samba-krb5-printing-4.11.12-12.oe1 >  A b>W^^f`G;#ziȬѰwK,[H%JŇMjX3yp[҈e',ShF݋K#vMEE @v"7|3H] h^Qj:9g𨪮Yfl W$Z]p@58yĿr%TIXQ gO3e~q 'u:+oejZ;X(oGt .fWdKʭ\[JM=صqnWcad2999a1e19fe2b9f6a48e73dea9f1fd01d5d6864a88a7ca99a612864d7f1fd14152d489150c8f5270f81e39502ea61bb3d950c*b>W^^f*iry(;v?^=' "bV%jLt(?Dso)x4Js0?Z{M n=\S m묝u:HJjZi|1~ddS~1G[{0+~X.7xZbQyF*äpvr ^3^ߚ]b6M-"V+xJϖҾvg?tKMOx؇'Q$,lQZgo媹D_B:T>pC?d % _/B Wcy     D%%%(8 90 : a >@!F)GTHXI\X`Yh\]^bcde$f'l)tDuHvLwxy zCsamba-krb5-printing4.11.1212.oe1The samba CUPS backend package for printing with KerberosThis package will allow cups to access the Kerberos credentials cache of the user issuing the print job.bobs-worker-backend-test-00019@openEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgGPLv3+ and LGPLv3+http://openeuler.orgUnspecifiedhttps://www.samba.orglinuxx86_64/usr/sbin/update-alternatives --install /usr/libexec/samba/cups_backend_smb \ cups_backend_smb \ /usr/libexec/samba/smbspool_krb5_wrapper 50if [ $1 -eq 0 ] ; then /usr/sbin/update-alternatives --remove cups_backend_smb /usr/libexec/samba/smbspool_krb5_wrapper fi9@bcdd000818beecb8f17c238972e7c93ffa5b37f8dd1a29cb137210cb80aca736drootrootsamba-4.11.12-12.oe1.src.rpmsamba-krb5-printingsamba-krb5-printing(x86-64)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    @/bin/sh/bin/shlibaesni-intel-samba4.so()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcom_err.so.2()(64bit)libcrypt.so.1()(64bit)libcups.so.2()(64bit)libdl.so.2()(64bit)libgenrand-samba4.so()(64bit)libgssapi_krb5.so.2()(64bit)libiov-buf-samba4.so()(64bit)libk5crypto.so.3()(64bit)libkrb5.so.3()(64bit)libkrb5.so.3(krb5_3_MIT)(64bit)libkrb5samba-samba4.so()(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libreplace-samba4.so()(64bit)libsamba-debug-samba4.so()(64bit)libsamba-util.so.0()(64bit)libsamba-util.so.0(SAMBA_UTIL_0.0.1)(64bit)libsocket-blocking-samba4.so()(64bit)libsys-rw-samba4.so()(64bit)libsystemd.so.0()(64bit)libtalloc.so.2()(64bit)libtevent.so.0()(64bit)libtime-basic-samba4.so()(64bit)libutil-setid-samba4.so()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)samba-client3.0.4-14.6.0-14.0-15.2-14.11.12-12.oe14.15.1bb D@b[@a@a@azawav@`8@_/@_`_L@_*@gaihuiying - 4.11.12-12gaihuiying - 4.11.12-11gaihuiying - 4.11.12-10gaihuiying - 4.11.12-9xihaochen - 4.11.12-8majun - 4.11.12-7chxssg - 4.11.12-6gaihuiying - 4.11.12-5gaihuiying - 4.11.12-4xihaochen - 4.11.12-3liulong - 4.11.12-2yuboyun - 4.11.12-1yuboyun - 4.11.6-8- Type:CVE - CVE:CVE-2021-3670 - SUG:NA - DESC:backport to fix CVE-2021-3670- Type:cves - ID:CVE-2022-0366 - SUG:NA - DESC:backport to fix CVE-2022-0366- Type:cves - ID:CVE-2021-44142 - SUG:NA - DESC:backport to fix CVE-2021-44142- Type:cves - ID:CVE-2021-43566 - SUG:NA - DESC:backport patches to fix CVE-2021-43566: s3/lib: add parent_smb_fname