bind-chroot-32:9.18.41-1.red80> K KtĉH2!c31^ Wgisupport@red-soft.ru  Wgm0,Y}N[TUXdLX4!$Y@u!3bN~mMm58۲[.*{ ׻{KMr9]0ڵ.&_5D"4h>d[JqBm6N)]m0/*pU9";D1X$כ6~` =g=y1T: ɺ i Xph _>WE0C=u\+ǒ.1323793b46ccae83165e8ecae26148c50e175344264e8dfda22cc0a596e88cf8f5344be3aaa5389d48ad5a7cf96d1404ed43d433( g`CEv"x>G?d  $ g $<@FN  P      P  p       p   D  t  - ( x8 9 : >?@G H I J,X@YL\ ] ^ bd5e:f?lBt\ u v\w x, yQ\`fCbind-chroot9.18.411.red80 A chroot runtime environment for the ISC BIND DNS server, named(8)This package contains a tree of files which can be used as a chroot(2) jail for the named(8) program from the BIND package. Based on the code from Jan "Yenya" Kasprzak iLstapel80.red-soft.ruredosredsoftMPL-2.0 AND ISC AND MIT AND BSD-3-Clause AND BSD-2-ClauseRED SOFTUnspecifiedhttps://www.isc.org/downloads/bind/linuxx86_64 if [ $1 -eq 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Initial installation /usr/lib/systemd/systemd-update-helper install-system-units named-chroot.service || : fi if [ $1 -gt 1 ]; then for DEV in "/var/named/chroot/dev"/{null,random,zero}; do if [ -e "$DEV" -a "$(/bin/stat --printf="%G %a" "$DEV")" = "root 644" ]; then /bin/chmod 0664 "$DEV" /bin/chgrp named "$DEV" fi done fi :;# wait for stop of both named-chroot and named-chroot-setup services # on uninstall if [ $1 -eq 0 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package removal, not upgrade /usr/lib/systemd/systemd-update-helper remove-system-units named-chroot.service named-chroot-setup.service || : fi :;# Package upgrade, not uninstall if [ $1 -ge 1 ] && [ -x "/usr/lib/systemd/systemd-update-helper" ]; then # Package upgrade, not uninstall /usr/lib/systemd/systemd-update-helper mark-restart-system-units named-chroot.service || : fi AA!!!!AAAA聠AAAAAAAAAAAAAACA iiiiiiiYiYiYiYiiiiiiiiiiiiiiiiiiiiii43a025934b4840c014afab9e440d101bf9f873ccdffe9e81a3b3afc8221fb9ec67eddadfe1d954fdffe40bbbfc24487013b2a666457000c80778960432cc481e57b3c2756f830c1282c416d8cbac779b357db2a39a7c5eb1e8eaa569c0102f702da7b6598510837a7804f47343c27708c79afdf69227fd89afe68a101d0e806d../run@@@@Qrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootnamednamedrootrootrootrootnamednamednamednamednamednamednamednamednamednamednamednamednamedrootrootrootrootnamednamedrootrootrootrootnamednamednamednamednamedbind-9.18.41-1.red80.src.rpmbind-chrootbind-chroot(x86-64)config(bind-chroot)  @    /bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/bashbind(x86-64)config(bind-chroot)greprpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)32:9.18.41-1.red8032:9.18.41-1.red803.0.4-14.6.0-14.0-15.4.18-14.18.2i@h^he@f@f`S@feeeIlya Polyvyanyy - 32:9.18.41-1Ilya Polyvyanyy - 32:9.18.37-2Dmitry Safonov - 32:9.18.37-1Dmitry Safonov - 32:9.18.28-1Alexandr Subbotin - 32:9.18.24-5Alexandr Subbotin - 32:9.18.24-4Alexandr Subbotin - 32:9.18.24-3Alexandr Subbotin - 32:9.18.24-2Dmitry Safonov - 32:9.18.24-1- CVE-2025-8677 