bind-chroot-32:9.18.19-1.red80> K KtĉH2!c31^ Wgehsupport@red-soft.ru  Wgj~hDdJb_©<b3  xeHe~^\(%(yv' h)ĢUd_hX\H%MHNpAV #4 5!ԍ2 '"B(Furr<0o!bյɋAZx2U~ce,I?̋G ?d  $ g $<@FN  P      P  p       p   D  t  - ( x8 9 :>?@G H I J8XLYX\ ] ^bdCeHfMlPth u vhw x8 y]hlrCbind-chroot9.18.191.red80 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak ek=stapel80.red-soft.ruredosredsoftMPL-2.0 AND ISC AND MIT AND BSD-3-Clause AND BSD-2-ClauseRED SOFTUnspecifiedhttps://www.isc.org/downloads/bind/linuxi686 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fi AA!!!!AAAA聠AAAAAAAAAAAAAACA elUelUelUelUel;el;elelelelel;el;el;el;el;el;el;el;el;el;el;el;el;el;el;el;el;el;el;el;el;el;43a025934b4840c014afab9e440d101bf9f873ccdffe9e81a3b3afc8221fb9ec67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481ee23894b89bded8fbd9bfcb7ceead14a0ee6c64a1199fcdb57181e0b19b106cca2da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.19-1.red80.src.rpmbind-chrootbind-chroot(x86-32)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(x86-32)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.18.19-1.red8032:9.18.19-1.red803.0.4-14.6.0-14.0-15.4.18-14.18.0e7dǢ@d!c>@c47@a@Dmitry Safonov - 32:9.18.19-1Dmitry Safonov - 32:9.18.16-2Vladislav Mitin - 32:9.18.16-1Vladislav Mitin - 32:9.16.27-1Vladislav Mitin - 32:9.16.16-4Vladislav Mitin - 32:9.16.16-3- Update to stable 9.18.19 version- Rebuild with x86- update to 9.18.16- update to 9.16.27- fix CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178- Rebuild for os73-updates - Update with fix CVE-2021-25219/bin/sh/bin/sh/bin/sh  /var/named/chroot32:9.18.19-1.red8032:9.18.19-1.red8032:9.18.19-1.red80   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlibbindGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redsoft/redsoft-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redsoft/redsoft-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19i686-redsoft-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8760d868cb7150e59ce8d06bd4d675c3ab3a29620cca4c498a5591b3f97f96354ffa861b336747ae7940cf6d84487766013e646874922f7262037ddbfa33be3c0?(/hHZ-|a \!JT |+,udİgKfar[i"kdA2鐯р44<=r|eXB;튍$rUzN4,U}S} j6IŚ^|'.I_Nz6ɩ}\%bĤ(}ML unDGN!}򺚍dQr+U/G'D2a y Luq"@ S :MGBh0QF%l4!̅gA)dt404 Nfbe拖\e6=+k;L+_'*_&y]uz+ObOqʥ"W?JʤqIYIzNLK?!tyW"$.>&<4˧̕*Şvaj,*ed!x_*MSkN`>˚q%mem/%aU H ĭjH]= ]צQ98\""(æ|$Fsz<U]{#r(7ohMffE<]yTj8ãlBtp@mvAsa+I*ABWBm64W4:,}q=oY_HDG?Y (+/d&1rthff$I  yɘ"8E"1""#D"I$uK7``CW'@ c6hwrAK`arRD[\$DUHɬC9L㈅>]`a:]DG0E?9b%/Ψa~LrF&piL,*v(be, ǃM'iKNr@flLJQLLUz3c]m(PDbL8t)D2ʆu'f@h?Fʺ - Ә> ߛ&54*>KoP4.^R̕px"$),k hSсt%}3ȣw?05nڲ?f.^zbjPBH- pOOYGqx=Q-lg&^#j_`gHA1ȸA3ν2._^^:> 0H1G3^TdUsSèzT5de =JqyGg$N̬f)rdޫr(~B&w,Wi}ƨe0%"!Mx ,Bdbqߕ1FLI2p"VCzFx hblu=Mazp I[z!"AkQ5f.QYZ@C8{҆t>^ɬ"1:oS;I 'nkP/bH^G()Y9iՕtT]ث Kqפ }1|z3