postgresql93-test-9.3.18-8.1<>,~YY/=„0NAFY侽OT'!]H<JSC 9nwƴEQ6/ƪ m淤-vwʓ6OrBxԺj 6e?TS cIQ6nH^%6Q_~> 7CkL%.dē u*PtӸx!) k`;ԟthŻB[kVXm}FFf/]0a`%E%:%hwݹJ.]>:ST?SDd  =  8WsyYY  Y  HY Y =EY >YDYJYQ~QYWW W X (X8YO9Z@O:^OF:GPYHYI#YX$tY$\$Y]* Y^<b>c>d?5e?:f??l?Au?TYvD wH YxMpYyRzS4Cpostgresql93-test9.3.188.1The test suite for PostgreSQLThis package contains the sources and pre-built binaries of various tests for the PostgreSQL database management system, including regression tests and benchmarks.YYcloud131sopenSUSE Leap 42.3openSUSEPostgreSQLhttp://bugs.opensuse.orgProductivity/Databases/Servershttps://www.postgresql.org/linuxx86_64(&-l#XOXO3P;W @QkQZ@Q@QP @PP@P@PnPmz@PiPWO]@NFNs:@Md@M@M@M@M@Mp@MbSM_M] M[@MQ0@MK@Ls@L@K^KtKrK@K@KqN@K(K(K&(J@J@JmJ]JS8J{Iymax@suse.commax@suse.comastieger@suse.commrueckert@suse.defweiss@suse.comfweiss@suse.comfweiss@suse.commrueckert@suse.demrueckert@suse.demax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.comcoolo@suse.comdarin@darins.netro@suse.demax@suse.commax@suse.comdarin@darins.netcoolo@suse.commax@suse.comdmueller@suse.commax@suse.comkpetsch@suse.comkpetsch@suse.comdarin@darins.netkpetsch@suse.commax@suse.comkeptsch@suse.comschwab@suse.deidonmez@suse.commax@suse.commax@suse.comdarin@darins.netmax@suse.commax@suse.comdarin@darins.netmax@suse.commax@suse.commax@suse.commax@suse.comzawel1@gmail.commax@suse.commax@suse.comjengelh@medozas.demax@novell.commax@novell.comidonmez@novell.commax@novell.comnkrinner@novell.commax@novell.comro@suse.decoolo@novell.commax@novell.commax@novell.commax@novell.commax@suse.demax@novell.commax@suse.demax@suse.demax@suse.demax@suse.demax@suse.demax@suse.demax@suse.demax@suse.dejengelh@medozas.dejengelh@medozas.decrrodriguez@novell.commax@suse.depoeml@suse.depoeml@suse.demax@suse.demax@suse.demax@suse.de- Update to version 9.3.18 * https://www.postgresql.org/docs/9.3/static/release-9-3-18.html * CVE-2017-7547, bsc#1051685: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. * CVE-2017-7546, bsc#1051684: Disallow empty passwords in all password-based authentication methods. * CVE-2017-7548, bsc#1053259: lo_put() function ignores ACLs.- Update to version 9.3.17: * https://www.postgresql.org/docs/9.3/static/release-9-3-16.html * CVE-2017-7486, bsc#1037624: Restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. !!! Manual action is needed to fix this in existing databases !!! See upstream release notes for details. * CVE-2017-7485, bsc#1038293: recognize PGREQUIRESSL variable again. * CVE-2017-7484, bsc#1037603: Prevent exposure of statistical information via leaky operators. * Obsoletes postgresql-9.3.16-fix-timezone-tests.patch - Move the timezone requirement to the server package as it was originally intended. - Sync spec file with postgresql96. - Merge Factory and SLE-12.- fix tests with timezone 2017a bsc#1029547 postgresql-9.3.16-fix-timezone-tests.patch- Update to version 9.3.16: - Build corruption with CREATE INDEX CONCURRENTLY - Fixes for visibility and write-ahead-log stability For the full release notes, see: https://www.postgresql.org/docs/9.3/static/release-9-3-16.html- Update to version 9.3.15: * Fix WAL-logging of truncation of relation free space maps and visibility maps * Fix SELECT FOR UPDATE/SHARE to correctly lock tuples that have been updated by a subsequently-aborted transaction * Fix EvalPlanQual rechecks involving CTE scans * Fix improper repetition of previous results from hashed aggregation in a subquery * Fix EXPLAIN to emit valid XML when track_io_timing is on * For the other bug fixes, see the release notes: https://www.postgresql.org/docs/9.3/static/release-9-3-15.html- Added "Requires: timezone" to Server Package (bsc#973660)- Update to version 9.3.14: * Fix possible mis-evaluation of nested CASE-WHEN expressions (CVE-2016-5423, bsc#993454) * Fix client programs' handling of special characters in database and role names (CVE-2016-5424, bsc#993453) * Fix corner-case misbehaviors for IS NULL/IS NOT NULL applied to nested composite values * Make the inet and cidr data types properly reject IPv6 addresses with too many colon-separated fields * Prevent crash in close_ps() (the point ## lseg operator) for NaN input coordinates * Fix several one-byte buffer over-reads in to_number() * Avoid unsafe intermediate state during expensive paths through heap_update() * For the other bug fixes, see the release notes: https://www.postgresql.org/docs/9.3/static/release-9-3-14.html- Bugfix release 9.3.13 This update fixes several problems which caused downtime for users, including: - Clearing the OpenSSL error queue before OpenSSL calls, preventing errors in SSL connections, particularly when using the Python, Ruby or PHP OpenSSL wrappers - Fixed the "failed to build N-way joins" planner error - Fixed incorrect handling of equivalence in multilevel nestloop query plans, which could emit rows which didn't match the WHERE clause. - Prevented two memory leaks with using GIN indexes, including a potential index corruption risk. The release also includes many other bug fixes for reported issues, many of which affect all supported versions: - Fix corner-case parser failures occurring when operator_precedence_warning is turned on - Prevent possible misbehavior of TH, th, and Y,YYY format codes in to_timestamp() - Correct dumping of VIEWs and RULEs which use ANY (array) in a subselect - Disallow newlines in ALTER SYSTEM parameter values - Avoid possible misbehavior after failing to remove a tablespace symlink - Fix crash in logical decoding on alignment-picky platforms - Avoid repeated requests for feedback from receiver while shutting down walsender - Multiple fixes for pg_upgrade - Support building with Visual Studio 2015 - This update also contains tzdata release 2016d, with updates for Russia, Venezuela, Kirov, and Tomsk. http://www.postgresql.org/docs/current/static/release-9-3-13.html- Bugfix release 9.3.12: - Fix two bugs in indexed ROW() comparisons - Avoid data loss due to renaming files - Prevent an error in rechecking rows in SELECT FOR UPDATE/SHARE - Fix bugs in multiple json_ and jsonb_ functions - Log lock waits for INSERT ON CONFLICT correctly - Ignore recovery_min_apply_delay until reaching a consistent state - Fix issue with pg_subtrans XID wraparound - Fix assorted bugs in Logical Decoding - Fix planner error with nested security barrier views - Prevent memory leak in GIN indexes - Fix two issues with ispell dictionaries - Avoid a crash on old Windows versions - Skip creating an erroneous delete script in pg_upgrade - Correctly translate empty arrays into PL/Perl - Make PL/Python cope with identifier names - For the full release notes, see: http://www.postgresql.org/docs/9.3/static/release-9-3-12.html- Security and bugfix release 9.3.11: * Fix infinite loops and buffer-overrun problems in regular expressions (CVE-2016-0773, bsc#966436). * Fix regular-expression compiler to handle loops of constraint arcs (CVE-2007-4772). * Prevent certain PL/Java parameters from being set by non-superusers (CVE-2016-0766, bsc#966435). * Fix many issues in pg_dump with specific object types * Prevent over-eager pushdown of HAVING clauses for GROUPING SETS * Fix deparsing error with ON CONFLICT ... WHERE clauses * Fix tableoid errors for postgres_fdw * Prevent floating-point exceptions in pgbench * Make \det search Foreign Table names consistently * Fix quoting of domain constraint names in pg_dump * Prevent putting expanded objects into Const nodes * Allow compile of PL/Java on Windows * Fix "unresolved symbol" errors in PL/Python execution * Allow Python2 and Python3 to be used in the same database * Add support for Python 3.5 in PL/Python * Fix issue with subdirectory creation during initdb * Make pg_ctl report status correctly on Windows * Suppress confusing error when using pg_receivexlog with older servers * Multiple documentation corrections and additions * Fix erroneous hash calculations in gin_extract_jsonb_path() - For the full release notse, see: http://www.postgresql.org/docs/9.3/static/release-9-3-11.html- Security and bugfix release 9.3.10: * CVE-2015-5289, bsc#949670: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. * CVE-2015-5288, bsc#949669: The crypt() function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. - For the full release notse, see: http://www.postgresql.org/docs/current/static/release-9-3-10.html - Move systemd related stuff and user creation to postgresql-init. - Remove some obsolete %suse_version conditionals. - Adjust build time dependencies. - Fix some more rpmlint warnings. - Relax dependency on libpq to major version.- Move ~postgres/.bash_profile to postgresql-server to avoid a file conflict between the versioned server packages.- Merge openSUSE and SLE12 packages (bsc#941886). - Merge .changes, remove duplicate entries and fix syntax violations at the very bottom. - postgresql-sle10-timestamptz.patch is obsolete. - remove baselibs.conf, because we don't build the libarries any longer. - Bugfix release 9.3.9: * Fix possible failure to recover from an inconsistent database state. See full release notes for details. * Fix rare failure to invalidate relation cache init file. * Avoid deadlock between incoming sessions and CREATE/DROP DATABASE. * Improve planner's cost estimates for semi-joins and anti-joins with inner indexscans - For the full release notse, see: http://www.postgresql.org/docs/9.3/static/release-9-3-9.html- Bugfix release 9.3.8: * Avoid failures while fsync'ing data directory during crash restart. * Fix pg_get_functiondef() to show functions' LEAKPROOF property, if set. * Allow libpq to use TLS protocol versions beyond v1. - For the full release notse, see: http://www.postgresql.org/docs/9.3/static/release-9-3-8.html- Security and bugfix release 9.3.7: * CVE-2015-3165, bsc#931972: Avoid possible crash when client disconnects just before the authentication timeout expires. * CVE-2015-3166, bsc#931973: Consistently check for failure of the * printf() family of functions. * CVE-2015-3167, bsc#931974: In contrib/pgcrypto, uniformly report decryption failures as "Wrong key or corrupt data" * Protect against wraparound of multixact member IDs. - For the full release notse, see: http://www.postgresql.org/docs/9.3/static/release-9-3-7.html- Security and bugfix release 9.3.6 (bnc#916953): * Fix buffer overruns in to_char() (CVE-2015-0241). * Fix buffer overrun in replacement *printf() functions (CVE-2015-0242). * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243). * Fix possible loss of frontend/backend protocol synchronization after an error (CVE-2015-0244). * Fix information leak via constraint-violation error messages (CVE-2014-8161). * For the other bug fixes, see the release notes: http://www.postgresql.org/docs/9.3/static/release-9-3-6.html- Align spec file with version 9.4 and improve the building of libs and devel.- postgresql93-libs doesn't require systemd - avoid cycles- fix systemd unresolvable for SLE_11 http://en.opensuse.org/openSUSE:Systemd_packaging_guidelines- add BuildIgnore systemd-mini to fix build- bnc#888564: Move the server socket from /tmp to /var/run to avoid problems with clients that use PrivateTmp. postgresql-var-run-socket.patch - Rediff patches.- Update to 9.3.5. The most important changes are: * In pg_upgrade, remove pg_multixact files left behind by initdb. If you used a pre-9.3.5 version of pg_upgrade to upgrade a database cluster to 9.3, it might have left behind a file $PGDATA/pg_multixact/offsets/0000 that should not be there and will eventually cause problems in VACUUM. However, in common cases this file is actually valid and must not be removed. * Correctly initialize padding bytes in contrib/btree_gist indexes on bit columns. This error could result in incorrect query results due to values that should compare equal not being seen as equal. Users with GiST indexes on bit or bit varying columns should REINDEX those indexes after installing this update. * Protect against torn pages when deleting GIN list pages. This fix prevents possible index corruption if a system crash occurs while the page update is being written to disk. * Don't clear the right-link of a GiST index page while replaying updates from WAL. This error could lead to transiently wrong answers from GiST index scans performed in Hot Standby. * See release notes for a full list of changes: http://www.postgresql.org/docs/9.3/static/release-9-3-5.html /usr/share/doc/packages/postgresql93/HISTORY - Remove obsolete postgresql-plperl.patch- Update to 9.3.4 * Fix WAL replay of locking an already-updated tuple * Restore GIN metapages unconditionally to avoid torn-page risk * Avoid race condition in checking transaction commit status during receipt of a NOTIFY message * Allow materialized views to be referenced in UPDATE and DELETE commands * Allow regular-expression operators to be terminated early by query cancel requests * Remove incorrect code that tried to allow OVERLAPS with single-element row arguments * Avoid getting more than AccessShareLock when de-parsing a rule or view * Improve performance of index endpoint probes during planning * Use non-default selectivity estimates for value IN (list) and value operator ANY (array) expressions when the righthand side is a stable expression * Remove the correct per-database statistics file during DROP DATABASE * Fix walsender ping logic to avoid inappropriate disconnects under continuous load * Fix walsender's failure to shut down cleanly when client is pg_receivexlog * See release notes for a full list of changes: http://www.postgresql.org/docs/9.3/static/release-9-3-4.html /usr/share/doc/packages/postgresql93/HISTORY- make postgresql-init