libfrrzmq0-7.4-150300.4.17.1 >  A ep9|=zY2T~#&Ʉ?Ltw(v&`1/pż [d3%:bڡ(vSŦFn;3mW*&aDW-VRp9u}gfug/g?C)3a=틲.r`12h܇"s;縺#7P#|XÜSNݍ&XH}`Ɉ~Qc&4 5d56e56a8cac782abea6c163e0055460131bbe0da9a7a5cf6f6e6f15a2885930c663e38f034774fcb64725cb24e382cd285d8e6185\ep9|&[5 DچY#P"`?wsK' i]vr Y +?/T#yb"zVt@o l<` h0l52˃p eQ=+bzQwEj_ٮ٠ƈ"|$'qJNk6qfw43QJ[1~{[޽YL6Z l5!XLis7 zە/5Ad jwbKe(oE* \ ,>p@"?"d   8  6<DL P T \  0 \ ^ (89:V>g@vFGHIXY\]^ b c d!Ae!Ff!Il!Ku!`v!hw!x"y" z"$"4"8">"Clibfrrzmq07.4150300.4.17.1FRRouting zeromq libraryThis library contains part of the zermomq implementation of FRRouting.eh01-armsrv1SUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-later AND LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.frrouting.orglinuxaarch64ee0036b935c5428f036d679451a2a52ec0f1234a94f934bfd1f6cdd77ab2ab3ffalibfrrzmq.so.0.0.0rootrootrootrootfrr-7.4-150300.4.17.1.src.rpmlibfrrzmq.so.0()(64bit)libfrrzmq0libfrrzmq0(aarch-64)@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libzmq.so.5()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3eRd@cb[cb%`_@_w@^z^Ӝ@^^k@^G@^"@^!^^^ @]@]@]]@\U@mt@suse.commt@suse.commt@suse.commt@suse.commt@suse.commt@suse.comrtorreromarijnissen@suse.commt@suse.commardnh@gmx.deerico.mendonca@suse.commardnh@gmx.demrueckert@suse.demardnh@gmx.demardnh@gmx.demardnh@gmx.demardnh@gmx.deidonmez@suse.commardnh@gmx.deerico.mendonca@suse.comerico.mendonca@suse.comerico.mendonca@suse.commardnh@gmx.demardnh@gmx.de- Apply upstream fix for NULL pointer dereference due to processing of malformed requests with no attributes in bgp_nlri_parse_flowspec (CVE-2023-41909,bsc#1215065,https://github.com/FRRouting/frr/pull/13222/commits/cfd04dcb3e689754a72507d086ba3b9709fc5ed8). [+ 0014-bgpd-Limit-flowspec-to-no-attribute-means-a-implicit.patch]- Removed protobuf-c BuildRequires (source package name) breaking build-system setup with libprotobuf-c-devel 1.3.2 updates. - Apply upstream fix for bgpd: Do not process NLRIs if the attribute length is zero (CVE-2023-41358,bsc#1214735, https://github.com/FRRouting/frr/pull/14260) [+ 0012-bgpd-Do-not-process-NLRIs-if-the-attribute-length-is.patch] - Apply upstream fix bgpd: Use treat-as-withdraw for tunnel encapsulation attribute instead of session reset (CVE-2023-38802,bsc#1213284, https://github.com/FRRouting/frr/pull/14290) [+ 0013-bgpd-Use-treat-as-withdraw-for-tunnel-encapsulation-.patch]- Applied upstream fix for a possible use-after-free due to a race condition related to bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets (CVE-2022-37035,bsc#1202085). [+ 0011-bgpd-avoid-notify-race-between-io-and-main-pthreads.patch] - Apply upstream fixes for frrinit.sh to avoid a privilege escalation from frr to root in frr config creation (bsc#1204124,CVE-2022-42917). [+ 0009-tools-Use-install-instead-of-touch-chown-combination.patch, + 0010-tools-Run-as-FRR_USER-install-chown-commands-to-avoi.patch]- Apply upstream fix for out-of-bounds read in the BGP daemon that may lead to information disclosure or denial of service (bsc#1202023,CVE-2022-37032) [+ 