libmlag_pb0-7.4-150300.4.17.1 >  A ep9|XWFHǵ4!e\4 S*b?X)+?ǂ}#+N^BbK`~Gcr,.o|ȷqYr/`ޔx4X}夭@Q]cH1= 0/?!fI%%ǡ0dp_>p@"P?"@d  :  6<DL P T \  4 X ! (B8L9:>+@:FIG`HhIpXtY\]^bc d!e! f!l!u!$v!,w!x!y!z!!!!"<Clibmlag_pb07.4150300.4.17.1FRRouting utility libraryThis library contains part of the mlag implementation of FRRouting.es390zl31(SUSE Linux Enterprise 15SUSE LLC GPL-2.0-or-later AND LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.frrouting.orglinuxs390x(eebd170f533a4b4faa35995fe9905b26b08120509d211c1ccf6748c6add3d2b7d0libmlag_pb.so.0.0.0rootrootrootrootfrr-7.4-150300.4.17.1.src.rpmlibmlag_pb.so.0()(64bit)libmlag_pb0libmlag_pb0(s390-64)@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libpthread.so.0()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3eRd@cb[cb%`_@_w@^z^Ӝ@^^k@^G@^"@^!^^^ @]@]@]]@\U@mt@suse.commt@suse.commt@suse.commt@suse.commt@suse.commt@suse.comrtorreromarijnissen@suse.commt@suse.commardnh@gmx.deerico.mendonca@suse.commardnh@gmx.demrueckert@suse.demardnh@gmx.demardnh@gmx.demardnh@gmx.demardnh@gmx.deidonmez@suse.commardnh@gmx.deerico.mendonca@suse.comerico.mendonca@suse.comerico.mendonca@suse.commardnh@gmx.demardnh@gmx.de- Apply upstream fix for NULL pointer dereference due to processing of malformed requests with no attributes in bgp_nlri_parse_flowspec (CVE-2023-41909,bsc#1215065,https://github.com/FRRouting/frr/pull/13222/commits/cfd04dcb3e689754a72507d086ba3b9709fc5ed8). [+ 0014-bgpd-Limit-flowspec-to-no-attribute-means-a-implicit.patch]- Removed protobuf-c BuildRequires (source package name) breaking build-system setup with libprotobuf-c-devel 1.3.2 updates. - Apply upstream fix for bgpd: Do not process NLRIs if the attribute length is zero (CVE-2023-41358,bsc#1214735, https://github.com/FRRouting/frr/pull/14260) [+ 0012-bgpd-Do-not-process-NLRIs-if-the-attribute-length-is.patch] - Apply upstream fix bgpd: Use treat-as-withdraw for tunnel encapsulation attribute instead of session reset (CVE-2023-38802,bsc#1213284, https://github.com/FRRouting/frr/pull/14290) [+ 0013-bgpd-Use-treat-as-withdraw-for-tunnel-encapsulation-.patch]- Applied upstream fix for a possible use-after-free due to a race condition related to bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets (CVE-2022-37035,bsc#1202085). [+ 0011-bgpd-avoid-notify-race-between-io-and-main-pthreads.patch] - Apply upstream fixes for frrinit.sh to avoid a privilege escalation from frr to root in frr config creation (bsc#1204124,CVE-2022-42917). [+ 0009-tools-Use-install-instead-of-touch-chown-combination.patch, + 0010-tools-Run-as-FRR_USER-install-chown-commands-to-avoi.patch]- Apply upstream fix for out-of-bounds read in the BGP daemon that may lead to information disclosure or denial of service (bsc#1202023,CVE-2022-37032) [+ 0007-bgpd-Make-sure-hdr-length-is-at-a-minimum-of-what-is.patch] - Apply upstream fix for a memory leak in the IS-IS daemon that may lead to server memory exhaustion (bsc#1202022,CVE-2019-25074) [+ 0008-isisd-Ensure-rcap-is-freed-in-error-case.patch]- Apply backport fix for a buffer overflow in isisd due to the use of strdup with a non-zero-terminated binary string (bsc#1196506,CVE-2022-26126) [+ 0006-isisd-fix-10505-using-base64-encoding.patch] - Apply backport fix for a buffer overflow