bind-license-32:9.16.23-8.oe2203 >  A bVɃW^^fZa= d;~(Ϳ7~ȵ$t4dVlK%ZZ#d5SM䧍'Tr{50WZ͍Uul؎n*Icݓ+Z+{uu4uzLlӯzM!L^esYVAf|r!1놭‚vy %2] \q,)?p>#?#d  $ Blp     $ , n px7(S8\9:F G H I X Y \!]!^!'b!^c"^d"e"f"l"t"u"v"z#####`#dCbind-license9.16.238.oe2203 License of the BIND DNS suiteContains license of the BIND DNS suite.bSoobs-worker1639015616-x86-0004HXHuawei openEulerhttp://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxnoarchHXA큤bSoa^1e451f21d07fc644af7518618f396bc9a7fb123d597b7500d13719a871139070rootrootrootrootbind-9.16.23-8.oe2203.src.rpmbind-license    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.17.0bT@bDF@baaZ@aeaa@aaya /```@`t6@`t6@`m`H`Gc@`3_@_@_ǁ_ _i@_a@^y^ϧjiangheng - 9.16.23-8jiangheng - 9.16.23-7jiangheng - 9.16.23-6jiangheng - 9.16.23-5jiangheng - 9.16.23-4jiangheng - 9.16.23-3jiangheng - 9.16.23-2jiangheng - 9.16.23-1jiangheng - 9.11.21-4.h9jiangheng - 9.11.21-4.h8jiangheng - 9.11.21-4.h7jiangheng - 9.11.21-4.h6jiangheng - 9.11.21-4.h5jiangheng - 9.11.21-4.h4zhujunhao - 9.11.21-4.h3jiangheng - 9.11.21-4.h2jiangheng - 9.11.21-4.h1zhouyihang - 9.11.4-17.h11yuboyun - 9.11.4-17.h10zhouyihang - 9.11.4-17.h9zhouyihang - 9.11.4-17.h8xihaochen - 9.11.4-17.h7yuboyun - 9.11.4-17.h6yuboyun - 9.11.4-17.h5yuboyun - 9.11.4-17.h4yuboyun - 9.11.4-17.h3gaihuiying - 9.11.4-17.h2gaihuiying - 9.11.4-17.h1- Type:CVE - CVE:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - CVE:CVE-2022-0396 - SUG:NA - DESC:fix CVE-2022-0396- Type:bugfix - CVE:NA - SUG:NA - DESC:limit number of test threads to reduce test execution time- Type:bugfix - CVE:NA - SUG:NA - DESC:add systemd buildrequire- Type:bugfix - CVE:NA - SUG:NA - DESC:remove not enabled option in named.conf- Type:bugfix - CVE:NA - SUG:NA - DESC:remove set-timeout-inteval-of-some-cases-to-600s.patch specify ISC_TASK_WORKERS value to fix some test cases execute time too long- Type:bugfix - CVE:NA - SUG:NA - DESC:set timeout inteval of some cases to 600s- DESC:update to 9.16.23- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:bugfix - CVE:NA - SUG:NA - DESC:give zspill its own lock fix tasan error fix data race Correctly encode LOC records with non integer negative isc_ratelimiter needs to hold a reference to its task dig +bufsize=0 failed to disable EDNS as a side effect Lock access to ctx->blocked as it is updated by multiple threads Only read dns_master_indent and dns_master_indentstr in named Defer read of zl->server and zl->reconfig Break lock order loop by sending TAT in an event Handle DNS_R_NCACHENXRRSET in fetch_callback_{dnskey,validator}() Unload a zone if a transfer breaks its SOA record Address inconsistencies in checking added RRsets dns_rdata_tostruct() should reject rdata with DNS_RDATA_UPDATE set- Type:bugfix - CVE: - SUG:NA - DESC:set print-time default to yes- Type:CVE - CVE:CVE-2021-25214 CVE-2021-25215 - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:bugfix - CVE:NA - SUG:NA - DESC:fix no response when execute rndc addzone command- Type:bugfix - CVE:NA - SUG:NA - DESC:remove GeoIP and libdb- Type:bugfix - CVE:NA - SUG:NA - DESC:fix the upgrade installtion failure- Type:bugfix - CVE:NA - SUG:NA - DESC:update version to 9.11.21-4.h1- Type:bugfix - CVE:NA - SUG:NA - DESC:set geoip-use-ecs default to no- Type:bugfix - CVE:NA - SUG:NA - DESC:free rbuf mempool didn t work for sizes less than sizeof void Reset dig exit code after a TCP connection is establ Prevent a race after zone load Fix isc_buffer_copyregion for auto reallocated buffe free tmpzonename and restart_master errors initalizing badcaches were not caught or clea set freed pointers to NULL cleanup allocated memory on error Fix a small memleak in delv pass the correct object to cfg_obj_log Try to fix crash at sigchase topdown Do not fail on NULL passed to OpenSSL_free error out if there are extra command line options correct errno to result translation properly detect period as last character in filename fail if ctime output is truncted Fix a race in fctx_cancelquery add missing MAYBE_UNLOCK Fix race in unix socket code when closing a socket t fix Ed448 length values for precomputed ASN.1 prefix don t overwrite the dns_master_loadfile result befor address NULL pointer dereferences address potential NULL pointer dereference Prevent query loops for misbehaving servers Lock di manager buffer_lock before accessing b Request exclusive access when crashing via fatal Assign fctx client when fctx is created rather when lock access to fctx nqueries acquire task lock before calling push_readyq for tas Call dns_dbiterator_destroy earlier to prevent poten Handle catopen errors Fixed crash when querying for non existing domain in Fixed rebinding protection bug when using forwarder initialize sockaddrdscp to prevent spurious output f Lock access to answer to silence TSAN Fix a data access race in resolver Address race between zone_maintenance and dns_zone_s rbtdb cleanup_dead_nodes should ignore alive nodes o make sure new_zone_lock is locked before unlocking i Prevent crash on dst initialization failure IPSECKEY require non zero length public keys NSEC3PARAM check that saltlen is consistent with the A6 return FORMERR in fromwire if bits are non zero Cast the original rcode to dns_ttl_t when setting ex Lock on msg SELECT_POKE_CLOSE as it triggers a tsan Lock access when updating reading manager epoll_even Take complete ownership of aclp before calling destr Take complete ownership of validatorp before calling Address lock order inversion It appears that you can t change what you are pollin counter used was read without the lock being held Missing locks in ns_lwresd_shutdown Use atomics to update counters Obtain a lock on the quota structure The node lock was released