function smbd: use parent_smb_fname in check_parent_access smbd: use parent_smb_fname in inherit_new_acl s3/VFS: Add SMB_VFS_MKDIRAT vfs_full_audit: pass conn to smb_fname_str_do_log s3/VFS: change connection_struct cwd_fname to cwd_fsp s3/smbd: Change mkdir_internal to call SMB_VFS_MKDIRAT smbd: use parent_smb_fname in mkdir_internal fix CVE-2021-43566- Type:cves - ID:CVE-2020-25718,CVE-2020-25719,CVE-2020-25721,CVE-2020-25722,CVE-2016-2124,CVE-2021-3738 - SUG:NA - DESC:fix CVE-2020-25718,CVE-2020-25719,CVE-2020-25721,CVE-2020-25722,CVE-2016-2124,CVE-2021-3738- Type:cves - ID:CVE-2020-25717 - SUG:NA - DESC:fix CVE-2020-25717- Type:cves - ID:CVE-2020-14318 CVE-2020-14323 CVE-2020-14383 - SUG:NA - DESC:fix CVE-2020-14318 CVE-2020-14323 CVE-2020-14383- Type:cves - ID:CVE-2021-3671 - SUG:NA - DESC:fix CVE-2021-3671- Type:cves - ID:CVE-2020-27840 CVE-2021-20277 CVE-2021-20254 - SUG:NA - DESC:fix CVE-2020-27840 CVE-2021-20277 CVE-2021-20254- Type:requirement - CVE:NA - SUG:NA - DESC:add samba-help dependency for samba- Type:cves - ID:CVE-2020-1472 - SUG:NA - DESC:fix CVE-2020-1472- Type:NA - ID:NA - SUG:NA - DESC:update to 4.11.12- Type:cves - ID:CVE-2020-10730 CVE-2020-10745 CVE-2020-14303 CVE-2020-10760 - SUG:NA - DESC:fix CVE-2020-10730CVE-2020-10745CVE-2020-14303CVE-2020-10760/bin/sh/bin/shobs-worker-backend-test-0001 16564766714.11.12-12.oe14.11.12-12.oe1smbspool_krb5_wrapper/usr/libexec/samba/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/ea51d460fa32995775a948a3841fe002-sambacpioxz2x86_64-openEuler-linux-gnuELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=4b7926126bdfcfbcbcda6fada270a86f7333ef7f, strippedRRRRRRRRRR RRRRRRR RRRRRRRRR R R RR"KGև%9ւutf-861412883f69365ebf2d93a065e67fd7f9312d96cc11f4e954606dc3478a9b22a?7zXZ !#,:Sn] b2u gG/ aw0dMzy9dyZWZu̙,MVE I֯1Vju\o :ES6Ps?Z;-l=xJ%h%Sc}h6Sy,h0(Vw?C6FѺORѽQ-`vt NH>M)ߧ:av5)٨Gg Z[4\XE c$# EFEӛ,xn&oi96L* i`bc*V^~.PM{뾬WD""ȥAel;vb ׍_wi!! aneuΧӶ(JSi:j VyGAƲ,hvAYxfn Z;*gc|p0z:JP1Ƌ[]*ACvh^.DSk,ԋ"g0kɫ87yhݼEd'΃C|)KC+)wlnk:,\(87%7.SFf^9-DAzSe7m,2j4),Hf:47ѵKB͞'W,LP-զڿÌHH#D BQNW`|Z&' xWMK7|ЗGʋu.Xٗi"d KBujJ)"" :=~=Lx+|LÚfX75 _0Q҃]q[^TE 62{WE6"1ztgj =y,RIЅ-%hwgBW`!fPD'BYЙBU)䔮a"ĭ!)Bvb_wLEKk0GC&vE~XFDA5qwab?7Vh*9$1ou.fV݊g. W9(]' Dggs/vQxyF:,~o1z):?Ϋfˠ1RC>q'o= '_7;G[xV qQt)Ap @fVcuu<5 dPDrWʋ" UGL4 QAzT yJOojI},P}Ef G22‘+T}IeZ^5ի4O|^0d:*#tDD/Gp*){0|O]P WO1b|(eě$>=eDGZxJ)O|:+6la@6$I>6c |)Y!k1oX ;{|; uP|/PԀs2doGq6T$5[3 D4&+혳F g#W/jm4ݼ!6CϏ4 :@<~e:yn6V>W4..ǯ(Z`92bx5b,=WhPyi 6t>̰Wٚ17y5aY. jWϳ ,jHÂ2)msuF%(ڈ!|Y̅{amҵA~&GfyG NSAL@^:#9ՠL)sT4#fR67셶2(L*2z8C&w"gb@=o e<4r fșƮ,}ioi{RP:3EU3,Go|3fW< cT,bŖA3{@AәQ yϊڵ^ ?2C'Cm2!~=p=N;[9:3u \Q.HlY *'i?nr*?Vo: >Y#!v ^r9ٱQV)er#!Vp02 pr>5,PlglB뉶7]GUM0}Q $-՝z$);BUW319gCs y9X0C~Tp/'1yvVn;y~AS/TM[noKfkkbf'yi/!*֒%0iy O6VbF'd~埃_sJTm X嚙kB2e/3"TS+Hǎ[b@#͎*I%iӷK 彰3${04f'3kx!tΌ YZ