in isisd due to wrong checks on the input packet length (bsc#1196505,CVE-2022-26125) with workaround for the GIT binary patch to tests/isisd/test_fuzz_isis_tlv_tests.h.gz [+ 0005-isisd-fix-router-capability-TLV-parsing-issues.patch] - Apply fix for a buffer overflow in babeld due to wrong checks on the input packet length in the packet_examin and subtlv parsing (bsc#1196504,bsc#1196507,CVE-2022-26128,CVE-2022-26129) [+ 0004-babeld-fix-10502-10503-by-repairing-the-checks-on-le.patch] - Apply fix for a heap buffer overflow in babeld due to missing check on the input packet length (bsc#1196503,CVE-2022-26127) [+ 0003-babeld-fix-10487-by-adding-a-check-on-packet-length.patch]- Use skip, not xfail in 0001-disable-zmq-test.patch to disable zmq test as it is not expected to fail but hangs (bsc#1180217)- Disable ZeroMQ tests due to sporadic timeouts during package builds (bsc#1180217) [+ 0001-disable-zmq-test.patch]- add build condition disabling mininet build require by default, needed by the optional topology tests. - removed one occurrence of vrrpd binary listed twice in file list- Update to version 7.4 * Upstream does not provide a changelog - Drop patch (fixed upstream): * 0001-build-use-configfile-mode-in-init-script.patch- 0001-build-use-configfile-mode-in-init-script.patch: Fix CVE-2020-12831 (boo#1171658).- Update to version 7.3.1 Bugfix/maintenance release * Upstream does not provide a changelog- enable verbose make rules - enable grpc support. new subpackage libfrrgrpc_pb0, new BR: pkgconfig(grpc) - enable config rollbacks. new BR: pkgconfig(sqlite3) - enable realms support - enable shell access - make sure we use system openssl - fix shebang line of the frr-reload.py and generate_support_bundle.py script so we dont pull python2 - do not delete users and groups. - add Requires for libyang-extentions- Update to version 7.3 * Upstream does not provide a changelog this time - Remove patch: * fix_tests.patch (not longer needed)- Update to version 7.2.1: BGPd * Fix Addpath issue * Do not apply eBGP policy for iBGP peers * Show ip and fqdn in json output for show [ip] bgp json * Fix large route-distinguisher's format * Fix no bgp listen range ... configuration command * Autocomplete neighbor for clear bgp * Reflect the distance in RIB when it is changed for an arbitrary afi/safi * Notify "Peer De-configured" after entering 'no neighbor cmd * Fix per afi/safi addpath peer counting * Rework BGP dampening to be per AFI/SAFI * Do not send next-hop as :: in MP_REACH_NLRI if no link-local exists * Override peer's TTL only if peer-group is configured with TTL * Remove error message for unkown afi/safi combination * Keep the session down if maximum-prefix is reached OSPFd * Fix BFD down not tearing down OSPF adjacency for point-to-point net BFDd * Fix multiple VRF handling * VRF security improvement PIMd * Fix rp crash NHRPd * Make sure no ip nhrp map works as expected LDPd * Add missing sanity check in the parsing of label messages Zebra * Use correct state when installing evpn macs * Capture dplane plugin flags lib * Fix interface config when vrf changes * Fix Interface Infinite Loop Walk (for special interfaces such as bond) Others * Rename man pages (to avoid conflicts with other packages) * Various other