a buildrequire. requires(pre) are used during build, but do not cause a rebuild trigger. But to make the depencency visible for bootstrapping, mark it as real buildrequire- Security and bugfix release 9.3.3: * Shore up GRANT ... WITH ADMIN OPTION restrictions (CVE-2014-0060, bnc#864845) * Prevent privilege escalation via manual calls to PL validator functions (CVE-2014-0061, bnc#864846) * Avoid multiple name lookups during table and index DDL (CVE-2014-0062, bnc#864847) * Prevent buffer overrun with long datetime strings (CVE-2014-0063, bnc#864850) * Prevent buffer overrun due to integer overflow in size calculations (CVE-2014-0064, bnc#864851) * Prevent overruns of fixed-size buffers (CVE-2014-0065, bnc#864852) * Avoid crashing if crypt() returns NULL (CVE-2014-0066, bnc#864853) * Document risks of make check in the regression testing instructions (CVE-2014-0067) * Rework tuple freezing protocol. The logic for tuple freezing was unable to handle some cases involving freezing of multixact IDs, with the practical effect that shared row-level locks might be forgotten once old enough. Fixing this required changing the WAL record format for tuple freezing. While this is no issue for standalone servers, when using replication it means that STANDBY SERVERS MUST BE UPGRADED TO 9.3.3 OR LATER BEFORE THEIR MASTERS ARE. * For the other (many!) bug fixes, see the release notes: http://www.postgresql.org/docs/9.3/static/release-9-3-3.html /usr/share/doc/packages/postgresql93/HISTORY- remove postgresql-tas-aarch64.patch: Fix build for aarch64- Fix handling of alternatives in the file lists.- Update to version 9.3.2: * Fix VACUUM's tests to see whether it can update relfrozenxid * Fix multiple bugs in MultiXactId freezing * Fix initialization of pg_clog and og_subtrans during hot standby startup * Fix multiple bugs in update chain traversal * Fix dangling-pointer problem in fast-path locking * Fix assorted race conditions in timeout management * Prevent intra-transaction memory leak when printing range values * Truncate pg_multixact contents during WAL replay * Ensure an anti-wraparound VACUUM counts a page as scanned when it's only verified that no tuples need freezing * Fix full-table-vacuum request mechanism for MultiXactIds * Fix race condition in GIN index posting tree page deletion * Avoid flattening a subquery whose SELECT list contains a volatile function wrapped inside a sub-SELECT * See release notes for a full list of changes: http://www.postgresql.org/docs/9.3/static/release-9-3-2.html /usr/share/doc/packages/postgresql93/HISTORY- Added option to build postgresql-devel package separatly from postresql-libs- Update to version 9.3.1: * Update hstore extension with JSON functionality * Fix memory leak when creating range indexes * Serializable snapshot fixes * Fix libpq SSL deadlock bug * Fix timeline handling bugs in pg_receivexlog * Prevent CREATE FUNCTION from checking SET variables unless function body checking is enabled * Remove rare inaccurate warning during vacuum of index-less tables- Added patch to build testsuite package (bnc#829952)- Re-enable running the regression tests during build. - The test suite needs the timezone package.- Updated to version 9.3: * Add materialized views * Make simple views auto-updatable * Many JSON improvements, including the addition of operators and functions to extract values from JSON data strings * Implement SQL-standard LATERAL option for FROM-clause subqueries and function calls * Allow foreign data wrappers to support writes (insers/updates/deletes) on foreign tables * Add a Postgres foreign data wrapper contrib module * Add support for event triggers * Add optional ability to checksum data pages and report corruption * Allow a streaming replication standby to follow a timeline switch, and faster failover * Dramatically reduce System V shared memory requirements * Prevent non-key-field row updates from locking foreign key rows * Add command-line utility pg_isready * Add pg_xlogdump contrib program * See release notes for a full list of changes: http://www.postgresql.org/docs/9.3/static/release-9-3.html /usr/share/doc/packages/postgresql93/HISTORY- postgresql-tas-aarch64.patch: Implement TAS for aarch64- Add Source URL, see https://en.opensuse.org/SourceUrls- Updated to version 9.2.4 (bnc#812525): * CVE-2013-1899: Fix insecure parsing of server command-line switches. A connection request containing a database name that begins with "-" could be crafted to damage or destroy files within the server's data directory, even if the request is eventually rejected. * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster child process. This avoids a scenario wherein random numbers generated by "contrib/pgcrypto" functions might be relatively easy for another database user to guess. The risk is only significant when the postmaster is configured with ssl = on but most connections don't use SSL encryption. * CVE-2013-1901: Make REPLICATION privilege checks test current user not authenticated user. An unprivileged database user could exploit this mistake to call pg_start_backup() or pg_stop_backup(), thus possibly interfering with creation of routine backups. * See the release notes for the rest of the changes: http://www.postgresql.org/docs/9.2/static/release-9-2-4.html /usr/share/doc/packages/postgresql92/HISTORY- Version 9.2.3 also fixes bnc#802679, CVE-2013-0255. - Remove postgresql92-full.spec.in and use postgresql92.spec as the master for generating postgresql92-libs.spec.- Updated to version 9.2.3 * Prevent execution of enum_recv from SQL (Tom Lane) * Fix multiple problems in detection of when a consistent database state has been reached during WAL replay * Fix detection of end-of-backup point when no actual redo work is required * Update minimum recovery point when truncating a relation file * Fix recycling of WAL segments after changing recovery target timeline * Properly restore timeline history files from archive on cascading standby servers * Fix lock conflict detection on hot-standby servers * Fix missing cancellations in hot standby mode * See the release notes for the rest of the changes: http://www.postgresql.org/docs/9.2/static/release-9-2-3.html /usr/share/doc/packages/postgresql/HISTORY- Use PDX license string.- Conflicts tags don't support the != operator.