bind-chroot-32:9.16.23-18.oe2203 >  A dNW^^f9ba j$0-t{N4*cxf/){̼?ґQݤL<4xtϕHa>QUKnJ#)\fbj\iy8I,}i`lnW0'ڗ=k&bs$t@v>| V7Q+DC /*~Ko{c#9G=\rGm&Y^ MK{H"ɍ׃OPd3A`bXC[*;4776e2f5b5fe3b525c0173139f5578b11f9ad1d1eb01c2c95d99b15a3a0174a4e49136abeb86d8e8a4fe3e191bf9684eba094e549edNW^^f z$\ZKgfJj(q5lqO@ʏ{9|ȾR.>P"aW_& ֗ê ]n68F[M %<b:gBI\%?>@'Vθ˪ٸŁÏGQ> :p"epi!EzY'Rs/]h2a"Z+9KcOF`j~Hzsj={uQCK|yjT'<>pJ)?)ud  $ g $PTez v<"" "  " "  6"  `" " " T t"  4  d   ( e8 l9 :>?@FG"Ht"I"J X 0Y <\ |"]!"^"b$Hc%3d%e%f%l%t%"u&<"v&w'"x'"y($z(((8(((()0)4Cbind-chroot9.16.2318.oe2203 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak dobs-worker-backend-test-arm-0009.novalocalHuawei openEulerhttp://openeuler.orgMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxaarch64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ]; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ]; then # Package removal, not upgrade if [ -d /run/systemd/system ]; then /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : else /usr/bin/systemctl --no-reload disable named-chroot.service named-chroot-setup.service || : fi fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAACA dddddddddddddddddddddddddddddddddd29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6306f047e72a2c8eb97f8be7cbbbef20b513ddb8bd595888609dc25f712fe5edb63b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.16.23-18.oe2203.src.rpmbind-chrootbind-chroot(aarch-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(aarch-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.16.23-18.oe220332:9.16.23-18.oe22033.0.4-14.6.0-14.0-15.2-14.17.0d}d5Kc@c@c@c/cc5c47@cM@bT@bDF@baaZ@aeaa@aaya /zhanghao - 32:9.16.23-18zhanghao - 32:9.16.23-17zhanghao - 32:9.16.23-16zhanghao - 32:9.16.23-15zhanghao - 32:9.16.23-14huangyu - 32:9.16.23-13jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9jiangheng - 9.16.23-8jiangheng - 9.16.23-7jiangheng - 9.16.23-6jiangheng - 9.16.23-5jiangheng - 9.16.23-4jiangheng - 9.16.23-3jiangheng - 9.16.23-2jiangheng - 9.16.23-1jiangheng - 9.11.21-4.h9jiangheng - 9.11.21-4.h8jiangheng - 9.11.21-4.h7- Type:CVE - CVE:CVE-2023-2911 CVE-2023-2828 - SUG:NA - DESC:fix CVE-2023-2911 CVE-2023-2828- Type:bugfix - CVE:NA - SUG:NA - DESC: Don't perform arithmetic on NULL pointers Accept 'in=NULL' with 'inlen=0' in isc_{half}siphash24 Fix a use-after-free bug in dns_zonemgr_releasezone() Fix dns_fwdtable_addfwd() error path cleanup bug Detach the views in zone_shutdown(), not in zone_free() Detach the zone views outside of the zone lock delay trust anchor management until zones are loaded In hmac_createctx free ctx on isc_hmac_init failure Fix dns_kasp_attach / dns_kasp_detach usage Fix backport error in 84929d1c Fix a cleanup bug when isc_task_create() fails in dns_catz_new_zones() Searching catzs->zones requires a read lock Fix view's zones reverting bug during reconfiguration- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:CVE - CVE:CVE-2022-3736 CVE-2022-3924 CVE-2022-3094 - SUG:NA - DESC:fix CVE-2022-3736 CVE-2022-3924 CVE-2022-3094- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC:fix CVE-2022-2881 CVE-2022-2906 CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080- DESC: fix downgrade