bind-chroot-32:9.11.21-7.oe1 >  A `kW^^fb1>.Cj1C|վﺨ Ǽ ʪc^֎`}ƮKvGRW1UU *K2Ⱦ GU c2;(U;!qQ)vuGH a܄;zڡkwȕ$8>pI?d  c 48bw Sp   X   !   X   g ( 8 9 : z >?$@,F4GTHI<JYXlYx\] ^bcdAeFfIlKthuvPwxyz>HLRCbind-chroot9.11.217.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak `iecs-obsworker-204openEuler:20.03:LTS:SP2 / standard_x86_64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA `k`k`k `k `k `k `k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k`k29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6306f047e72a2c8eb97f8be7cbbbef20b513ddb8bd595888609dc25f712fe5edbbce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-7.oe1.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-7.oe132:9.11.21-7.oe13.0.4-14.6.0-14.0-15.2-14.15.1`8@`KW`.V__м@_ts@_D@^s^] @jiangheng - 9.11.21-7yanan - 9.11.21-6liulong - 9.11.21-5gaihuiying - 9.11.21-4hanzhijun - 9.11.21-3yuanxin - 9.11.21-2gaihuiying - 9.11.21-1songnannan - 9.11.4-13openEuler Buildteam - 9.11.4-12- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:enhancement - ID:NA - SUG:NA - DESC:remove useless bind-sdb package- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2020-8625- Type:requirement - ID:NA - SUG:NA - DESC:remove GeoIP and libdb dependency- Type:bugfix - ID:NA - SUG:NA - DESC:Fix the difference at the macro definition using clock gettime instead of gettimeofda- Type:CVE - ID:CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch - SUG:NA - DESC:fix CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch- Type:requirement - ID:NA - SUG:NA - DESC:update bind version to 9.11.21- add gdb in buildrequires- Package init/bin/sh/bin/sh/bin/shecs-obsworker-204 1624467902 /var/named/chroot32:9.11.21-7.oe132:9.11.21-7.oe132:9.11.21-7.oe1 0-metadata_list-compact_tlv-bind-chroot-9.11.21-7.oe1.x86_640-metadata_list-compact-bind-chroot-9.11.21-7.oe1.x86_64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP2/standard_x86_64/9f60b8b48b8574a4e22f68058bced379-bindcpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRdk\>,Ua*if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-8f846757cf965155f35b1d192d34ad430734f3512d6d714002dddbffcefe45f6a?p7zXZ !#,$7 ] b2u Q{LQ}  `A1u +etjđPɩ'TmG(7ErS+%1="2|fʄmwGgUb?O*ܦNl`_'髟ofZ0jiQ[9Ђ$]vZ&-N,NѼ_X}ɎqɽS) h-x~a<8X"С^&\i+Xe&rl`"~ۑҎ;뽃tL?UhK7.oif~8+߉k~rMYwSgU'IB'Bj\?a`F{F.썏Gl~a 4H[;d^#YP,ˍJ~3l{ ,e_<;X\{ - O-:AȾk0(3>utfhRIGvm_:kr*FrD>L^C |p#+ %y8l&5["MI6^"6уPCfN2Do~<T= 00f_+[Y`^>1|Ә1`;wϞvw{@Sg-Mp z*6U 8ςbII"a۾.ƮOK$2\ R~KQ &[)m3*Hڌ_<7\7nRUkbec~9E [_sS>$kd-:!a# gNlO&ʃm|p|CGR\*Xz2`6p]x Q&lH"LcG}Wug; LXeI`OQ\Aj}h ק{;GG~n%d=7_X|8Qy9m\+;V/ էN.X<)%KbA.k [!&+k;xԮc0?? m9 ҏSh#ᎎÔaNĂ}l5~g#m[HoZ{D0 t&Rm=ZR'ۙX w`4Q~;"H&:듗\&"w?,0&M  GI2chB7::\Sؕ}!纃z@-HHRVVO ^HFw4EQ@,K1Fwi:FDƄ͜AvMth,g=Jpp+,&B,<1;* <)2|Թ*s)Gtt&=2e'~٢#~K h3Ȏ೵}+9߶ ӣ-l_4vTU) d CVl?aE0{=SC-3̘nK+Pqr)j*x+m7?:}>+T5 ={r α''pqfDZVӿ晓b]d}zuEX4BUJh; &S neAɟɮzavDpGߕ=ѩ=AwV1߀ܨ;eJyW P5v >XT\@pzj1b8 jr]›رyүGm61 c֏j h֛X3yj VL0E̱h%wp>ֹ`ҡ1s{)eѴ, =/fɆ'lK-TE&E0hZ<ϑ2q|ҊKvf̰FKz E Ӿ˄=yD^ʫSK 7Z t fgGuoOc6w]A,# nYܵhˏ>LſaPv8fF8F[y 9RF}*GTMNfͥj"nhP-nM@ei}wH`w3 YZ