- Updated to version 9.2.2 * Fix multiple bugs associated with CREATE/DROP INDEX CONCURRENTLY * Correct predicate locking for DROP INDEX CONCURRENTLY * Fix buffer locking during WAL replay * Fix an error in WAL generation logic for GIN indexes * Fix an error in WAL replay logic for SP-GiST indexes * Fix incorrect detection of end-of-base-backup location during WAL recovery * Properly remove startup process's virtual XID lock when promoting a hot standby server to normal running * Avoid bogus "out-of-sequence timeline ID" errors in standby mode * Prevent the postmaster from launching new child processes after it's received a shutdown signal * Fix the syslogger process to not fail when log_rotation_age exceeds 2^31 milliseconds * Fix WaitLatch() to return promptly when the requested timeout expires * Avoid corruption of internal hash tables when out of memory * Prevent file descriptors for dropped tables from being held open past transaction end * See the release notes for the rest of the changes: http://www.postgresql.org/docs/9.2/static/release-9-2-2.html /usr/share/doc/packages/postgresql/HISTORY- Change mechanism for making postgresql??-devel exclusive (bnc#789562).- Resolve "have choice for libpq.so.5" by ignoring postgresql-libs.- Get the new packaging scheme over to the postgresql92 packages and make 9.2 the new default version.- Bugfix release 9.1.6 (bnc#782251) to fix data corruption issues. * Users who upgrade from a previous 9.1 release should run REINDEX after applying this update. See also: http://wiki.postgresql.org/wiki/20120924updaterelease * For the full list of changes, see http://www.postgresql.org/docs/9.1/static/release.html - Change the base name of all PostgreSQL packages from postgresql to postgresql91 and adopt the new packaging schema, which allows the parallel installation of multiple PostgreSQL versions to simplify and speedup migration. - Move init script, sysconfig file and firewall configuration into a new package called postgresql-init which can work with different PostgreSQL versions.- Security and bugfix release 9.1.5: * Ignore SECURITY DEFINER and SET attributes for a procedural language's call handler (CVE-2012-2655) * Fix incorrect password transformation in "contrib/pgcrypto"'s DES crypt() function (CVE-2012-2143) * Prevent access to external files/URLs via "contrib/xml2"'s xslt_process() (CVE-2012-3488) * Prevent access to external files/URLs via XML entity references (CVE-2012-3489) * See the release notes for the rest of the changes: http://www.postgresql.org/docs/9.1/static/release.html /usr/share/doc/packages/postgresql/HISTORY- Security and bugfix release 9.1.3: * Require execute permission on the trigger function for "CREATE TRIGGER" (CVE-2012-0866, bnc#749299). * Remove arbitrary limitation on length of common name in SSL certificates (CVE-2012-0867, bnc#749301). * Convert newlines to spaces in names written in pg_dump comments (CVE-2012-0868, bnc#749303). * See the release notes for the rest of the changes: http://www.postgresql.org/docs/9.1/static/release.html /usr/share/doc/packages/postgresql/HISTORY - This also fixes bnc#701489.- New version 9.1.1. For detailed release notes, see: http://www.postgresql.org/docs/9.1/static/release-9-1-1.html - Stop using deprecated silent_mode in default config. - postgresql-perl514.patch is no longer needed. - Use %_smp_mflags for parallel make - Keep the rpath when linking plperl [bnc#578053].- Add postgresql-devel to baselibs- Revert the postgresql-libs package split for SLE in preparation of submitting the package to SLE11-SP1.- Fix file name of last added patch and remove overlong comment.- Add postgresql-9.0.4-perl514.patch: For Perl 5.14 GvCV(sv) is no longer an lvalue and needs to be replaced by GvCV_set(sv, value)- Bugfix release: 9.0.4: * This update contains a critical fix to the pg_upgrade utility which prevents significant downtime issues. Do not use pg_upgrade without installing this update first. http://wiki.postgresql.org/wiki/20110408pg_upgrade_fix * change SQLSTATE for Hot Standby warnings * prevent bgwriter hang during recovery * prevent recursive composite type creation * disallow dropping tables whose triggers are still pending * allow use of "replication" as a user name * prevent a crash during GEQO planning * improve join plans for tables with missing statistics * fix error with SELECT FOR UPDATE in a subselect * close PL/python array slice memory leak * allow SSL connections for users with no home directory - http://www.postgresql.org/docs/9.0/static/release-9-0-4.html- enabled --with-ossp-uuid- Fix the fix of the fix for the successors of postgresql-libs.- provide postgresql-libs in the specfile that actually builds the libs package- fix update of libs- Move all of pgxs into the devel package to fix build of server extensions.- Move pg_config from -server to -devel to fix build of certain client apps and language bindings, but using pg_config on the client side is still considered broken, because it tells what got linked into the server binary not what got linked into libpq.- Remove unneeded PreReq from postgresql on postgresql-libs.- New version: 9.0.3. For the complete release notes, see http://www.postgresql.org/docs/9.0/static/release.html - Build libs and devel separate from the main package. - Build the PL subpackages as part of the main package. - Have separate packages for libpq and libecpg. - Generate the main and lib spec files from postgresql.spec.in.- Fix LSB conformance of the init script (bnc#658014).- Security and bugfix release 8.4.5 (bnc#643771): * Use a separate interpreter for each calling SQL userid in PL/Perl and PL/Tcl (CVE-2010-3433). * Prevent possible crashes in pg_get_expr() by disallowing it from being called with an argument that is not one of the system catalog columns it's intended to be used with. * Fix incorrect placement of placeholder evaluation. * Fix possible duplicate scans of UNION ALL member relations. * Fix "cannot handle unplanned sub-select" error. * Fix mishandling of whole-row Vars that reference a view or sub-select and appear within a nested sub-select. * Fix mishandling of cross-type IN comparisons. * Fix computation of ANALYZE statistics for tsvector columns. * Improve planner's estimate of memory used by array_agg(), string_agg(), and similar aggregate functions. * Fix failure to mark cached plans as transient. * Reduce PANIC to ERROR in some occasionally-reported btree failure cases, and provide additional detail in the resulting error messages. * Fix incorrect search logic for partial-match queries with GIN indexes. * Prevent show_session_authorization() from crashing within autovacuum processes. * Defend against functions returning setof record where not all the returned rows are actually of the same rowtype. * Fix possible corruption of pending trigger event lists during subtransaction rollback. * Fix possible failure when hashing a pass-by-reference function result. * Improve merge join's handling of NULLs in the join columns. * Take care to fsync the contents of lockfiles (both postmaster.pid and the socket lockfile) while writing them. * Avoid recursion while assigning XIDs to heavily-nested subtransactions. * Avoid holding open old WAL segments in the walwriter process. * Fix log_line_prefix's %i escape, which could produce junk