CVE-2025-40778 CVE-2025-40780- fix ExecReload .service- Update to 9.18.37 - fix CVE-2024-12705, CVE-2024-11187 - remove start named.service from logrotate - build with dnsrps- Update to 9.18.28 - fix CVE-2024-0760, CVE-2024-1737, CVE-2024-4076, CVE-2024-1975- add start bind service to logrotate file- change ExecReload- add After rule to named-chroot.service- Update changed b.root-servers.net address in hints- Update to 9.18.24 - fix CVE-2023-50387, CVE-2023-50868, CVE-2023-4408, CVE-2023-5517, - CVE-2023-5679/bin/sh/bin/sh/bin/sh  /var/named/chroot32:9.18.41-1.red8032:9.18.41-1.red8032:9.18.41-1.red80   named-chroot.filesnamed-chroot-setup.servicenamed-chroot.servicesetup-named-chroot.shchrootdevnullrandomurandomzeroetccrypto-policiesback-endsnamednamed.confpkidnssec-keysprocsysnetipv4runnamedusrlib64bindGeoIPvarlognamedruntmp/etc//usr/lib/systemd/system//usr/libexec//var/named//var/named/chroot//var/named/chroot/dev//var/named/chroot/etc//var/named/chroot/etc/crypto-policies//var/named/chroot/etc/pki//var/named/chroot/proc//var/named/chroot/proc/sys//var/named/chroot/proc/sys/net//var/named/chroot/run//var/named/chroot/usr//var/named/chroot/usr/lib64//var/named/chroot/usr/share//var/named/chroot/var/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -U_FORTIFY_SOURCE -Wp,-U_FORTIFY_SOURCE -Wp,-D_FORTIFY_SOURCE=3 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redsoft/redsoft-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redsoft/redsoft-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19x86_64-redsoft-linux-gnuASCII textBourne-Again shell script, ASCII text executabledirectoryemptyRif [ -x /usr/sbin/selinuxenabled ] && /usr/sbin/selinuxenabled; then [ -x /sbin/restorecon ] && /sbin/restorecon /var/named/chroot/dev/* > /dev/null 2>&1; fi;/bin/shutf-8911a4c29bd76cc93a315d748a9b2f3556ff1747ecd7bafad9d1c368375a42a82131caf7c53721eb36cb6d823a34a22ef03ed59a0fce3154def71ec86850bc63f?(/hH\ (֭MV_`w!,xd:8   h/diFTx>۪xRd ||xMT6okߐ^ѩ )_˝N75jw5CdB'5N0\W6˥f6=㤖lZ7xFY/jQ2!Zl*zh˴ͱϝjen_l*_fuv n SuXJm/u^6~;ڙRS7Z&[{U5l9 08M /"tAq 6@N kq<99`6a&HاT6(@! ')XhuI}gWbUV^ݞx/SДItޝ{<_P^Wpo66*xVglWR +*R8R"ດ6cҜt4*MJOBwIN5e42=R{xk²ΉWPn[wjeo-5\.}y#nɳvp]nɭ-d6 C߬˝V^mkktu?RňOBvij{gme7~uagLm6C7wQ[;~]Bpm0"!4R1MO W@)R e*Nwe=Gnlma3n&dPZEnVĪ^c :CּIEx$8G6W7vZڤhCdXI x|c&Fqݪb1;\(رU|_[@ 6ܖ3Mˠu:e&c@YLrP2#91F)$X:نЙa^1kU{Q.diCAø]Mua7nMc9joD%C'^alSҦ̱sK߸guz7=^"ÎiFcj%$,3ɵq5yDsznJVށR(a߫L"对vv3`."" !BBF0gaOeڼO-Rt&)  8r(dQDDD$ D)(HK7`C2ה+be4.u9vԑn%PØlN3KzOϒrq*S“Ilmk ţ9bnQP}y~<%6:KԞxx7v8Qx曷B!1Ggā4]қ/WKyJkOl#PE7^Y%`?`{ϴ~\av ZA(ǭês_C4UX͍ |4ҩ\`Â٭?j{f_STQ.])g&WBCAX.{( Q,r)P9!G/ pt}=%#UPoEB{~Ty3$hoƚlrbQQ[ Z.^p8Fei94S9k]>n|4D'< Q!> v5([/ >\ۋ}/q2;M ;+?ΐ;]~SpToq`KWDX, iRQW 1Bhy^H?*%屈Fp1sqf? 2PWy"?LK&#SJ No,TO÷ކ_y)M+?O›2DV wk[f! QĢ5X7 G |f\9l8k+$.1^vԒ$gvW$HxfJ_GX:̰`Shܚ#YV'iva৫(@Ee6 _0I+3ce^9.WCΓy~ 8F8Gq j!Hٟ$Ι %5Q#HBp%9":UxeH*q7U0с MDI;Iȕ/ZӁBh-hm>5=՟AwTUk,}5`Te=`u= d\+](㮙W:X礧h8uWB2e G,H>iPP/jN ]tZcS:3X!YΚ