bind-chroot-32:9.11.21-3.oe1 >  A _W^^fFCmW0#~`Àr¡ӊp2Z0a+3t3dl=7I<6& "ߘ5Nf;uYPo@@7B'QXw j#/@0Hj^q)?^!pHpe۫ܨBW66,/c޴$uԝ{.>dU9#(8*Y#jTFrQ2:[{>=CV+IM.98ba8547ab3a6c4b5f7e62b05503f53267b2ced638eecf34998ec02105033e548bf7a32bf02fdda48cbe6d3f215c3e2c3890f992$_W^^f $B30U0;,B@2cрY0qkT>c:5stFߎ~sS32~bI#D(}%#1/宲\pI8?(d  c 48bw Sh   @ [ |s  ,    ( 8 9 : > ? @ F G H,IJXY\]t^_ b~cdefltuvw@xyz,$Cbind-chroot9.11.213.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak _şecs-obsworker-202jopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA _ȕ_ȕ_ȕ_ȕ_Ȍ_Ȍ_Ȍ_ȗ_ȗ_ȗ_ȗ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍ_Ȍbce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-3.oe1.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-3.oe132:9.11.21-3.oe13.0.4-14.6.0-14.0-15.2-14.15.1_м@_ts@_D@^s^] @hanzhijun - 9.11.21-3yuanxin - 9.11.21-2gaihuiying - 9.11.21-1songnannan - 9.11.4-13openEuler Buildteam - 9.11.4-12- Type:bugfix - ID:NA - SUG:NA - DESC:Fix the difference at the macro definition using clock gettime instead of gettimeofda- Type:CVE - ID:CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch - SUG:NA - DESC:fix CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch- Type:requirement - ID:NA - SUG:NA - DESC:update bind version to 9.11.21- add gdb in buildrequires- Package init/bin/sh/bin/sh/bin/shecs-obsworker-202 1607583135 /var/named/chroot32:9.11.21-3.oe132:9.11.21-3.oe132:9.11.21-3.oe1    named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/6d3010ebfa9d75edc428ec2a94d5f1c1-bindcpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyROa_I,%/P[if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-823dbf85134a8935c041e397b919d802bd6f13cb763ededf10f7f37eb3001afd8?p7zXZ !#,?] b2u Q{K Keg^>%}ӗ)1 6LXMσ]GS.ߘ[jIT焤I,Bo(`<<U!Mʻ[Jݚ\93`q%Y^ɕwW6FҎ¶zQYuXg7rgTW+i}02ðC;&Ppedi{^. kξIғ rTBrȻ]⥔Gc>?!ћ:_Iǎ[Pf˕,-V0oR:-n'䆮Bkُ5P%6h:A-P4|B% Hm/0/PZN I[1/%ĒLȌų⢺b~[q-F?>S w)ApЫ9&4t# t`!5rVEZf uLd@+o r>bmAj*$mGCTkb*_vmqsѹ\Prַhxn48]:FO9f?davmʸo|XpG]CtSqʹ#}yTf)P.KnJ#l]R  li,KO`48&GL;v FWtZ !2!$h.~ |0%[[ydڣb%9cYth] ';Ҽj8Y"yO n[Bo!iF/c.r2ӿ52\:#pZ@d[7]a1b`'Z3rV#oZAC!3krn" #_$"TG#ŤJNX-Ee84D^C7Pi|Y"X9jUj1tnR\$6szV>$>`3L +W@\S&-*)f1aUPb +dh Tڇl'\%hF"%=+|^(O %X5ψRAm>^GmQX nEvv߉yh[4؎+!ϯ ڰA=W D= l +PTJvf6'lҬvcz` ~Mկʟ&z>*ć7%x*8sw~UD_ǵ:vuW*M7(WC RV ϗr-AUKM, }=s D@>QލM`J!ʳm |Y++coqk"iEM0\IH G"2{%dPxgH͒T,4C9)iOl) 6)|5M0 ^5ERr%6-Ox:`JllM$irW b^e d5; 1!C@]G~\k/~=3[ߪ]/)qM0ijvAS| 05!ߤX<"Bɦփ7,1g;^DX 'Snbi 5hAl? 'Li@}t`ho"*i=_Plf>>35  YZ