tomcat-jsvc-1:9.0.10-21.oe1 >  A aeZW^^f&3)5o"Qf -{*aUdPI9p/ˏ)vM^2>Z]~zصWq/Nb/)OH()Ȇg[uPEȝP>9CƒѢWTڏr/y]9$U.gݏ`PyZE*g5 GF4}IRQ1 .+ӪThR~ekpiBkW NjKj7e + I-55c5bfd8f57092ca9084999dd3efb9ee977950dbeb6fdda03f31f139507537f7843499662cb7cd037b3a485ec4e15113b37264f0aeZW^^fqx<F$n6¹_/v71˂y ^xS!7=bbW6QuRzجKzie Ȩ5~N'R4(;y=wd&Sp= ? d  Z$(Shp      8(8 9D :M F BG `H lI xX |Y \ ] ^ b c d ^e cf fl ht u v z     Ctomcat-jsvc9.0.1021.oe1Apache jsvc wrapper for Apache Tomcat as separate serviceSystemd service to start tomcat with jsvc, which allows tomcat to perform some privileged operations (e.g. bind to a port < 1024) and then switch identity to a non-privileged user.aeYobs-worker-0016 openEuler:20.03:LTS:SP2 / standard_aarch64http://openeuler.orgASL 2.0http://openeuler.orgUnspecifiedhttp://tomcat.apache.org/linuxnoarchaeZaeZaeZ123093c36e3e48cc620d9f18d87d1bba82079dc3f47b378e390675acf9ae0df9d0ac947eb01462b0058ee723b2f3772eee765af7f1b06f08873f2c4c69832977e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855rootroottomcatrootroottomcattomcat-9.0.10-21.oe1.src.rpmconfig(tomcat-jsvc)tomcat-jsvc    apache-commons-daemon-jsvcconfig(tomcat-jsvc)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)tomcat1:9.0.10-21.oe13.0.4-14.6.0-14.0-15.2-11:9.0.10-21.oe14.15.1aa@a@`i@`KW`.V_԰_ǁ_X^@^>@^Yhouyingchao - 1:9.0.10-21wangyue - 1:9.0.10-20wangyue - 1:9.0.10-19wangyue - 1:9.0.10-18wangxiao - 1:9.0.10-17zhanghua - 1:9.0.10-16jialei - 1:9.0.10-15wangxiao - 1:9.0.10-14huanghaitao - 1:9.0.10-13Guoshuai Sun - 1:9.0.10-12Senlin Xia - 1:9.0.10-11- Fix CVE-2021-41079- Fix CVE-2021-30640- Fix CVE-2021-33037- Type:cve - ID: CVE-2021-25122 CVE-2021-25329 - SUG:restart - DESC: fix CVE-2021-25122 CVE-2021-25329- Type:cve - ID: CVE-2021-24122 - SUG:restart - DESC: fix CVE-2021-24122- Type:cve - ID: CVE-2020-17527 - SUG:restart - DESC: fix CVE-2020-17527- Type:cves - ID: CVE-2020-13943 - SUG:restart - DESC: fix CVE-2020-13943- Type:cves - ID: CVE-2020-9484 CVE-2020-11996 CVE-2020-13934 CVE-2020-13935 - SUG:restart - DESC: fix CVE-2020-9484 CVE-2020-11996 CVE-2020-13934 CVE-2020-13935- Type:cves - ID: CVE-2019-17563 CVE-2019-12418 CVE-2020-1935 CVE-2020-1938 - SUG:restart - DESC: fix CVE-2019-17563 CVE-2019-12418CVE-2020-1935 CVE-2020-1938- Add install require ecj package- Package initobs-worker-0016 16340318741:9.0.10-21.oe11:9.0.10-21.oe1tomcattomcat-jsvc.servicecatalina.out/etc/logrotate.d//usr/lib/systemd/system//var/log/tomcat/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:20.03:LTS:SP2/standard_aarch64/3bee00e625a87b2ac0a4fe459e752e1d-tomcatcpioxz2noarch-openEuler-linux-gnuASCII textemptyamQutf-849c9ced4bdc840cd4596545ec7a140fa9a5c07254b86734f04b4975a9b2ed77c?07zXZ !#,7T] b2u Q{MūMU(zO1ǭMߨd&nj ,^u+:L3^c2='[KK,xܼ kՠ3CaJ$+ħfzS*e"ת1_lQ_Y/bu!<P;wڴ}:y* SM]*bE;]*`堞: >I&w2S,S-/mM5GC,˃m!jfHmnFɘe*od%{ݖH< NVI@N@VԼ璃I.Xp=aƜ@5Ba^#Kv4(Ng%/*@# 1f-pǥաM[j0m=4`|nS[ = U܋W͚ P$O0oS]!O/2O~k_`/^zhkQKEqX1a}B!j!>yɽ&3i*q:&k͇= !]O6KoeeκfV񑡓$mϛǴiau ., YZ