0007-bgpd-Make-sure-hdr-length-is-at-a-minimum-of-what-is.patch] - Apply upstream fix for a memory leak in the IS-IS daemon that may lead to server memory exhaustion (bsc#1202022,CVE-2019-25074) [+ 0008-isisd-Ensure-rcap-is-freed-in-error-case.patch]- Apply backport fix for a buffer overflow in isisd due to the use of strdup with a non-zero-terminated binary string (bsc#1196506,CVE-2022-26126) [+ 0006-isisd-fix-10505-using-base64-encoding.patch] - Apply backport fix for a buffer overflow in isisd due to wrong checks on the input packet length (bsc#1196505,CVE-2022-26125) with workaround for the GIT binary patch to tests/isisd/test_fuzz_isis_tlv_tests.h.gz [+ 0005-isisd-fix-router-capability-TLV-parsing-issues.patch] - Apply fix for a buffer overflow in babeld due to wrong checks on the input packet length in the packet_examin and subtlv parsing (bsc#1196504,bsc#1196507,CVE-2022-26128,CVE-2022-26129) [+ 0004-babeld-fix-10502-10503-by-repairing-the-checks-on-le.patch] - Apply fix for a heap buffer overflow in babeld due to missing check on the input packet length (bsc#1196503,CVE-2022-26127) [+ 0003-babeld-fix-10487-by-adding-a-check-on-packet-length.patch]- Use skip, not xfail in 0001-disable-zmq-test.patch to disable zmq test as it is not expected to fail but hangs (bsc#1180217)- Disable ZeroMQ tests due to sporadic timeouts during package builds (bsc#1180217) [+ 0001-disable-zmq-test.patch]- add build condition disabling mininet build require by default, needed by the optional topology tests. - removed one occurrence of vrrpd binary listed twice in file list- Update to version 7.4 * Upstream does not provide a changelog - Drop patch (fixed upstream): * 0001-build-use-configfile-mode-in-init-script.patch- 0001-build-use-configfile-mode-in-init-script.patch: Fix CVE-2020-12831 (boo#1171658).- Update to version 7.3.1 Bugfix/maintenance release * Upstream does not provide a changelog- enable verbose make rules - enable grpc support. new subpackage libfrrgrpc_pb0, new BR: pkgconfig(grpc) - enable config rollbacks. new BR: pkgconfig(sqlite3) - enable realms support - enable shell access - make sure we use system openssl - fix shebang line of the frr-reload.py and generate_support_bundle.py script so we dont pull python2 - do not delete users and groups. - add Requires for libyang-extentions- Update to version 7.3 * Upstream does not provide a changelog this time - Remove patch: * fix_tests.patch (not longer needed)- Update to version 7.2.1: BGPd * Fix Addpath issue * Do not apply eBGP policy for iBGP peers * Show ip and fqdn in json output for show [ip] bgp json * Fix large route-distinguisher's format * Fix no bgp listen range ... configuration command * Autocomplete neighbor for clear bgp * Reflect the distance in RIB when it is changed for an arbitrary afi/safi * Notify "Peer De-configured" after entering 'no neighbor cmd * Fix per afi/safi addpath peer counting * Rework BGP dampening to be per AFI/SAFI * Do not send next-hop as :: in MP_REACH_NLRI if no link-local exists * Override