valkey-devel-8.0.6-150600.13.17.1<>,/hBwp9|f=G8[CriSYG[4ARgGo#*0R#g: t  5xHnC=Ixv*>8 (oâ25@QyyėN]WNQljҼ 1{HڀV~wȹW LĹtCiۇM;/3р22a/7) ̷\D!YdkS@]  WJ>;'?&d $ U  %,< D L \   $4H\'(C8L9:)F#G#H$ I$X$ Y$(\$T]$d^$b$c%d&e&!f&$l&&u&8v&Hz&&&&&Cvalkey-devel8.0.6150600.13.17.1Development header for Valkey module developmentHeader file required for building loadable Valkey modules.hBws390zp38SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Unspecifiedhttps://valkey.iolinuxs390xD 쁤A큤h1fbhBwh14c4eee4d0aff4a4eaf500a32292d519d769a09e534f270e844104dace5508d30a4c1c42bf1ed4e01b26b2d1302371235e527b1b24a6a734e5f9eaae29114324ef19701ee041aae9c4883d86856db2afb4ec2e970af1a83d04470b6edae9228edrootrootrootrootrootrootrootrootvalkey-8.0.6-150600.13.17.1.src.rpmvalkey-develvalkey-devel(s390-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3h@hxh>h=@h@g~hgY~gPD@gffͿf&@ff@f|fvfaantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comdmueller@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comschwab@suse.dengompa@opensuse.orggeorg.pfuetzenreuter@suse.comngompa@opensuse.orgngompa@opensuse.org- Update to 8.0.6: - Security fixes * (CVE-2025-49844, bsc#1250995) A Lua script may lead to remote code execution * (CVE-2025-46817, bsc#1250995) A Lua script may lead to integer overflow and potential RCE * (CVE-2025-46818, bsc#1250995) A Lua script can be executed in the context of another user * (CVE-2025-46819, bsc#1250995) LUA out-of-bound read - Bug fixes * Fix accounting for dual channel RDB bytes in replication stats (#2614) * Fix EVAL to report unknown error when empty error table is provided (#2229) * Fix use-after-free when active expiration triggers hashtable to shrink (#2257) * Fix MEMORY USAGE to account for embedded keys (#2290) * Fix memory leak when shrinking a hashtable without entries (#2288) * Prevent potential assertion in active defrag handling large allocations (#2353) * Prevent bad memory access when NOTOUCH client gets unblocked (#2347) * Converge divergent shard-id persisted in nodes.conf to primary's shard id (#2174) * Fix client tracking memory overhead calculation (#2360) * Fix RDB load per slot memory pre-allocation when loading from RDB snapshot (#2466) * Don't use AVX2 instructions if the CPU doesn't support it (#2571) * Fix bug where active defrag may be unable to defrag sparsely filled pages (#2656) - Changes from 8.0.3, 8.0.4, 8.0.5: https://github.com/valkey-io/valkey/releases/tag/8.0.3 https://github.com/valkey-io/valkey/releases/tag/8.0.4 https://github.com/valkey-io/valkey/releases/tag/8.0.5 - Drop patches included in upstream release * CVE-2025-21605.patch * CVE-2025-27151.patch * CVE-2025-32023.patch * CVE-2025-48367.patch * CVE-2025-49112.patch * valkey-fake-client-flag.patch * valkey-ssl_new-null-return.patch- Fix CVE-2025-32023, out-of-bounds write when working with HyperLogLog commands can lead to remote code execution (bsc#1246059) * CVE-2025-32023.patch - Fix CVE-2025-48367, unauthenticated connection causing repeated IP protocol erros can lead to client starvation and DoS (bsc#1246058) * CVE-2025-48367.patch- Fix crash on SSL_new() returning NULL in outgoing connections (bsc#1243061) * valkey-ssl_new-null-return.patch- Fix CVE-2025-27151, absence of filename size check may cause a stack overflow (bsc#1243804) * CVE-2025-27151.patch - Fix CVE-2025-49112, setDeferredReply integer underflow (bsc#1243913) * CVE-2025-49112.patch- Fix CVE-2025-21605, output buffer denial of service (bsc#1241708) * CVE-2025-21605.patch - Fix test suite * valkey-fake-client-flag.patch * valkey-slot-stats.patch- Update to 8.0.2: - Security fixes * (CVE-2024-46981, bsc#1235387) Lua script commands may lead to remote code execution. (#1513) * (CVE-2024-51741, bsc#1235386) Denial-of-service due to malformed ACL selectors. (#1514) - Bug fixes * Fix an uncommon crash when using TLS with dual channel replication. (#1173) * Make sure repl_down_since is correctly reset when dual channel replication fails. (#1149) * Fix a performance regression where a replica does not properly initialize the database size when loading a snapshot during replication. (#1199) * Make sure the last accessed time is correctly updated when using the TOUCH command with the CLIENT NO-TOUCH option. * Fix a bug where total_net_repl_output_bytes may report the wrong. (#1486) * Fix a bug where used_memory_scripts may report the wrong value. (#1255) * Fix a bug where server might crash when using active defrag when scripts are evicted from the script cache. (#1310) * Fix a bug where extra memory would be used when storing strings in the inline protocol. (#1213) * Fix a bug where the SORT command may throw a cross slot error. (#1182) * Fix a bug where the RANDOMKEY command may omit returning keys in cluster mode. (#1155) * Send the correct error message