bind-chroot-32:9.11.21-9.oe1 >  A aW^^fF_l{bH-yq[7޴TK1Q:8U9=ô>vDk%J 0jz& OlBA4L ;"nŗ{l.b?zuIlϘ>4JyDpuOnH~e~,3OW>^c6 X'Л0@WSjiq#_5т3O4ڄM&@>pI?d  c 48bw Sh   @ [ |s  ,    ( 8 9 : >C?K@SF[GxHIPJkXY\],^ b6c6defltu$vwxLyznx|Cbind-chroot9.11.219.oe1 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak aBecs-obsworker-206jopenEuler:20.03:LTS:SP2 / standard_x86_64http://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA aaaaa|a|a|aaaaa|a|a|a|a|a|a|a|a|a|a|a|a|a|a|a|bce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-9.oe1.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-9.oe132:9.11.21-9.oe13.0.4-14.6.0-14.0-15.2-14.15.1a@``8@`KW`.V__м@_ts@_D@^s^] @jiangheng - 9.11.21-9jiangheng - 9.11.21-8jiangheng - 9.11.21-7yanan - 9.11.21-6liulong - 9.11.21-5gaihuiying - 9.11.21-4hanzhijun - 9.11.21-3yuanxin - 9.11.21-2gaihuiying - 9.11.21-1songnannan - 9.11.4-13openEuler Buildteam - 9.11.4-12- Type:CVE - ID:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:bugfix - ID:NA - SUG:NA - DESC:remove gdb buildrequires- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:enhancement - ID:NA - SUG:NA - DESC:remove useless bind-sdb package- Type:CVE - ID:NA - SUG:NA - DESC:fix CVE-2020-8625- Type:requirement - ID:NA - SUG:NA - DESC:remove GeoIP and libdb dependency- Type:bugfix - ID:NA - SUG:NA - DESC:Fix the difference at the macro definition using clock gettime instead of gettimeofda- Type:CVE - ID:CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch - SUG:NA - DESC:fix CVE-2020-8622.patch CVE-2020-8623.patch CVE-2020-8624.patch- Type:requirement - ID:NA - SUG:NA - DESC:update bind version to 9.11.21- add gdb in buildrequires- Package init/bin/sh/bin/sh/bin/shecs-obsworker-206 1638894914 /var/named/chroot32:9.11.21-9.oe132:9.11.21-9.oe132:9.11.21-9.oe1    named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP2/standard_x86_64/2d683c76499b5f178c6a28bcdcd9eece-bindcpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyR*L\N Gif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-86cf9623eea460b36bb8ec913ad23d13eb769d1acf44f0ffc4c164fc1da8b67b4?p7zXZ !#,?] b2u Q{Ll,"FJxe nD&_Yso]^okYM DuQn97A*^UQQRϙ@y'=oų$zCܨ֭"{ ΚCrr3Myo1\SpO6/]vXBkPW~kΪ' u^OK .Dք# @לaްR|8tЕ nИ11ɽvs)8hZaP(*GrV1Tm4[w}ԅj:ʮBx*X1mZMDY8yYZEX'(ݻu*XYᏏ̠?yᵭKnۢ@˂%ӠW@(3,0tq&\j %qߴRƮ2FHQ4]`Z%"˪KLh֯ #VD0W4z$R,N-0RK;rs?V {cVzXgѕ;v&!2n5隤!ąS}'\Ƕ>D bxdі+Znv@EJ3j܇$ypZWn}v\+/jNyW G%f '$?ȩоal(wJܽyKtW K]bI;܊ N:E{vznbgQ__oGK]r+Dxv,Xfj-!W{n5#\` IEW+h#uXac (wMhyz.݀<:j'snv1:271 2{gz̮*C@prg6hQ27ͺk]T4#&[x ,PoPJ9I㱞TIf iU<8Ydēl^͎c;jMPb#w=Yճ ZؤXMn倿uX±:OP>4ˏGQӊLhz«=clAL~X| *<哏pVE`ޢH[Uy~'1J;Ni;DOteٍK2.Vޢb6]詁~kLscbŘfkw$Xl360vpQ̈́ԏQm3\C<L@R5!筻i^ht f̏ RpߦOL9 9pm:UX(d9k&#_B+8Fߕ"Td[8TMsi'˟hmysuCH%^J5˛hdzONЉۖ)@?4WͿ׾ G8ߎ]x1i#3tWO ޽Z`xJ+.Ŧ ȯ쎇;Q޵g8Bzt8c'-!MЈw:\!d~0Ƌy `Җ*G0+4:x3< lXi|vmK?!9D #:F#< bYmv50':X^&nDR pA<ڒ,W}[#~:4uk.guJLR2-?j\&6]a.S SyKW x,^ 3Dy67m6%@}(X5=t^ˬkP}x3q:#ۇn*2w*{_cO?ic Y9Q=]LtRm?@t|\2T&F *ML\J^* a@=wn0vO_7]־w" J-bl"*XWe ˨ 9,!Fv7k r\|hߕ̒ 4o40a7W؀9 o<_qn;S^`%nؠ#9I\.{Ms\{5ik_%!#l YZ