peer's TTL only if peer-group is configured with TTL * Remove error message for unkown afi/safi combination * Keep the session down if maximum-prefix is reached OSPFd * Fix BFD down not tearing down OSPF adjacency for point-to-point net BFDd * Fix multiple VRF handling * VRF security improvement PIMd * Fix rp crash NHRPd * Make sure no ip nhrp map works as expected LDPd * Add missing sanity check in the parsing of label messages Zebra * Use correct state when installing evpn macs * Capture dplane plugin flags lib * Fix interface config when vrf changes * Fix Interface Infinite Loop Walk (for special interfaces such as bond) Others * Rename man pages (to avoid conflicts with other packages) * Various other fixes for code cleanup and memory leaks- Fix license tag- Build with support for pcre, protobuf, rpki and zeromq by default- Cleanup spec file- Fix build-time dependencies - Remove superflous comments- fix_tests.patch: correct syntax for Python 3 imports in tests. - Enabling tests- Update to version frr7.2: * zebra: use correct state when installing evpn macs * lib: set entry to xpath in if_update_to_new_vrf * zebra: capture dplane plugin flags * bgpd: Autocomplete neighbor for clear bgp * ospfd,eigrpd: don't take address of packed struct member * bgpd: Prevent crash in bgp_table_range_lookup * bgpd: Fix memory leak in json output of show commands * tests: Test if `distance bgp (1-255) (1-255) (1-255)` works * bgpd: Reflect the distance in RIB when it is changed for an arbitrary afi/safi * bfdd: fix multiple VRF handling- Updating to version 7.2 - Adding systemd scripts - Fixing build and permission issues- Update to version 7.0.1- Initial package, version 6.0.2/sbin/ldconfig/sbin/ldconfigh01-armsrv1 16950228367.4-150300.4.17.17.4-150300.4.17.1libfrrzmq.so.0libfrrzmq.so.0.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:30538/SUSE_SLE-15-SP3_Update/8c5cf61b820ca28d589ed165c047b638-frr.SUSE_SLE-15-SP3_Updatecpioxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=ec233f356c9c611f85ed887a852c69ec910340ef, strippedPRRRRRWf`8Q %P$utf-8ba6fe76f4bb24e48d82c0dc71da0f356afbb18131e039fe5947ee2e343451cce?7zXZ !t/ +_] cr$x#JX&[?zdUkFn 鼩b3RuWk4]ϙu 8b:R9}ǗGQWnGtLEm0j TN*d ?Խ^8$NdOCRG@Z\ yڦ%qU~Gk }-)$hWBչ[jC V *1gsZsfڄz@1E4{5V&v״DtkR  o+e% `so4RĢܸ&d><H@ p#};WIACֵ[ʗLfԹR$K!C/ogEn *bԞ?Z=bVg XʳTԴBB[1Y7+'܈:۴W~ asrQ?8BCdxUp:bLj_o |xt;Р0?og$UWaUpXȪ^Lœb\Pš.ET 6?jcleKdh"_qx۴)b:A R[,1-4e*b!HrQ#Wǜ9 v 4#2M>SaÚ[Ǐw'r@T =E胰O#:R햙'q7rZDQ01Ff1T )֚AM"7`{ Jpf9"7D˸h}7Z3; 7EEsԣE ӽ&,hHSqM P^/Kǁ{Édp H4Gv;]gH!v h!i`c 4)c7cЬIgM "^Qz5<7\W8eSuɑΓ1rj̫'vq2[WhW7W~B].ѝ/<=  ⫓[<]sZ ΄NuQ(gi;1ӎe+T P7^>惓Y_vg`K QD[|)pF0sB@_kKfUJDvMr(PngK6ҵڨOǗs:ψWjiܕ,5SP:t,n=NAbao̐{%N7f #jUPe? hOQz٥ph }ljFTPA{|ⱕ* 3U9yQsփޣ7M뛘_l<c|GHka(c*( T;OC6hƽ?Oc/fcxV RZ֎՘."'a,~Љt>Ist+TQ4ƂYgdybAc Ge/ s-ȄmoD6އ_1oUv)q6jLPV1V=܀QNn-=!:\}#aLpPKSN;|Z4#8W H~%v"J̘qQuĶ)aJkL^ iI)h됔M'2l A!U4wKBGU-H0}.g@3NHYf ԉE`(tV.]&'Rwሖv{v.j#[4k'Qa#0Q%̂#,#H-X5W2ڤq)a3ɚZ$v(ڻ`ζG9,^'Qhc:.9%Waa|-p|\6v9\w!KKGR q(:O'v49DaFf 9q7{#X@ Oltu9pԂGKy)ݞi%NߔfE*3`Qgśl(ɖ0 K@ٿLGde噫ݯoªM)H0h.Ҙq_x0g>TG*",sZ