bind-license-32:9.16.23-11.oe2203 >  A cGgW^^f3m^vl¤cpWU_H5jy .mMK` e=j&YuʵQn}bHY+U4nȂ ȒCYkb&ru^q8fr̷ Jv}ΞS<څ_h202959834fff31c4c51b594eb84459929e1edebed9b7b7b166be2d5cd596181fae21e264ffe845a18acf8228928466d2446feb8b3cGgW^^fo@ۈVWE:4(3'@UnuG2=lm l]vN~ezHKݲ["SM# ,P$lU:Οl9[`so<^g_FA;Q{Ts(k.\mc[^&9pKaj֝*E)7bpB{eU5֓22HhMݑS,;yZ0|T =!:^D4L`+2eJ>p>#?#d$ ( Fpt $ ( , 4 v x?([8d9:F G H I X Y \!]!^!'b!^c"^d"e"f"l"t"u"v"z#####`#dCbind-license9.16.2311.oe2203 License of the BIND DNS suiteContains license of the BIND DNS suite.c4obs-worker-backend-test-x86-0006HXHuawei openEulerhttp://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxnoarchHXA큤c4a^1e451f21d07fc644af7518618f396bc9a7fb123d597b7500d13719a871139070rootrootrootrootbind-9.16.23-11.oe2203.src.rpmbind-license    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.17.0c5c47@cM@bT@bDF@baaZ@aeaa@aaya /```@`t6@`t6@`m`H`Gc@`3_@_@_ǁ_ huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9jiangheng - 9.16.23-8jiangheng - 9.16.23-7jiangheng - 9.16.23-6jiangheng - 9.16.23-5jiangheng - 9.16.23-4jiangheng - 9.16.23-3jiangheng - 9.16.23-2jiangheng - 9.16.23-1jiangheng - 9.11.21-4.h9jiangheng - 9.11.21-4.h8jiangheng - 9.11.21-4.h7jiangheng - 9.11.21-4.h6jiangheng - 9.11.21-4.h5jiangheng - 9.11.21-4.h4zhujunhao - 9.11.21-4.h3jiangheng - 9.11.21-4.h2jiangheng - 9.11.21-4.h1zhouyihang - 9.11.4-17.h11yuboyun - 9.11.4-17.h10zhouyihang - 9.11.4-17.h9zhouyihang - 9.11.4-17.h8xihaochen - 9.11.4-17.h7yuboyun - 9.11.4-17.h6yuboyun - 9.11.4-17.h5- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC:fix CVE-2022-2881 CVE-2022-2906 CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080- DESC: fix downgrade bind-utils conflict bind-dnssec-doc- Type:CVE - CVE:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - CVE:CVE-2022-0396 - SUG:NA - DESC:fix CVE-2022-0396- Type:bugfix - CVE:NA - SUG:NA - DESC:limit number of test threads to reduce test execution time- Type:bugfix - CVE:NA - SUG:NA - DESC:add systemd buildrequire- Type:bugfix - CVE:NA - SUG:NA - DESC:remove not enabled option in named.conf- Type:bugfix - CVE:NA - SUG:NA - DESC:remove set-timeout-inteval-of-some-cases-to-600s.patch specify ISC_TASK_WORKERS value to fix some test cases execute time too long- Type:bugfix - CVE:NA - SUG:NA - DESC:set timeout inteval of some cases to 600s- DESC:update to 9.16.23- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:bugfix - CVE:NA - SUG:NA - DESC:give zspill its own lock fix tasan error fix data race Correctly encode LOC records with non integer negative isc_ratelimiter needs to hold a reference to its task dig +bufsize=0 failed to disable EDNS as a side effect Lock access to ctx->blocked as it is updated by multiple threads Only read dns_master_indent and dns_master_indentstr in named Defer read of zl->server and zl->reconfig Break lock order loop by sending TAT in an event Handle