bind-chroot-32:9.18.21-2.oe24030>    fP ;G|`u` c @>iGQ1#[y5ƛT_/nz3vȗ@XzZ BEDmŽx rɅ}a, xߛs,v9A>)9R"u]z0 =X+nWB-'C2)/i|-^] f)^g=1h_%[!G)Dx~>m66<$Xa6`qO{Evi4gyvKjݧ~_FS gt>o4NhE0'x(--(dm5"R,:Yd*S)JW\VMS_ܭ bda113c628069503cd3faf8e6c7dd033f5c9aea5bd4edcc1fc16e13bda07748c8758a680ed2dd728c42c6336030c68ef56db29e3.=“Ѓ=$1[>G 1? !d  $ g $8<D Yed|   <  |      D   h   <    $  ( #8 ,9 t:>?@FG H` I JXY \\ ] ^bndZe_fbldt u vw xP yzCbind-chroot9.18.212.oe2403 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak fP dc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxriscv64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAACA fP|fP|fP|fP|fPKfPJfPfPfPfPfPKfPJfPJfPJfPKfPJfPJfPKfPKfPKfPKfPJfPJfPKfPKfPKfPKfPKfPJfPJfPKfPJ63b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.21-2.oe2403.src.rpmbind-chrootbind-chroot(riscv-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(riscv-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.18.21-2.oe240332:9.18.21-2.oe24033.0.4-14.6.0-14.0-15.2-14.18.2e~@e|@eev@cwc&@c@c=@cc5c47@cM@b@bޅb&bEbDF@bDF@chengyechun - 32:9.18.21-2zhanghao - 32:9.18.21-1zhanghao - 32:9.16.37-6zhanghao - 32:9.16.37-5zhanghao - 32:9.16.37-4zhanghao - 32:9.16.37-3zhanghao - 32:9.16.37-2zhanghao - 32:9.16.37-1jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9jiangheng - 32:9.16.23-8jiangheng - 32:9.16.23-6jiangheng - 9.16.23-5jiangheng - 9.16.23-4jiangheng - 9.16.23-3jiangheng - 9.16.23-2- Type:CVE - CVE:CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868 - SUG:NA - DESC:fix CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868- Type:requirement - CVE:NA - SUG:NA - DESC:version update to 9.18.21- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:CVE - CVE:CVE-2023-2911 - SUG:NA - DESC:fix CVE-2023-2911- Type:requirement - CVE:NA - SUG:NA - DESC:fix two patch from 9.16.23 and delete useless Patches- Type:bugfix - CVE:NA - SUG:NA - DESC:fix bind-9.18-zt-include-rwlock.patch- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:requirement - CVE:NA - SUG:NA - DESC: update to 9.16.37- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC: fix CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080 CVE-2022-2906 CVE-2022-2881- DESC: fix downgrade bind-utils conflict bind-dnssec-doc- Type:bugfix - CVE: - SUG:NA - DESC:update version number to maximum and keep it same as 22.03- Type:bugfix - CVE: - SUG:NA - DESC:add missing dependencies remove geopip-directory in named.conf- Type:bugfix - CVE: - SUG:NA - DESC:fix test cases timeout- Type:bugfix - CVE: - SUG:NA - DESC:add bind.yaml to master branch- Type:CVE - CVE:CVE-2021-25220 - SUG:NA - DESC:fix CVE-2021-25220- Type:CVE - CVE:CVE-2022-0396 - SUG:NA - DESC:fix CVE-2022-0396/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1716570637  /var/named/chroot32:9.18.21-2.oe240332:9.18.21-2.oe240332:9.18.21-2.oe2403   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -grecord-gcc-switches -pipe -fstack-protector-strong -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2riscv64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRY!ף}ꤤmfpif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-854370e8b2a5d1015d9d903e337acca2421aeaae16ba5d83443f713ed998a676b83b94d97878035d67c4fc4dfbffa0f9d8bdb45761fefd623ef671f70a4fbbf8e?7zXZ !#,"; 2] b2u Q{LY1UJ u#ֱ H y5 eU$Lk|Fw iD]6[g:>X/h5>'_6X\ 0onOPKZts.F!iN\Jؗ-+5 ,N@7^ ^(wv?:&I60v#N`s =crh< 5N]peH_RglXvTGAڑYRVa7Ui#Eq!gadP{$R@Z‘T _tSZ5AX=(ro Ǻ'Y䷉cCq -[Ypw0b/mސvT~7P +PŨ)QjD  e!4EћV0M"Qs/@)\)s<\ƓkغDqEYfmܜ-Ձ: sլaK |Zܸ{qs rZ˅VAڼex7n7HIDU'4zĽ&邊ƵUi)}Qs rNfhGl(i>_b0ff|$tmX8ݝ!n }̰56 %|xxI8D`jAsSn 1O[ϗ j AiNZ|W9{c3acI3FyܘCxo.T;VuYѦњd#Ȧ`vq 4 Ƙ79@}Iv&U_y܏JҷaR#%|x,q9NhfYYyAipQ[ĵY2ۦbQ2y?`@bCnWV\$_;yo\<)JMTo5-s.jWuY'JsmWoNiGT`5U1+hz+s1 [^t~c31