bind-chroot-32:9.11.21-18.oe1 >  A eW^^f<c> `yN*N.Դ]ucn1o`]5^!ͅL%LzsEE&#yj"¤~~Be03:?v0cO<.ݻS̎9ohpj|dWDV|g`1GĢS+_zTO״e+ķyf>iSx#"ŹPm}fy ba2e4ffd9b877d6bf502b9e8a62828dbead4778354d1cd97bc73bdcf5dd1c3989c71cf3a7d11743a3346ee8152e7a3ad33e2091c&eW^^fi`qAA􅐤@1-g Uc5V\z[5OsrY p|dqtX+U8QS8KmX` d΂)l: xR+Ag=,IX/(QV]r~;%yz|JQ/VhkڨW }G ΅[*(A*3"/ ŗ`vQ!h44v? {Bᘛ/ 8T[` cs+p/ 1/}*|n6'p)$@>pI?d  $ g $8<f{ [p   H c {  4     ( 8 9 $ :  >n?v@~FGHI|JXY\]\^G bfcrdefltu`vwxyzCbind-chroot9.11.2118.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak eecs-obsworker-209jopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA eLeLeLeLeAeAeAe e e e eAeAeAeAeAeAeAeAeAeAeAeAeAeAeAeAbce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-18.oe1.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-18.oe132:9.11.21-18.oe13.0.4-14.6.0-14.0-15.2-14.15.1ee@d}cD @c*cAc@b_bDF@aKzhanghao - 32:9.11.21-18zhanghao - 32:9.11.21-17zhanghao - 32:9.11.21-16huangyu - 32:9.11.21-15huangyu - 32:9.11.21-14jiangheng - 32:9.11.21-13jiangheng - 32:9.11.21-12jiangheng - 9.11.21-11jiangheng - 9.11.21-10jiangheng - 9.11.21-9- Type:CVE - ID:CVE-2023-3341 - SUG:NA - DESC:update CVE-2023-3341 patch- Type:CVE - ID:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:CVE - ID:CVE-2023-2828 - SUG:NA - DESC:fix CVE-2023-2828- Type:CVE - ID:CVE-2022-2906 CVE-2022-2881 CVE-2022-2795 CVE-2022-38178 CVE-2022-38177 - SUG:NA - DESC:fix CVE-2022-2906 CVE-2022-2881 CVE-2022-2795 CVE-2022-38178 CVE-2022-38177- Type:bugfix - ID:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:bugfix - ID:NA - SUG:NA - DESC:backport some patches from community- Type:bugfix - ID:NA - SUG:NA - DESC:remove GeoIP dependency remove obsolete patch- Type:bugfix - ID:NA - SUG:NA - DESC:add selinux-policy-targeted requires- Type:CVE - ID:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - ID:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219/bin/sh/bin/sh/bin/shecs-obsworker-209 1695745738 /var/named/chroot32:9.11.21-18.oe132:9.11.21-18.oe132:9.11.21-18.oe1    named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/4995a8ecddec13863f3364b896bd0eee-bindcpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRdad&sgj if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-8625796f3bfbfb20621ee941fc51c53a7995fc4eb79574155f78fb44e41814300?p7zXZ !#,?] b2u Q{LWXd@by N-aGLrhX2@9S(<>6]Q(K$U#<a} ]f:.j"O>:#K"\ #&8/ĠOeTS"2[<Zͱߎ9fY1M*TNp/}kGkBȳpy)ҥ=U{@]j*'E*$.4$X*beMu5ФL@{l|<`xX⌠/H> ch (,[˱3+4xK&{HOn|BKKQ2 &uW8[!$'KgCbUx!]igKU{VVG\a7B*/lcLH+~;*b!mݮ+KfdK9ycL`j_v:ILB#fnlWPP#/afKM__)|j Rl'"=fbdFtK  0~Ay?r5(Z`ʮ%Skl'R 1 xc.MpUG!"~ `\h8o1Գ ֺelQ~|ӳ”j>5+^ſȓ^ .ﭜk ^sX/- `4f^m HdJ^&˓x<郮HW(?H麞VyL.K2bwJ- v1ߓ}9M%d LGh0UR_si<>VfHH(ͣHg,٣|7Md[|`59Ff|9Uf|Kd/HⲚYeD|5Z9fču(Y0Cf_L/iD(F̀c-ǎc'~J I ʶ7z=Faw2A8BvW|Vہ)`PhEx7- Y~=M!"}Lq{vP @R'H?! Oqf.T%1VRops@YeEsԣX5F߸|m`'38(Ss&A"I^dN>eAջQ7F2Ybqߖߊ~osoU^g$A:{KߊV#l YZ