bind-chroot-32:9.16.23-4> )lp b879ec4541875fd56e151a3815ad35584a046ffb774411fe5b05c57fc464a2676431104ddb105eb96ad62daddc725b2987eff33fAdBUɖZ2!"<>F3?3d  _(, 4@djp  T      T  t       t   D  t  ) ( e8 l9 :)>+>?+F@+NF+VG+l H+ I,l J,X,Y,\, ]-T ^.Ub/d/e/f/l/t0 u0 v1w1d x1 y2dz2h2x33$3(3.3p3tCbind-chroot9.16.234 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak bQlocalhostMPLv2.0Unspecifiedhttps://www.isc.org/downloads/bind/linuxsw_64 if [ $1 -eq 1 ] && [ -x /usr/bin/systemctl ]; then # Initial installation /usr/bin/systemctl --no-reload preset named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x /usr/bin/systemctl ]; then # Package removal, not upgrade if [ -d /run/systemd/system ]; then /usr/bin/systemctl --no-reload disable --now named-chroot.service named-chroot-setup.service || : else /usr/bin/systemctl --no-reload disable named-chroot.service named-chroot-setup.service || : fi fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x /usr/bin/systemctl ]; then # Package upgrade, not uninstall for unit in named-chroot.service; do /usr/bin/systemctl set-property $unit Markers=+needs-restart || : done fis AA!!!!AAAA聠AAAAAAAAAAAAAACA bTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbTbT63b134688b419e30f614a7eb61857d28c82f5ac6b48454dbe39964cd334ed99f67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd6786fbc88c7929fadf217cf2286f2eb03b6fba14843e5da40ad43c0022dd71c3a../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.16.23-4.src.rpmbind-chrootbind-chroot(sw_64-64)config(bind-chroot)@      /bin/bash/bin/sh/bin/sh/bin/sh/bin/shbind(sw_64-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)32:9.16.23-432:9.16.23-43.0.4-14.6.0-14.0-15.2-14.17.0aZ@aeaa@aaya /```@`t6@`t6@`m`H`Gc@`3_@_@_ǁ_ _i@_a@^y^ϧ^0^|@^v^t@^s^jiangheng - 9.16.23-4jiangheng - 9.16.23-3jiangheng - 9.16.23-2jiangheng - 9.16.23-1jiangheng - 9.11.21-4.h9jiangheng - 9.11.21-4.h8jiangheng - 9.11.21-4.h7jiangheng - 9.11.21-4.h6jiangheng - 9.11.21-4.h5jiangheng - 9.11.21-4.h4zhujunhao - 9.11.21-4.h3jiangheng - 9.11.21-4.h2jiangheng - 9.11.21-4.h1zhouyihang - 9.11.4-17.h11yuboyun - 9.11.4-17.h10zhouyihang - 9.11.4-17.h9zhouyihang - 9.11.4-17.h8xihaochen - 9.11.4-17.h7yuboyun - 9.11.4-17.h6yuboyun - 9.11.4-17.h5yuboyun - 9.11.4-17.h4yuboyun - 9.11.4-17.h3gaihuiying - 9.11.4-17.h2gaihuiying - 9.11.4-17.h1liaichun - 9.11.4-17liaichun - 9.11.4-16liaichun - 9.11.4-15wangli - 9.11.4-14songnannan - 9.11.4-13- Type:bugfix - CVE:NA - SUG:NA - DESC:remove not enabled option in named.conf- Type:bugfix - CVE:NA - SUG:NA - DESC:remove set-timeout-inteval-of-some-cases-to-600s.patch specify ISC_TASK_WORKERS value to fix some test cases execute time too long- Type:bugfix - CVE:NA - SUG:NA - DESC:set timeout inteval of some cases to 600s- DESC:update to 9.16.23- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:CVE - CVE:CVE-2021-25219 - SUG:NA - DESC:fix CVE-2021-25219- Type:bugfix - CVE:NA - SUG:NA - DESC:give zspill its own lock fix tasan error fix data race Correctly encode LOC records with non integer negative isc_ratelimiter needs to hold a reference to its task dig +bufsize=0 failed to disable EDNS as a side effect Lock access to ctx->blocked as it is updated by multiple