early in backend startup. * Prevent misinterpretation of partially-specified relation options for TOAST tables. * Fix inheritance count tracking in ALTER TABLE ... ADD CONSTRAINT. * Fix possible data corruption in ALTER TABLE ... SET TABLESPACE when archiving is enabled. * Allow CREATE DATABASE and ALTER DATABASE ... SET TABLESPACE to be interrupted by query-cancel. * Improve CREATE INDEX's checking of whether proposed index expressions are immutable. * Fix REASSIGN OWNED to handle operator classes and families. * Fix possible core dump when comparing two empty tsquery values. * Fix LIKE's handling of patterns containing % followed by _ * Re-allow input of Julian dates prior to 0001-01-01 AD. * Fix PL/pgSQL to throw an error, not crash, if a cursor is closed within a FOR loop that is iterating over that cursor. * In PL/Python, defend against null pointer results from PyCObject_AsVoidPtr and PyCObject_FromVoidPtr * In libpq, fix full SSL certificate verification for the case where both host and hostaddr are specified. * Make psql recognize DISCARD ALL as a command that should not be encased in a transaction block in autocommit-off mode. * Fix some issues in pg_dump's handling of SQL/MED objects. * Improve pg_dump and pg_restore's handling of non-seekable archive files. This is important for proper functioning of parallel restore. * Improve parallel pg_restore's ability to cope with selective restore (-L option). * Fix ecpg to process data from RETURNING clauses correctly. * Fix some memory leaks in ecpg. * Improve contrib/dblink's handling of tables containing dropped columns. * Fix connection leak after "duplicate connection name" errors in contrib/dblink. * Fix contrib/dblink to handle connection names longer than 62 bytes correctly. * Add hstore(text, text) function to contrib/hstore.- Security and bugfix release 8.4.4: * Enforce restrictions in plperl using an opmask applied to the whole interpreter, instead of using Safe.pm. Recent developments have convinced us that Safe.pm is too insecure to rely on for making plperl trustable. This change removes use of Safe.pm altogether, in favor of using a separate interpreter with an opcode mask that is always applied. Pleasant side effects of the change include that it is now possible to use Perl's strict pragma in a natural way in plperl, and that Perl's $a and $b variables work as expected in sort routines, and that function compilation is significantly faster. (CVE-2010-1169) * Prevent PL/Tcl from executing untrustworthy code from pltcl_modules. PL/Tcl's feature for autoloading Tcl code from a database table could be exploited for trojan-horse attacks, because there was no restriction on who could create or insert into that table. This change disables the feature unless pltcl_modules is owned by a superuser. (However, the permissions on the table are not checked, so installations that really need a less-than-secure modules table can still grant suitable privileges to trusted non-superusers.) Also, prevent loading code into the unrestricted "normal" Tcl interpreter unless we are really going to execute a pltclu function. (CVE-2010-1170) * Fix data corruption during WAL replay of ALTER ... SET TABLESPACE. When archive_mode is on, ALTER ... SET TABLESPACE generates a WAL record whose replay logic was incorrect. It could write the data to the wrong place, leading to possibly-unrecoverable data corruption. Data corruption would be observed on standby slaves, and could occur on the master as well if a database crash and recovery occurred after committing the ALTER and before the next checkpoint. * Fix possible crash if a cache reset message is received during rebuild of a relcache entry. This error was introduced in 8.4.3 while fixing a related failure. * Apply per-function GUC settings while running the language validator for the function. * This avoids failures if the function's code is invalid without the setting; an example is that SQL functions may not parse if the search_path is not correct. * Do constraint exclusion for inherited UPDATE and DELETE target tables when constraint_exclusion = partition. Due to an oversight, this setting previously only caused constraint exclusion to be checked in SELECT commands. * Do not allow an unprivileged user to reset superuser-only parameter settings. Previously, if an unprivileged user ran ALTER USER ... RESET ALL for himself, or ALTER DATABASE ... RESET ALL for a database he owns, this would remove all special parameter settings for the user or database, even ones that are only supposed to be changeable by a superuser. Now, the ALTER will only remove the parameters that the user has permission to change. * Avoid possible crash during backend shutdown if shutdown occurs when a CONTEXT addition would be made to log entries. In some cases the context-printing function would fail because the current transaction had already been rolled back when it came time to print a log message. * Fix erroneous handling of %r parameter in recovery_end_command. The value always came out zero. * Ensure the archiver process responds to changes in archive_command as soon as possible. * Fix pl/pgsql's CASE statement to not fail when the case expression is a query that returns no rows. * Update pl/perl's ppport.h for modern Perl versions. * Fix assorted memory leaks in pl/python. * Handle empty-string connect parameters properly in ecpg. * Prevent infinite recursion in psql when expanding a variable that refers to itself. * Fix psql's \copy to not add spaces around a dot within \copy (select ...). Addition of spaces around the decimal point in a numeric literal would result in a syntax error. * Avoid formatting failure in psql when running in a locale context that doesn't match the client_encoding. * Fix unnecessary "GIN indexes do not support whole-index scans" errors for unsatisfiable queries using contrib/intarray operators. * Ensure that contrib/pgstattuple functions respond to cancel interrupts promptly. * Make server startup deal properly with the case that shmget() returns EINVAL for an existing shared memory segment. This behavior has been observed on BSD-derived kernels including OS X. It resulted in an entirely-misleading startup failure complaining that the shared memory request size was too large.- Use %configure to pick up the default directories (bnc#600616).- Security and bugfix release 8.4.3.- Disable GSSAPI, XML, kerberos and make check in OBS for SLES9.- Fix build for SLES9- Fix package descriptions.