bind-utils conflict bind-dnssec-doc- Type:CVE - CVE:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - CVE:CVE-2022-0396 - SUG:NA - DESC:fix CVE-2022-0396- Type:bugfix - CVE:NA - SUG:NA - DESC:limit number of test threads to reduce test execution time- Type:bugfix - CVE:NA - SUG:NA - DESC:add systemd buildrequire- Type:bugfix - CVE:NA - SUG:NA - DESC:remove not enabled option in named.conf- Type:bugfix - CVE:NA - SUG:NA - DESC:remove set-timeout-inteval-of-some-cases-to-600s.patch specify ISC_TASK_WORKERS value to fix some test cases execute time too long- Type:bugfix - CVE:NA - SUG:NA - DESC:set timeout inteval of some cases to 600s- DESC:update to 9.16.23- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:bugfix - CVE:NA - SUG:NA - DESC:give zspill its own lock fix tasan error fix data race Correctly encode LOC records with non integer negative isc_ratelimiter needs to hold a reference to its task dig +bufsize=0 failed to disable EDNS as a side effect Lock access to ctx->blocked as it is updated by multiple threads Only read dns_master_indent and dns_master_indentstr in named Defer read of zl->server and zl->reconfig Break lock order loop by sending TAT in an event Handle DNS_R_NCACHENXRRSET in fetch_callback_{dnskey,validator}() Unload a zone if a transfer breaks its SOA record Address inconsistencies in checking added RRsets dns_rdata_tostruct() should reject rdata with DNS_RDATA_UPDATE set/bin/sh/bin/sh/bin/shobs-worker-backend-test-arm-0009.novalocal 1687737600  !"/var/named/chroot32:9.16.23-18.oe220332:9.16.23-18.oe220332:9.16.23-18.oe2203   0-metadata_list-compact_tlv-bind-chroot-9.16.23-18.oe2203.aarch640-metadata_list-compact-bind-chroot-9.16.23-18.oe2203.aarch64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/9ed0ed1dadbd330da95efb743b5bb715-bindcpioxz2aarch64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRC oʄ /dev/null 2>&1; fi;/bin/shutf-802612c5a7f99f6e8fc58e38f8a3b60d6c522ac5edc17643a78ec88c7e6bcf8a53de368ee6592ed83cce018d2b439285680d4654b6cbb1d9c91674fa1b509772b?`7zXZ !#,'; ] b2u Q{LV5ۛ)n4AsfG*(v)P{' :  L:NR J$Yͼ'EGiޗTiOf]GV~qS%-uh|Ȏ'q':zk9bc5Fu+.4珠㞪Ge무Kcm1JU,: voI OQr& 20N+HYY#Esp> /˺Xktm8@OBC\S.rÞg jkۣfaeԩE6`M+֌ķ3:JMHiXX 7/1;h@>Yxz%tm-Z Vp'"풽siC͍*ζJYr>}<-TtC N (4nY7EމO:Gt]Df؂vcuM;^ɞњmf8zwLOvMFrVf8\HC,O2v(ׄsyZnS 8q; p\a~FVĖa Ĕ?w!?H,;D^~gܶkbp``Uh>) d[&_Zewa3HUӈCK1Eo|lQk 3*1i9J RJhMmh:u40y( ⟩#x3,V:dm{۶99y.l)1>-?ldfsH%n%( Tk> i!|86δa$7{j:Sqع=j]K6^bkTx ҋxEZ=UNľ919_9;.3.U\Țio˖8zq7XXa*nCHOۗ)D\2JbaW\+ƩP5{_P9ɚ>e@"i[;"M/W[-%{Nu>5 'Izci]+,t\#H:H`N!ڬ>Z%uic1$y|b5¿ߓhy=10]T:d{*jg݆s{~|!KC{ΧS)`c C#`D,ԺU:peMgd=WW^܉M!nZjsc΄:RĽzs@mc\`*d E0_0_;AU&b9|}ÖګFT8r]T~")/m[cM}& oܘK>oJ=h191&A3E2(7bx4u:&3җot:؋4V C\ C%|@p% E✲]::dGp讀d1 Ӆ8B\G $ *Zq=V+/`m{7QXT= gZ\H]c %"WJ.! &!!sب;qDٖF[ַON>jNӦ5-&KLd:h1:{Iξ88Bђ ܿBQГ)(9T{;*b {WBε,fzݥ$IF.ꜥAo1Bу~fHjEm1z*rnۙńɔNKٺ,nEH4䴰A!)I[X;iTu랼CD-/>\Ĵm9oe)O3en~holìa-&iB)e;AW2- נA qeU SoîU;MS#j Aᙋ(6)7E%z_ue9D_UDz'姱d6zD+|"kqoJlxb p ʙħJQ5hY'ٚ#0l4Ѣ'OuMii"JdB6B-yeӺt6D*dĊ7 iV=r\M gjڃr9lS,}bqRPw# sБ9Ӗ 놦78_M#Q %Pps _c2Yֿ.B06@Gq\O{Vܯ4j.>' BJw=Dp<PnK}F1 $ɠs]ңTs+Fᚓгj<20o/7w0SM&e5d0i9SFYsXi a[`H-9 |Z`ǁ4>#s̕'w[V.bI'Q"֓'KNqײOe ~31K"IuO mo{$.Re:aPRSiQ;tbWU&JS"B[6}U‰q"JIQ&z{hVcQn1mC~0n˦D$ۑ\{Fb$?x^f7,4Oh[a~=heҴ9(VeKlgO w+N "u YZ