threads Only read dns_master_indent and dns_master_indentstr in named Defer read of zl->server and zl->reconfig Break lock order loop by sending TAT in an event Handle DNS_R_NCACHENXRRSET in fetch_callback_{dnskey,validator}() Unload a zone if a transfer breaks its SOA record Address inconsistencies in checking added RRsets dns_rdata_tostruct() should reject rdata with DNS_RDATA_UPDATE set- Type:bugfix - CVE: - SUG:NA - DESC:set print-time default to yes- Type:CVE - CVE:CVE-2021-25214 CVE-2021-25215 - SUG:NA - DESC:fix CVE-2021-25214 CVE-2021-25215- Type:bugfix - CVE:NA - SUG:NA - DESC:fix no response when execute rndc addzone command- Type:bugfix - CVE:NA - SUG:NA - DESC:remove GeoIP and libdb- Type:bugfix - CVE:NA - SUG:NA - DESC:fix the upgrade installtion failure- Type:bugfix - CVE:NA - SUG:NA - DESC:update version to 9.11.21-4.h1- Type:bugfix - CVE:NA - SUG:NA - DESC:set geoip-use-ecs default to no- Type:bugfix - CVE:NA - SUG:NA - DESC:free rbuf mempool didn t work for sizes less than sizeof void Reset dig exit code after a TCP connection is establ Prevent a race after zone load Fix isc_buffer_copyregion for auto reallocated buffe free tmpzonename and restart_master errors initalizing badcaches were not caught or clea set freed pointers to NULL cleanup allocated memory on error Fix a small memleak in delv pass the correct object to cfg_obj_log Try to fix crash at sigchase topdown Do not fail on NULL passed to OpenSSL_free error out if there are extra command line options correct errno to result translation properly detect period as last character in filename fail if ctime output is truncted Fix a race in fctx_cancelquery add missing MAYBE_UNLOCK Fix race in unix socket code when closing a socket t fix Ed448 length values for precomputed ASN.1 prefix don t overwrite the dns_master_loadfile result befor address NULL pointer dereferences address potential NULL pointer dereference Prevent query loops for misbehaving servers Lock di manager buffer_lock before accessing b Request exclusive access when crashing via fatal Assign fctx client when fctx is created rather when lock access to fctx nqueries acquire task lock before calling push_readyq for tas Call dns_dbiterator_destroy earlier to prevent poten Handle catopen errors Fixed crash when querying for non existing domain in Fixed rebinding protection bug when using forwarder initialize sockaddrdscp to prevent spurious output f Lock access to answer to silence TSAN Fix a data access race in resolver Address race between zone_maintenance and dns_zone_s rbtdb cleanup_dead_nodes should ignore alive nodes o make sure new_zone_lock is locked before unlocking i Prevent crash on dst initialization failure IPSECKEY require non zero length public keys NSEC3PARAM check that saltlen is consistent with the A6 return FORMERR in fromwire if bits are non zero Cast the original rcode to dns_ttl_t when setting ex Lock on msg SELECT_POKE_CLOSE as it triggers a tsan Lock access when updating reading manager epoll_even Take complete ownership of aclp before calling destr Take complete ownership of validatorp before calling Address lock order inversion It appears that you can t change what you are pollin counter