bind-chroot-32:9.18.21-3.oe24090>    f ;G|`u` t 42Cp_iDl_-fiHw\ Y}MM=fxڌfQu L_A N 㾰IH]%y~ l9mE7Alϥ!ǸQ? ?NroNP@W9 c(G/$pBm)CPk> i`V:Yg`iN%8;\ ?0p^ȿCgWu_)v̡0 D GQ!~M,ig/8Gu`!&Բf_pz]PB!"8k]~.~>En(b?NFl%~]zs1#r"Yva7aW 821bb240844651f96ba7d8388d01fb82118ce55fa38577c05baebc7396032cc94cfbc381589f40a4d6aaf094828af3133e76b9377S# 40>G?d  $ g $8<D Yec|"" H" " " " " h" "  " |   ( 8 9  : >,?4@<FDGd"H"It"JXY\"]x"^bdeflt"u"v w\"x"ylzp!,06x|Cbind-chroot9.18.213.oe2409 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak fdc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxx86_64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fi s AA!!!!AAAA聠AAAAAAAAAAAAAACA ffffffffffffffffffffffffffffffffff29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6bf3d73b7f7fa903ed777668127b5d4fa91588880bd825415ba52262d66e5c02763b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.21-3.oe2409.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(x86-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.18.21-3.oe240932:9.18.21-3.oe24093.0.4-14.6.0-14.0-15.2-14.18.2f@e~@e|@eev@cwc&@c@c=@cc5c47@cM@chengyechun - 32:9.18.21-3chengyechun - 32:9.18.21-2zhanghao - 32:9.18.21-1zhanghao - 32:9.16.37-6zhanghao - 32:9.16.37-5zhanghao - 32:9.16.37-4zhanghao - 32:9.16.37-3zhanghao - 32:9.16.37-2zhanghao - 32:9.16.37-1jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9- Type:CVE - CVE:CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076 - SUG:NA - DESC:fix CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076- Type:CVE - CVE:CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868 - SUG:NA - DESC:fix CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868- Type:requirement - CVE:NA - SUG:NA - DESC:version update to 9.18.21- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:CVE - CVE:CVE-2023-2911 - SUG:NA - DESC:fix CVE-2023-2911- Type:requirement - CVE:NA - SUG:NA - DESC:fix two patch from 9.16.23 and delete useless Patches- Type:bugfix - CVE:NA - SUG:NA - DESC:fix bind-9.18-zt-include-rwlock.patch- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:requirement - CVE:NA - SUG:NA - DESC: update to 9.16.37- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC: fix CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080 CVE-2022-2906 CVE-2022-2881- DESC: fix downgrade bind-utils conflict bind-dnssec-doc/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1727404422  !"/var/named/chroot32:9.18.21-3.oe240932:9.18.21-3.oe240932:9.18.21-3.oe2409   0-metadata_list-compact_tlv-bind-chroot-9.18.21-3.oe2409.x86_640-metadata_list-compact-bind-chroot-9.18.21-3.oe2409.x86_64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -g -grecord-gcc-switches -pipe -fstack-protector-strong -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection cpioxz2x86_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRun/RPif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-811c52c961c0cde2313223972b8ae5949de4cb18d62788fdca3afba23fc051ba88bd6fcec35bdc5639a9b7db8fc938330cc199c07bcacf6374d098a25a4a1a5c1?7zXZ !#,1] b2u Q{LY]Yy!r j*%K/P`p, }֜]f&3?[tВ2wЎHS VFmҥ D̏xpsmh\<&k.r?vڔb45{nYH b'TzMwzZV !of G)ܥFw ETTjja}as~!zG9C*ַ=kD5"XUA|]fEXxic,Cm._@h?nom*.AqSeA­BJUZzwj?rیb߶1s{|S#%2"F]A5#LOf@u`i'.=n \Q B9KxA!YsLwzxz8܅M3ru,`Њ^d|h_M~\i9y?P[n+v"KkX{"CZPМtm >[4 iطg/k]KphOf4U2~D 9dʮ_V?cAg@UWayEֹ&7G# HJe]'*X+ozX n+h4nRgs,|觧n@NU-g9K7SpέڍR{RWeiBIH0*ȁ+يZ/ոr:v GD){ R"?^3V 0v_GÓ;zN4nXİF)qt}H qYj10x\Î&Ї5+ &M)UثZ470KF:]W7˓ߓ UoRڔa( vVtw.c„륏`:tz$: Yw҇hW<m)@u@aM7@U=!լS!r4Qj/L3U7[#uBڦ' E%r`F]8@Ξ3?HB1 4!5WO \'xKIĊu\]uˮˌ\OܤI"G% >}*N26j-8jc}lqq(5-0O)j٥D R=vvfB@QP"ʔ%o,~=NpdZL `vshu_.q-T^Y|퐈=V t:ni6@3@l{( kg^+7q&A=1EF:^8Ac&,[Bé%s,|>npz ?!J$&$$$-%x=oJUNǰRZ" cO󹬴|8FbH İ’uN p) dj™$VȂw]I0OEN IƏ!m"KQp2lRb#wtҒ$ŕs|&PD Υ& /5'$V}pYx=!5AQ hxG}=o f8.\ I,+>Ss&, 8u2h#Hv^kfᣌ T[/3F_U\֮/'wXK'l-6$oJQlN/!d>/{ SCn@aU⢾\)QȪ]93}92c 6LrM7q0Sz%Ъ6  Oj~#W!Da[ckn,?G}J"bFDuf ]eċ8sƥ򆐎5Hm|Mc]I>Pu|Z`5oQj6SNy Cќ W3%BE {@@(і^s e= |D9Ӳj'rf?J};P<*4xP8j %y,9#5rzӪIr'-gK}w!d4^]LSXpŪ)1r"r[<NǀJ[|'yUU5{z}ryfvz%AABckQ1 B~yµ4T}d* W[6F=stiq,]!Ӧ ַzh3gysg/T/نGo2Z-@U.wrכAh;W rKR4{}n}\CRb)5X=rM9C⽜rZ: <]r\-D|nꬤ|ܭBK)JǓ^:=APr0bLH?&3AP=LK 9an4ܭL%`x}꒝x:8W6>z^aZ9ݑF%/!%ctTOc$bX6;Dgul5{7lĶr|}Z\o[~;b^H@&e%哥ʍ@{&ܧ˙ɌV^I*sX(c`$/^SVph[rRdƤ,Mxiz/ 㟏owVN$E6`Wj?{ 3{bj\ r)a?"0>:BB{!{;HD-7B(V0Zxk)BCNvow-|{.l:@&ugq U"+52kYn CabXʃ-hp>QEFwp0* UќpxVW+%x8#pV; < w\ a(<2 INTW(a"f4Mx}޳9U Ą, `e %jFke/f߁7j#^VcWgmx_Vg]} XB2M'v>3 UmXۚOr؜@7.]\4+,|Q%[$12'jU a9e~B;K fDže:ۦeoObs-YqK)l(h~Uo<'3v ]um7J#3~TxǔsNvZ;_FDa;XU"U5ʱʀ! WNFGM?BrՈ2%^tmjdc{; ":f CՑX)K+fuT鸀n>#'Tw,+p ܎ҖXW 5c}07M %&bQ9Ͷ YZ