when FUNCTION KIlL is used to kill an ongoing script. (#1171) * Fix a potential memory corruption when databases are emptied, such as through FLUSHDB, when during active defrag is running. (#1512) - Behavior changes * Revert an unintended breaking change when sending an unsubuscribe command when a client is not subscribed to any channels. (#1265)- Don't obsolete redis- Fix redis and sentinel units lookup in migration script (bsc#1226986) * Look for units in /etc/systemd/system/redis.target.wants - Fix sentinel config files permissions in migration script- fix requires for compat-redis package- Update to 8.0.1: - Bug fixes * Fix a build issue with RDMA when using additional make parameters. (#1074) * Fix an issue where `CLUSTER SLOTS` might return the wrong tcp or tls port when called from inside a script or from a module. (#1072) * Fix a crash when `CLUSTER SLOTS` or `CLUSTER SHARDS` is called from inside a script or from a module. (#1063) * Fix a build issue on systems where `` is unavailable. (#1053) * Fix an issue with the default `sentinel.conf` being invalid. (#1040) - Security fixes * (CVE-2024-31449, bsc#1231264) Lua library commands may lead to stack overflow and potential RCE. * (CVE-2024-31227, bsc#1231266) Potential Denial-of-service due to malformed ACL selectors. * (CVE-2024-31228, bsc#1231265) Potential Denial-of-service due to unbounded pattern matching. - 8.0.0 changelog: * See https://github.com/valkey-io/valkey/blob/8.0.0/00-RELEASENOTES - Drop ppc-atomic.patch - Refresh valkey-conf.patch- Update to 7.2.6: - Bug Fixes - Core * Fix typo in REGISTER_API macro to prevent segfaults when loading Redis modules (#608) * Fix the command duration reset issue when clients are blocked and commands are reprocessed (#526) * Fix the data type conversion error in zrangeResultBeginStore (Redis#13148) * Fix a crash caused by quicklist node merges (Redis#13040) * Fix crashes in module blocking client timeout cases (Redis#13011) * Fix conversion of numbers in Lua args to Redis args (Redis#13115, Fixes Redis#13113) * Fix crash in LSET command when replacing small list items with larger ones, creating listpacks larger than 4GB (Redis#12955, Fixes Redis#12864) * Fix blocking command timeout reset issue during reprocessing (Redis#13004) - Bug Fixes - Cluster * Fix the CLUSTER SHARDS command to display accurate slot information even if a primary node fails (#790, Fixes #784) * Fix an issue where module authentication failed when the cluster was down (#693, Fixes #619) * Ensure only primary nodes with slots can mark another node as failed (#634) * Improve MEET command reliability under link failures to maintain cluster membership symmetry (#461) * Allow single primary node to mark potentially failed replica as FAIL in single-shard cluster (Redis#12824) - Bug Fixes - Sentinel * Accept redis-sentinel to start Valkey in sentinel mode (#731, Fixes #719) - Bug Fixes - CLI * Ensure the --count option in redis-cli works correctly even without - -pattern (Redis#13092) * Fix redis-check-aof misidentifying data in manifest format as MP-AOF (Redis#12951) * Update redis-check-rdb types to replace stream-v2 with stream-v3 (Redis#12969)- migrate_redis_to_valkey.bash fixes (boo#1227139) * Also set group owner for /var/lib/valkey * Change logdir option in copied conf files to /var/log/valkey * Change owner of copied conf files to root:valkey- valkey.logrotate: fix owner of logfiles- Add legacy symlinks for "redis" executables in sbin to fix running valkey in other package test suites using absolute paths- Repair Redis instance detection (boo#1226986)- Enable automatic replacement of redis with valkey- Initial package based on the redis package and Fedora valkey package - Ported over patch from redis package + Added valkey-conf.patch - Backport patch from upstream submission + Added ppc-atomic.patchs390zp38 17598552238.0.6-150600.13.17.18.0.6-150600.13.17.1valkeymodule.hmacros.valkeyvalkey-develCOPYING/usr/include//usr/lib/rpm/macros.d//usr/share/licenses//usr/share/licenses/valkey-devel/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:41027/SUSE_SLE-15-SP6_Update/8a3f0c243122e1aa7018388ab4c8e57e-valkey.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxC source, ASCII textASCII textdirectoryASCII text, with very long lines@+J ݶutf-8483e8789e01ae49dea71dbdc09940392861efdc007f8499bf7d8a836d646d260?P7zXZ !t/]"k%ˣɭ<.voL\WONUb'{~TxApK>i}R$;C9v>ַĶH4]kMJ 84$m:KDhH 8bY\0v\#Gy:^܏yv!{éO° {7dvVG ͭ"τC66ƃȰ9V\\P$aL K)l!T(mQ3xAh9?V`,DSˆG ?3 @ fH~qS2l5CqvI(3*N7b:7̔sJO["& ڣ-{PF)zh؇p3~pツ>ϑ2J<mEv5M0o8}E'DO:i}zsX'h4`O,ln9jfXjȖe'N q]( X0t,O$R LgmbYPvC]* 6L zI͑PeX9si# Ox>n"SfM5eo!b )O "BV>ԚqN*V&e8&q`fc j6ҎӺ4I#˔V; TK:m-:w닧hC/N\)蟉@g%`-B"EKg;|QK&]T/ȿnQp\ml:j;34~4\[VW%7lJ;.f̉OK` k L^w ?`h_֕鿞7V^4`Xs,q15ꊔ_WCIon"/^:]#P*|=J :Y<N<':}m!ip0jP@A ]KwjyLnѣ'%u YZ