tomcat-jsvc-1:9.0.10-20.oe1 >  A aMW^^fbb9>< ɓ!GR+s"vUzp55hYcnq`,ęYb[ %SC#N H D!T^cEŌ3SXH5SR>?&cf{_[3Un5+-VKծxGpp)`]XcJ )?)pov^~VQoU*ͭ RQ[g7)~k~.oq@uEҁb75dL08 aQKk 8=sz5tbT4$↧pMU6HCj^ [N_' ;AV:>|ɱtHȔ䒠Nb= >p= ? pd  Z(,Vks     = DXs(8 9 : F G H I X Y \ 0] D^ b Pc Pd e f l t u v z   $ * lCtomcat-jsvc9.0.1020.oe1Apache jsvc wrapper for Apache Tomcat as separate serviceSystemd service to start tomcat with jsvc, which allows tomcat to perform some privileged operations (e.g. bind to a port < 1024) and then switch identity to a non-privileged user.aecs-obsworker-0017VopenEuler:20.03:LTS:SP2 / standard_x86_64http://openeuler.orgASL 2.0http://openeuler.orgUnspecifiedhttp://tomcat.apache.org/linuxnoarch`aCaCa8a8a75c293f3e6e3e26fcc81412cedac5702372dc3d73085b55c53ea7edbf88c7cd41eea8ab99a1bac4de6deff5cc202639370961e3e61c4bdad04ed038ab491a4d01123093c36e3e48cc620d9f18d87d1bba82079dc3f47b378e390675acf9ae0df9d0ac947eb01462b0058ee723b2f3772eee765af7f1b06f08873f2c4c69832977e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855rootrootrootroottomcatrootrootrootroottomcattomcat-9.0.10-20.oe1.src.rpmconfig(tomcat-jsvc)tomcat-jsvc    apache-commons-daemon-jsvcconfig(tomcat-jsvc)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)tomcat1:9.0.10-20.oe13.0.4-14.6.0-14.0-15.2-11:9.0.10-20.oe14.15.1a@`i@`KW`.V_԰_ǁ_X^@^>@^Ywangyue - 1:9.0.10-20wangyue - 1:9.0.10-19wangyue - 1:9.0.10-18wangxiao - 1:9.0.10-17zhanghua - 1:9.0.10-16jialei - 1:9.0.10-15wangxiao - 1:9.0.10-14huanghaitao - 1:9.0.10-13Guoshuai Sun - 1:9.0.10-12Senlin Xia - 1:9.0.10-11- Fix CVE-2021-30640- Fix CVE-2021-33037- Type:cve - ID: CVE-2021-25122 CVE-2021-25329 - SUG:restart - DESC: fix CVE-2021-25122 CVE-2021-25329- Type:cve - ID: CVE-2021-24122 - SUG:restart - DESC: fix CVE-2021-24122- Type:cve - ID: CVE-2020-17527 - SUG:restart - DESC: fix CVE-2020-17527- Type:cves - ID: CVE-2020-13943 - SUG:restart - DESC: fix CVE-2020-13943- Type:cves - ID: CVE-2020-9484 CVE-2020-11996 CVE-2020-13934 CVE-2020-13935 - SUG:restart - DESC: fix CVE-2020-9484 CVE-2020-11996 CVE-2020-13934 CVE-2020-13935- Type:cves - ID: CVE-2019-17563 CVE-2019-12418 CVE-2020-1935 CVE-2020-1938 - SUG:restart - DESC: fix CVE-2019-17563 CVE-2019-12418CVE-2020-1935 CVE-2020-1938- Add install require ecj package- Package initecs-obsworker-0017 16279747981:9.0.10-20.oe11:9.0.10-20.oe10-metadata_list-compact_tlv-tomcat-jsvc-9.0.10-20.oe1.noarch0-metadata_list-compact-tomcat-jsvc-9.0.10-20.oe1.noarchtomcattomcat-jsvc.servicecatalina.out/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc/logrotate.d//usr/lib/systemd/system//var/log/tomcat/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection obs://private/openEuler:20.03:LTS:SP2/standard_x86_64/ac1ce25d0523b18c44969f54a2d5d013-tomcatcpioxz2noarch-openEuler-linux-gnuASCII textemptyFᛠJEdtutf-8af55b2b165c64bc1379c19848fcc3583639ad901f1983cf372ae0e60475cfc20?07zXZ !#, K] b2u Q{LS.=/N:qz{A.KOM@uNo7>.8F'Fbh\x2ZGI_Zf%kDlu VOiL{d{!7w$.;e 6yA[ ߅O&'3 Ӭ ͈)lP >q5FjfϠ{]wt$3X/VVA(L"ƪ?U#cSAO"m8,+e =Dn<9qS]ptFsWu6XYRv*ǢǂMwUH nʣDh0{GbP0Plxr!WC'nwh YaGVlYޖZ,~4r MԱj%{:*DC#7JHkj =D%/J0?z%W5IYȼ$MM 9?E@0c[\&F:}