- Security and bugfix release 8.4.2: * CVE-2009-4136: Protect against indirect security threats caused by index functions changing session-local state. This change prevents allegedly-immutable index functions from possibly subverting a superuser's session. * CVE-2009-4034: Reject SSL certificates containing an embedded null byte in the common name (CN) field. This prevents unintended matching of a certificate to a server or client name during SSL validation. * Fix hash index corruption. The 8.4 change that made hash indexes keep entries sorted by hash value failed to update the bucket splitting and compaction routines to preserve the ordering. So application of either of those operations could lead to permanent corruption of an index, in the sense that searches might fail to find entries that are present. To deal with this, it is recommended to REINDEX any hash indexes you may have after installing this update. * Fix possible crash during backend-startup-time cache initialization * Avoid crash on empty thesaurus dictionary * Prevent signals from interrupting VACUUM at unsafe times. This fix prevents a PANIC if a VACUUM FULL is cancelled after it's already committed its tuple movements, as well as transient errors if a plain VACUUM is interrupted after having truncated the table. * Fix possible crash due to integer overflow in hash table size calculation. This could occur with extremely large planner estimates for the size of a hashjoin's result. * Fix crash if a DROP is attempted on an internally-dependent object. * Fix very rare crash in inet/cidr comparisons. * Ensure that shared tuple-level locks held by prepared transactions are not ignored. * Fix premature drop of temporary files used for a cursor that is accessed within a subtransaction. * Fix memory leak in syslogger process when rotating to a new CSV logfile. * Fix memory leak in postmaster when re-parsing "pg_hba.conf". * Make FOR UPDATE/SHARE in the primary query not propagate into WITH queries. * Fix bug with a WITH RECURSIVE query immediately inside another one. * Fix concurrency bug in hash indexes. Concurrent insertions could cause index scans to transiently report wrong results. * Fix incorrect logic for GiST index page splits, when the split depends on a non-first column of the index. * Fix wrong search results for a multi-column GIN index with fastupdate enabled. * Fix bugs in WAL entry creation for GIN indexes. These bugs were masked when full_page_writes was on, but with it off a WAL replay failure was certain if a crash occurred before the next checkpoint. * Don't error out if recycling or removing an old WAL file fails at the end of checkpoint. It's better to treat the problem as non-fatal and allow the checkpoint to complete. Future checkpoints will retry the removal. Such problems are not expected in normal operation, but have been seen to be caused by misdesigned Windows anti-virus and backup software. * Ensure WAL files aren't repeatedly archived on Windows. This is another symptom that could happen if some other process interfered with deletion of a no-longer-needed file. * Fix PAM password processing to be more robust. The previous code is known to fail with the combination of the Linux pam_krb5 PAM module with Microsoft Active Directory as the domain controller. It might have problems elsewhere too, since it was making unjustified assumptions about what arguments the PAM stack would pass to it. * Raise the maximum authentication token (Kerberos ticket) size in GSSAPI and SSPI authentication methods. While the old 2000-byte limit was more than enough for Unix Kerberos implementations, tickets issued by Windows Domain Controllers can be much larger. * Ensure that domain constraints are enforced in constructs like ARRAY[...]::domain, where the domain is over an array type. * Fix foreign-key logic for some cases involving composite-type columns as foreign keys. * Ensure that a cursor's snapshot is not modified after it is created. This could lead to a cursor delivering wrong results if later operations in the same transaction modify the data the cursor is supposed to return. * Fix CREATE TABLE to properly merge default expressions coming from different inheritance parent tables. This used to work but was broken in 8.4. * Re-enable collection of access statistics for sequences. This used to work but was broken in 8.3. * Fix processing of ownership dependencies during CREATE OR REPLACE FUNCTION. * Fix incorrect handling of WHERE "x"="x" conditions. In some cases these could get ignored as redundant, but they aren't -- they're equivalent to "x" IS NOT NULL. * Fix incorrect plan construction when using hash aggregation to implement DISTINCT for textually identical volatile expressions. * Fix Assert failure for a volatile SELECT DISTINCT ON expression. * Fix ts_stat() to not fail on an empty tsvector value. * Make text search parser accept underscores in XML attributes. * Fix encoding handling in xml binary input. If the XML header doesn't specify an encoding, we now assume UTF-8 by default; the previous handling was inconsistent. * Fix bug with calling plperl from plperlu or vice versa. An error exit from the inner function could result in crashes due to failure to re-select the correct Perl interpreter for the outer function. * Fix session-lifespan memory leak when a PL/Perl function is redefined. * Ensure that Perl arrays are properly converted to PostgreSQL arrays when returned by a set-returning PL/Perl function. This worked correctly already for non-set-returning functions. * Fix rare crash in exception processing in PL/Python. * Fix ecpg problem with comments in DECLARE CURSOR statements. * Fix ecpg to not treat recently-added keywords as reserved words. This affected the keywords CALLED, CATALOG, DEFINER, ENUM, FOLLOWING, INVOKER, OPTIONS, PARTITION, PRECEDING, RANGE, SECURITY, SERVER, UNBOUNDED, and WRAPPER. * Re-allow regular expression special characters in psql's \df function name parameter. * In "contrib/pg_standby", disable triggering failover with a signal on Windows. This never did anything useful, because Windows doesn't have Unix-style signals, but recent changes made it actually crash. * Put FREEZE and VERBOSE options in the right order in the VACUUM command that "contrib/vacuumdb" produces. * Fix possible leak of connections when "contrib/dblink" encounters an error. * Ensure psql's flex module is compiled with the correct system header definitions. This fixes build failures on platforms where --enable-largefile causes incompatible changes in the generated code. * Make the postmaster ignore any application_name parameter in connection request packets, to improve compatibility with future libpq versions. * Update the timezone abbreviation files to match current reality This includes adding IDT to the default timezone abbreviation set.