libkea-eval69-2.6.3-150600.13.6.1<>,N|ihp9|RWq! V,]uy.,?$[}eCcc|N b΂#J.6~<5nq-l$Ի3i >R|1 @Q`, q*\tYS wqpnQS@ޓ\D$޾?,u s)c9  ':- ~pm^!#ld&_]Lt"5f"5CHQ"rf.mE:>@C?Cd $ K!BJ `q     X(89L:>@@@F@G@H@I@X@Y@\A]A^A*bA6cAdB]eBbfBelBguB|vBwC(xC,yC0zCCCCCClibkea-eval692.6.3150600.13.6.1Kea DHCP expression evaluation libraryThe core of the libeval library is a parser that is able to parse an expression (e.g. option[123].text == 'APC'). This is currently used for client classification.ihibs-power9-15 (SUSE Linux Enterprise 15SUSE LLC MPL-2.0https://www.suse.com/System/Librarieshttps://kea.isc.org/linuxppc64le (i^43200c8fb1eb9ab4917af5d1914f0a9edd71f4f53d494f5247b180b5143afe50rootrootkea-2.6.3-150600.13.6.1.src.rpmlibkea-eval.so.69()(64bit)libkea-eval69libkea-eval69(ppc-64)@@@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibboost_system.so.1.66.0()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libkea-asiolink.so.72()(64bit)libkea-dhcp++.so.92()(64bit)libkea-exceptions.so.33()(64bit)libkea-log.so.61()(64bit)libkea-util.so.86()(64bit)libstdc++.so.6()(64bit)libstdc++.so.6(CXXABI_1.3)(64bit)libstdc++.so.6(CXXABI_1.3.9)(64bit)libstdc++.so.6(GLIBCXX_3.4)(64bit)libstdc++.so.6(GLIBCXX_3.4.11)(64bit)libstdc++.so.6(GLIBCXX_3.4.14)(64bit)libstdc++.so.6(GLIBCXX_3.4.20)(64bit)libstdc++.so.6(GLIBCXX_3.4.21)(64bit)libstdc++.so.6(GLIBCXX_3.4.9)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3h4WhgJ@g&g@ggfqve*edcb)aZ`@``j__S}^1]v>]e@]]2@\&@[(@['YV=@YV=@Y)j@VTjorik.cronenberg@suse.comjorik.cronenberg@suse.comjengelh@inai.dejorik.cronenberg@suse.comjorik.cronenberg@suse.comjorik.cronenberg@suse.comjorik.cronenberg@suse.comjengelh@inai.dejengelh@inai.derrahl0@proton.mejorik.cronenberg@suse.comjorik.cronenberg@suse.comjengelh@inai.dejengelh@inai.dejengelh@inai.dejengelh@inai.desmar@smar.fijengelh@inai.dejengelh@inai.desteven.kowalik@suse.comjengelh@inai.deadam.majer@suse.deadam.majer@suse.demardnh@gmx.dejengelh@inai.deadam.majer@suse.dejengelh@inai.deobs@botter.ccobs@botter.ccjengelh@inai.dejengelh@inai.de- Update to release 2.6.3 Security Fixes: * The default configuration for the Kea Control Agent (CA) has been updated to enable basic HTTP authentication. Access to the Kea API will thus require a password. (CVE-2025-32801, CVE-2025-32802, CVE-2025-32803) [bsc#1243240] * `kea-dhcp4`, `kea-dhcp6`, `kea-dhcp-ddns`, and `kea-ctrl-agent` now only load hook libraries from the default installation directory. For ease of use, the path may be omitted. (CVE-2025-32801) [bsc#1243240] * The API command `config-write` will now only write to the same directory as the configuration file used when Kea was started (passed as a `-c` argument). (CVE-2025-32802) [bsc#1243240] * Lease files can now only be loaded from the data directory `/var/lib/kea`. This path may be overridden at startup by setting the environment variable `KEA_DHCP_DATA_DIR` to the desired path. If a path outside the defined data directory is used in `lease-database.name`, Kea returns an error and refuses to start or, if already running, aborts and exits. For ease of use in specifying a custom file name, simply omit the path component from `name`. (CVE-2025-32802) [bsc#1243240] * Log files can now only be written to a defined output directory `/var/log/kea`. This path may be overridden at startup by setting the environment variable `KEA_LOG_FILE_DIR` to the desired path. If a path outside the defined output directory is used in `loggers.output_options.output`, Kea returns an error and refuses to start or, if already running, aborts and exits. For ease of use, simply omit the path component from `output` and specify only the file name. (CVE-2025-32802) [bsc#1243240] * Files created by Kea now have more restrictive file permissions. Write access by group and any access by others is now forbidden. (CVE-2025-32803) [bsc#1243240] * Sockets can no longer be created in a world-writable directory, such as `/tmp`. Sockets must now be created in the more restricted `/var/run/kea`. (CVE-2025-32802) [bsc#1243240] * Many sample