bind-chroot-32:9.16.23-20.oe2203sp3>  <@PT@7!.ܶujG7oeopeneuler@compass-ci.com G7o' ?{Ķ&lj|F sRTqɪxikFapyA79ƧOG&!JDB!؞U"2q)P`"te=( f-ցoų=:bo+߉M/ޜe94s:c9w8 {;95;Ộrn7k')1UނZR/M*n3R{7u~p6tJ+^ -ךSGFj/8 Q K vO@`L\-v'NW,2NsR8Z}'%%8/\H<۷˳?+.0d֟ANSS3\FͷbϺq ;b_|O@z764a19fbbf3e4f219549bad1a82ed80982df88ab050eed90ad9732d12c551150b8ce4cbfa28b969389852284e37c1d7a3408b5046q% u%Zap'D>G&?&d$ ( k$(<@H ]i;"H" " " X" "  $" " Z"  <"   (  ( -8 49 :>?$@,F4GT"H"Id"JXY\"]t"^b!d"e"f"l"t""u#l"v#w$D"x$"y%Tz%X%h& &&&&`&dCbind-chroot9.16.2320.oe2203sp3 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak e.dc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ]; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ]; then # Package removal, not upgrade if [ -d /run/systemd/system ]; then /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : else /usr/bin/systemctl --no-reload disable named-chroot.service named-chroot-setup.service || : fi fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAACA eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6306f047e72a2c8eb97f8be7cbbbef20b513ddb8bd595888609dc25f712fe5edb63b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.16.23-20.oe2203sp3.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(x86-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.16.23-20.oe2203sp332:9.16.23-20.oe2203sp33.0.4-14.6.0-14.0-15.2-14.17.0e@dd}d5Kc@c@c@c/cc5c47@cM@bT@bDF@baaZ@aeaa@aayzhanghao - 32:9.16.23-20chengyechun - 32:9.16.23-19zhanghao - 32:9.16.23-18zhanghao - 32:9.16.23-17zhanghao - 32:9.16.23-16zhanghao - 32:9.16.23-15zhanghao - 32:9.16.23-14huangyu - 32:9.16.23-13jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9jiangheng - 9.16.23-8jiangheng - 9.16.23-7jiangheng - 9.16.23-6jiangheng - 9.16.23-5jiangheng - 9.16.23-4jiangheng - 9.16.23-3jiangheng - 9.16.23-2jiangheng - 9.16.23-1jiangheng - 9.11.21-4.h9jiangheng - 9.11.21-4.h8- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:bugfix - CVE:NA - SUG:NA - DESC:Disable the internal memory allocator by default- Type:CVE - CVE:CVE-2023-2911 CVE-2023-2828 - SUG:NA - DESC:fix CVE-2023-2911 CVE-2023-2828- Type:bugfix - CVE:NA - SUG:NA - DESC: Don't perform arithmetic on NULL pointers Accept 'in=NULL' with 'inlen=0' in isc_{half}siphash24 Fix a use-after-free bug in dns_zonemgr_releasezone() Fix dns_fwdtable_addfwd() error path cleanup bug Detach the views in zone_shutdown(), not in zone_free() Detach the zone views outside of the zone lock delay trust anchor management until zones are loaded In hmac_createctx free ctx on isc_hmac_init failure Fix dns_kasp_attach / dns_kasp_detach usage Fix backport error in 84929d1c Fix a cleanup bug when isc_task_create() fails