bind-chroot-32:9.11.21-18.oe2003sp4>  <@PT@7!.ܶujG7oevopeneuler@compass-ci.com G7o* L;ρ, t>7Grn6b,6 u&@[붽z7AäT`6'G.ȗo: J*N=s0Cc cQQbt }f> tef>[G G+F?d$ ( k$(<@H ]iS!< v  $  X   ( `   ; ( 8 9 : >?@FGHtIJXY$\l]^Qbdefltu<vwxtyzCbind-chroot9.11.2118.oe2003sp4 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak evdc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttp://www.isc.org/products/BIND/linuxaarch64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ] ; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ] ; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : fi if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ] ; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fims AAA!!!!AAAA聠AAAAAAAACA evevevevevevevevevevevevevevevevevevevevevevevevevevevevev29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6306f047e72a2c8eb97f8be7cbbbef20b513ddb8bd595888609dc25f712fe5edbbce5be07e9f803c381c4659f8de4f0272993123db8a8b733b39dd281c95cfee567eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamedrootnamednamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootnamednamednamednamednamedbind-9.11.21-18.oe2003sp4.src.rpmbind-chrootbind-chroot(aarch-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbindconfig(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.11.21-18.oe2003sp432:9.11.21-18.oe2003sp43.0.4-14.6.0-14.0-15.2-14.15.1ejed}c@cEZcAc@b_bDF@aKsunhai - 32:9.11.21-18zhanghao - 32:9.11.21-17zhanghao - 32:9.11.21-16zhanghao - 32:9.11.21-15huangyu - 32:9.11.21-14jiangheng - 32:9.11.21-13jiangheng - 32:9.11.21-12jiangheng - 9.11.21-11jiangheng - 9.11.21-10jiangheng - 9.11.21-9- Type:bugfix - ID:NA - SUG:NA - DESC:fix update- Type:CVE - ID:CVE-2023-3341 - SUG:NA - DESC:FIX CVE-2023-3341- Type:CVE - ID:CVE-2023-2828 - SUG:NA - DESC:FIX CVE-2023-2828- Type:bugfix - ID:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:CVE - ID:CVE-2022-2906 CVE-2022-38177 CVE-2022-38178 CVE-2022-2795 CVE-2022-2881 - SUG:NA - DESC:FIX CVE-2022-2906CVE-2022-38177CVE-2022-38178CVE-2022-2795CVE-2022-2881- Type:bugfix - ID:NA - SUG:NA - DESC:backport some patches from community- Type:bugfix - ID:NA - SUG:NA - DESC:remove obsolete patch- Type:bugfix - ID:NA - SUG:NA - DESC:add selinux-policy-targeted requires- Type:CVE - ID:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - ID:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1702296567 /var/named/chroot32:9.11.21-18.oe2003sp432:9.11.21-18.oe2003sp432:9.11.21-18.oe2003sp4 0-metadata_list-compact_tlv-bind-chroot-9.11.21-18.oe2003sp4.aarch640-metadata_list-compact-bind-chroot-9.11.21-18.oe2003sp4.aarch64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootlib64devnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysrunnamedusrbindvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//usr//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot//var/named/chroot/run//var/named/chroot/usr/lib64//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRW oorיK]if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi/bin/shutf-8f382ab16d57001e6b58c6d50be5ff1b276757f77764ee9a8b16790a76048d9a9?7zXZ !#,$G ] b2u Q{LWUMf eEtCo_pqɷ/.bdq%TJe:$hucg]Ft'u憯І[ hK]qV%ق2]-f2XhAY`k3,N21\@ /CF LL]\q0k177Z7Ϲh$3"'Tl!|]@1,ir{U녰Gl? rI@Yb˯+H0~T7C6o kb9 7f7l2ʉ* RޝW|<i/ g>[T߫{WqvK<[Y<$QbFf7㎤&Pw=C6mf!d{4pFk ~!i|ٛTQ@߉hZKh [BwhW:"2syc_ @64jN*u[xCùVџb6eN0!j&AK@$%IM#v'5=x;ABo E_`𦣻w,k){pSP2z`%pߍ 뙅E+Z l5gt;gJg6,oAJG•kr ~?7{}?JX R͂ (!+;p."?y0 950-T(c@ 2Ktpi3z͡Ҹbd@-\>!nT~;H*iJ۩; #0ÀF)޹6b/ Ԫ1/n\c8aڟ :KZo]NO@Ɍ UZҔS 1I2u2~!Qh0}@ =8[cX\::vٵQ-MH,>-o_G*+,[ˀ-۽aYh.gi6RgJGHd{@:di75 Q# A!F6NSN(9I /bm ta.d9Dcx3fg|udE^ _Y+'NgFb(o'h)I%B%:l(k &vaAlMsJ^zMJ.yLVC b' |#KAZ=U! }G몚/ڽ\hT6= {iѕ*;,2jm[jÝI_Ϻdp0#JIUCKl5xrQ)y!`ӎD8[%})=lu[ZKa`eNfb*#ړHpH寗!6!wy2gΫI&-ceؿj-/pEd*fVӄl7G n7lyWnƧ@u$¡on'>aGracV3{(ega?nB0|_ֆN2A="rl+JgVG^/Rh9,/l&9ەj6,10;cc5w5|_ׇb\S;\,҃j.@rv1 )șz** H4D 0.JKΡϋ m^(f-S2V`ZoYV.*:dr–6[&A~3(#)j^g^gL"82HZ[Dz&-B;˪ȗR=۷95bW)0D1`3x4V*䊌S A9u8ـIM骚~+f־J/U#HQ,_! f*tG)%k,\T]c%ٛX0oRL&lKNO)oH怜Vg'2 8vz_[<w\U\ĦEwكl^0A,?ϫ% p.kvSv<-Q#Pr˶ͷ8-fLHOم YZ