- package documentation as noarch- add baselibs.conf as a source- use find_lang to package language files correctly- Security and bugfix release 8.4.1: * Fix WAL page header initialization at the end of archive recovery. This could lead to failure to process the WAL in a subsequent archive recovery. * Fix "cannot make new WAL entries during recovery" error. * Fix problem that could make expired rows visible after a crash. This bug involved a page status bit potentially not being set correctly after a server crash. * Disallow RESET ROLE and RESET SESSION AUTHORIZATION inside security-definer functions. This covers a case that was missed in the previous patch that disallowed SET ROLE and SET SESSION AUTHORIZATION inside security-definer functions. (See CVE-2007-6600) * Make LOAD of an already-loaded loadable module into a no-op. * Formerly, LOAD would attempt to unload and re-load the module, but this is unsafe and not all that useful. * Make window function PARTITION BY and ORDER BY items always be interpreted as simple expressions. In 8.4.0 these lists were parsed following the rules used for top-level GROUP BY and ORDER BY lists. But this was not correct per the SQL standard, and it led to possible circularity. * Fix several errors in planning of semi-joins. These led to wrong query results in some cases where IN or EXISTS was used together with another join. * Fix handling of whole-row references to subqueries that are within an outer join. An example is SELECT COUNT(ss.*) FROM ... LEFT JOIN (SELECT ...) ss ON .... Here, ss.* would be treated as ROW(NULL,NULL,...) for null-extended join rows, which is not the same as a simple NULL. Now it is treated as a simple NULL. * Fix Windows shared-memory allocation code. This bug led to the often-reported "could not reattach to shared memory" error message. * Fix locale handling with plperl. This bug could cause the server's locale setting to change when a plperl function is called, leading to data corruption. * Fix handling of reloptions to ensure setting one option doesn't force default values for others. * Ensure that a "fast shutdown" request will forcibly terminate open sessions, even if a "smart shutdown" was already in progress. * Avoid memory leak for array_agg() in GROUP BY queries. * Treat to_char(..., 'TH') as an uppercase ordinal suffix with 'HH'/'HH12'. It was previously handled as 'th' (lowercase). * Include the fractional part in the result of EXTRACT(second) and EXTRACT(milliseconds) for time and time with time zone inputs. This has always worked for floating-point datetime configurations, but was broken in the integer datetime code. * Fix overflow for INTERVAL 'x ms' when x is more than 2 million and integer datetimes are in use. * Improve performance when processing toasted values in index scans. This is particularly useful for PostGIS. * Fix a typo that disabled commit_delay. * Output early-startup messages to postmaster.log if the server is started in silent mode. Previously such error messages were discarded, leading to difficulty in debugging. * Remove translated FAQs. They are now on the wiki. The main FAQ was moved to the wiki some time ago. * Fix pg_ctl to not go into an infinite loop if postgresql.conf is empty. * Fix several errors in pg_dump's --binary-upgrade mode. * pg_dump --binary-upgrade is used by pg_migrator. * Fix contrib/xml2's xslt_process() to properly handle the maximum number of parameters (twenty). * Improve robustness of libpq's code to recover from errors during COPY FROM STDIN. * Avoid including conflicting readline and editline header files when both libraries are installed. * Work around gcc bug that causes "floating-point exception" instead of "division by zero" on some platforms.- postgresql-8.4.0-sle10-timestamptz.patch added, and applied _only_ on SLE10. It fixes a build failure due to a test case that seems to be confused by daylight saving time in the time zone that the test expects its result (PDT vs. PST). Since this failure happened only on SLE10, I assume that the test case isn't broken, and some peculiarity on that (rather old now) platform is to blame (possibly too old timezone files). Also, the testcase is checking correctness when converting timezones > 32 bit, which actually seems to work.- replace "ident sameuser" with "ident" as auth method for the initdb call in the init script, because the former doesn't work with PostgreSQL 8.4. With the generated pg_hba.conf, PostgreSQL failed to start. Added note to the upgrade READMEs. [bnc#522375]- New major release: 8.4.0 - Improvements include: * Windowing Functions * Common Table Expressions and Recursive Queries * Default and variadic parameters for functions * Parallel Restore * Column Permissions * Per-database locale settings * Improved hash indexes * Improved join performance for EXISTS and NOT EXISTS queries * Easier-to-use Warm Standby * Automatic sizing of the Free Space Map * Visibility Map (greatly reduces vacuum overhead for slowly-changing tables) * Version-aware psql (backslash commands work against older servers) * Support SSL certificates for user authentication * Per-function runtime statistics * Easy editing of functions in psql * New contrib modules: pg_stat_statements, auto_explain, citext, btree_gin- Remove dependency on local posixrules from horology test.- Security release 8.3.7 * Fixes a vulnerability that allowed remote authenticated users to cause a denial of service (stack consumption) via mismatched encoding conversion requests. * Details of the other bugfixes contained in this and previous releases can be found here: http://www.postgresql.org/docs/8.3/static/release.html /usr/share/doc/packages/postgresql/HISTORY - Users of GiST indexes should "REINDEX" them after installing this update. - Re-added libpgport.a to the devel package, as some apps require it, although it is meant to be internal to the PostgreSQL backend. - Fix removal of leftover files on database startup (bnc#473644).cloud131 1503418814  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXY9.3.18-8.19.3.18-8.1testregressautoinc.sodataagg.dataarray.dataconstrf.dataconstro.datadept.datadesc.dataemp.datahash.dataonek.dataperson.datareal_city.datarect.datastreets.datastud_emp.datastudent.datatenk.datatsearch.datadummy_seclabel.soexpectedabstime.outadvisory_lock.outaggregates.outalter_generic.outalter_table.outarrays.outbit.outbitmapops.outboolean.outbox.outbtree_index.outcase.outchar.outchar_1.outchar_2.outcircle.outcluster.outcollate.linux.utf8.outcollate.outcombocid.outcomments.outconversion.outcopy2.outcopyselect.outcreate_aggregate.outcreate_cast.outcreate_function_3.outcreate_index.outcreate_misc.outcreate_operator.outcreate_table.outcreate_table_like.outcreate_type.outcreate_view.outdate.outdelete.outdependency.outdomain.outdrop_if_exists.outenum.outequivclass.outerrors.outevent_trigger.outfloat4-exp-three-digits.outfloat4.outfloat8-exp-three-digits-win32.outfloat8-small-is-zero.outfloat8-small-is-zero_1.outfloat8.outforeign_data.outforeign_key.outfunctional_deps.outgeometry.outgeometry_1.outgeometry_2.outguc.outhash_index.outhorology.ouths_standby_allowed