bind-chroot-32:9.11.21-7.oe1 >  A `cZW^^fGZSZ_7 nKHCrnS" w߁J%牲k 4iD{QBliK'A8uܴrA~fn5ztoagQܻN$ht1X4ƞ.b4ГUDZpGl(QQ&|5lkLD$Y Dn\7*^rD}X\7.T_[4h6g$]7a990645c999e4409fc3b1d9735ee66c296427d6f0d15580ac4ac9481d1f7c3a59df2bc1436158d862a2e6808875029af7be6ab5c4)0`cZW^^ftyoV"UŨv;#b8HXMXa4L餂5 v5uLnsntᏼxmx+ ;> v42[؋ B7Ǿ -ňb A HfL8FPjDNb Ukfll>S)myN~jRQ\ep]5Ftr܆h=F5 eךIp,_1/ bK YXؔm  m58C揉TH$8>pI?d  c 04_t| Ql   T      T   g ( 8 9 : z >?$@,F4GPHI8JUXhYt\]^bcd+e0f3l5tTuv<wxytzx*48>Cbind-chroot9.11.217.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak ``obs-worker-0013openEuler:20.03:LTS:SP2 / standard_aarch64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxaarch64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA `cP`cP`b`b`b`b`b`b`b`cP`cP`cP`cP`b`b`b`b`b`b`b`b`b`b`b`b`b`b`b`b29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6306f047e72a2c8eb97f8be7cbbbef20b513ddb8bd595888609dc25f712fe5edbbce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-7.oe1.src.rpmbind-chrootbind-chroot(aarch-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-7.oe132:9.11.21-7.oe13.0.4-14.6.0-14.0-15.2-14.15.1`8@`KW`.V__м@_ts@_D@^s^] @jiangheng - 9.11.21-7yanan - 9.11.21-6liulong - 9.11.21-5gaihuiying - 9.11.21-4hanzhijun - 9.11.21-3yuanxin - 9.11.21-2gaihuiying - 9.11.21-1songnannan - 9.11.4-13openEuler Buildteam - 9.11.4-12- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:enhancement - ID:NA - SUG:NA - DESC:remove useless bind-sdb package- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2020-8625- Type:requirement - ID:NA - SUG:NA - DESC:remove GeoIP and libdb dependency- Type:bugfix - ID:NA - SUG:NA - DESC:Fix the difference at the macro definition using clock gettime instead of gettimeofda- Type:CVE - ID:CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch - SUG:NA - DESC:fix CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch- Type:requirement - ID:NA - SUG:NA - DESC:update bind version to 9.11.21- add gdb in buildrequires- Package init/bin/sh/bin/sh/bin/shobs-worker-0013 1624465618 /var/named/chroot32:9.11.21-7.oe132:9.11.21-7.oe132:9.11.21-7.oe1 0-metadata_list-compact_tlv-bind-chroot-9.11.21-7.oe1.aarch640-metadata_list-compact-bind-chroot-9.11.21-7.oe1.aarch64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP2/standard_aarch64/9f60b8b48b8574a4e22f68058bced379-bindcpioxz2aarch64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyR9*@"+Byif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-8957d22bb06e0457cd5f658ec4510b9601470ba6c0bc372c1fa825ecef15e77d2?p7zXZ !#,$7 ] b2u Q{LQkHeQ"5-Q|ׇXټ99\7hBw2:v PD?b T%~}5٣k Frt9GSp|NəLDdC;P&STDQ/us[gYN!/ 0vA#Ӊck Uo&-jp){?"=bzۖ!]rʉi⛮#[adE% 6?ؼFI_7-A(&~4ùkNMUS}^-G6-%i|b&KSNCjjW<*_QtQxX?m=EIZc`ާ O9#;/iihː2˜r&;nwwE+UM@4{ Ҡ2؄ݼ]!ZND(%>%81ػZcO#KT\ܙKnChO˃%xUf~\dq PW AxJXHnK[ln½fg bp!R;YBeAv;['cKLOwpGë́ڝdI4mIa9zG(;KjPmXkͰI]FϐV׭p(5!'΀S 6漏ܓ4%}-y=5ׅt^x[H%HH ;Y*msFfLoN(KJ/ul2>mhή]}˂"͟b޳tµ-ll1lD[/ y! J6PRL6QD_/8yՊNU+(1$9/'Ӆ)G>, JEef°j ğ0akl$T*ףMm Gq(s]*P7Q1VSZ;l}~1G8<&n8ȸ^|~NVʮt4 ;iA,D՚-bxaJC1YV/a_iK2qez{к WZ%2{.$mJdX8idM]$vg:PDx?$+EYpC.Aln 4q 71)ĻT2.*j0F uRatʘMqIND b#|=qw}L ŵƞA㨦dЕuE2K2(LKԒ"iٜvO|yO3{oSOSC$>zҗ[dCfD-s[s_9*nѤnxah6„:@GSqcZ ѝ„㚖n}$YAsWzvzx.ΪK Y[S:G1&S^xxBgEKC0!(ԠeP ۗEi],.U+F3 @dMunyYգ BWG,8xa"YF$i,.lr2*ӏQ !Y|_t߲H/w|N^ff#҄gTf{ !9:*? 2FH$Vk2nfN]#`-CNמz=M -ri\B[cf=FjOsYjp (0jDAc); %neau?}MK   ee4lhEB7I_l*_h$/aqRIR/i}JAG,5*L|ٗ-37XYGmm7ɷ}.;Ob.&-Yl}#πI.gS$}:O[5vt9 "9g8s==tPOvT%-CRo]x5:vP؏B;ǰo wCF7Ʒaa!3ґM-(aiׄZfK%%K23 ]p4Wn")y/n $G͵swx˳,l`xTpiC-sed[*4?p f Nڶ gX% K0D91ƭT¦QlJCt,h) 1xGq8 E>/??@ 7Ut<6NLusQGQQbARrFs0&:Pr,?f^-rYysK),GxlB:]]Ugy-lym,l RN6³OrE -ܶ޹/%b4DD$GK]ߺHn44_M/yv @ƒj ;w]WB@J$gy^"Mrx4Zڎ~r(>۰!q[{xxf".6zr73F/P\?H}  YZ