too early Address lock order inversion between the keytable an Pause dbiterator to release rwlock to prevent lock o Address lock order reversals when shutting down a vi Hold qid lock when calling deref_portentry as Lock zone before calling zone_namerd_tostr Address TSAN error between dns_rbt_findnode and subt Address data race in dns_stats_detach over reference Lock check of DNS_ZONEFLG_EXITING flag- Type:CVE - CVE:CVE-2020-8625 - SUG:NA - DESC:fix CVE-2020-8625- Type:CVE - CVE:CVE-2020-8619 - SUG:NA - DESC:fix CVE-2020-8619- Type:CVE - CVE:CVE-2020-8624 - SUG:NA - DESC:fix CVE-2020-8624- Type:bugfix - CVE:NA - SUG:restart - DESC:fix the difference at the macro definition using clock gettime instead of gettimeofday- Type:CVE - CVE:CVE-2020-8623 - SUG:restart - DESC:fix CVE-2020-8623- Type:CVE - CVE:CVE-2020-8622 - SUG:NA - DESC:add %patch6032 -p1 to fix CVE-2020-8622- Type:CVE - CVE:CVE-2020-8622 - SUG:restart - DESC:fix CVE-2020-8622- Type:cves - ID:CVE-2018-5744 CVE-2019-6467 CVE-2019-6471 CVE-2019-6477 - SUG:restart - DESC:backport patch to fix CVE-2018-5744 CVE-2019-6467 CVE-2019-6471 CVE-2019-6477- Type:cves - ID:CVE-2020-8616 CVE-2020-8617 - SUG:restart - DESC:backport patch to fix CVE-2020-8616 CVE-2020-8617obs-worker1639015616-x86-0004 164963520032:9.16.23-8.oe2203bind-licenseCOPYRIGHT/usr/share/licenses//usr/share/licenses/bind-license/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:22.03:LTS/standard_x86_64/35222b59e42ad6657429df79b31634a3-bindcpioxz2x86_64-openEuler-linux-gnudirectoryISO-8859 textm04Xb7utf-86efb860e19573005493b10d70b88c8bb62d3d9fea372d46425c4feae29de51a91b66d2e2469bd00bf82e90c48443c20c9033eb1819affada1c574fd8001d276f? 7zXZ !#,I ] b2u jӫ`(y-Y"˽;PWΜ࣓/A%y [ ![d/m$ жݕBsċb"kl5W @WZ*_+ɅJLvW4.6.ff")\Kqp-D}R;K+H/:O8WeNn[UD_uEgnnI˵F` es(1oxDbJ1A0cݍrh>jq h61 +V Xd5 Og|?8 ":&X۱R(gLS.DU܋;or01!3BpJ>yR6BI/ 9|Rc[2z>b1[UbǕ΁[&k뼊"I6^N]LH~QE$.y?7-_NPJ^4?bF>jfL`/4Li,ʉvYP$ Fy}OVYLb 4=/)d$#Jt4}[rU;‘-2LN'p/ 4(`^?ܭ.v^5ðKOWaMVt>t%w!q($ahЎeByÒΘ UV!s %_w/w Er Uɱ.I߰użWƩY==mN6bFRyY?TNOWk(s' kuH Ѷ_q8h1DAyѨ )ٕj2l>N<& ؙ0)ׁnn~"P˭O&LKv׮D(}OYMw(2C6mm)"r:r&~y;\紧)NL-OW}ӣpTi!WJAn;q19 :Yryeg`/6%[́1>D"F#=up? |?MdۥGA֨)c-Tsl̻=3ȏ2JWau\x#vtcQI2?am#ݤ ]i妭jbœ0~6BZ9a֓K$|i Y:` jP#N4,2Dt0C M|o0=7H !L k7bV /ף" @Xo@f)^EXjVu@&8NA&.v07=!-ap 9HN䀮_g r+jTfRI~XaǙ"wn`FgVZՃ{(g10!]sω |(R-x@Ro.K̈jD|:%CAEQ#T*V\a"75{3 JC=!R̄5fHTִyГ"SҏBќ$u!MBe*wmC_#EJVsu ҼqSBKjG$ l+/ o9{/ g'\="p7C~JAԨd*D$^a C/ců%lY|B,!CD0k⦴[# lK^pߗ;8qd!")DtXCp7Ԙ 9@1Y>фXZ5U%(AF:->?R^QK=^*-[q628Q$ې^!!ؚˋ>$utvL_y-n0rEekqJ)et˳|ʃ*GH5?.bb@IwxS3Zxh07 I僈1SME("\c,Rؑ)î[KMeS276zK{TR7QAUXa8<4ȧ/V|tqdv,%ںUcQ"hXőqw$;XYyzǺ 8ޞ?TTy͟sN-E~mA4Q{9yIy]JMfݩ_nmz1{UɸvSc}'56P|6zx[̞5cX։#]ևL6~Źy&g`\U.S!x72))A)@nX5䗺)Qr`hgex܈4<$B@C(#b<O]{FpDFc٭i4 `&Oa5^"-%&PiSrrBBȊdW-߉t^#?<)g6 >H ?XgNbvy@wЇPAXF:R[4h+j,~ӏ *@Ba|ߢR*Ɵ~*ِFIWۡVwYH#?g~ \֫b9!H$T]9kN[$EONFl%jĽ]g:GV|| Ӡ0v,- ƌI{ʌ@恣B8fF .ĄC 3WO'oP7h YZ