bind-chroot-32:9.18.24-2.red80> K KtĉH2!c31^ Wge support@red-soft.ru  Wglg}nK _o/(3fӤ%~2v-l# ߦ-AVv%xcŸ8mHa{^c`U]76tDdzgey κ ц37˻:%*W"3Q-{+NW`AWPs+R-ޘ.FWbvPG+ߴO|gE:{$Fl}΃Nk8,V1,߿&e^̕9c20b289b1c2483ea869e4694c0e861c8e52da4871872dfb1d423bfeabe525cbe7c87f3c120b9877f474bb459562fbb73f98e9f8' {!= "\>G?ud  $ g $<@FN  P      P  p       p   D  t  - ( x8 9 :F>?@G H< I JXY\8 ] ^bJdeflt ud vw4 x y4804Cbind-chroot9.18.242.red80 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak eղsstapel80.red-soft.ruredosredsoftMPL-2.0 AND ISC AND MIT AND BSD-3-Clause AND BSD-2-ClauseRED SOFTUnspecifiedhttps://www.isc.org/downloads/bind/linuxx86_64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fi AA!!!!AAAA聠AAAAAAAAAAAAAACA eճeճeճeճeճ eճ eճZeճZeճZeճZeճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ eճ 43a025934b4840c014afab9e440d101bf9f873ccdffe9e81a3b3afc8221fb9ec67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481ee23894b89bded8fbd9bfcb7ceead14a0ee6c64a1199fcdb57181e0b19b106cca2da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.24-2.red80.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(x86-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.18.24-2.red8032:9.18.24-2.red803.0.4-14.6.0-14.0-15.4.18-14.18.2eee7dǢ@d!c>@c47@Alexandr Subbotin - 32:9.18.24-2Dmitry Safonov - 32:9.18.24-1Dmitry Safonov - 32:9.18.19-1Dmitry Safonov - 32:9.18.16-2Vladislav Mitin - 32:9.18.16-1Vladislav Mitin - 32:9.16.27-1Vladislav Mitin - 32:9.16.16-4- Update changed b.root-servers.net address in hints- Update to 9.18.24 - fix CVE-2023-50387, CVE-2023-50868, CVE-2023-4408, CVE-2023-5517, - CVE-2023-5679- Update to stable 9.18.19 version- Rebuild with x86- update to 9.18.16- update to 9.16.27- fix CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178/bin/sh/bin/sh/bin/sh  /var/named/chroot32:9.18.24-2.red8032:9.18.24-2.red8032:9.18.24-2.red80   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redsoft/redsoft-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redsoft/redsoft-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19x86_64-redsoft-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-87f06cd4d3acdade5cecea3c0d6bc67b745d22821e94a942595494177a45e14cb1c6e968ff95d6c9c578b1fa3634f4bf5b56257e8a283d26d0be22329638e3942?(/huHZ-x \!JT |+,uS찡{Eՙ*NMq;+Z9= (##tC%o+ڟAu5tkcƄeZ'J4+pu$Y6"KٯoWl$selꋝ3M|V˴+P,Vw%tgjU_.vk[+OLkO*WѝML unDeG im>my]F2Ҿx*<4˧̕*Şvaj** ed!x_*MSkV`>˚q%uem/%aY Hk  d!uW,ta"@~\GFd{ #C DD<du\_蕒x(NQniMffE<]uyTlQvM86~ mpXJh7 AZ.T MNN, i!2*ygveN9検T*Oc;]`3ɪـ>>n; 5,dZX~sfdϧidH.X=n'2B+/7N>UzUz|OqzR(1Z. zF."64wŒ%L-.eE- CkYP}6u#!(Sx!CQQy_Ξm֚S̘6*.kVIH/?„0yڔmziJw+ϯfmi|/u1Y)zR?Ҭ/$1avbcC#+7t ] w0BH X8rE20"""D"I$uK7`C2'ה@.SԤyZse!ZLf^z=u;H@'2xjI9+ /DJ昷E6?1!8#4/{[q"A4ʚͦ1#HZڠcQJZl;S>0RM!m :;ؘ_N_X^B>؊XOp`Y-UW0"2xX5*[J+(ZG ㅈS YFTh`&;w(dL ![w@X KN97Jr >U ۯ?w jI¯y?sY]qXXq(ots 4) (W3$25Ehr=-.HW}+<-Neugc#>%d-^"Rb]Lu.b31;|–l죒RJ'<QCB Թwj26d#i?s{}FcBzT8+I:U9|xpէVӁeXݫI$4Vx`SY-N.Y(ubя7RΣWcDlNX ~K=Ì@ [ߎ`Xv75<?ny厅UO3qUh |-K4xN ԙטu6~5 B7$8_@wE<dpciƝ<Ip"-cxPtV{ KRлI0K?Dzh}`\˅I4$PW:Apr-)C:/A> ſ 7FSS6XCS`W?*]J0s+ [YXUxw,FA 5V}]<~2l1,+PO$|v*qi9JTKIIHt53c;