tomcat-jsvc-1:9.0.10-18.oe1 >  @ `hW^^fl!JGO* U">s4*@ҬBeOzNȫp!AN1%Vؒ±p/SZɆV oþ`ՒiF/~(p"x<%ǾB;P~l)2|BZt Ne,%*ő3eY$34DMd1fYHeе+Rx OIbdEg:,jqQu?Wk;,VA)9= J+J9e6db050899aeddd187f2f550f72e8f38eac6173a3f81929ff9a323e7fe5ac7216aa4bfb06a5335cac2e4d6c7a7505694796bf3e9d`hW^^fU+ u;ąj_!}^J{A{doߏcMVz{p= ? d  Z$(Shp     9 @To(89:tF *G HH \I pX xY \ ] ^ Rb c d e f l t 0u Dv Xz j |   Ctomcat-jsvc9.0.1018.oe1Apache jsvc wrapper for Apache Tomcat as separate serviceSystemd service to start tomcat with jsvc, which allows tomcat to perform some privileged operations (e.g. bind to a port < 1024) and then switch identity to a non-privileged user.`gobs-worker-0018VopenEuler:20.03:LTS:SP2 / standard_aarch64http://openeuler.orgASL 2.0http://openeuler.orgUnspecifiedhttp://tomcat.apache.org/linuxnoarch``h`h`h`h`h5c293f3e6e3e26fcc81412cedac5702372dc3d73085b55c53ea7edbf88c7cd41eea8ab99a1bac4de6deff5cc202639370961e3e61c4bdad04ed038ab491a4d01123093c36e3e48cc620d9f18d87d1bba82079dc3f47b378e390675acf9ae0df9d0ac947eb01462b0058ee723b2f3772eee765af7f1b06f08873f2c4c69832977e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855rootrootrootroottomcatrootrootrootroottomcattomcat-9.0.10-18.oe1.src.rpmconfig(tomcat-jsvc)tomcat-jsvc    apache-commons-daemon-jsvcconfig(tomcat-jsvc)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)tomcat1:9.0.10-18.oe13.0.4-14.6.0-14.0-15.2-11:9.0.10-18.oe14.15.1`KW`.V_԰_ǁ_X^@^>@^Ywangyue - 1:9.0.10-18wangxiao - 1:9.0.10-17zhanghua - 1:9.0.10-16jialei - 1:9.0.10-15wangxiao - 1:9.0.10-14huanghaitao - 1:9.0.10-13Guoshuai Sun - 1:9.0.10-12Senlin Xia - 1:9.0.10-11- Type:cve - ID: CVE-2021-25122 CVE-2021-25329 - SUG:restart - DESC: fix CVE-2021-25122 CVE-2021-25329- Type:cve - ID: CVE-2021-24122 - SUG:restart - DESC: fix CVE-2021-24122- Type:cve - ID: CVE-2020-17527 - SUG:restart - DESC: fix CVE-2020-17527- Type:cves - ID: CVE-2020-13943 - SUG:restart - DESC: fix CVE-2020-13943- Type:cves - ID: CVE-2020-9484 CVE-2020-11996 CVE-2020-13934 CVE-2020-13935 - SUG:restart - DESC: fix CVE-2020-9484 CVE-2020-11996 CVE-2020-13934 CVE-2020-13935- Type:cves - ID: CVE-2019-17563 CVE-2019-12418 CVE-2020-1935 CVE-2020-1938 - SUG:restart - DESC: fix CVE-2019-17563 CVE-2019-12418CVE-2020-1935 CVE-2020-1938- Add install require ecj package- Package initobs-worker-0018 16244674061:9.0.10-18.oe11:9.0.10-18.oe10-metadata_list-compact_tlv-tomcat-jsvc-9.0.10-18.oe1.noarch0-metadata_list-compact-tomcat-jsvc-9.0.10-18.oe1.noarchtomcattomcat-jsvc.servicecatalina.out/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc/logrotate.d//usr/lib/systemd/system//var/log/tomcat/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP2/standard_aarch64/00c96e682ab8720866fa7541c0880ebb-tomcatcpioxz2noarch-openEuler-linux-gnuASCII textempty$ [utf-89f9d10e235c236b55d5ca6eabf07363e224a0dffe0e28aa9f5d6c365bf4e04b5?07zXZ !#, M] b2u Q{LQo/-wj rl1,{=e݁l$W'fg)6Csw^6S/@w7,%8Bc(o"`5k2#jO97oޘN zv F}aK9@R PgKם//* U:xT-ঌ-A0H6ty,'fPO.)$_"\j,[eVLD01<((lt I~xػ&pwm^$QyK`<أQ䈦N88ه Jqo"Lo[}(Öv[@:H&9܊I}SD_41nPn Հzg = Ljv*|eT:؛ʄ]~`+1lx+I閛QW:7[/l]R4pxey`D9j9ʪcUi~{.h6X3JMa`F|;ZRT/h,]>R}N.Oڻ\z!p{(lŭOiL\rJ(,wIZko71~q] ' 9"}hf{{~XACe0 YZ