bind-chroot-32:9.18.24-5.red80> K KtĉH2!c31^ Wgfaזsupport@red-soft.ru  Wg\ 1p@út|ZA>tzy6w4%cͩuF!{ʓY4&) ?i\L/j`*Tc5"٨d5ě5hKе|Yzؽv n?mam@.&]NĞl ?yp$ˣH7~"v1:$ϲ`}2VEVt5" B1_YĉYPcLp% 82cf6caa05053f0da5701bd25892bd6e6ab446cb7ef56c12a9ac3822e3626dbb6b576982f0e8cbfaae8797eb6b8607fcdfa25e201d(x )]* "x>G?d  $ g $<@FN  P      P  p       p   D  t  - ( x8 9 : >?@G Hx I JX,Y8\t ] ^bdKePfUlXtp u vpw x@ yeptzCbind-chroot9.18.245.red80 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak f``qstapel80.red-soft.ruredosredsoftMPL-2.0 AND ISC AND MIT AND BSD-3-Clause AND BSD-2-ClauseRED SOFTUnspecifiedhttps://www.isc.org/downloads/bind/linuxi686 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fi AA!!!!AAAA聠AAAAAAAAAAAAAACA f`aAf`aAf`aAf`aAf`a)f`a)f`af`af`af`af`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)f`a)43a025934b4840c014afab9e440d101bf9f873ccdffe9e81a3b3afc8221fb9ec67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e57b3c2756f830c1282c416d8cbac779b357db2a39a7c5eb1e8eaa569c0102f702da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.24-5.red80.src.rpmbind-chrootbind-chroot(x86-32)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(x86-32)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.18.24-5.red8032:9.18.24-5.red803.0.4-14.6.0-14.0-15.4.18-14.18.2f`S@feeee7dǢ@d!c>@c47@Alexandr Subbotin - 32:9.18.24-5Alexandr Subbotin - 32:9.18.24-4Alexandr Subbotin - 32:9.18.24-3Alexandr Subbotin - 32:9.18.24-2Dmitry Safonov - 32:9.18.24-1Dmitry Safonov - 32:9.18.19-1Dmitry Safonov - 32:9.18.16-2Vladislav Mitin - 32:9.18.16-1Vladislav Mitin - 32:9.16.27-1Vladislav Mitin - 32:9.16.16-4- add start bind service to logrotate file- change ExecReload- add After rule to named-chroot.service- Update changed b.root-servers.net address in hints- Update to 9.18.24 - fix CVE-2023-50387, CVE-2023-50868, CVE-2023-4408, CVE-2023-5517, - CVE-2023-5679- Update to stable 9.18.19 version- Rebuild with x86- update to 9.18.16- update to 9.16.27- fix CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178/bin/sh/bin/sh/bin/sh  /var/named/chroot32:9.18.24-5.red8032:9.18.24-5.red8032:9.18.24-5.red80   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlibbindGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -U_FORTIFY_SOURCE -Wp,-U_FORTIFY_SOURCE -Wp,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redsoft/redsoft-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redsoft/redsoft-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19i686-redsoft-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-809d1dd011db6e877badbd3f416594b3c0f5588dd4bf63714fa8b181d0068b0e1e5be900ac03c93514422a1e88871c6c9d720a147204b7e4a4be0daa76e6ff205?(/hHj\(֭MV_`w!,xd:8   ^B!mM烾'%@ R'̇Dnx NUxOZt򰸩]5Uy"P= I5wi ƸJLm^.5딵U( 'f3׺Ee3zqWd YbWFK_um}|T+s[ZgUڼ0w,p{_Rj+~yqk oZX,2ګ VM̭0d6 f La,F" )492&$J"CM#@"لqB a`S1ڠ4$Fn`յ&']ZalA UV^ݞx/SДItޝ{<_P^Wpo66*xVglWR +*R8R"ດ6cҜt4*MJOBwIN5e42=R{xk²ΉWPn[wjeo-5\.}y#nɳvp]nɭ-dQgfe\_00jc_[6 ݔ*Fx6߰K[W;kS(þ{ 8c*n+彩츻R79rk󽕇 9YjhxLNAܽw` R(CTq+ >\Ua * 9u :ΘS}D~opckFY6*΅Zl*$y}x5H6! hYʾva/7Qz\E kiY{'XEkb ,(ci}9z|Nw_>~ O8\*>RNVQ.L҈vK[ 4T;CbYՇ+c{7ۮ3}U!l8x0-0{~pĄq9 %H̹uɸ&9R#'/p3ɗ4@/U/FC~w  %o H lz}þQЩɣkV-/z#d99ka6 Bޅ@>EA LQgJ-nAZ>!W R* [/~\/Ds 8QT<_՜6KrWDH, ppRQ< ΁boϼh~= +U䁏pa1sq>:*PUy'?vމ IezEW"!Gb U _9fX?HZᒚr~ӟ7e%N\DRu̅D&N ,,%u4H!ș Vx~E06_a]-޵B#dFLe b EF9GBvQԊ_n:+6A{n zHylCftސ99#o[UP"F4G{ ;H?="I{$%5]{&"L*|ePB)qsUEcU%uI-Z@hm>5ӭ՟>AW Qjȩސ򚱬H:%rI=0u|F\7b[e-|8ЯN&O\;$iF!ߍ yISI9݃h9Dզ|y9&0)*E