bind-chroot-32:9.16.23-24.el9_5.3> M Mv ĉJ4!!%joLne)Ip-Bm5 ']greleng@rockylinux.org p-Bm5 ']-l{/d~"E] @%ZQjނҧZu;h2fʳ%AJțL@1"n-^DD.!P0fMz_*TjMT⯂^*gj^03ѷE‚N#OTi$l€5NnsFq9{]$&2DR,SpuQewhL #! H V6y3mB lG=9 8*^[M[sYUI )u4klfP\nY (AVCBL+qo^iZD AV(yiQMja8|L0Lu '#O_Tj$n-ixr(ZTBO%BAk3SNg1n`85RUzOQ.(gidEX=EA?W $1_cK R?Ǯ1c4b27d94934090356ca8906d2dd395981f6453156f467d3bb65ae0cf4df7e832fda3520e8bfb073429edbfc2f2f620423ca7156.o/b%i֤%I">G!?!d$ ( k$(X\l  !! ! ! ! ! ! l! !  ! t   ( 8 9 8:>?@&G0!H!I8!JYXlYx\!]@!^Ibd=eBfGlJtd!u!vlw!x@!y i t x ~  Cbind-chroot9.16.2324.el9_5.3 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak gYpb-43346488-6adf-469b-9e00-eebf101477b6-b-s390xRocky Linux 9.5Rocky Enterprise Software FoundationMPLv2.0Rocky Linux Build System (Peridot) Unspecifiedhttps://www.isc.org/downloads/bind/linuxs390x if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fis AA!!!!AAAA聠AAAAAAAAAAAAAAACA ggggggggggggggggggggggggggggggggg2be082b8958381ea6413eeed42028c97893c58570692e79eb9f49fdfabc302a467eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e6da77cadc4d6f46cb0560954fd1b7dc65eb8cedf87c92d09224ea34596492bd62da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootrootnamednamednamednamednamedbind-9.16.23-24.el9_5.3.src.rpmbind-chrootbind-chroot(s390-64)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(s390-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.16.23-24.el9_5.332:9.16.23-24.el9_5.33.0.4-14.6.0-14.0-15.4.18-14.16.1.3ggRgRffaff&@fU@f"@fg@eBe@eqe d}dc@c@Petr Menšík - 32:9.16.23-24.3Petr Menšík - 32:9.16.23-24.2Petr Menšík - 32:9.16.23-24.1Petr Menšík - 32:9.16.23-24Petr Menšík - 32:9.16.23-23Petr Menšík - 32:9.16.23-22Petr Menšík - 32:9.16.23-21Petr Menšík - 32:9.16.23-20Petr Menšík - 32:9.11.36-19Petr Menšík - 32:9.16.23-18Petr Menšík - 32:9.16.23-17Petr Menšík - 32:9.16.23-16Petr Menšík - 32:9.16.23-15Petr Menšík - 32:9.16.23-14Petr Menšík - 32:9.16.23-13Petr Menšík - 32:9.16.23-12Petr Menšík - 32:9.16.23-11Petr Menšík - 32:9.16.23-10- Fix test backport changes- Limit additional section records CPU processing (CVE-2024-11187)- Switch to autopatch changes applying- Minor fix of reclimit test backport (CVE-2024-1737)- Backport addition of max-records-per-type and max-records-per-type options- Resolve CVE-2024-1975 - Resolve CVE-2024-1737 - Resolve CVE-2024-4076 - Add ability to change runtime limits for max types and records per name- Increase size of hazard pointer array (RHEL-39131)- Ensure bind CVE fixes hits public Stream repository- Ensure incompatible bind-dyndb-ldap is not accepted- Prevent crashing at masterformat system test (CVE-2023-6516)- Import tests for large DNS messages fix - Add downstream change complementing CVE-2023-50387- Prevent increased CPU load on large DNS messages (CVE-2023-4408) - Prevent assertion failure when nxdomain-redirect is used with RFC 1918 reverse zones (CVE-2023-5517) - Prevent assertion failure if DNS64 and serve-stale is used (CVE-2023-5679) - Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516) - Prevent increased CPU consumption in DNSSEC validator (CVE-2023-50387 CVE-2023-50868)- Update addresses of b.root-servers.net (RHEL-18188)- Limit the amount of recursion possible in control channel (CVE-2023-3341)- Prevent possible endless loop when refreshing stale data (CVE-2023-2911)- Strengten cache cleaning to prevent overflowing configured limit (CVE-2023-2828)- Correct backport issue in statistics rendering fix (#2126912)- Handle subtle difference between upstream and rhel (CVE-2022-3094)/bin/sh/bin/sh/bin/sh  !/var/named/chroot32:9.16.23-24.el9_5.332:9.16.23-24.el9_5.332:9.16.23-24.el9_5.3   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindnamedGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=z14 -mtune=z15 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19s390x-redhat-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-84329dca0eb4b4d37e5a7f58fb864e0ea38ca1bedde916f35b57d9635db297091af719221fca91a8645011416d187d1e49a5c777f7ef44c8ccea6bb2a97b5555b?(/hmHY-,a \!JT (4AEnkL"uT7"DXL\&0I|atC%o+ ZQWC6 aL\{Y4N3 WGjJ*d[KvFJH*='XOƪة>ӄiL{bQX/(/y{=T>t_Zyb}]{~TپSt&w:W7Sy6cf#ig\X2Rnw% h]P(g0B$aa5`I<GA&AFhx,p4 xAi8M.HAã2:E'iT23FLB{V:L+_'*cFi]uJbOqʥ"W?ʏʤqJYIzVLK?t !t;- %FO g>A6)s%ȆJw&e;ǧ:hYH%Fkt4EJZ,.2ϲy\It`e[/bMXH$ZC([Րz+P i?M$r=HXLDïi:(Io\^)EU 0%ج۬9n9S/<*G !  : [IMF5YkTBY9Bi@eZ[`lJޙ]d9)t1] $+g p.4 A%K P3'{> cg'2B+c&=>ɷ&TJ-QdH$ZJDK Ed8j H y Z,Kٺ@{E [֞<m,z[G:CEmybݻj?Ul=L(LN%PtԽC,=> =۬5D1mU\r׬~aU!cU^ `)ӔV_RG:'}<>yO/rL$f+:: Ln>|CW5R˚HR  X4q%P ÈH@I(a$u7C2&m\RowDc\W?}ctb𘎯_yI3 ^I$dn&Pn9u!ّͺB MyJ?NorJ{8+vUK okv[]cKn0)Wh?"!jCMպ;xo_P-~G'zW&/eZ8q DJoEBW*5+&̲T=m*ӒzG4>2s/Q"tW1+[tMLXvgDBi("A#ьvMH CҥԅP]Hg^ Zś*n OCf$Y=ճ2s+)c&p3:K[J\Dp ]} RD~t#\|p tы\b= 0 c=$e.ʴK"Di+%zXP n0ά D$&BJ,ccS ڡI' 8@Ѳ|ӹbnG[%*Uv|*j(+njƶ95Ne :9T79PKp_nTYAIjB;tsظ(X'$aJ 5wOl`پw6 0&9ӱhްg8:&@HkCO*3ޭtl 9B9ɧKY=}\%^qPuc^Kn.| b D~X#4(MURG{ p}t%\ ,cv9Yzwjjqq7 x2k6BE qNےi^xuV=ۓٺGֵ;@jaBgq^OAw Wpr66'=!s/6 Qx |ONA8A T;~{u H6yEIbŵ