bind-chroot-32:9.11.21-4.oe1 >  A `7`W^^f@+b O>iu#1Xe"Z;[4鿌w:&a]C@~e*V'H\1v0p]_΁xHgE 1܇? ӓrTR#%IjX-X_ Vh=P}se3Ďt H_AZ .z$3m?p〾Rny/V*[hd3HJ6I~ I e66a1738aed336da36e31ca9e35a13889ef9d7db1304538507270d871d82c7081a21f013501624c2bcc70fdd090850789603487b$`7`W^^f(9$|Q ^X=F|2_iFXO-FO2wA>mz!ְqc=[0adm0^* a==upI?d  c 48bw Sh   @ [ |s  ,    ( 8 9 : *> ? @ FG(HIJX0Y<\p]^ bcd[e`fcletuvXwxyz6@DJCbind-chroot9.11.214.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak `7]Cecs-obsworker-0008jopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA `7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7``7`bce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-4.oe1.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-4.oe132:9.11.21-4.oe13.0.4-14.6.0-14.0-15.2-14.15.1`.V_м@_ts@_D@^s^] @liulong - 9.11.21-4hanzhijun - 9.11.21-3yuanxin - 9.11.21-2gaihuiying - 9.11.21-1songnannan - 9.11.4-13openEuler Buildteam - 9.11.4-12- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2020-8625- Type:bugfix - ID:NA - SUG:NA - DESC:Fix the difference at the macro definition using clock gettime instead of gettimeofda- Type:CVE - ID:CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch - SUG:NA - DESC:fix CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch- Type:requirement - ID:NA - SUG:NA - DESC:update bind version to 9.11.21- add gdb in buildrequires- Package init/bin/sh/bin/sh/bin/shecs-obsworker-0008 1614241091 /var/named/chroot32:9.11.21-4.oe132:9.11.21-4.oe132:9.11.21-4.oe1    named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/1c9db5001811c50f4437a3b8a96b7e0d-bindcpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyR5{w jmT{m*if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-8174b90015d1d002532c21b3744dea75cca4e15eb329d988c2fdb168448416386?p7zXZ !#,?] b2u Q{LP! 0/V߮^$iiDSī|B.y(cINt(a8Ig~ mx2l/MwЂr'tߝAD. vbz[uz k T+L|gPP)Qi 8"3<#JGE$")~z2هYɒ_+wJFKSw* 3EG" CjДv FQY剐`(s ВoҘZc^\#h4/'I̭xv[K'yCK5+P+0D2OpbPW*iL<0F&wayPI"#T62*0֢@~͇YHQV'L^kxc]Zb Y73ڛ(HH3̎'τow]៺٨%{$7C{iR9]v7(" OGҥ/qTY.Gw)g0'$~wSh-QpUU6Q9$p VmcCW|)tK8^qs]:UϪPm_jrʱ^~_oɕ>pyr)=38ĩ럟;FK&*P!}6rP\::X`•+wDu)YàM9 /)U-%D_d+A9bY̶';A\'u-`HqGf 1kVGW4_ Us>7[r^ޝV${ SA"I #gnAQLl?!LZ{iL=jэ Oq Òk0Ө[k04<ڤPg=d{FC$ޕ&FW)JT<ΓE4ݐؔ⾯|5JFq +kv0%eA%P8hH2_sRgy:ȖF{G\QB ٮvYD_z4@Hb>2Ɣ(\4(•py;n/21 qY ϺY$)hh\p销B32[f2N֡ SV,c6\ϩc߿Y'$ rj/Τw ]]]mx@E. = XΡM>tBZ ,>HK4&Vaԁ ЧĐ^,%%3 Y^Mɶb:mAq qTƘwpxԓN~>o`/k3B; ["22C}2}y*hy;{cp;;Ӊ'&ZaǕ=[nQP=J7v@7q8>B)ϸZ3H^Nm;xJ\mۢ :ׂճFk,Sc-+]$(?6 ]HPIrmU1΂\j0 stk(O51שwC_!%}xd;pE8"*`ek кF+Aˤ3J2)ˏ΍b7n_ͲiBPx3m +,Uo6h~?{$uk䗈 GDU:BqVl:;e(G @ , CB]筍\{"!#h(u0uK}(q YZ