bind-chroot-32:9.16.23-18.el9_4.1> M Mv ĉJ4!!%joLne)Ip-Bm5 ']f1releng@rockylinux.org p-Bm5 '] uRteG`9NnUL)(|i3Z畚snmh53EezB*޲W&w!Hc$+b;AtF$^U) &؟Bb} Q瑺8}:5*|hkOgcv\nUZ1 7ڧFOKsGqWÇptgO W" &[X=SDG<ӈAkkr*CrVx_m5ǶGMɀZ*Y`RWO8) 46J17*`lb9?_؎b%bшmKR zsu6U>j/'0Rk0n܅ʳO]Ȣ+C;>(V:-hwINI4 PΫBm8B*@EHr6;#BTE?ĸz4R}'M|z38687f5f8c49b34cb1e6834ca77fe14b797b349a87cbc2c6301979c58d0376b6c5380686a2e5071ae5e5ed51dc28fdccc8b4e8cd/YM"w`Nz]:r)">G!?!d$ ( k$(\`p !!! !  ! ! ! ! p! !  ! x   ( 8 9 4:>?@G!H`!I!JXY$\h!]!^bdeflt!u!vwl!x!y t x!!$!(!.!p!tCbind-chroot9.16.2318.el9_4.1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak f1Lpb-79bb7e01-f4c2-41f5-ac8b-da75607936e1-b-ppc64leRocky Linux 9.4Rocky Enterprise Software FoundationMPLv2.0Rocky Linux Build System (Peridot) Unspecifiedhttps://www.isc.org/downloads/bind/linuxppc64le if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAAACA f1tf1tf1tf1tf1^f1^f1f1f1f1f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^f1^2be082b8958381ea6413eeed42028c97893c58570692e79eb9f49fdfabc302a467eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd62da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootrootnamednamednamednamednamedbind-9.16.23-18.el9_4.1.src.rpmbind-chrootbind-chroot(ppc-64)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(ppc-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.16.23-18.el9_4.132:9.16.23-18.el9_4.13.0.4-14.6.0-14.0-15.4.18-14.16.1.3fg@fg@eBe@eqe d}dc@c@ccGc< @c< @c,N@b@bT@Petr Menšík - 32:9.16.23-18.1Petr Menšík - 32:9.16.23-18Petr Menšík - 32:9.16.23-17Petr Menšík - 32:9.16.23-16Petr Menšík - 32:9.16.23-15Petr Menšík - 32:9.16.23-14Petr Menšík - 32:9.16.23-13Petr Menšík - 32:9.16.23-12Petr Menšík - 32:9.16.23-11Petr Menšík - 32:9.16.23-10Petr Menšík - 32:9.16.23-9Petr Menšík - 32:9.16.23-8Petr Menšík - 32:9.16.23-7Petr Menšík - 32:9.16.23-6Petr Menšík - 32:9.16.23-5Petr Menšík - 32:9.16.23-4Petr Menšík - 32:9.16.23-3- Rebuild with correct z-stream tag again- Prevent crashing at masterformat system test (CVE-2023-6516)- Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387- Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868)- Update addresses of b.root-servers.net (RHEL-18188)- Limit the amount of recursion possible in control channel (CVE-2023-3341)- Prevent possible endless loop when refreshing stale data (CVE-2023-2911)- Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828)- Correct backport issue in statistics rendering fix (#2126912)- Handle subtle difference between upstream and rhel (CVE-2022-3094)- Prevent flooding with UPDATE requests (CVE-2022-3094) - Handle RRSIG queries when server-stale is active (CVE-2022-3736) - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924)- Correct regression preventing bind-dyndb-ldap build (#2162795)- Prevent freeing zone during statistics rendering (#2101712)- Bound the amount of work performed for delegations (CVE-2022-2795) - Add /usr/lib64/named to bind-chroot (#2129466)- Fix possible serve-stale related crash (CVE-2022-3080) - Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)- Export bind-doc package (#2104863)- Tighten cache protection against record from forwarders (CVE-2021-25220) - Include test of forwarders/bin/sh/bin/sh/bin/sh  !/var/named/chroot32:9.16.23-18.el9_4.132:9.16.23-18.el9_4.132:9.16.23-18.el9_4.1   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindnamedGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mcpu=power9 -mtune=power9 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19ppc64le-redhat-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8fd5c68e4770180debba065c5eec73c69748f7cc05c9a007e47b0664a323ba1f5bcb4965f86d549d977b7458544d2874aa0a8401c2bd086ef78ec207029dd232c?(/h]HY-x \!JT |+,uS찡{E*ՙ*NMq;+Z9= (##tC%o+ ZQWC6 aL\{Y4 N WGjJ*d[KvFJH*='XOƪة>ӄiLb^|'.Q_Nz6ʩ}\%bĤ(}ML unDeG im>my]F2Ҿx*<4˧̕*Şvaj** ed!x_*MSkV`>˚q%uem/%aY /tߕ+$nWC1XD6eQbuDz$_auQ` REU 0#ج۬An9S3<.  : [IMf5YkԅjbiIRi%21D0ATY%̮2ǜv._gUó}|v8k8XPRɞO'Ȑ\ {V}"#>^Po㳝| BSZJD8 TI@U̻HXb&[hyﲈ@b=0[֞<m,z[G:C#Emybݻj{8P>(SL{ YF {D}|:{YkN2cYªn'Cƪ"p &UjS镧IW[y~5kGN{Mo Oד:|䧗f}9T& ~&7UYQV4bthdh$)H ʘ"4q%P ∈H@$)((7`؍iE_\&m-0 or:F.Blf L8N9ƪRhr-v9 ١8#MB`F/j*ハcY>)pXhM'C9e:vzyI$1iN:jp6iVM¶W<ICfbY$~=O,b@W4"l-XljZ?U[eپ> +O 2ή8%_$t.kOb("]M_!!/$-(hzL<5*āw8N^ 6X7>p3& '؝qUeNLmc&Y_U `ҧt7' h\cd0$dy'nI럦4g&sF<,nMo,lbֆ7(F0#9#;aa"4w5e5) F2|^ X̪de-rN%k*#Ba_0{D+8i`@2S9K-";wRW 1 N wW9nTNP3q+<4]79l6t07 Ɲؕ**Gc̛\Elu [z#M4 _A1{ֈЯu0v4480#(>) ҃a_BWdXU'y]] 2t3th؂3pOOUv8+rR[AKf qB1K\vQ>X $q'cWTJ$ۺ(ѶF">H>C Swe {r:5j:Y$Qsq~rE%O_3JeMb=C$I(5šʬ@ހ `