DNS_R_NCACHENXRRSET in fetch_callback_{dnskey,validator}() Unload a zone if a transfer breaks its SOA record Address inconsistencies in checking added RRsets dns_rdata_tostruct() should reject rdata with DNS_RDATA_UPDATE set- Type:bugfix - CVE: - SUG:NA - DESC:set print-time default to yes- Type:CVE - CVE:CVE-2021-25214 CVE-2021-25215 - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:bugfix - CVE:NA - SUG:NA - DESC:fix no response when execute rndc addzone command- Type:bugfix - CVE:NA - SUG:NA - DESC:remove GeoIP and libdb- Type:bugfix - CVE:NA - SUG:NA - DESC:fix the upgrade installtion failure- Type:bugfix - CVE:NA - SUG:NA - DESC:update version to 9.11.21-4.h1- Type:bugfix - CVE:NA - SUG:NA - DESC:set geoip-use-ecs default to no- Type:bugfix - CVE:NA - SUG:NA - DESC:free rbuf mempool didn t work for sizes less than sizeof void Reset dig exit code after a TCP connection is establ Prevent a race after zone load Fix isc_buffer_copyregion for auto reallocated buffe free tmpzonename and restart_master errors initalizing badcaches were not caught or clea set freed pointers to NULL cleanup allocated memory on error Fix a small memleak in delv pass the correct object to cfg_obj_log Try to fix crash at sigchase topdown Do not fail on NULL passed to OpenSSL_free error out if there are extra command line options correct errno to result translation properly detect period as last character in filename fail if ctime output is truncted Fix a race in fctx_cancelquery add missing MAYBE_UNLOCK Fix race in unix socket code when closing a socket t fix Ed448 length values for precomputed ASN.1 prefix don t overwrite the dns_master_loadfile result befor address NULL pointer dereferences address potential NULL pointer dereference Prevent query loops for misbehaving servers Lock di manager buffer_lock before accessing b Request exclusive access when crashing via fatal Assign fctx client when fctx is created rather when lock access to fctx nqueries acquire task lock before calling push_readyq for tas Call dns_dbiterator_destroy earlier to prevent poten Handle catopen errors Fixed crash when querying for non existing domain in Fixed rebinding protection bug when using forwarder initialize sockaddrdscp to prevent spurious output f Lock access to answer to silence TSAN Fix a data access race in resolver Address race between zone_maintenance and dns_zone_s rbtdb cleanup_dead_nodes should ignore alive nodes o make sure new_zone_lock is locked before unlocking i Prevent crash on dst initialization failure IPSECKEY require non zero length public keys NSEC3PARAM check that saltlen is consistent with the A6 return FORMERR in fromwire if bits are non zero Cast the original rcode to dns_ttl_t when setting ex Lock on msg SELECT_POKE_CLOSE as it triggers a tsan Lock access when updating reading manager epoll_even Take complete ownership of