in dns_catz_new_zones() Searching catzs->zones requires a read lock Fix view's zones reverting bug during reconfiguration- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:CVE - CVE:CVE-2022-3736 CVE-2022-3924 CVE-2022-3094 - SUG:NA - DESC:fix CVE-2022-3736 CVE-2022-3924 CVE-2022-3094- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC:fix CVE-2022-2881 CVE-2022-2906 CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080- DESC: fix downgrade bind-utils conflict bind-dnssec-doc- Type:CVE - CVE:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - CVE:CVE-2022-0396 - SUG:NA - DESC:fix CVE-2022-0396- Type:bugfix - CVE:NA - SUG:NA - DESC:limit number of test threads to reduce test execution time- Type:bugfix - CVE:NA - SUG:NA - DESC:add systemd buildrequire- Type:bugfix - CVE:NA - SUG:NA - DESC:remove not enabled option in named.conf- Type:bugfix - CVE:NA - SUG:NA - DESC:remove set-timeout-inteval-of-some-cases-to-600s.patch specify ISC_TASK_WORKERS value to fix some test cases execute time too long- Type:bugfix - CVE:NA - SUG:NA - DESC:set timeout inteval of some cases to 600s- DESC:update to 9.16.23- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1703745326  !"/var/named/chroot32:9.16.23-20.oe2203sp332:9.16.23-20.oe2203sp332:9.16.23-20.oe2203sp3   0-metadata_list-compact_tlv-bind-chroot-9.16.23-20.oe2203sp3.x86_640-metadata_list-compact-bind-chroot-9.16.23-20.oe2203sp3.x86_64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection cpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRd&{0wY.Gif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8ee89baf7d2c3cffef25a983c8d5d48f316c5ffb3b2ac3a2017ba7b0cd728a59f8a3bd44dd885590ded48bd3b01e5dc503d338de3700ecc686cd2357dbf0032d8?7zXZ !#,'C ] b2u Q{LWsxAc:J@1w2@#LΕ.& dp9h^xf^Abx‘sCp/N?t ZA{Ѳ5U1̘j+j/|$#Y.a^FA:XJ& T_6 ]۶_"v]2жWd9 xڙ3K-e1ݥU4wq_ mQj &\t/QcwޟW@-hZ̠uM(/]G!tS3Ҝ>K|toˬ?)+qc.r$Ejr ZYl3݌iA0s%Աfz+<lz貀+~M4/ ґϫS lM}18R-,9GH.r}2dTjw7$ ^Bɨ9Whwb]D8kݯ*Mw=XvONwT|9IǁbXC3R5s(>2i< X)!R]zeLyV Zfgd3P,?<+K0;lmiH%/Ic";,{"bܳG:, 0Wjq*R>@[PS(+7`1_>LP'僶ےZxi7:3o2*8zvBwMπsӉ8e;,`3ذ- &2)bqt{MכpVR OU<Ϩl" |h"b6͎g0KVRBI ptP< iXfY`Z#.W*1*N[دA_^Sm<]qjE%Mt/!^0*(hT:GqJA}ldo/ 8pkJvwn>pzk eVxSkږ>us;gd-5> !UnPToA]%h :W >rlDz.%d2 5Sr7Ta[^}Є$qC^Qba* bl\M8N@/JCN4!~:y'u\^uW6$RШc rԛ+oס+R$0I+&qGƢ"4@|Usm~ސUsPs)jB0ѯ\x :f5yCC Y2Ak+L}<]%F'e*^+AdIBQB_56UgpӳyO2:\uѢ*? 54::)/Pð Xߡ֛PՍqxjL]maka+a] 1lH&2<^>,n ת Zbm H:hTS1=l$.x.Nll0*Wo%%2%Oxebug켫j 6JU9 Emkreg$> ט⧩w 6uI,֙.ƓDejXjmhGr7{?AnesO>bh cvvXWS_,ZErm96/j({!1ͧHjAeVSԜ߭)] x z@~9rdSq p>E',~ QapɊoE_BcތuS)k['玾DᄇkB]7pmT-_\`2Ip+rN\ %_bvt0!dp!wHhH)_% eF†4ع) <K7eΕ}zX>6JnCbI{ҨDHkTW~%_jD5 +VRg:W#:;Xiܮ'6Epy@pE2}U%q nyHM*s.ZnIF׌`D{>=;uWZg ;M؅Y H;P=3phl5}2Nu YZ