mariadb-cracklib-1:10.3.39-1.oe1 >  A e/#W^^fP -GY?W| u@&|wh@ ̺%opCr9+ ?s顈:HӈlϺg8Ljp4ūwn/6‰Ɂ^^l^AtUq{\[u3*݂ {&% uHdǛ\S,mڴ̾pf$K@xHKLvp*h2d%ka1.1ɘKM=A܄۳caba2c96e27646aa3bc0109ebca299ceae9bdbc28b6d99eeb04f970bc52f22aaf18e98775bb0b2e0ce976d687940cdc4c74209a0xe/#W^^fI9z>;?$gѐBJb62ZNLNm{FʼRXI˄=qt\J~GԸf)1-yA$YhQgvσ~}8v2N&߇>R 'Ft5)(wh8W;c6ƒ=QaR@}6cW2h&CLev+Ŵ, P`aD1f 'bSSJPr⵮vkDp;;֐ ù;>pC 4? $d$ ( E#L am    * ,4>Hhp$o(89:bB BF ZG H I X Y Z [ \ ] ^ 3b ]c id e f l t u v w x y z     Cmariadb-cracklib10.3.391.oe1A password validation plugincracklib_password_check is a password validation plugin. It uses the CrackLib library to check the strength of new passwords. CrackLib is installed by default in many Linux distributions, since the system's Pluggable Authentication Module (PAM) authentication framework is usually configured to check the strength of new passwords with the pam_cracklib PAM module.e/obs-worker1665654630-x86-0001.novalocal9openEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv2 with exceptions and LGPLv2 and BSDhttp://openeuler.orgUnspecifiedhttp://mariadb.orglinuxx86_6459e/ e/56c7039b287ba80dc8dda2e862613d8960972cd33546e6b21af657d9e2a155c60d43edcdf61c008497386c31828298a9c47d023bb98ffc8c7b068ebd09436670erootrootrootrootmariadb-10.3.39-1.oe1.src.rpmconfig(mariadb-cracklib)cracklib-password-checkcracklib-password-check(x86-64)mariadb-cracklibmariadb-cracklib(x86-64)@@@@@@    @config(mariadb-cracklib)cracklib-dictslibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrack.so.2()(64bit)libpthread.so.0()(64bit)mariadb-server(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)1:10.3.39-1.oe11:10.3.39-1.oe13.0.4-14.6.0-14.0-15.2-14.15.1e.w@bkb!ZhenyuZheng - 1:10.3.39-1bzhaoop - 3:10.3.35-1bzhaoop - 3:10.3.34-1- Bump to 10.3.39- Bump version to 10.3.35 for resolving CVEs as below - CVE-2022-27379 - CVE-2022-27386 - CVE-2022-27447 - CVE-2022-27448 - CVE-2022-27449 - CVE-2022-27445 - CVE-2022-27456 - CVE-2022-27458 - CVE-2022-27452 - CVE-2022-27376 - CVE-2022-27378 - CVE-2022-27377 - CVE-2022-27381 - CVE-2022-27383 - CVE-2022-27380 - CVE-2022-27384 - CVE-2022-27387- Bump version to latest 10.3.34 version - For resolving the CVEs, which includes: - CVE-2021-46659 - CVE-2021-46664 - CVE-2021-46665 - CVE-2021-46663 - CVE-2021-46662 - CVE-2021-46666 - CVE-2021-46667 - CVE-2021-46661 - CVE-2021-46669 - CVE-2021-46657 - Above all CVEs needs to bump to the latest version for resolve. - Refresh all patches relies on the latest tar package.cracklib-password-checkobs-worker1665654630-x86-0001.novalocal 16976360521:10.3.39-1.oe11:10.3.39-1.oe11:10.3.39-1.oe1cracklib_password_check.cnfcracklib_password_check.so/etc/my.cnf.d//usr/lib64/mariadb/plugin/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/0b62581e2b4849c74e6114fd3e2b9247-mariadbcpioxz2x86_64-openEuler-linux-gnuASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=e5231943a2ed5d899838a5eb8c5ee8d64c248c9e, strippedRRRRRRR ]gZ R9n;Sq2j>c;515Rg-ݙPfciL*֎sa^ ˷+&L_?_^ ڌ0j"x8g ys9sn(;Z1PC"He863a\+uBI5B,a%6>oYkIˠA&LI&qv*z+FSat\3EjqI. ^m_wyYrRԶ@u>R `uӶ}~:}TD^liPz~EH("W9Bd#Y0sxC4]r/?h@BQVK1%(vca ?# #pQkxxCp%}Fr -bU}kWL[1RP{,%ucV}6 )eFrtv?K#Os,j.10/*>&Nٴe03Et-{x T9`=5oz=뭪!ٲ 0 -ޣ`}_8w*zwEgYnz)L0o20a~/kIIoIPgx_qU{DuCg͏yVj"66GkԤlͺځ{R%$q="!hZӗJ.ڝ#\Ղ> }6iA2fҝꋙzoCi4NV3I1~;Ϲ3Hۄ涖(߇tp&`\o 2ȗhYebtO72NSd) =O L~$-QWBP`mg P?XQaYmPjBt# ϧy@*g2%;iu$C) AR&9z-6;Ϡp%q47bG2!#]t Jj(>M!5Ue} im6GnTL'C zO7A.B|G]I l>bM؎ I7,/@Ԝ܈@.D#2.*p"")t;'-GǾ R^ d9I. l u-Q V:5aiS9r*6W~Ntlpۺ. `7F=l^4q UsdCbz y(CGz Ÿ{CL~EjRb8q~rZxX y', Vۑ$7$v)wQ. YZ