aclp before calling destr Take complete ownership of validatorp before calling Address lock order inversion It appears that you can t change what you are pollin counter used was read without the lock being held Missing locks in ns_lwresd_shutdown Use atomics to update counters Obtain a lock on the quota structure The node lock was released too early Address lock order inversion between the keytable an Pause dbiterator to release rwlock to prevent lock o Address lock order reversals when shutting down a vi Hold qid lock when calling deref_portentry as Lock zone before calling zone_namerd_tostr Address TSAN error between dns_rbt_findnode and subt Address data race in dns_stats_detach over reference Lock check of DNS_ZONEFLG_EXITING flag- Type:CVE - CVE:CVE-2020-8625 - SUG:NA - DESC:fix CVE-2020-8625- Type:CVE - CVE:CVE-2020-8619 - SUG:NA - DESC:fix CVE-2020-8619- Type:CVE - CVE:CVE-2020-8624 - SUG:NA - DESC:fix CVE-2020-8624- Type:bugfix - CVE:NA - SUG:restart - DESC:fix the difference at the macro definition using clock gettime instead of gettimeofday- Type:CVE - CVE:CVE-2020-8623 - SUG:restart - DESC:fix CVE-2020-8623obs-worker-backend-test-x86-0006 166440960032:9.16.23-11.oe2203bind-licenseCOPYRIGHT/usr/share/licenses//usr/share/licenses/bind-license/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/b85be3c30e196ac6526f2b4ebecae089-bindcpioxz2x86_64-openEuler-linux-gnudirectoryISO-8859 text͒KcU[utf-8e74601218cb92ded43d845ad8fb3cf05cdd0cb8222ea6e8f5d09a7ca89de5646dc2574cc7fdc143344f997964d5fdfe9a5f4f2a44457edc10ba6b7afebc5b38a? 7zXZ !#,I ] b2u jӫ`(y.> 6ƾhQ[d=QG/b.' F|p"jo"N ӽc8AYGN +GV&aԙ*0a֜WECBB䁫+Gb]@N gv;La}l^bc'{f?B*F_& m]mX]GôYt$$T<8NVZP[KVM-L`p*?&dQ}(s3eaIDQafLY-*^m83*H4Jj1fʤp2DYٽ!kDm>Oc,*&@ýMĄ͕QyYu |Y2-.r]3 V|@tb7ib1݄0 ߮w.W^V ,;SgFBA\ tp q>Ctjө{O{>@Ph?vH_s.qcwZSH7/6L\롧oڽ^<^nLsN82rj)1i(CK!;Xۯ715oN͋ Bq]V{{JQTK78p ӯ^-a+|VV%Rp8 SȁĔ*SMi>,AĀ iGrO\+"X1A (Q,pww5KN5[5vPAsLOlinX'2zo-dz`ȓ:  CS m׉mȪrÁ@Z)ZY0S}0ÃWZL1/^!x+kȌAAi]H6d L5ZtD!BF¡tE.o8v_#?Ffd٤MSuy$EhA3F8A (̃)1SNiIizx l`'i~EQ婌bQ=( $E%<+}F~wOB/e2PQ nCx@TCy6\}#r@q6$kMGsCc404=s#'))۳B晹t>t¼. U%8z߾i5 3S@b^f(=oa-9j\з^Vm"(" v3trL~L c؃u*T:N|H6G/5?Kܻ]oLw~GJ1;7~ ʁ<)Ǎ<[:%jȠ/th _O ,^1>%.U[f+9K"c.sܠdjb*J'YQKOڜrM-_1.LwyU/;[Źv ,:Tҫ]"W`ʿJ6 HZ5`y~1d.&YDGZOz% {n5UdJ }^%CqW_{ÑۅG\:>xy܀: 4o4x]qp$pk]y' CX%xA}e:͚g"rx= Xj]\7b}{ /## D0A""%QzhJL.Jfuy Yv|#JHLgvq 4o8>wg)mjAdžHkR8༭&xiڡky_Uq&Qkh bj}yLhZC oh}z$<۽0[::=N%TrヘJ{8׉&g8lM{Z> l{% yT{Ķb H]2_d,Csnx(clHTM=G?c @X ~`+1D—?߅b=JB49?S}2qp(1Y݋C?GuUBIQI[@0H]OcC*Y 9dOC iix  /9=KީܳCc荩o~17QrV+yۅ4mk9eu׺@xW,]M]J|cSn`\aYO^>tq.CW|`ܔT 4H n8>M繨20֍ۧo()搛@4 _l\bT ~߅#pF|aggt+'>8i,'(M̉m8VF)TdCTq]W[M: s4s$BӒח~WC \s`:ͩ`->up&3y>{F嚆Tڹ̸FaޣQV;4Vm9Ӎq@q{\^\@~J&FJ\ TT[;B"8[oaCS7:7<_"F+b}4rpζy*DC)O$ĀӔ D*HlLRKNzc8^exg(t Ndx;DFHpؾtť4޳E̼ \3v3 +O)㕪5Q?(z?Qd8G־!#U@f xe&O ـnMwV[FVɰ3ڒUs$0>1ase^ S< *~4Z:0h偓>*Ff,s£sdƋ/TEQ҅YHDEK+)`D"4]ݑ#C[BC'bbvoZw`N\kNǰb>JD%t3DM_DW ųE* YZ