bind-chroot-32:9.11.21-9.oe1 >  A a/W^^fPh*\b/3/M|W#{n;XL0oĠR |jv;s=YFh>̷ZUoc}/>!.qϗ<{?bMgdf[+׊H4d6jR/{P LuI%MO^,Cnbj*h!.KË-~2Tھ+bFF 5!סٖ e#Cl{Xst -2oEϬe*7cb4187dc029a8e65bb8dd9ca7ca6e82e16a7ed9378dbda5288a4b03d65629da1e1ca99d199e8738243841c312b5489812f1c58ff2&a/W^^fug?Cy \._N^-#ye!C",lao?8(oJ=f# fY"ʼn y|u/ _MB΄И:ת xCYzB8z4!¤H{\B=e,"0D,Y[δkK@iglfmU>rWg(n`=V6bq.ƞKJ oWJ?nߍ:=#ʶHaХʝ@>pI?d  c 48bw Sh   @ [ |s  ,    ( 8 9 :  >;?C@KFSGtHILJgX|Y\](^ b2c>defltu,vwxTyzvCbind-chroot9.11.219.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak aecs-obsworker-0018jopenEuler:20.03:LTS:SP1 / standard_x86_64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA aaaaaaaaaaaaaaaaaaaaaaaaaaabce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-9.oe1.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-9.oe132:9.11.21-9.oe13.0.4-14.6.0-14.0-15.2-14.15.1aK``8@`8@`KW`.V_м@_ts@_D@^s^] @jiangheng - 9.11.21-9jiangheng - 9.11.21-8jiangheng - 9.11.21-7jiangheng - 9.11.21-6yanan - 9.11.21-5liulong - 9.11.21-4hanzhijun - 9.11.21-3yuanxin - 9.11.21-2gaihuiying - 9.11.21-1songnannan - 9.11.4-13openEuler Buildteam - 9.11.4-12- Type:CVE - ID:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:bugfix - ID:NA - SUG:NA - DESC:remove gdb buildrequires- Type:bugfix - ID:NA - SUG:NA - DESC:remove unnecessary dependencies- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:enhancement - ID:NA - SUG:NA - DESC:remove useless bind-sdb package- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2020-8625- Type:bugfix - ID:NA - SUG:NA - DESC:Fix the difference at the macro definition using clock gettime instead of gettimeofda- Type:CVE - ID:CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch - SUG:NA - DESC:fix CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch- Type:requirement - ID:NA - SUG:NA - DESC:update bind version to 9.11.21- add gdb in buildrequires- Package init/bin/sh/bin/sh/bin/shecs-obsworker-0018 1638894557 /var/named/chroot32:9.11.21-9.oe132:9.11.21-9.oe132:9.11.21-9.oe1    named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/openEuler/openEuler-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP1/standard_x86_64/e2ffef81ea6f2bfa87160f6a7d465ab9-bindcpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRPWj=1'T6?q=>Bif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-8fbe40ec22477551a4c381d43ffd3410171c131267ff48aea39dd6f33fbe139e9?p7zXZ !#,?] b2u Q{Ll,"fW}F\εZw>hlN4rm+LRk wO~|aWM+hJ {_2x>q>f2 JuRvGۇq : udS?0V^RgDc}[P }e7:umG64Ӫ/ǒ ysix;a9&|/0{!@&eM.bGs:`7Øn7I4-$f荨2^(!,lKHW?4g6^fN2tlz. x8EW02 S}vVQMŞ9w]/e9̹(4 ]TWMR-U[Z S-nIeP:Nb 39K"!^Rr(fMG\8vLtou{b4RNEz[ 5-%nr co1Wc7#E[ASGδR'_UD|3&S3kk$RXf@Vti{Q:@e]U.iKZ> ^JJ9#|G"8Wd) ȱdZ5F W Z>.dF#Nimy×ĕuYkei&?Z^:_X]R?N8+ >?ЯOR1~X" ëA;i2ʍfeu xM2iR v!ޣ^Hb&ΰ^+ O0qӃ̜$9ە&K˳B,FǓ6IKa*A%킌 18ؔP+!Drl5laфԼRMa~VXՕm|?Y`:Ve]? Ew8U^) ^+Q)"b,^yx=n-lj!6k!9ZOpzqai 3h1ߣ6hr'krەYO<+\q$-DC6G Zm8|Yt %}~SpvEҁ$⩺Р=`WZLK~{@/Jf<uGӞDEen,I0Y3(DŃ7,^|WmlvmQ2b0eR ;dDق&@`h n{X`KW-]Ua9K lV;96KUPW ˬHAT䰫\I)u+!*m !(3Ƅǘ:G\"wZEdHRleZk$j6ĄAk¾<0l) TW9w_83Sd)1BLզ]g%Q{D6 hg]{r}?I{祄^m%.top鞠M'D1Ⱥ[9 WXr0tvE.4G3vr'T>5;?ۣȞh2+DZCx.x7 Էɩ%]P<3RzMOVM"xN+<\egaўnWp\ >>K4_1˱S]]:&ʄF|0 zpg+VYB9̋H/;/֟Sy@ɌX.O<* ww/#>&d3/v|N)8lM?oLtTP|h6: } O~vtYbVehCf^2F 2a5x]b=TS_¹\꣧( F- 〔Vioϕ̧wZ;aK@%8p55P]aB# 3 iǹհ]?w/;+AqF/UZvd2@O`_UXx1\mԡFw/H4 6&|)LB !A!1ֽ29U"-GP#uX bCTg.+@j ni |ʾD,,In0w~n1=0ݹ\.VfE>FO!{4såpFLz!Unc?R.k>#l YZ