain for SXT5ac device;
No point in netinstalling when trying to verify the changelog entry quoted by @Maggiore81Did you try netinstall
I do not understand why this prevents it from become long term.Seems that it's not 6.49.18 that will become next long-term.
That's quite concerning. This CVE isn't even listed in the MikroTik security notices: https://cdn.mikrotik.com/web-assets/supportsec/rss.xml. Nor is it mentioned here: https://mikrotik.com/supportsec.CVE-2024-54772 is fixed by - *) user - improved authentication procedure when RADIUS is not used;
Sorry if it wasn't clear - MikroTik forgot, not you.Did I forget what?
https://github.com/deauther890/CVE-2024-54772
I agree that it may seem like a "stupid vulnerability".stupid vulnerability
The patch is present in v6.49.18
And, if they really fixed the vulnerability after being notified and did not mention it in the release notes, this shows extreme bad faith on MikroTik's part.However, the moment a CVE and an exploit are publicly documented, all relevant information must be transparently disclosed.
You can find the Answer to the Ultimate Question of Life, the Universe, and Everything in that time.Your password username will be bruteforced with an average home computer in approximately...
10000+ centuries
Since 6.49.18 I have the problem that the 5GHz WLAN on my RB4011igs becomes extremely slow after 10-14 days of operation. I suspected Capsman and switched to local forward, unfortunately the same phenomenon. Does anyone have similar problems? After briefly deactivating and then activating the 5GHz radio, everything works again ¯\_(ツ)_/¯