valkey-devel-8.0.6-150600.13.17.1<>,/h@p9|æ_=DbܥCD+U2`h=<& U5_\:a`@FhvV1%vϱ[3PBsi;+sBQ`甮PAq_Œ[Ðj' L|KoF,sC.uW*e,[ケrss$V:#,_,mNQv>;' ?&d $ U  %0@ H P ` $ (8L`+(G8P9:-F#G$H$I$ X$$Y$,\$X]$h^$b$c%d& e&%f&(l&*u&@v&Pz&&&&&Cvalkey-devel8.0.6150600.13.17.1Development header for Valkey module developmentHeader file required for building loadable Valkey modules.h@nebbioloSUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Unspecifiedhttps://valkey.iolinuxppc64leD 쁤A큤h1fbh@h14c4eee4d0aff4a4eaf500a32292d519d769a09e534f270e844104dace5508d30a4c1c42bf1ed4e01b26b2d1302371235e527b1b24a6a734e5f9eaae29114324ef19701ee041aae9c4883d86856db2afb4ec2e970af1a83d04470b6edae9228edrootrootrootrootrootrootrootrootvalkey-8.0.6-150600.13.17.1.src.rpmvalkey-develvalkey-devel(ppc-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3h@hxh>h=@h@g~hgY~gPD@gffͿf&@ff@f|fvfaantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comdmueller@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comschwab@suse.dengompa@opensuse.orggeorg.pfuetzenreuter@suse.comngompa@opensuse.orgngompa@opensuse.org- Update to 8.0.6: - Security fixes * (CVE-2025-49844, bsc#1250995) A Lua script may lead to remote code execution * (CVE-2025-46817, bsc#1250995) A Lua script may lead to integer overflow and potential RCE * (CVE-2025-46818, bsc#1250995) A Lua script can be executed in the context of another user * (CVE-2025-46819, bsc#1250995) LUA out-of-bound read - Bug fixes * Fix accounting for dual channel RDB bytes in replication stats (#2614) * Fix EVAL to report unknown error when empty error table is provided (#2229) * Fix use-after-free when active expiration triggers hashtable to shrink (#2257) * Fix MEMORY USAGE to account for embedded keys (#2290) * Fix memory leak when shrinking a hashtable without entries (#2288) * Prevent potential assertion in active defrag handling large allocations (#2353) * Prevent bad memory access when NOTOUCH client gets unblocked (#2347) * Converge divergent shard-id persisted in nodes.conf to primary's shard id (#2174) * Fix client tracking memory overhead calculation (#2360) * Fix RDB load per slot memory pre-allocation when loading from RDB snapshot (#2466) * Don't use AVX2 instructions if the CPU doesn't support it (#2571) * Fix bug where active defrag may be unable to defrag sparsely filled pages (#2656) - Changes from 8.0.3, 8.0.4, 8.0.5: https://github.com/valkey-io/valkey/releases/tag/8.0.3 https://github.com/valkey-io/valkey/releases/tag/8.0.4 https://github.com/valkey-io/valkey/releases/tag/8.0.5 - Drop patches included in upstream release * CVE-2025-21605.patch * CVE-2025-27151.patch * CVE-2025-32023.patch * CVE-2025-48367.patch * CVE-2025-49112.patch * valkey-fake-client-flag.patch * valkey-ssl_new-null-return.patch- Fix CVE-2025-32023, out-of-bounds write when working with HyperLogLog commands can lead to remote code execution (bsc#1246059) * CVE-2025-32023.patch - Fix CVE-2025-48367, unauthenticated connection causing repeated IP protocol erros can lead to client starvation and DoS (bsc#1246058) * CVE-2025-48367.patch- Fix crash on SSL_new() returning NULL in outgoing connections (bsc#1243061) * valkey-ssl_new-null-return.patch- Fix CVE-2025-27151, absence of filename size check may cause a stack overflow (bsc#1243804) * CVE-2025-27151.patch - Fix CVE-2025-49112, setDeferredReply integer underflow (bsc#1243913) * CVE-2025-49112.patch- Fix CVE-2025-21605, output buffer denial of service (bsc#1241708) * CVE-2025-21605.patch - Fix test suite * valkey-fake-client-flag.patch * valkey-slot-stats.patch- Update to 8.0.2: - Security fixes * (CVE-2024-46981, bsc#1235387) Lua script commands may lead to remote code execution. (#1513) * (CVE-2024-51741, bsc#1235386) Denial-of-service due to malformed ACL selectors. (#1514) - Bug fixes * Fix an uncommon crash when using TLS with dual channel replication. (#1173) * Make sure repl_down_since is correctly reset when dual channel replication fails. (#1149) * Fix a performance regression where a replica does not properly initialize the database size when loading a snapshot during replication. (#1199) * Make sure the last accessed time is correctly updated when using the TOUCH command with the CLIENT NO-TOUCH option. * Fix a bug where total_net_repl_output_bytes may report the wrong. (#1486) * Fix a bug where used_memory_scripts may report the wrong value. (#1255) * Fix a bug where server might crash when using active defrag when scripts are evicted from the script cache. (#1310) * Fix a bug where extra memory would be used when storing strings in the inline protocol. (#1213) * Fix a bug where the SORT command may throw a cross slot error. (#1182) * Fix a bug where the RANDOMKEY command may omit