bind-chroot-32:9.18.21-3.oe24090>    fHl ;G|`u`  E`, Hb}9'֘J[Vd;I!~Bd俫7 ПIb/~I횛6e{O' \W(''tBlr NLbvz8@lZ8-|**US 2Zu70I06 25RG[rIS1ja{PBMwlc #5| !$1KwWfI݆>{[// LA#5i1UXmӝ&psXKM _Nhp=v%g$xڔnvQ,W@ϊڎ̂eIgsyZ)ĥF*eV3341dc4ed930de3fa13101c93ad8ddcdad8e97e6a645e8b99af1ed9773582e2d3a37577dc62e5b20f0c8fc5c3bb708f924be58ff/yܓ(+ԶV>G?d  $ g $8<D Yed|"" H" " " " " h" "  " |   ( 8 9 : >4?<@DFLGl"H"I|"JXY\"]"^bdeflt"ut"vwL"x"y\z`p &hlCbind-chroot9.18.213.oe2409 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak fC\dc-64g.compass-ciMPLv2.0http://openeuler.orgUnspecifiedhttps://www.isc.org/downloads/bind/linuxriscv64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" ] && [ "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/bin/systemctl try-restart named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAACA fHNfHNfGfGfGfGfGfGfHNfHNfHNfHNfGfGfGfGfGfGfGfGfGfGfGfGfGfGfGfGfGfGfGfGfGfG29ee458080c5457fc9031ed46c1ab762b24caab3b9ff39307ea7cce899edadf6306f047e72a2c8eb97f8be7cbbbef20b513ddb8bd595888609dc25f712fe5edb63b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.21-3.oe2409.src.rpmbind-chrootbind-chroot(riscv-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(riscv-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.18.21-3.oe240932:9.18.21-3.oe24093.0.4-14.6.0-14.0-15.2-14.18.2f@e~@e|@eev@cwc&@c@c=@cc5c47@cM@chengyechun - 32:9.18.21-3chengyechun - 32:9.18.21-2zhanghao - 32:9.18.21-1zhanghao - 32:9.16.37-6zhanghao - 32:9.16.37-5zhanghao - 32:9.16.37-4zhanghao - 32:9.16.37-3zhanghao - 32:9.16.37-2zhanghao - 32:9.16.37-1jiangheng - 32:9.16.23-12huangyu - 32:9.16.23-11huangyu - 32:9.16.23-10yangchenguang - 32:9.16.23-9- Type:CVE - CVE:CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076 - SUG:NA - DESC:fix CVE-2024-0760,CVE-2024-1737,CVE-2024-1975,CVE-2024-4076- Type:CVE - CVE:CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868 - SUG:NA - DESC:fix CVE-2023-4408 CVE-2023-5517 CVE-2023-5679 CVE-2023-50387 CVE-2023-50868- Type:requirement - CVE:NA - SUG:NA - DESC:version update to 9.18.21- Type:CVE - CVE:CVE-2023-3341 - SUG:NA - DESC:fix CVE-2023-3341- Type:CVE - CVE:CVE-2023-2911 - SUG:NA - DESC:fix CVE-2023-2911- Type:requirement - CVE:NA - SUG:NA - DESC:fix two patch from 9.16.23 and delete useless Patches- Type:bugfix - CVE:NA - SUG:NA - DESC:fix bind-9.18-zt-include-rwlock.patch- Type:bugfix - CVE:NA - SUG:NA - DESC:fix output expected information when install bing-sdborbind-sdb-chroot- Type:requirement - CVE:NA - SUG:NA - DESC: update to 9.16.37- Type:bugfix - CVE:NA - SUG:NA - DESC: backport some patches from community- Type:bugfix - CVE:NA - SUG:NA - DESC: Fix catalog zone reconfiguration crash Improve the logging on failed TCP accept Separate the locked parts of dns_zone_catz_enable-di Check if key-metadata is modified before writing Fix CID-352776 Concurrent data access violations Require valid key for dst_key functions- DESC: fix CVE-2022-2795 CVE-2022-38177 CVE-2022-38178 CVE-2022-3080 CVE-2022-2906 CVE-2022-2881- DESC: fix downgrade bind-utils conflict bind-dnssec-doc/bin/sh/bin/sh/bin/shdc-64g.compass-ci 1727546204  !"/var/named/chroot32:9.18.21-3.oe240932:9.18.21-3.oe240932:9.18.21-3.oe2409   0-metadata_list-compact_tlv-bind-chroot-9.18.21-3.oe2409.riscv640-metadata_list-compact-bind-chroot-9.18.21-3.oe2409.riscv64named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc/ima/digest_lists.tlv//etc/ima/digest_lists//etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -grecord-gcc-switches -pipe -fstack-protector-strong -fgcc-compatible -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS --config /usr/lib/rpm/generic-hardened-clang.cfg -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2riscv64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRa N͟e2*Mdif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-84d825252cecd438514a379ea4c8aa414013c9142821f68f99150095dfca2926d92e31693faffe54828599e8864ded294e5610ade0d8f4afa0d75bc53e8fd6c8e?7zXZ !#,'; ] b2u Q{LY]Z}&eBhcܒ&9g [~%a#~oysj 7F+pha4s y{{7!d5ͦpkA)F߁iKj9I3dPfj;>M/a9b7{3q22L'08BGC î /m~ V)J*秡mΐKC, "ڧ09h%Tv@yȡm,|!YbU 9nJĺfiGX.݌FD3F$J{gKQK|i]7Þlp"lAoeZdqqN'Й g/QjDWejnPg'Zy^qVC)b75myhF<loV'LOb_ũΏ.=^";6$_ƪO.,.^~0},bx*d)ȴU;R@Oeb\@6bD{='0t#&րFWgUWMRۯirЄf ou6YZ[PýD ^ Xe <Ɍ`v6T_Jz3YbJx|qKK»}j]#5qZ9"n@y0?&OBY[0(\怅GRgXG΁CJy-Dwu)p̶Dkz|Q*« @Nq^v`zqc \3b W!W=_Ah^ klc)zpHF\1ϥkoGr^;4Je')`:]ɕ2WA߿K`?J6UTG0GTBA_q%̃ף8l ~6gޕE$QɈpP4_nˎ ]R Kœ0,GdLֶ5%ݕoF(楪i4i4[(AÞNߞzYdLdp 8Y`$Һp/wu}jO6vӉ!'JVlZH;㤫/UbരehHѐH!%ڧpYn LT,AG+F5my 2ߍ{1'FQW܄-/_jp1 4?Lirp(yvzt#_TĜr.jxFkT0躇3"L;ZRk悸p)3 Re'Fҙ C}aݽF?( 81 L~~A:k"o:-~q>_n \{nfJ&0D w[hU HgI.*q(LTNt !uzFm:cuJq].*Rfy|Ár{_2/6y fnm^Q ddLO,xZxKӛ+h@+t}v#ԯSx>=z[Ru݁IC`sbxbpa0CxW5n"$@]IZ&mIE6\>p}ĬJ *@Xyr/& nϋC=4?˦?<8Sju^dlX"^^oB+̀5`],( 2_(d۔ҭ 5I2{}z, 3a8QzL/o+)g'6wwQl>^vP(S3> PBw)_ 7?Θ!r*UY˝ne镵 xL q,@Ul>V5 0pozȬZįX9zg?Lߘ*g使L8/NGfVe}↡YkWe[~"j͝wȮ.s{2RX ijY6ǽYר(sZAlW#dkeh@ģ9QFZܠЖ{Z|`7K.w̓-+r zD>O0 -P Fj1T̴4肢%\//VN+pƪH iZsL: iH(YdҔa J uSlN`L YZ