slirp4netns-0.4.7-150100.3.18.1<>,؉d p9| TNt:CˌMˇ4$AK%dnJr#<-sD \ȢxarKP:} 9!mVB)\c9},&ٮ |O }P1Y2tbN4ߛZ)mj`>e *O`cKfF㷵dؗ$ts8*fOvɌ UlO4]_c]7 H^r\a)_sz>>(?d " [ 2Dw}     0Xp   (28<9|:FRGhHIXY\]^/bckdefluv(whxyzCslirp4netns0.4.7150100.3.18.1User-mode networking for unprivileged network namespacesslirp for network namespaces, without copying buffers across the namespaces.d ibs-arm-3uSUSE Linux Enterprise 15SUSE LLC GPL-2.0-only AND MIT AND BSD-2-Clausehttps://www.suse.com/System/Managementhttps://github.com/rootless-containers/slirp4netnslinuxaarch64;" A큤A큤d d _bd _bd 79e1dd51732e458820dcb38c6ea9d4faaf0d126f7519d6d5adf17960767dcac048b8664232cb25b513d212893d4a3d9ab2e7ceca8ae0778409bb4315d5ebe51758db3cfabf8ec806bc060e54ab5466a31de4a3ae80fe4a8aa02fb6b1c053c93f9e092584b0680f7534047757895975d51a042865e6fc0c98c6e2f98418f32649rootrootrootrootrootrootrootrootrootrootrootrootslirp4netns-0.4.7-150100.3.18.1.src.rpmslirp4netnsslirp4netns(aarch-64)@@@@@@@@    ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libglib-2.0.so.0()(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libseccomp.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1d @b'E@_^^}]]]i]g@]J@]H@]B@\\+@\@[$@pgajdos@suse.compgajdos@suse.comrhafer@suse.comrhafer@suse.comrhafer@suse.comsgrunert@suse.comsgrunert@suse.comsgrunert@suse.comsgrunert@suse.comsgrunert@suse.comsgrunert@suse.comsgrunert@suse.comsgrunert@suse.comrbrown@suse.comappleonkel@opensuse.orgvrothberg@suse.com- security update - slirp4netns-CVE-2020-29130.patch renamed to slirp4netns-CVE-2020-29129,29130.patch, fixes both CVE-2020-29129 [bsc#1179466], out-of-bounds access while processing NCSI packets CVE-2020-29130 [bsc#1179467], out-of-bounds access while processing ARP packets + slirp4netns-CVE-2020-29129,29130.patch- security update - added patches fix CVE-2020-29130 [bsc#1179467], out-of-bounds access while processing ARP packets + slirp4netns-CVE-2020-29130.patch- Update to 0.4.7 (bsc#1172380) * libslirp: update to v4.3.1 (Fix CVE-2020-10756) * Fix config_from_options() to correctly enable ipv6- Update to 0.4.5 (bsc#1170940) * libslirp: update to v4.3.0: * Fix use-afte-free in ip_reass() (CVE-2020-1983)- Update to 0.4.4 (bsc#1167850) * libslirp: Update to v4.2.0: * New API function slirp_add_unix: add a forward rule to a Unix socket. * New API function slirp_remove_guestfwd: remove a forward rule previously added by slirp_add_exec, slirp_add_unix or slirp_add_guestfwd * New SlirpConfig.outbound_addr{,6} fields to bind output socket to a specific address * socket: do not fallback on host loopback if get_dns_addr() failed or the address is in slirp network * ncsi: fix checksum OOB memory access * tcp_emu(): fix OOB accesses * tftp: restrict relative path access * state: fix loading of guestfwd state- Update to 0.4.3 * api: raise an error if the socket path is too long * libslirp: update to v4.1.0: Including the fix for libslirp sends RST to app in response to arriving FIN when containerized socket is shutdown() with SHUT_WR * Fix create_sandbox error- Update to 0.4.2 * Do not propagate mounts to the parent ns in sandbox- Update to 0.4.1 * Support specifying netns path (slirp4netns --netns-type=path PATH TAPNAME) * Support specifying --userns-path * Vendor https://gitlab.freedesktop.org/slirp/libslirp (QEMU v4.1+) * Bring up loopback device when --configure is specified * Support sandboxing by creating a mount namespace (--enable-sandbox) * Support seccomp (--enable-seccomp) - Add new build dependencies libcap-devel and libseccomp-devel- Update to 0.3.3 * Fix use-after-free in libslirp- Add missing licenses to spec file- Update to 0.3.2 * Fix heap overflow in `ip_reass` on big packet input- Update to 0.3.1 * Fix use-after-free- Update to 0.3.0 * QMP-like JSON API for exposing node ports (--api-socket)- Change _service to use releases instead of git commit references- Update to 0.3.0-beta1 * Support protecting 127.0.0.1 on the host (--disable-host-loopback) * Support specifying CIDR like 10.0.2.0/24 (--cidr) * Fix CVE-2019-6778 * Synced with QEMU upstream- Introduce slirp4netns in version 0.1 to support rootless Podman: slirp4netns provides user-mode networking ("slirp") for unprivileged network namespaces. A common use-case of slirp4netns is to enable network access for rootless container engines such as Podman.ibs-arm-3 16783699350.4.7-150100.3.18.10.4.7-150100.3.18.1slirp4netnsslirp4netnsREADME.mdslirp4netnsCOPYINGslirp4netns.1.gz/usr/bin//usr/share/doc/packages//usr/share/doc/packages/slirp4netns//usr/share/licenses//usr/share/licenses/slirp4netns//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:28159/SUSE_SLE-15-SP1_Update/d7a1a7e4d37aee489572ea39a7c393b7-slirp4netns.SUSE_SLE-15-SP1_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=fa6686fce20c045ea3236a94c61084d9c898e759, for GNU/Linux 3.7.0, strippeddirectoryASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRRR+ {i^ԋ6utf-84222044e9b334f3e1689bb14d7f153cb7865defdc767d0e8abecb669bdd15fc5? 7zXZ !t/Wf]"k%nա ~HAjRCk̅߈/ݏ> ޻ S$tCaNdx~矶 #=n5yJb]r?[2dܣ2SV4:ix:ʛl(Yǫ0pac _ \fW4N>A6ϧH(FH L}rjhMn^WH!")!Ҧ6ɗmbk^JT4;j[p)KQBt'u@͞+m>2f|3Eڇ4Z!gY 36ʈ\lkwL`dhƔȹ,9-4s{˒": ۡ6A?:Ie82b7ȷ6`F'ӄbmw@Je?8ΙvQ¹WƉtL$U::?Y tf{Ne٧ڞp-rFM>; +"]Nh tѾ2 j; 5,\(*M@NE{AP`5&X&[E2(^Rk_МPI wXx3ovoO_E(H=]e`xjF0g}!0֞+UAUv\}rhS=dӸn?84e.,!CwMQhCJ3dWdJP2Y_:(2._+c' nѶvh$5 _ :|фMpG7J0VwxV#ehQyeSH(SGkhT,^:<*d3.ڵCKc[b G58cx\ lʿ}|uqN/mjvX'dgu`R؃_U Xo' 8<5!䧡vX)V[9ZW{R?j15 *т YZ