bind-chroot-32:9.18.21-3.oe24030>    f ;G|`u`  cqU>>X9%0LJl9q.Hk)R,|?GGղy:.%o`w"8Z& |A#T~|:¹)mx(R%`vD6K%WaN_DYU|BD۾*Ϗ,kx .bq Ōgu*J-Vgr 9eB ʽyѾEP}͐]ɌKΉ@Mվk(l9W{W$2bYB.N%th&S^vJ!q-HC MҚ7mAM&røɍc7Wd691cb9cf8903adc3eb300dd1d989db4ea61984fcb6a48a1dfbd0ec429507ebb3c93f051ac9b45f6a02b5169b5a6189fbaa4b768e7mK>.}>G?d  $ g $8<D Yed|"" H" " " " " h" "  " |   ( 8 9 : >4?<@DFLGl"H"I|"JXY\"]"^bdeflt"u\"vw4"x"yDzHXPTCbind-chroot9.18.213.oe2403 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak f"dc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxaarch64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fi s AA!!!!AAAA聠AAAAAAAAAAAAAACA fffffff{f{fffff{f{f{f{f{f{f{f{f{f{f{f{f{f{f{f{f{f{f{f{f{f{29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6bf3d73b7f7fa903ed777668127b5d4fa91588880bd825415ba52262d66e5c02763b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.21-3.oe2403.src.rpmbind-chrootbind-chroot(aarch-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(aarch-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.18.21-3.oe240332:9.18.21-3.oe24033.0.4-14.6.0-14.0-15.2-14.18.2f@e~@e|@eev@cwc&@c@c=@cc5c47@cM@chengyechun - 32:9.18.21-3chengyechun - 32:9.18.21-2zhanghao - 32:9.18.21-1zhanghao - 32:9.16.37-6zhanghao - 32:9.16.37-5zhanghao - 32:9.16.37-4zhanghao - 32:9.16.37-3zhanghao - 32:9.16.37-2zhanghao - 32:9.16.37-1jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9- Type:CVE - CVE:CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076 - SUG:NA - DESC:fix CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076- Type:CVE - CVE:CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868 - SUG:NA - DESC:fix CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868- Type:requirement - CVE:NA - SUG:NA - DESC:version update to 9.18.21- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:CVE - CVE:CVE-2023-2911 - SUG:NA - DESC:fix CVE-2023-2911- Type:requirement - CVE:NA - SUG:NA - DESC:fix two patch from 9.16.23 and delete useless Patches- Type:bugfix - CVE:NA - SUG:NA - DESC:fix bind-9.18-zt-include-rwlock.patch- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:requirement - CVE:NA - SUG:NA - DESC: update to 9.16.37- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC: fix CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080 CVE-2022-2906 CVE-2022-2881- DESC: fix downgrade bind-utils conflict bind-dnssec-doc/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1722918178  !"