bind-chroot-32:9.18.21-3.oe24090>    f ;G|`u` @fyj#!9QBhɒ>G.0vd/l!f$0&Ngl":&WWBO: GuS XF t e!ua4wPC.:;?[wzzHUaNCݸ`r|hY&t f~w_[o1C Q3F9:a8e61b41defc9e830c775764b5aeb0c28b1f99dca77efd453cf5fc943b1f34c49f1a4ff460d7777961b901764c10881611e2b9d27kxJ*WMq`+>G?d  $ g $8<D Yed|"" H" " " " " h" "  " |   ( 8 9 : >4?<@DFLGl"H"I|"JXY\"]"^bdeflt"u|"vwT"x"ydzhx$(.ptCbind-chroot9.18.213.oe2409 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak fdc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxaarch64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fi s AA!!!!AAAA聠AAAAAAAAAAAAAACA ffffffffffffffffffffffffffffffffff29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6bf3d73b7f7fa903ed777668127b5d4fa91588880bd825415ba52262d66e5c02763b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.21-3.oe2409.src.rpmbind-chrootbind-chroot(aarch-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(aarch-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.18.21-3.oe240932:9.18.21-3.oe24093.0.4-14.6.0-14.0-15.2-14.18.2f@e~@e|@eev@cwc&@c@c=@cc5c47@cM@chengyechun - 32:9.18.21-3chengyechun - 32:9.18.21-2zhanghao - 32:9.18.21-1zhanghao - 32:9.16.37-6zhanghao - 32:9.16.37-5zhanghao - 32:9.16.37-4zhanghao - 32:9.16.37-3zhanghao - 32:9.16.37-2zhanghao - 32:9.16.37-1jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9- Type:CVE - CVE:CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076 - SUG:NA - DESC:fix CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076- Type:CVE - CVE:CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868 - SUG:NA - DESC:fix CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868- Type:requirement - CVE:NA - SUG:NA - DESC:version update to 9.18.21- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:CVE - CVE:CVE-2023-2911 - SUG:NA - DESC:fix CVE-2023-2911- Type:requirement - CVE:NA - SUG:NA - DESC:fix two patch from 9.16.23 and delete useless Patches- Type:bugfix - CVE:NA - SUG:NA - DESC:fix bind-9.18-zt-include-rwlock.patch- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:requirement - CVE:NA - SUG:NA - DESC: update to 9.16.37- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC: fix CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080 CVE-2022-2906 CVE-2022-2881- DESC: fix downgrade bind-utils conflict bind-dnssec-doc/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1727404533  !"/var/named/chroot32:9.18.21-3.oe240932:9.18.21-3.oe240932:9.18.21-3.oe2409   0-metadata_list-compact_tlv-bind-chroot-9.18.21-3.oe2409.aarch640-metadata_list-compact-bind-chroot-9.18.21-3.oe2409.aarch64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -g -grecord-gcc-switches -pipe -fstack-protector-strong -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRpXlOi"Zۆif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8b1f2821da71445c57b55d1e9c58c887191e1f6903408a38f1525e92c32b6a83bcfda17fb1c6849e4d8f7fdf2c3f9f6b50f7c48e5857775536756c78426b578b0?7zXZ !#,1] b2u Q{LY]YyI^-ePwmwReV(P@./[V&`~"7Ahb_ž&H1sPv6T64܃HݢJ,^)b%!i I]XM3/CHYY㹾!gȔIdKNƪ= <_l;L߂_O 4^v 94`'ΈGjxV*ULfLXcI|҂0 曨^J C[sbts;!^Ĉz XXvw"Qe1jg6ˑFN˧VSr+(+^|{WGeW֢36thEP\@HAH' /mIր݈&ț(xvyLa'az; `YbCl06b\6HoAog:)z@7[xa4̆|GfH&Bfn[ٰxM(5jߒB,]WYe=l˒',z2Cnsū` 9 4R lkxA8܉Ͳ,0/2ǘbR~ k2&WĦd p2k Vٓ)(4,Ŏ`-%8*/Wy gЕUjHxA{꫏ L[Q:2%Addt}YF¸mpt;))qzbCCYv*f!ȏI)fl3vT{HA3) 92s_j_BmmWCľN֬d[p]^Uc]䓈kp$|\yfLYi9̿V@hT ' >e7-,QTEupgBt(%tuͰkR!n3&-r\נoqE6, a^*?`JSJ+s1~~vhrjĒ$mQ'VXA鰕UF.( qu_=ZFXrTYRj[ L mWڱ~@"ò '(XzB9Νm>H7'WqR'j]/ݮh"d^ZLpe0(2$fh/d[0B-6Tyz K׵ s=ʢ0FY'A-] /umIƔ~bB;Q=%7&^[}ĆUC,efTCL.{UA u4IV@f_VֿGZwG+"C q(&HL\{B`JS" *I}c8 maB[@ i\睭?7pFg`R0`8/ h9׌WAU)Nje3!<ľЦ!SQ'H{ #֬v_{G#| NLOT)FUMR;V1s3]m$ @!b AVd8WM#jꉋxԥdsu3',tlsihة3/*N3~IDz2#/4w0 @13n<&UVr }dT5&O,i;d;"W5\>5[ ĎQOH%}}h7r6^iHEQv#"ض; Xx|ps= yK0D,F$IҼ﹜T3_s'Ͱnl@R%ȳ@2k.>b?$U|1;^gagDa>/RqWxWY7L3ׁM  p/Y3!b8I\g~W׵ U85f`Z6Ph<ـ^M@*|>x[`ohVYH+-nٕw -uܸnzXZHy_}\V/nl:OG:nRO,I#>0?od^ioRDi|ye)D'Cu>r :ft|SL- "yDm՞;65- phNA:+ M0ʛ[{=#ZOqЀg= Vwԩ '<΍axG<ۍnYr%4f͋iZ rͱg"Zxw\`VaC/Qs=+7ظ;Ky q1Q=~DTPt8 ^1Ӝr][.L*\Av* Գ n+ER{ 3!;cX>q-e!(ƣFD~jF "ւTCڍw:tjilz>Р۶Ұ]Ju\:&exwϠ.elkمZ?Ajr]ԷҹX,ҏtυ@u߸ 룘@ N&-*9=F8כgʣ୎SM%h 1qPvCzWe ~?t*l*X7*4w0ۏhH&Ӗ]EK|G.U͛#]s>-MsƳۘufZ<F}dyߡ6rV(VN!=UPmYZ<+vYkw%mZ&m#DY1h}qpݏ?7I ._Xn(!ES|hI|HwuSgVDŽ&x&b YZ