configuration files have been updated to reflect changes introduced in this release. In the ARM, the Kea Security section has been moved to a more prominent location, and a new section concerning securing the Kea Control Agent has been added. (CVE-2025-32801, CVE-2025-32802, CVE-2025-32803) [bsc#1243240] Other changes: * Fix build with the latest Boost 1.87. (Obsoletes patch `kea-2.6.1-boost_1.87-compat.patch`) * Backported a clarification in the ARM about subnet4-delta-add. - Remove /run/kea from systemd tmpfiles as the creation of this directory is handled by the services. - Replace 'chmod -h' and 'chown -h' with 'find' as the '-h' isn't present in Leap/SLE. - /run/kea now has mode 0750 for all services.- Update owner and perms in %post on modified config files- Add logic to %post for switching from kea.service to the new split units, kea-*.service. (Inspiration taken from strongswan.spec.)- Split off services into separate ones to allow more fine grained control for e.g. capabilities. - Tighten access to state and log directories.- Update to release 2.6.2 Bug fixes: * Fix for inaccurate statistics: Kea was miscalculating declined and assigned leases. * Fix for lease conflicts and NAK: Conflicting entries were created when two relayed HA instances tried to update a shared lease DB at the same time. * Fix for `subnetX-del` not removing subnets completely: `subnetX-del` was not correctly deleting the subnet declaration from the shared network configuration section. * Fix for `config-write` and `retry-on-startup` parameter: `config-write` was improperly storing the `retry-on-startup` parameter in the config file, causing Kea to fail when restarting. * Fix for incorrect DB schema entry: A typo prevented the upgrade script from working in certain circumstances. * Fix for mishandling malformed DISCOVER packets: * Fix for excessive memory utilization when receiving frequent SIGHUP: Kea was storing a history of configs in memory with each restart. * Fix for `config-set` with `output_options`: `config-set` was omitting the `output_options` section when spelled with "_". * Fix for store-extended-info breaking lease limits: A specific combination of vendor classes and storing extended info caused limits to not be applied. * Fix for DB connection recovery * DB upgrade scripts: DB upgrade could fail on some distributions.- Add patch to fix build with boost 1.87 (kea-2.6.1-boost_1.87-compat.patch) - Add BuildRequires for python3-sphinx_rtd_theme to fix docs build- Update to release 2.6.1 Bug fixes: * Corrected an issue in MySQL config back end that causes preferred life time values to be overwritten when updating client classes via remote-set-class6. command. * Corrected an issue with overlapping enum values for option definition data type. This was causing option definitions of type "record", created via config backend commands, to not load properly when fetched from the back end. * Corrected a bug in storing and fetching the encapsulated DHCP options from the configuration backend. These options were sometimes not returned when they were specified at the subnet, shared network or client class level. * Fixed a file descriptor leak in the High Availability hook library. - Only require bison for build and enable regen_files on Tumbleweed and SLFO, because bison is too old in SLES/Leap - Remove leading zeros from %if %{with ...}- Update to release 2.6.0 * New features: * Hub-and-spoke model in High Availability (HA) * Ping Check hook, RADIUS hook, Performance Monitoring hook * Database connection retry on startup * Classless static route option * Discovery of Network-designated Resolvers (DNR) options * Stash Agent options: ISC DHCP provided a `stash-agent-options` mechanism that, when enabled, caused the server to remember options inserted by a relay agent during the initial exchange with a client. * Removals/Changes: * Removed autogeneration of subnet-ids * `output_options` was renamed to `output-options`- Generate "keadhcp" user with sysusers mechanism- Update to release 