tomcat-jsvc-1:9.0.10-27.oe2203 >  A cW^^fU+i& ,b]'9ΓQRVD N30Xt5e2=CH!V&a &.`ng0R2tDzl Xb{UG$ ̟3ef0a7460625210a08b0e72823500d162e983bb190c586224724154d1c54299b0b85fbdbd7c216c7ceff62d878a0869672585be3c}cW^^fjusk !̥mL >G硡܌HU^P2pY;(ꬌĮff? 1 Q d JОfEC? 4>>zdL Mͅfa>g%gv{ dCMÆmy nXB'}rOoғH+:M=2;5 mzϽ&#u%:iخ3vNni x:)}p> ? d  $ ^DHYnv     A H\w(8 9 : FG H I 0X 8Y @\ h] |^ b c yd e f l t u v $z 6 H L R  Ctomcat-jsvc9.0.1027.oe2203Apache jsvc wrapper for Apache Tomcat as separate serviceSystemd service to start tomcat with jsvc, which allows tomcat to perform some privileged operations (e.g. bind to a port < 1024) and then switch identity to a non-privileged user.cշobs-worker-backend-test-arm-0009.novalocalVHuawei openEulerhttp://openeuler.orgASL 2.0http://openeuler.orgUnspecifiedhttp://tomcat.apache.org/linuxnoarch`cշcշcշcշcշ5c293f3e6e3e26fcc81412cedac5702372dc3d73085b55c53ea7edbf88c7cd41eea8ab99a1bac4de6deff5cc202639370961e3e61c4bdad04ed038ab491a4d01123093c36e3e48cc620d9f18d87d1bba82079dc3f47b378e390675acf9ae0df9d0ac947eb01462b0058ee723b2f3772eee765af7f1b06f08873f2c4c69832977e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855rootrootrootroottomcatrootrootrootroottomcattomcat-9.0.10-27.oe2203.src.rpmconfig(tomcat-jsvc)tomcat-jsvc    apache-commons-daemon-jsvcconfig(tomcat-jsvc)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)tomcat1:9.0.10-27.oe22033.0.4-14.6.0-14.0-15.2-11:9.0.10-27.oe22034.17.0c_bf@b@a@ayazaa@a@`i@`KW`.Vyaoxin - 1:9.0.10-27wangkai - 1:9.0.10-25caodongxia - 1:9.0.10-24caodongxia - 1:9.0.10-23liwu - 1:9.0.10-22houyingchao - 1:9.0.10-21wangyue - 1:9.0.10-20wangyue - 1:9.0.10-19wangyue - 1:9.0.10-18wangxiao - 1:9.0.10-17- Fix CVE-2022-42252- Refix CVE-2021-41079- Fix CVE-2022-23181- Replace recommends libtcnative-1-0 with requires libtcnative-1-0- Replace recommends tomcat-native with libtcnative-1-0- Fix CVE-2021-42340- Fix CVE-2021-41079- Fix CVE-2021-30640- Fix CVE-2021-33037- Type:cve - ID: CVE-2021-25122 CVE-2021-25329 - SUG:restart - DESC: fix CVE-2021-25122 CVE-2021-25329- Type:cve - ID: CVE-2021-24122 - SUG:restart - DESC: fix CVE-2021-24122obs-worker-backend-test-arm-0009.novalocal 16749504001:9.0.10-27.oe22031:9.0.10-27.oe22030-metadata_list-compact_tlv-tomcat-jsvc-9.0.10-27.oe2203.noarch0-metadata_list-compact-tomcat-jsvc-9.0.10-27.oe2203.noarchtomcattomcat-jsvc.servicecatalina.out/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc/logrotate.d//usr/lib/systemd/system//var/log/tomcat/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/b26b9a3bb4166254541319dea0de941a-tomcatcpioxz2noarch-openEuler-linux-gnuASCII textempty Ұ6^vutf-86468d8fff61dec03ec2791f7d365fd9c8f5b38af90f1695532fbd95e8d6c2e25a3eadf3781075043a12aa5f1a235c0854831a77586d97a98575dbb82c74088f8? 7zXZ !#,I] b2u Q{LUwK!x1羽76g6?S`{.A#4J9Hw[@h`\C?OWF,"^z_J[OaI(A*m"ԟ/Gڛt)?0) 9!E-JޔFR<atKZ9ހТGлzYtdNO ԧwIZ3u`Gwnq+SF|iE|i2O#B+ÂVRo)؝ĉ_ҽ[vz~z}+{Q]QxKkPo!/ [jo|;`@}4%r͉jbrᨒEcS`3S7>]kgá"P* 4f )<4Fp00A a"3RWN?};#)gJ[YP}Q Jq'I,n"3Nm^+lV{Lϑ !st $؛QL5gaxʣ.VƏVhQNyED0i`^3gE#3OK3F|rV?I;d Y?%W(TװrYrmWIl3fУMq->]RF~ĕ.O,$絉uwI#* jnfM?2)*ŲY@S3ɗo