fixes for code cleanup and memory leaks- Fix license tag- Build with support for pcre, protobuf, rpki and zeromq by default- Cleanup spec file- Fix build-time dependencies - Remove superflous comments- fix_tests.patch: correct syntax for Python 3 imports in tests. - Enabling tests- Update to version frr7.2: * zebra: use correct state when installing evpn macs * lib: set entry to xpath in if_update_to_new_vrf * zebra: capture dplane plugin flags * bgpd: Autocomplete neighbor for clear bgp * ospfd,eigrpd: don't take address of packed struct member * bgpd: Prevent crash in bgp_table_range_lookup * bgpd: Fix memory leak in json output of show commands * tests: Test if `distance bgp (1-255) (1-255) (1-255)` works * bgpd: Reflect the distance in RIB when it is changed for an arbitrary afi/safi * bfdd: fix multiple VRF handling- Updating to version 7.2 - Adding systemd scripts - Fixing build and permission issues- Update to version 7.0.1- Initial package, version 6.0.2/sbin/ldconfig/sbin/ldconfigs390zl31 16950235357.4-150300.4.17.17.4-150300.4.17.1libmlag_pb.so.0libmlag_pb.so.0.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:30538/SUSE_SLE-15-SP3_Update/8c5cf61b820ca28d589ed165c047b638-frr.SUSE_SLE-15-SP3_Updatecpioxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=6972d37ea9804bd1b286ebaeb3ab21631790c436, strippedPRRRj3]S6"pRiutf-85704efc75589bc5f3faaaf750ff942b9d8d268b2b0366c549a7f67a00bcff43b?7zXZ !t/] cr$x#I߲S1sJU|K!X$Jޭp#+J 'c$l6-v gP#q(kf׻~LUJ6a_(]/H"(NGJ !?( BsOl3)(XƽV}k24ݻ)0q^͋JVZ>,o95ԁr1e'*:)`=4FAgTTHw6-ŜWcإ! YaC5?}70t ;5 pfPYH?bԦח$DqL'\hLjUqlRhu mlh's2ArZ.ʱGEk7* HN3tKnI++Fz >L'&io$~RIa6ݽkSDnhjnuyh1|X53@xEX?ïT+c^ 03qɏ)#U[L4\bt$i}dh> j)a<}.b*mYV hp|UdOEy-Q {:M4iFzK^'E4+Hw1B{tXH R7.NccT騼&H4}:K#`|ON Lt0q#aِn$ g)Z˿ۼ`'?`),$E|,?c9ơ1oe>!~CV1+L #wK7 8M/Mk,oEuN%-(s2r_C͕YL僀]pqk>\(䆸EւXRiDSJi%°P 7!"p8Nket<((nhr?.q#LDm5Z l}"KV|;?ՃYEA#1@fD缵>v7я GYJm._vqa@e3F~MWxƱ?Zsc0TxtGZe/ j]hzKY:8~e3,p<{"q-<@`!O``XK#{z?Y6)p-m,r!VUL!nr[>2Vt# d*s]uVc5{4VG2:$ULo^hCYGLl..gb_xKwmx#R5f"xȼ/=ǟpS Mg. 0/\jS@P 6(q7*RlB>nȫ~TN.m!^PC= V(k+ U4m4wnXdyD'7FEdau` R `)S=u7G\+.릁%Z2%.! ph{I_Q^P}sd-4D?:Ƽ6" pBj1Qh}tS>7K4R}6EU GT)k,  mF >B!:,DS>У -v4"m’GT`&E?Y7yBb%u8|,<'f}ޖvT*B$ȹ*+wJ}vԬJFw[TEH*9O5afg+F_vBXuMIF!jV'eIPgeWqE `TmjISriG{WQݙp[ |рW ac 5!S1wwOj٬Dw丶dԒcoF׀@{ѳV#1{Ű5rd !䔴_=B?-f)sNRXgل 2"Jo.04YKT,I} PUK2{EXg# m5r.>S Hvod8E;8&Yg1Y n0ټtI6Q5YU%'XSJU?#EDS.s| f ~z# Lao+]b8n14jT2Ƴg5.i2_ppC AVHa8?" V5PYحMt=wi:=L19ux}*GcIEYc-e R"l)qs^Hѫ#o?.MS WMlC&9DBB54ꋷJQ`ag9-NGJ̕>d+g^b\XbgZ`.dh 34fT4w @JkP'=j*fۭS[HZŴGIו6i0k/fi;unf\0}ˇ%{_@Μw61dt9tT Z24k]u!рsfx0FL-@~6#Wnqi(Yp1^PL,Q9[1{9%RwW#Az|̰ @- DX 2cRu~MQnfQ{gB#pi [gH'xj |Ad^*h[0bevkܐSj&>ܵV] n'y6)ZMWΰ$VC8PP83q?TaAٱ斔<ӊjL;ϓB{wh߲/͋w#bb[щ;ddWȝ/ɀ s1GF(DL'*hRzr@d4H@Ms K:?-6dH*VoMƜ'JӘ:ØѨFc+}9m @>[|%}dn<2;Evi6w eF16Mv@t3/m{K ,OcslL!š0h'X?ۺ'Wgi*Lbv߈^̒\# $ E9J=7Џ#ly(kd%D=Gb^a!bɜ ʘ H>Q\.̽ Ux`kAVfӿ7-j2Pk)zCAQ<ٯ͗5^Ap_0AZm0)VUK$&Láy5 g)iyXn`"E,;@ n! $"zq&s>?fIwGɊ3eQ҉ewP= ǭ'BA,0 9;?~hOGu;sVNwM=g\ULnP; ~I g1@;m7آ||MއuAx7#zu!cޟg?6Yɹ;t LGIΫZªC%Y]K!1C]}xn\Davi N@ XLXP1ʴxO`[ILˑn6-0}y,ʻc{ahym7dce\*Lblcю6,Pנ3|,У6jƳ鬚RDqz 'r[ܬbǖ XT~y'q`e 9}/{ЭRQ#!@9@7` Z4*j8!7wo7`*3F=AXPWNd/!*GcuT=} Ͻ]1 oCꃘynX Gnzmo uӅ[-WK9#.p)-.c&bt3x]H_l`3S M;2sR]|]ԯ %~73pYOy`x\1#uE%Mmj!AC5YA@LZdSjBi ܍ۜx=񖗫Ji߯ϙ$&^I-1G XQ7%)3_[GsF GJ{;ֈ{2GbcQv4YnrH̕jrg&B+ԓD> YZ