used was read without the lock being held Missing locks in ns_lwresd_shutdown Use atomics to update counters Obtain a lock on the quota structure The node lock was released too early Address lock order inversion between the keytable an Pause dbiterator to release rwlock to prevent lock o Address lock order reversals when shutting down a vi Hold qid lock when calling deref_portentry as Lock zone before calling zone_namerd_tostr Address TSAN error between dns_rbt_findnode and subt Address data race in dns_stats_detach over reference Lock check of DNS_ZONEFLG_EXITING flag- Type:CVE - CVE:CVE-2020-8625 - SUG:NA - DESC:fix CVE-2020-8625- Type:CVE - CVE:CVE-2020-8619 - SUG:NA - DESC:fix CVE-2020-8619- Type:CVE - CVE:CVE-2020-8624 - SUG:NA - DESC:fix CVE-2020-8624- Type:bugfix - CVE:NA - SUG:restart - DESC:fix the difference at the macro definition using clock gettime instead of gettimeofday- Type:CVE - CVE:CVE-2020-8623 - SUG:restart - DESC:fix CVE-2020-8623- Type:CVE - CVE:CVE-2020-8622 - SUG:NA - DESC:add %patch6032 -p1 to fix CVE-2020-8622- Type:CVE - CVE:CVE-2020-8622 - SUG:restart - DESC:fix CVE-2020-8622- Type:cves - ID:CVE-2018-5744 CVE-2019-6467 CVE-2019-6471 CVE-2019-6477 - SUG:restart - DESC:backport patch to fix CVE-2018-5744 CVE-2019-6467 CVE-2019-6471 CVE-2019-6477- Type:cves - ID:CVE-2020-8616 CVE-2020-8617 - SUG:restart - DESC:backport patch to fix CVE-2020-8616 CVE-2020-8617- Type:bugfix - ID:NA - SUG:restart - DESC: modify named.root.key permissions from 600 to 644- Type:bugfix - ID:NA - SUG:restart - DESC:fix named service hangs and crashes- Type:bugfix - ID:NA - SUG:NA - DESC: modify key file permissions from 644 to 600- Type:bugfix - ID:NA - SUG:restart - DESC:Reenable crypto rand for DHCP, disable just entropy check- add gdb in buildrequires/bin/sh/bin/sh/bin/shlocalhost 1645760957  /var/named/chroot32:9.16.23-432:9.16.23-432:9.16.23-4   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlibbindGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib//var/named/chroot/usr/share//var/named/chroot/var/-O2 -g -mieeecpioxz2sw_64-openEuler-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRSC6S>'7if [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-87bb03bd97a2eb918f6467d62842a7d0bea45ee9ce5eadbaf88c440927787f4a7a3ef868b61871617830446c77c36b585d1a03df57a580da03e3faccce885673b?7zXZ !#,"; )] b2u Q{LTJ~n_YMJbnc*]J"CЎ^˪Èq)@0/N]o-UR!,Vi %Ǒon#ab,^2e5tLܮ?T -˼QXm[A <툘<є!Ma#.PG\g *kgVtNyUf_@w䣤KUy5e="gSEr 6|]}ΕB ?`$R=Sk9JxR,^(SЈ2~^9s@⮠L `)@f1 rBL&dX&]>%=HYz̻L(@T섶?2 KG>tbS=SSk>Sj0%B Lbh^Y x6wH>e.>: 짜<ӛ*-C1XF\nQ6g!JX _W7R-Lq쭴Yi]yZ&9䄙g mQAj?^1m)NePQtaw\KX3Id`A҉~=*}Ң̎wh[^ej ῼ U Z6|cG2E\1кӄF}Juʞqi%š}̪LSK)eam81Hv5}&UȭWkv(Wf/8[0=^!^c^s8=a>'$:rCmYu3?DW͞u\ceO7"~6dY7u/N^N4(}'غB5|UezEH" ּnO:^R-GXɪ4҇m-6dj- UA!}*Q!og6{6/tyЪD]qp13mك}`1LWpSjEgIe!jtJ/JZd۷%tϭ | Y ~`*#;u8WQ%SM"۝s[~͚~}l~Vv>wUt:#鴯,<2uFA!6824]1jA<:qzVݔsX}uܖ ducvj ξxi*!3&#M4&Τ2g~gfwc8W"RJn7uj}EQW3e;;;ӣ6Av@&]FTHL@ h3bB,觛+9 |$,J&082"{Z:T=Xfbzg4ef)x/Y*m,ꗯ$һ TϯGG^S47˖Tlheu=43 rrudoos7e|G#*XXՌѠ(1!`^ƆyyMiKn`amo?,i/:95 (J°?_QԈp-#H $I#u<5GIEv#RE(o`OT~lu5HVV6&kUկZϵl <:yjhljP xgtNg t`{neO`yT@V6Ub 2V9L}t8yvԀawkWv59€\  'F@B-VsΤ$`eU [7ŠCA?c&Wj֨/AawVpY-)%oӉyB׭"+ 4Պ nZo6O vE.T/:qK{$*q4sƒկ@_:?g;DW YZ