/var/named/chroot32:9.18.21-3.oe240332:9.18.21-3.oe240332:9.18.21-3.oe2403   0-metadata_list-compact_tlv-bind-chroot-9.18.21-3.oe2403.aarch640-metadata_list-compact-bind-chroot-9.18.21-3.oe2403.aarch64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -grecord-gcc-switches -pipe -fstack-protector-strong -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRm7] 6`if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-812ec4b878ede8ee611e058cdeb355fa36b595ab2419fdcc9226f32a594fc34c00a361315386e7e2bad8d52537285b2f62c8ac7ff1926eb7bcd1ac940b7280e23?7zXZ !#,1] b2u Q{LYZ`d^kSO ~=8GwQjXo?/1 q3c/uQ~9ʣ,Q?IXN緸HP:4T0QU2 b0~A:^ "mVrmI=Jk7oiFe@r6~ac_CRVuL(TuvC-j7ͻFf,{!|W jWzoHٽI>}>V jMj]_xZ-4Z#8}Ǹ$zi>$騢£d)3A{oz8hF:#knr{nNߧ;'rZ;ҁ1oìN.J]45`~n^ۅJE,g xl5n@a0MJ OE]MYg 'H9hZs8T`QfnaoV+1b"NR)$41& R`au<ㅽxCGWeZr6%.Ւ@ izg)=P^H ԥ׈%E1.~,SG@pF1C1 ,sc{Z>6Q:'f1'ˬkbH#_Ĉ gAF*(E c藽okY;h S5ƇFhեhvxo:z(pUԣeh;hSlk;Jrg+>[k I-9,R2)Lc+Vugޗ8 ,VfFuc|P-b:ȩf`nrZ 8X rq. 5B q H-Ŧ)Jd/>^68ƤqGrY58;w>?1Jٹ D.KlM[׊3raJm+cGdY&BkM_c7%s]n?Ui ?1P^15guTzZ @gQ6Mu6}5rc0\45i{dyE}?lQ9DCJoVۻXzΣ2g 89Хxt~4(0d AYJog2@ twkB$1(lЫe9LI[ x)ҥNT/Xf%g& VisB R(v~"cDG-ݺĚRkzF]e2čVs a;AHz8Fa-}*ws XŧKXG4|Ҁqjdmq=I/Эc <\Rqvlxk5&ϭAdI貉gS#g%z[{}9#b¿q.p1J4FQ,;JYgI%>t8qXia^υ?-YHBaK{zDƺ_.'I!7Qpp`1B0g#";n|hqS~:oAf=\k>{U*/uhQSVN"zbjB/mXY>O7')8j\nB"3᡽:XܡArg`H"xP]u: {>aEZus |b ͚u2>cƣTDm T;, M_YLV݈c ue( ng4N`\E]D=.4TI^7&ۓE.1Pk5e)Q>"({7N=?-sMRpfneoT7PtNXb\ ŌP~j|VM;vX!Nc_: o<_j/6iӺAŖo]8)ϗyW\,\Λ +U 6+cN!Ʒnp'y[HV I ?V??4;#Jh]ix1@8XamG=jy*"R77YO.>RpZ)tgzJ21=p6H/bJ{5N Ge iU(, $6ǬZXzl2Kn"IPB rMUp'L]sZt#Fh . @v3D3>_2Z"2[Ib\5p[H[3lXA <9Ee*qh< s t|w Mτ^|F{kGrZBN}g֫ k1J;H)IHxm+ \!S,nu[򘚏B#]ٚ *ݰ a|d! qx[qE:K)v_6눺DD3%ͨYgr+^*]MWm#Ax4IoX /wJ_?2[0ѐ:6f=JҼJOif2PVb5p+g`0CXr&ZI,d@ 1z\0` m" 8o-ku5|d՞Ԝ*hY4.ɹKk'V ĭU'9_DA3g8,5Y>m֐R) ).FSWWi|g\C)"\Wƾ_!{>23fX.=g~[ F-|[G 4C =ڑV:tǿ -1*?j8bu;gNJsmH"#H o xCA,31dTCtTرpy".T;?ae0;n44p%pfjq(xǺ9 =]ntw}]sp΅$-y+ѲUbeXbqVO]xY=uDaz1oG5^y_Sl<KL+{SԱr*Vi#qe+OJÆ,L?M8i7Oy= R[fJ #.E~uN(e$qF҃/B͠i:I20 xa!σK4e=h)甄4 |zI5S̪%>ig?d Xoʖz/ P~.q-,"ʵKxN۬j;8l.q$W>Qd$@Vr[(G>'55=/-EeIe?r5n "]pϖ)Fflg}aL_I1.A4No#(퓜/mH)^(lAYK23#ed/O_1hѭC[5u/d?Yc"b閐٣./`FNNr  k]ߪ(_̃ƲA#J0W4EA=9\p(~~=6BLQ+;It~S< >pυ)lbN }cLm0Y >>)Iz=*`JPIv;}]15!9*g󐅹CP' VBYh7FG~d6 RxU [ =N (bNV,|ۄ0N;{1M4q Lj-q_j q+Q>3?Fyʕ*o$xe+Vf"A36& =2i&n)QO9>ڧz<`@1#ߑKdG1Vc#?p&J>#.U M2S g @axPy tǝjRωwBxt%GYAKS@;Ǧ!"/K']oO2!1~yPv3Huz\ȈClr!4_gZq ZO;$:${>`@'+=l!xW:/mmS4E4ViCƐzi CE+B=k5U(*CB/H;2w0O zJ#]0%5j[:Avj 68n~+RSr,&{@(#&b