bind-chroot-32:9.16.23-23.oe2203sp40>    f ;G|`u` * p[2oj.x3M)S ZQ1gU@);D l)ӗ0ҎL\n k|~1ν߈^AT ,ɝ&?cCK)8,1n/ Q0<>ҢV5 (9Dg* /UMLı腈O $/ȣխlRy@2# /UaqϾ@ނ,xMdva:j<2HB @))&ơ@աbW*u#@Uڎa)ӘzMz/B*ǐ 33 H" V/~ < +M^Ёܨ ﺼٓ[ fe7920dfd7c86b3ed46aaecfdd12da2d5c951be15064bb5712a236170998befd87d695236f066c9d88e69fdeed2566d783314bc73QRi:e)>G$ ?#d$ ( k$(<@H ]i;"H" " " X" "  $" " Z"  <"   (  ( -8 49 p:p>v?~@FG"H4"I"JXY\D"]"^Sbd e f l t <"u "v!Lw!"x"$"y"z""#a#l#p#v##Cbind-chroot9.16.2323.oe2203sp4 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak fdc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxx86_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ]; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ]; then # Package removal, not upgrade if [ -d /run/systemd/system ]; then /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : else /usr/bin/systemctl --no-reload disable named-chroot.service named-chroot-setup.service || : fi fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAACA ffffffffffffffffffffffffffffffffff29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6306f047e72a2c8eb97f8be7cbbbef20b513ddb8bd595888609dc25f712fe5edb63b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.16.23-23.oe2203sp4.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(x86-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.16.23-23.oe2203sp432:9.16.23-23.oe2203sp43.0.4-14.6.0-14.0-15.2-14.17.0f@e!@e8@e@dd}d5Kc@c@c@c/cc5c47@cM@chengyechun - 32:9.16.23-23chengyechun - 32:9.16.23-22chengyechun - 32:9.16.23-21zhanghao - 32:9.16.23-20chengyechun - 32:9.16.23-19zhanghao - 32:9.16.23-18zhanghao - 32:9.16.23-17zhanghao - 32:9.16.23-16zhanghao - 32:9.16.23-15zhanghao - 32:9.16.23-14huangyu - 32:9.16.23-13jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9- Type:CVE - CVE:CVE-2024-1975,CVE-2024-4076,CVE-2024-1737 - SUG:NA - DESC:fix CVE-2024-1975 CVE-2024-4076 CVE-2024-1737- Type:bugfix - CVE: - SUG:NA - DESC:update release version- Type:CVE - CVE:CVE-2023-6516 CVE-2023-4408 CVE-2023-5517 CVE-2023-5680 CVE-2023-5679 CVE-50387 CVE-2023-50868 - SUG:NA - DESC:fix CVE-2023-6516 CVE-2023-4408 CVE-2023-5517 CVE-2023-5680 CVE-2023-5679 CVE-50387 CVE-2023-50868 and sync some patches from upstream- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:bugfix - CVE:NA - SUG:NA - DESC:Disable the internal memory allocator by default- Type:CVE - CVE:CVE-2023-2911 CVE-2023-2828 - SUG:NA - DESC:fix CVE-2023-2911 CVE-2023-2828- Type:bugfix - CVE:NA - SUG:NA - DESC: Don't perform arithmetic on NULL pointers Accept 'in=NULL' with 'inlen=0' in isc_{half}siphash24 Fix a use-after-free bug in dns_zonemgr_releasezone() Fix dns_fwdtable_addfwd() error path cleanup bug Detach the views in zone_shutdown(), not in zone_free() Detach the zone views outside of the zone lock delay trust anchor management until zones are loaded In hmac_createctx free ctx on isc_hmac_init failure Fix dns_kasp_attach / dns_kasp_detach usage Fix backport error in 84929d1c Fix a cleanup bug when isc_task_create() fails in dns_catz_new_zones() Searching catzs->zones requires a read lock Fix view's zones reverting bug during reconfiguration- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:CVE - CVE:CVE-2022-3736 CVE-2022-3924 CVE-2022-3094 - SUG:NA - DESC:fix CVE-2022-3736 CVE-2022-3924 CVE-2022-3094- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC:fix CVE-2022-2881 CVE-2022-2906 CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080- DESC: fix downgrade bind-utils conflict bind-dnssec-doc/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1722918899  !"/var/named/chroot32:9.16.23-23.oe2203sp432:9.16.23-23.oe2203sp432:9.16.23-23.oe2203sp4   0-metadata_list-compact_tlv-bind-chroot-9.16.23-23.oe2203sp4.x86_640-metadata_list-compact-bind-chroot-9.16.23-23.oe2203sp4.x86_64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection cpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyR>\,<+!%SFtTif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8aecbe7909835d46a034353014e6b4b5ad3faa2a1d76f048a0d8aa57f50e98b91ca8c02e067c56d4c8e65978d895b89018f2a8b4bddbc124a592cb2117504ec49?7zXZ !#,'C ] b2u Q{LYZ`]#G.2:; 9Iʰ\ܷ ,WV[pEW'hg~ɖ^52)Q'. ,O6 [N gPhSW- [PF_6t[$ v#3{:p4h0!PS(58( ֲr0d2}PqqѽgKhdCK}A hg%$An0xy#->vyLz tʘ,Tq%$EX Dx*WfGy"wY[~2MBB*M-6%۴ۛo+1c[ZLS4F➇o|@<1XݴoiJa al ^ 0=F1)i"ĔP|IAD;K X!&)2'u?PKIF*DsD#f{B~s*•m&C,Ze]0|֍& P޳EcFY{|꯸]\aDËdWustU`{1tV)]Ͳd GJ-$Qu+Yj_wLݶ2i><H(O.!x ǂ%7俏@e3GG-x5܀xl8R9rezҹ͏63-F(7BNFjO۷™Y86cEt> 0V??wUѾ¶DyK5l"(Vfc;H8}'% ڔiǔn a`z%M1\R=(%G@+JV$ND+Mw˔HY)~r{Bkҫ_zdY"INjv!,\l\#` t%oaVs>pOqEhQs9c-GP[;B_@IEWͲ,$UN~7!m/߳WbtPk48-x6ْ TJ??\9m.EnD}QEG_YƥRu}3jmzLN\A8G= " 0o'r x  :Nl8pr{&:K~<~K@ ā1QCLZyD?d< 3Z onJVlQD6l J0PbfTs!!#>Q y뷻3@|x 6jQ.Di'*chjw48բ0\X0='|&n0r"op'v5GuBہYϊ 燌]Jcw} /vmH-LɗoEC#d'0ԾO*UҌ3z毤DnGW Ź1aT T\օܴ [061M#ˌJ0p9S`tL#5ީ/Tk%#KWqo Ž/m 5ݕQT*d9QZ@һH*hֽ6|%iJ1Os#? ~-%]ؙޑ˖Z*G: M9rexV`OG +j$ K8@(aہ)7?cT×hsH4&.=4&vQW7HQ%! BfjcR5 <7XmDqɾfS_/sTR4 sCWrZ~Q9F9-p#ārumɋӫO` udm44r ńvf,ĦCFoKsٵ!q8 )>˯0Ŷ?=\P^X؍pJ'Eq+K`d*G(+?E+gIV$D<"UF6Y3jcdJҹB;WacBV,4-?U`9 健[C?HTx:tI"]`jx[NgZT!8fg5 qӥ$6 %tlY )XUoٱsHG3t6-?g>Dbx=鿠78[Vɤ 9?&Gfg<~G.C;>NiʌgmLe[*KݼJY,uIN:d YZ