2.4.1 * fix a race condition in FLQ in which kea could crash * fix a regression where redetection of interfaces stopped working- Add RuntimeDirectory to kea.service - Update to release 2.4.0 Breaking Changes: * Both MySQL and PostgreSQL database schemas were updated to accommodate DHCPv6 Bulk Leasequery support. * The values accepted by `operation-target` used in `reservation-*` commands have been renamed: primary -> memory, alternate -> database. * Kea DHCPv4 server can now handle multiple `vivco-suboptions` options with different enterprise IDs and multiple vendor options. * The Discovery of Network-designated Resolvers (DNR) options have been implemented for both DHCPv4 and DHCPv6. The options allow configuration. * Template classes mechanism, similar to spawning classes in ISC DHCP, has been implemented. * Kea now keeps leases for a period of time after they are released. * An address reserved in a global reservation must now lie within the range of the subnet or shared-network selected by Kea. * It is now possible to add an "empty" host reservation without any attribute. * kea-dhcp4 now supports the `offer-lifetime` parameter to allow the temporary allocation of leases during DHCPOFFER. * Added support for Secure Zero Touch Provisioning options, per RFC8572. * The kea-dhcp6 `prefix-len` and `pd-pools` list now checks the prefix lengths correctly. * The preferred lifetime is now calculated as 0.625 * `valid-lifetime` unless explicitly specified. * The link selection suboption is now optional. * See /usr/share/doc/kea/ChangeLog in the kea-doc package for details.- Separate documentation into kea-doc package - Remove following packages from BuildRequires * docbook-xsl-stylesheets * elinks * libxslt-tools- Update to release 2.2.0 * Kea now features full native support for TLS in HA * PostgreSQL configuration backend * A new hook is dedicated to RBAC. * A new hook limits the rate and number of leases. * A new DDNS Tuning library adds custom behaviors related to Dynamic DNS updates on a per-client basis. * The subnet_cmds hook has been expanded with several new commands: `subnet4-delta-add`, `subnet4-delta-del`, `subnet6-delta-add`, and `subnet6-delta-del`.- Update to release 2.0.0 * In Kea 2.0, the HA component has undergone a substantial architectural change. When HA+MT is enabled, the DHCPv4 and DHCPv6 daemons are now able to open HTTP sockets on their own and connect directly to each other, bypassing the Control Agent (CA). This eliminates the bottlenecks of sequential UNIX socket connection and the need to translate between HTTP and UNIX socket connections. * A new parameter on-fail gives the operator more control over what to do on database connection loss. * The length of the "parking lot queue" is now configurable; a default value of 256 is used. * A new statistic, `packet-queue-size`, has been added that reports packet-queue utilization.- Update to release 1.9.8 * Kea now recognizes requests sent from vendors that include their information in DHCPv6 Vendor Class option (code 16). * Fixed the server ignoring the Subnet Selection option supplied by a client if its query contained a Relay Agent Information (RAI) option without a Link Selection option.- Update to release 1.9.7 * The Control Agent now supports TLS/HTTPS. * kea-shell supports TLS/HTTPS. * kea-admin now accepts the -P, --port parameter * kea-dhcp4 now supports specifying valid-lifetime in client classes.- Own directory /var/lib/kea, as that is used as default for memfile lease store.- Update to release 1.9.1 * New parameters: ddns-use-conflict-resolution, ip-reservations-unique, ddns-update-on-renew, cache-threshold, cache-max-age. * Support for new IPv6-only-preferred option for DHCPv4. * Added support of basic HTTP authentication in HTTP library, control agent.