mariadb-gssapi-server-1:10.3.39-1.oe1 >  A e/%W^^fvIyගKIكp?ǠgTG-e|VV*zrgH# L7tcKE_v0ߪ~rY1M :c5yyuOvhIQdR\.-6uci?Қ#nJXa7;ɲc2j.%`ԟTͮrZ/ի‘ e װbvU40!=B@ PAX^=9e7b8d34a72e4f03566bfbdb8bfc72380157e0d5e81d51e22082cded83af06f48b23f1598475190f7255a25008ed03367b47eec8#Le/%W^^fF K꾍Aphv%]p*蕅ѹf!F'ߝ;ήVľu \}3v j21ԼĿ_5ޚ5^s!ߢxmax'jBjB'1 ßn3(:΍Ihxlr*";#G,B9m[͑LFp޸zٳzQZfr%8~٤Z%*-]ι2Y\ĸS{AƲ) "YK>p@ ? d ( , M8 MYlr|      *4T\+(v89:&F G <H DI LX PY \\ ] ^ b c d He Mf Pl Rt pu xv w x y (z d t x ~ Cmariadb-gssapi-server10.3.391.oe1The gssapi authentication pluginThe gssapi authentication plugin allows the user to authenticate with services.e/obs-worker1665654630-x86-0001.novalocalJ)openEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv2 with exceptions and LGPLv2 and BSDhttp://openeuler.orgUnspecifiedhttp://mariadb.orglinuxx86_64)Je/ e/5a11412717949dd85d690114dc62044881be01a9e44e112dc4fa688a387514237eb6a47af2371beff6252e87f3e02fb9ee59fa7067a7633f6a67315232fa88238rootrootrootrootmariadb-10.3.39-1.oe1.src.rpmconfig(mariadb-gssapi-server)mariadb-gssapi-servermariadb-gssapi-server(x86-64)@@@@@@@@@@@@@@    @config(mariadb-gssapi-server)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcom_err.so.2()(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libk5crypto.so.3()(64bit)libkrb5.so.3()(64bit)libkrb5.so.3(krb5_3_MIT)(64bit)libm.so.6()(64bit)libpthread.so.0()(64bit)libstdc++.so.6()(64bit)mariadb-server(x86-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)1:10.3.39-1.oe11:10.3.39-1.oe13.0.4-14.6.0-14.0-15.2-14.15.1e.w@bkb!ZhenyuZheng - 1:10.3.39-1bzhaoop - 3:10.3.35-1bzhaoop - 3:10.3.34-1- Bump to 10.3.39- Bump version to 10.3.35 for resolving CVEs as below - CVE-2022-27379 - CVE-2022-27386 - CVE-2022-27447 - CVE-2022-27448 - CVE-2022-27449 - CVE-2022-27445 - CVE-2022-27456 - CVE-2022-27458 - CVE-2022-27452 - CVE-2022-27376 - CVE-2022-27378 - CVE-2022-27377 - CVE-2022-27381 - CVE-2022-27383 - CVE-2022-27380 - CVE-2022-27384 - CVE-2022-27387- Bump version to latest 10.3.34 version - For resolving the CVEs, which includes: - CVE-2021-46659 - CVE-2021-46664 - CVE-2021-46665 - CVE-2021-46663 - CVE-2021-46662 - CVE-2021-46666 - CVE-2021-46667 - CVE-2021-46661 - CVE-2021-46669 - CVE-2021-46657 - Above all CVEs needs to bump to the latest version for resolve. - Refresh all patches relies on the latest tar package.obs-worker1665654630-x86-0001.novalocal 16976360521:10.3.39-1.oe11:10.3.39-1.oe11:10.3.39-1.oe1auth_gssapi.cnfauth_gssapi.so/etc/my.cnf.d//usr/lib64/mariadb/plugin/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/0b62581e2b4849c74e6114fd3e2b9247-mariadbcpioxz2x86_64-openEuler-linux-gnuASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=9a76d6132921718fb463d4c970cbabc3f8f053ea, strippedRRRRRR RR R RRR R RR$<1f}/ ׾In!bڲU|VWtט=2ZA^ "[Y"@uiˉ2tppMGͿe^չ \uiXKubT^T;R.lKUޏަ([ z>{#ddLu{賋 %!Gt)k.Ehef) siE }5ކDfO|pYx13AoEL~]h!;<нI'[5KZRX3#f%AUd ї*&8bO/,vRP +z!a ސӼxѕʄ 'c^yҝ\w8w;-Q 2 {]G~uR xZ4)LsI!B dGPE<=MJzDYyxvAWrYA5:1$ %+a7FU{ {U<6DL9}|!u*3)['Y_MJEagM}Ma/eUWg|{ \9J4Ҋ~>c'j6ԐVi҉O |[2;? py& ]^&NI[V Y2٪H#0!Ya܂0( Q|rnSa}Bvpi,L)^G98d.%`&TBIRUC?xyk v#cA]c4`& [jzajquDW'5F/͓sߵ5ꔀԤ*UIUa ;7YcٞCQ~G >$sΐR.=ˣs7Mux2yPs2#\)g%Ftmr'7oR:p6Lfmc' ,gM7X.m>ޡ$0y9)AL)E ?<5b #y!ٝs7AZn)t551. TWթsިu@/WCe#Q+Py N7Q\ۺ"W E45dA# I{ B{nknhˬ^"L8CI{9n9a_wɖT7$ ~ho0624MWv4ɽFT~r5Ą9b^vivMQ}!V;+]/צR97R̘"%Xא0+(~hQZ`&Y((Op,W`Ogn[j"> J93pɃ96SnʳQ$T[Fj^kgoȚW\"~яg3@ 6%~DNQ(_h%F y)JZ!$З'~ YZ