bind-chroot-32:9.16.23-24.el9_5> M Mv ĉJ4!!%joLne)Ip-Bm5 ']g&releng@rockylinux.org p-Bm5 ']VI#hR֡8Dmkx@ae~>n""ԢW>O&G踩!LF35bA!uq?S [˒ D>MmCRQ]WQ1[L״U]0YeʧparcjnO2})lVhEx3!33l6Gt-7)G#A?#1d  $ g $X\l  !! ! ! ! ! ! l! !  ! p   ( 8 9 <:G>g?o@wG!H!I!JXY\!]!^b djeoftlwt!u !v w !x!l!y!!""""""Cbind-chroot9.16.2324.el9_5 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak g&Hpb-338a3799-7e94-44f8-a764-7451f864b902-b-aarch64Rocky Linux 9.5Rocky Enterprise Software FoundationMPLv2.0Rocky Linux Build System (Peridot) Unspecifiedhttps://www.isc.org/downloads/bind/linuxaarch64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAAACA g&$g&$g&$g&$g&g&g&'g&'g&'g&'g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&g&2be082b8958381ea6413eeed42028c97893c58570692e79eb9f49fdfabc302a467eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd62da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootrootnamednamednamednamednamedbind-9.16.23-24.el9_5.src.rpmbind-chrootbind-chroot(aarch-64)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(aarch-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.16.23-24.el9_532:9.16.23-24.el9_53.0.4-14.6.0-14.0-15.4.18-14.16.1.3ffaff&@fU@f"@fg@eBe@eqe d}dc@c@ccGc< @c< @c,N@Petr Menšík - 32:9.16.23-24Petr Menšík - 32:9.16.23-23Petr Menšík - 32:9.16.23-22Petr Menšík - 32:9.16.23-21Petr Menšík - 32:9.16.23-20Petr Menšík - 32:9.11.36-19Petr Menšík - 32:9.16.23-18Petr Menšík - 32:9.16.23-17Petr Menšík - 32:9.16.23-16Petr Menšík - 32:9.16.23-15Petr Menšík - 32:9.16.23-14Petr Menšík - 32:9.16.23-13Petr Menšík - 32:9.16.23-12Petr Menšík - 32:9.16.23-11Petr Menšík - 32:9.16.23-10Petr Menšík - 32:9.16.23-9Petr Menšík - 32:9.16.23-8Petr Menšík - 32:9.16.23-7Petr Menšík - 32:9.16.23-6Petr Menšík - 32:9.16.23-5- Minor fix of reclimit test backport (CVE-2024-1737)- Backport addition of max-records-per-type and max-records-per-type options- Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name- Increase size of hazard pointer array (RHEL-39131)- Ensure bind CVE fixes hits public Stream repository- Ensure incompatible bind-dyndb-ldap is not accepted- Prevent crashing at masterformat system test (CVE-2023-6516)- Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387- Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868)- Update addresses of b.root-servers.net (RHEL-18188)- Limit the amount of recursion possible in control channel (CVE-2023-3341)- Prevent possible endless loop when refreshing stale data (CVE-2023-2911)- Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828)- Correct backport issue in statistics rendering fix (#2126912)- Handle subtle difference between upstream and rhel (CVE-2022-3094)- Prevent flooding with UPDATE requests (CVE-2022-3094) - Handle RRSIG queries when server-stale is active (CVE-2022-3736) - Fix crash when soft-quota is reached and serve-stale is active (CVE-2022-3924)- Correct regression preventing bind-dyndb-ldap build (#2162795)- Prevent freeing zone during statistics rendering (#2101712)- Bound the amount of work performed for delegations (CVE-2022-2795) - Add /usr/lib64/named to bind-chroot (#2129466)- Fix possible serve-stale related crash (CVE-2022-3080) - Fix memory leak in ECDSA verify processing (CVE-2022-38177) - Fix memory leak in EdDSA verify processing (CVE-2022-38178)/bin/sh/bin/sh/bin/sh  !/var/named/chroot32:9.16.23-24.el9_532:9.16.23-24.el9_532:9.16.23-24.el9_5   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindnamedGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19aarch64-redhat-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8a2203cba128558c27d374ff194dcd8b16e485169812241908eed3fe5702ab49c2f89e9d4b5f0c8bc62cfb2d41a897db54593cf1980d4541a1a4a447d423ae0e8?(/heHY-,a \!JT (4AEnkL"uT7"DX5Tn3Ur,:@wW&rz8ƆݻGu +huxD] X(1arVf88*\b"DrV*Ȓ}l-vI*!bY>9bL>+2 EaN\4lSJˣ.~mkIQVwISe7Nҙ\݈ʏ\N!}򺚍dqI$byHݕ*ȗwBxHDXgM1.^/CwB[s [.KXI|lSJ bOM0v5OGku2 Jh/v& +XV]d0YeM2˶_Ś,H$]yE6qRWqB*8ǵ)dTN:"= _auQ` R jaKZYYe5rp9OWrU$_xUhCh+t8Bk#g֨ UŅgs (ʴ Sf32' sRb@|IV r\h0AJ>gF]O|:C ϪOdV Mz|oAM^[x|H$ZJDK Ed8j H y Z,YDb-]IDD 0=gyB)Yt,F źw߳/\2q|29;P&BS2tl֜eƴ!Vq]UNUEzY"L,ɫ~#Ԧlo+OtjRG:'}<>yO/rL$f+:: Ln>|CWP7bthdh$)HX"y4qJA$$7CW.g\S8{W,6$,}~`!_O_sI}$ya%F| 2 ᛻%c_;/dDqR|)R| ͉n[ ׀nf򪅯s3HN]SD6G핱~&FOU)(d@B>tmFS`R4 pE{=VuIN&=6=9^M#ϕna@>&Odͮh(H)Ii>pk@D :(cBjY[m噾{=4*VA>e10.N31xB>()@? w$°y *ܐuel'O+j!XOp Ḏ~ U[lvDDei# ^{rt_Qʅŗ f[[Z;NY19PfEbyL5a#Nk=H6O<ނƫCGBE'P JPx0;xX&ԓA(Z_SԜÚP jِU3LU @"B8u3O)jpQ FJ<5]M˥CHh0[8O>9]R֦ \0FOv>\+>sIO`G& qQ4ƧG%t79` ux`:׍N6JP\;MF Uu$+g:dχ{ٳ2N!Ga,$> Ă %:C =V%ZRend ю'yP}8eh`QnI]UWG+(`l0Щ5O=rjdӠo{W_\][ p/QݲmV؞QMĻCɪ0pvE DFN:"\`QxI̠FyP~"A9J6Uw=b9>&.