- Update to release 1.8.0 * User-defined option definitions were not committed, which was fixed. * kea-dhcp4 now rejects inbound client messages that have neither a hardware address nor a client identifier. * Rather than within the 'dhcp-ddns' section, DDNS behavioral parameters may now be specified at global, shared-network, and subnet scopes. * Added support of BOOTP leases with infinite valid lifetime. * Added the -N command line switch that enables experimental multi-threading support.- Switch to Python 3 Sphinx due to Python 2 removal.- Update to release 1.6.0 * Corrected multiple occurrences of out of bounds vector reads. * Corrected a bug in the Kea MySQL Configuration Backend which caused the Kea DHCPv6 server to incorrectly require the server tag to be provided with the remote-subnet6-option-set command. * Corrected a bug in the Kea MySQL Configuration Backend which prevented the DHCP servers from discovering and fetching the changes applied with the new commands. * Prevent the DHCP servers from asserting when malformed hostname or FQDN options are received.- Update keyring file - Temporarily hardcode version in upstream URLs- Update to version 1.6.0~beta2 * Default file locations for lease file, server-duid, log files and lock files have changed. Files previously stored in `/var/kea` are now stored in `/var/run/kea`. Server hooks previously installed in `/usr/lib/hooks` are now installed in `/usr/lib/kea/hooks`. The log files are now stored in `/var/log/kea`. * The kea-admin commands (lease-init, lease-version, lease-upgrade) were renamed to better reflect the fact that the database can store much more than just leases. They're now called db-init, db-version, db-upgrade. * The Logging entry in the configuration file has moved to specific daemon sections. This require a simple configuration file modification. You need to move Logging entry from its global scope into the Dhcp4, Dhcp6, DhcpDdns, Control-agent or Netconf scope. Please see 1.6 migration wiki https://gitlab.isc.org/isc-projects/kea/wikis/migrating-to-kea-1.6 For release notes, see https://ftp.isc.org/isc/kea/1.6.0-beta2/Kea160beta2ReleaseNotes.txt - Fix building of perfdhcp - Enable building of kea-shell - Update sonames of all affected libraries and ship only libraries, allowing `ldconfig` to actually make the symlinks - Rework spec file to abstract soversions- Update to version 1.5.0 * Support for YANG/NETCONF, the ability to store major configuration elements in a YANG model and manipulate it using NETCONF. * Support for global host reservations (previously each host reservation had to be associated with a specific subnet) * Class commands – a new hook that allows dynamic changes to be made to client classes without restarting. * Performance and resiliency improvements to the High Availability hook. * A new congestion control feature to mitigate the effects of heavy DHCP traffic conditions. * Improvements to the High Availability feature, including paged updates between HA pairs to alleviate timeouts. - Run spec-cleaner- Remove unnecessary ldconfig call for kea-hooks: files are outside standard search dirs. - Drop --disable-dependency-tracking, this is already part of %configure.- update to new upstream release 1.4.0 - fix licence - Mozilla Public License v2.0 - package default hook libraries - regenerate parser and documentation - add ISC keyring (2017 & 2018)- Stop on errors from useradd/groupadd- compile in support for MySQL and PostgresQL - add symlink to rckea - add environment variable for PID_FILE_DIR to service file- Update to new upstream release 1.2.0- Update to new upstream release 1.0.0- Initial package (version 0.9.g20262) for build.opensuse.org/sbin/ldconfig/sbin/ldconfigibs-power9-15 17737360402.6.3-150600.13.6.12.6.3-150600.13.6.1libkea-eval.so.69.0.0/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:43199/SUSE_SLE-15-SP6_Update/92969f2c0606749bb364c3f03520b519-kea.SUSE_SLE-15-SP6_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (GNU/Linux), dynamically linked, BuildID[sha1]=f5a0c29209c7ca6c8b4c8d89222a07c273d12f60, strippedPRRRRRRRRR RRRR R R RR RRQUc ڈQd9O~l(Crbd_lL0[TNщΥ6D{Y ʾ9bMDsxTIO]$j묹h?'a7^B>@)(o-J"lMP3ݴ12SU7O|tit.9N;d^aZ}X:k+)![I|"Z{X9xvuO"Ln| *@זi򊴰,e:Q]0R&j'8&ҿ 6,eA`?V