bind-chroot-32:9.18.21-3.oe24030>    f ;G|`u` ^ "Fׇ@bo'W ҂v>1BDef2 W, C2&yC5?M~YpjHH9M)pQVZΔ"׶ѧ$逎.%; #n(6&,*=QnPYSʟ>! |-ǥ_HkE9{'?rM-]׏AmOHxn{,5ppN͇da]\[@yPn9 뤸v?jS [[6a807a414917457300b704769b83da8779912b1282b302fb927cecbb7af9579929b875d31358c1d2a862e4415c1d34a62c5239be7y] 93.>G?d  $ g $8<D Yec|"" H" " " " " h" "  " |   ( 8 9  : >,?4@<FDGd"H"It"JXY\"]x"^bdeflt"uh"vw@"x"yPzTd\`Cbind-chroot9.18.213.oe2403 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak fdc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxx86_64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fi s AA!!!!AAAA聠AAAAAAAAAAAAAACA ffffffffffffffffffffffffffffffffff29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6bf3d73b7f7fa903ed777668127b5d4fa91588880bd825415ba52262d66e5c02763b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.21-3.oe2403.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(x86-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.18.21-3.oe240332:9.18.21-3.oe24033.0.4-14.6.0-14.0-15.2-14.18.2f@e~@e|@eev@cwc&@c@c=@cc5c47@cM@chengyechun - 32:9.18.21-3chengyechun - 32:9.18.21-2zhanghao - 32:9.18.21-1zhanghao - 32:9.16.37-6zhanghao - 32:9.16.37-5zhanghao - 32:9.16.37-4zhanghao - 32:9.16.37-3zhanghao - 32:9.16.37-2zhanghao - 32:9.16.37-1jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9- Type:CVE - CVE:CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076 - SUG:NA - DESC:fix CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076- Type:CVE - CVE:CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868 - SUG:NA - DESC:fix CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868- Type:requirement - CVE:NA - SUG:NA - DESC:version update to 9.18.21- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:CVE - CVE:CVE-2023-2911 - SUG:NA - DESC:fix CVE-2023-2911- Type:requirement - CVE:NA - SUG:NA - DESC:fix two patch from 9.16.23 and delete useless Patches- Type:bugfix - CVE:NA - SUG:NA - DESC:fix bind-9.18-zt-include-rwlock.patch- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:requirement - CVE:NA - SUG:NA - DESC: update to 9.16.37- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC: fix CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080 CVE-2022-2906 CVE-2022-2881- DESC: fix downgrade bind-utils conflict bind-dnssec-doc/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1722917013  !"/var/named/chroot32:9.18.21-3.oe240332:9.18.21-3.oe240332:9.18.21-3.oe2403   0-metadata_list-compact_tlv-bind-chroot-9.18.21-3.oe2403.x86_640-metadata_list-compact-bind-chroot-9.18.21-3.oe2403.x86_64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -grecord-gcc-switches -pipe -fstack-protector-strong -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection cpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyR-dtA\3@13if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8989f31abf21155c4beacb74b65e069d59ea466dba9a42d7b76bb37c13892d41a3c19423778fa36867567ff5c3dde6376c742cd021194b1c7fa4f28d1d4e0dd3e?7zXZ !#,1] b2u Q{LYZ`y"M)? gCI(xŭxN*]<996};"[lcx hM|- `vJEȂva)g{1#lx, )BAa`| 8dЧ;7u?ԺLEkN͂@ɟ9+w;οVb(Y~P9{Y${3u9-$Ƭ;1T*t[NH;Rdש 4!=>3lNbʙȶABB%.~|V; ¦蟥D7m|s"n>lĮOg2T3\ 31}u{Pv xpu@O|_OƓK[oi+*ڌR_מ 4 XÖXSӑPqt=[D_4Ͷ9v^RdLҼdiP sH~{ +T+ ݥ9趔[gph Z-fWx|Wd9~4ŏcGF\7徸#t/7kz}4/XI1tYC<: ~nl1O4o}Q 4 ̷n1DtEhl)%'>^^Dm;S'xshnfZPsd^Gyu؃<`. -E>nC=0PLhͻQ-ɱ;NN;ud/PҦa Y6OEס<3.gtq]LV[76\֛W>q 4@oOV_ F.ĸ m,;L u-;Sc7E5ܜM;n7_˨rȍ7Z+[Ly*QH, ;HscR߽㈎/_\oǓeDgrړX pAKO]@J~,18>Xo#:ҟKn oeXK.>Ӯ?LY\:*n vzfRv?MT @8"xah:&#lw:!ED)ԳcF_C7Fgy,[kbrfpsAd̙ QDY$>jd>:XrwlU{;<L~N "`8NbH*,:?LY,%#_ũ^'e)Q9"**# *%mg$"D]*º[q7g'o=0ə=zgvQ:ݢ={Ar_i5θ3t+2i $c޲L,t9ЃI~gPWK:ƨK ǖ ܼ&W\ȥT~J@a=EWqVEe_h2,ӽg؆bM/b=ʢꅷ"PJ+Ѐ[!HW<+Oҹԭ+$p{7ɉ`~Ry3R:@# Uf}!4=@,Mʸh4^Pn旲Q8_*1YO*;U7SW_659ɻ= g!$nhb}\zgDX3iTQN ?>VE\NFA/l9[svu1}>fdʐ6Lp+ς,QwXqweh68 \3 cB76giK^(5{d #scu>I~ *3t'O$˼؁eGg/H;_li3[MW/#ǂ;Bw;`ogU׶iɮ=?\A?0'J0_s ;t1HMSG%7O7+5E}he1-d //6qJ ٕo8=F놙d;O/N/;$"s4˚|ۯa鱻"`I}x09ֽ(w{T8=8q΢gk`lW.w eꁪ[~AkEV5f/S W~:VZ$LJ>[j3_0d5Չ1F͜!H ]S!FBˈi@Uu+qs@ۍD<  9-<ثМީD"+SGE'mW]1HSί۩ѧx!B`UF(PW_-0Fgv:H5RPXw*k%i\nUlejKɏa:yi$wf7ʻNrٹR77d4i@/R|PuC0){21 ^Z {o;!1?;As HAbh+ޕS dy:7iJ\)H IBrV7PY ;XNsz` *xvZ`(8쩡c)h{n5MجD$ߙxƀHۆŀt'w]Rl)&b< YZ