returning keys in cluster mode. (#1155) * Send the correct error message when FUNCTION KIlL is used to kill an ongoing script. (#1171) * Fix a potential memory corruption when databases are emptied, such as through FLUSHDB, when during active defrag is running. (#1512) - Behavior changes * Revert an unintended breaking change when sending an unsubuscribe command when a client is not subscribed to any channels. (#1265)- Don't obsolete redis- Fix redis and sentinel units lookup in migration script (bsc#1226986) * Look for units in /etc/systemd/system/redis.target.wants - Fix sentinel config files permissions in migration script- fix requires for compat-redis package- Update to 8.0.1: - Bug fixes * Fix a build issue with RDMA when using additional make parameters. (#1074) * Fix an issue where `CLUSTER SLOTS` might return the wrong tcp or tls port when called from inside a script or from a module. (#1072) * Fix a crash when `CLUSTER SLOTS` or `CLUSTER SHARDS` is called from inside a script or from a module. (#1063) * Fix a build issue on systems where `` is unavailable. (#1053) * Fix an issue with the default `sentinel.conf` being invalid. (#1040) - Security fixes * (CVE-2024-31449, bsc#1231264) Lua library commands may lead to stack overflow and potential RCE. * (CVE-2024-31227, bsc#1231266) Potential Denial-of-service due to malformed ACL selectors. * (CVE-2024-31228, bsc#1231265) Potential Denial-of-service due to unbounded pattern matching. - 8.0.0 changelog: * See https://github.com/valkey-io/valkey/blob/8.0.0/00-RELEASENOTES - Drop ppc-atomic.patch - Refresh valkey-conf.patch- Update to 7.2.6: - Bug Fixes - Core * Fix typo in REGISTER_API macro to prevent segfaults when loading Redis modules (#608) * Fix the command duration reset issue when clients are blocked and commands are reprocessed (#526) * Fix the data type conversion error in zrangeResultBeginStore (Redis#13148) * Fix a crash caused by quicklist node merges (Redis#13040) * Fix crashes in module blocking client timeout cases (Redis#13011) * Fix conversion of numbers in Lua args to Redis args (Redis#13115, Fixes Redis#13113) * Fix crash in LSET command when replacing small list items with larger ones, creating listpacks larger than 4GB (Redis#12955, Fixes Redis#12864) * Fix blocking command timeout reset issue during reprocessing (Redis#13004) - Bug Fixes - Cluster * Fix the CLUSTER SHARDS command to display accurate slot information even if a primary node fails (#790, Fixes #784) * Fix an issue where module authentication failed when the cluster was down (#693, Fixes #619) * Ensure only primary nodes with slots can mark another node as failed (#634) * Improve MEET command reliability under link failures to maintain cluster membership symmetry (#461) * Allow single primary node to mark potentially failed replica as FAIL in single-shard cluster (Redis#12824) - Bug Fixes - Sentinel * Accept redis-sentinel to start Valkey in sentinel mode (#731, Fixes #719) - Bug Fixes - CLI * Ensure the --count option in redis-cli works correctly even without - -pattern (Redis#13092) * Fix redis-check-aof misidentifying data in manifest format as MP-AOF (Redis#12951) * Update redis-check-rdb types to replace stream-v2 with stream-v3 (Redis#12969)- migrate_redis_to_valkey.bash fixes (boo#1227139) * Also set group owner for /var/lib/valkey * Change logdir option in copied conf files to /var/log/valkey * Change owner of copied conf files to root:valkey- valkey.logrotate: fix owner of logfiles- Add legacy symlinks for "redis" executables in sbin to fix running valkey in other package test suites using absolute paths- Repair Redis instance detection (boo#1226986)- Enable automatic replacement of redis with valkey- Initial package based on the redis package and Fedora valkey package - Ported over patch from redis package + Added valkey-conf.patch - Backport patch from upstream submission + Added ppc-atomic.patchnebbiolo 17598547328.0.6-150600.13.17.18.0.6-150600.13.17.1valkeymodule.hmacros.valkeyvalkey-develCOPYING/usr/include//usr/lib/rpm/macros.d//usr/share/licenses//usr/share/licenses/valkey-devel/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:41027/SUSE_SLE-15-SP6_Update/8a3f0c243122e1aa7018388ab4c8e57e-valkey.SUSE_SLE-15-SP6_Updatedrpmxz5ppc64le-suse-linuxC source, ASCII textASCII textdirectoryASCII text, with very long lines0}Moutf-80c2c18084f733d38bd9cdfaab15f17ec734970ec0666a8a54f286906a2134a63?P7zXZ !t/]"k%ˣɭ<.voL\WONUb'{~TxApK>i}R$F:cFֿ:ILt\C<6)4ȢQuБe|V~5 56 tȽY~"aDxHƼ$TN㈪4[U!-Gн:lps;pm]#koKs^+}?KQ-S-mܶx $O_WxYt8񂧒xa/>F} .,B G#7Z NP9+= 0~Oh/'-b#.RV>%6zl=E[l^ 4raGޯs诹WqC0EMۗ=Iml1.m^$pO$Uö'Ѥ=3q@A*|m\#i-yn#{}x1^m(/ð}5V6|~SbtEwB}Rzك˓'n-ic MYЂU*wY#aƕErz6A3}@8 xV%>?Y:FS%ܻ YZ