.ouths_standby_check.ouths_standby_disallowed.ouths_standby_functions.outinet.outinherit.outinsert.outint2.outint4.outint8-exp-three-digits.outint8.outinterval.outjoin.outjson.outjson_encoding.outjson_encoding_1.outlimit.outlseg.outmacaddr.outmatview.outmoney.outname.outnamespace.outnumeric.outnumeric_big.outnumerology.outnumerology_1.outoid.outoidjoins.outopr_sanity.outpath.outplancache.outplpgsql.outpoint.outpolygon.outpolymorphism.outportals.outportals_p2.outprepare.outprepared_xacts.outprepared_xacts_1.outprivileges.outpsql.outrandom.outrangefuncs.outrangetypes.outregex.outreltime.outreturning.outrowtypes.outrules.outsanity_check.outselect.outselect_distinct.outselect_distinct_on.outselect_having.outselect_having_1.outselect_having_2.outselect_implicit.outselect_implicit_1.outselect_implicit_2.outselect_into.outselect_views.outselect_views_1.outsequence.outsequence_1.outstats.outstrings.outsubselect.outtemp.outtext.outtime.outtimestamp.outtimestamptz.outtimetz.outtinterval.outtransactions.outtriggers.outtruncate.outtsdicts.outtsearch.outtstypes.outtxid.outtype_sanity.outtyped_table.outunion.outupdatable_views.outupdate.outuuid.outvacuum.outvarchar.outvarchar_1.outvarchar_2.outwindow.outwith.outwithout_oid.outxml.outxml_1.outxml_2.outxmlmap.outxmlmap_1.outinputconstraints.sourcecopy.sourcecreate_function_1.sourcecreate_function_2.sourcelargeobject.sourcemisc.sourcesecurity_label.sourcetablespace.sourceoutputconstraints.sourcecopy.sourcecreate_function_1.sourcecreate_function_2.sourcelargeobject.sourcelargeobject_1.sourcemisc.sourcesecurity_label.sourcetablespace.sourceparallel_schedulepg_regressrefint.soregress.soserial_schedulesqlabstime.sqladvisory_lock.sqlaggregates.sqlalter_generic.sqlalter_table.sqlarrays.sqlbit.sqlbitmapops.sqlboolean.sqlbox.sqlbtree_index.sqlcase.sqlchar.sqlcircle.sqlcluster.sqlcollate.linux.utf8.sqlcollate.sqlcombocid.sqlcomments.sqlconversion.sqlcopy2.sqlcopyselect.sqlcreate_aggregate.sqlcreate_cast.sqlcreate_function_3.sqlcreate_index.sqlcreate_misc.sqlcreate_operator.sqlcreate_table.sqlcreate_table_like.sqlcreate_type.sqlcreate_view.sqldate.sqldelete.sqldependency.sqldomain.sqldrop_if_exists.sqlenum.sqlequivclass.sqlerrors.sqlevent_trigger.sqlfloat4.sqlfloat8.sqlforeign_data.sqlforeign_key.sqlfunctional_deps.sqlgeometry.sqlguc.sqlhash_index.sqlhorology.sqlhs_primary_extremes.sqlhs_primary_setup.sqlhs_standby_allowed.sqlhs_standby_check.sqlhs_standby_disallowed.sqlhs_standby_functions.sqlinet.sqlinherit.sqlinsert.sqlint2.sqlint4.sqlint8.sqlinterval.sqljoin.sqljson.sqljson_encoding.sqllimit.sqllseg.sqlmacaddr.sqlmatview.sqlmoney.sqlname.sqlnamespace.sqlnumeric.sqlnumeric_big.sqlnumerology.sqloid.sqloidjoins.sqlopr_sanity.sqlpath.sqlplancache.sqlplpgsql.sqlpoint.sqlpolygon.sqlpolymorphism.sqlportals.sqlportals_p2.sqlprepare.sqlprepared_xacts.sqlprivileges.sqlpsql.sqlrandom.sqlrangefuncs.sqlrangetypes.sqlregex.sqlreltime.sqlreturning.sqlrowtypes.sqlrules.sqlsanity_check.sqlselect.sqlselect_distinct.sqlselect_distinct_on.sqlselect_having.sqlselect_implicit.sqlselect_into.sqlselect_views.sqlsequence.sqlstats.sqlstrings.sqlsubselect.sqltemp.sqltext.sqltime.sqltimestamp.sqltimestamptz.sqltimetz.sqltinterval.sqltransactions.sqltriggers.sqltruncate.sqltsdicts.sqltsearch.sqltstypes.sqltxid.sqltype_sanity.sqltyped_table.sqlunion.sqlupdatable_views.sqlupdate.sqluuid.sqlvacuum.sqlvarchar.sqlwindow.sqlwith.sqlwithout_oid.sqlxml.sqlxmlmap.sql/usr/lib/postgresql93//usr/lib/postgresql93/test//usr/lib/postgresql93/test/regress//usr/lib/postgresql93/test/regress/data//usr/lib/postgresql93/test/regress/expected//usr/lib/postgresql93/test/regress/input//usr/lib/postgresql93/test/regress/output//usr/lib/postgresql93/test/regress/sql/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Maintenance:7166/openSUSE_Leap_42.3_Update/cc65e7837e6f8a0f32b81ccce30573e2-postgresql93.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linux directoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=b661060318930511eeaad244eec44385e746b0bb, strippedASCII textASCII text, with very long linesELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=ff9df43af0edee19e499d254cc766bf15e9c2f81, strippedUTF-8 Unicode textexported SGML document, ASCII textELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 3.0.0, BuildID[sha1]=04e72689e2b017a545f11318915c897bb0e9a3c8, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=5a1172e6ea1b0378a9a2e31d2444aa3e8bd6d6db, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=367257974a5a6077f8c2a6d30d003b1ea5b8b172, stripped PRRPRRRRRRRRRPRRRRRPRRRRQ~}8ЦdB9?`]"k%ܮdπ{&W"O/a$E։"Έ+kԸp#2β$VA[=b |;QK>Hlz p;f{&끃)?Em\^Ta@PEt>4Fԓ<|xo51e/T71"}>d:8d(9 Ev'A`!q=eXFh1#>&ؓDo kj Zxv4;}^fW<~r6eX \S>r$ pO(39|ŧ%Vhi5 B)|P4N씛D {;!LD<k'+ )2$0@8:#comIA)(C"W~oly=T1~u'HE("W7˶[gSF#t4Nj,ꢰZ\8Eb!ɿXsCSlHGh#oӘ' <2r$ |$sJ _ZWX N~Kc߹y~eR2ZSU_]*|{{K,8$Fש?*{º@d0'Qǒw)}Bk LMjՐhಒs@Ǜ>Ks !|Z1)MUwmUD/hB:XNlBDPg#XB.4= (qcoؙ*$V6(zifc=N\k7=N -/~@EHq%Rخ킱I7{- +,Tw'^aaC7}X^LsۿHEm/kq,tH}WE(_#D~a݂ʡzrHD>F.45M& 5_P iڥpèc{ǸۺWgq+') 2otܵZCm3|{L/;0=<4R$U+Į{/8{y-xRB o(}KhѬKQ|LhZja>,В‚5޺O2E/aA`ŽbFϑ lXՄ,3^,k2"r/#+飧*-фt 2B,_$ZBq͚Ls%7>և{)mj$6H l# &2a7iYjKGςo 3AK}/R3eՄnS5%idpDw,nS@ VF+ /s_fs{nWvO,J$TՀx%o9DǽPkؖuo8JԬ//vrGul+SAHʴ3+/ Vɲ CwM*D%p,1N,BZ5`PɚT-':q|Dg]@] kػ1=\7`33.F1RlQqqcC?wl19^.HLD0BT̢0tpZAN"<{PNd]IXUF&#_ c"=cgvɠyHMxZC LLhhO'AXMK4h*{T*\qQSDRx3<`){KޜBX_ŮPfQ=cT?w8 7E@ jn FZEY%bU+\V8]AT,di|e iI{ MDE~KWLe .vL15ߍQ=&Y)f(#--5$(U?FloH' D@H<cQd#ja Ѯji{STtٚ$^%UEoD ;D5M)Ik- cTE)=eLѪ>*7 ΋E͸ΣuTlC5{ k(߃GGQ9R(~D*LR].<NKϺa3)q]±S]ƆS%Oxzj۫zmz^@FFVB/SܣEU~)7**q^ZZ=;ԌZ-gDf64/Hk%d%V!@6I٣uѢvRvWe f ~r7@aQy*Oà/"v)+)M4VZY *,ܢoX! 9y*T{4.~C}MJ1XYlA=Y<,VAJ/N' U^e\|U b֜~Nm;%"4M%e0!DsNJ` a]xƓ;+Pegѥ/5T%8˖F3$t:P,bGt$>pU=xL?߀xZG7؝ɑTc,O: 䵆 A|ͱGkF:T1oJ^H烹${bhW/J:^-Mzl#`h*O*~t.MM 0L$V-Ăn5mX䍲sɐ( @Uy3|S'k D2gqNDA&'[^P_jqP6~'dpu8r\<@;(z -en?0<ur I&CJ]ge 򹢫VCox]Nr~"ڮ2`&+P 45@A[F[rw<ͼf B.gŏ$emM9yɎ~\텔ƪdvo`[;jf/^`'؊?.  R2Bsa~ sڝBkXmSqWK SFs!i-(i{Eu \r`!,y*xGp_4v{tC_j#;2`7NY9mp񂋴7Q3CdG:sm.E%R4quJE&*tv||}>j;r?3X0!# + RtoN[\k0gQK(+2YOsćX}D"0i2.  AGmiLzd?ph\!;C]΍Z1v̩% u=3I^}8U[$,;p4໳}sQō|GiBduQkqe 5 ff2Ç*(aYEaJDvJ`հwGb8R1B40 }s{m0 .OK nKjf@-;2(AQ&{y.KvJj` _`NSZaXQ6K⺩4̨{'&>gIHkH,0 {ҿ䩽Ӟ9N~|( xH%}ՉYq'7e߀uaE-&7WZh$E$TZ\wsW~&>rFCICC;@DI>u3P^2@{|YdeAq⓺eMlJ gre Rs.#zQm(/:$9)*dU2gAcDpeATo16C~kP jO]&5~s0C: V ~yt oNqyh AldV)MR#"|tND++*Xɽ6Ka-.dt$s'z"qc |Hܙ-x #X9&MCxt@r H=DGDqLա@UdWwL GM'|߈qXTbWPYdpP/4P^[;=,"sko \Csv=#$pbF^'~7Nچb}| f`Ƕh { |ŀa!M5P} kMJTB10DiEJOABs./)?|?'fNWs B=Ieǘ7[i;JIbkh}k'5؎%EagWRvєƼCNepw^oMĞ该ٹW@ |ɢ,qhm4`Bmg &I #&*PtG@tMJx!cɋ".: 0Hu >}5EZ֧:0'87#Wg9L\A', FH^.&`(m3"l' Jgnf0]Ai.+ ~5yU7~݁3x P\h$7U )i 9|;HK; 5!s{@Pk\#p8ENGyqU`&4Tzy "s-ܑ1ͤtk&(֓)" eZm&#eoy2dXRiw+e6JQDo^EŠ8<2j/s\K APvֹ]ˠndŠ*LoF%p EwBI)y9 %Ly. _e^nb3=߾'( Z=25.Tn#$M f0ҳ/> Qw/J`%cJ<0KNq8N!KT>C_*q 3SnuLi3с<#[oS|x0$.|:~)1ȱV>6 Qua,[/v݌G}BKŠcJ2Wɐ0bb=P[ 9^1ax7 ۆX(|~WvF6d<$+Tm2ʖcX/a3R0r`'kLν+;oO٢gD2gXAa Z-v>k8P/rx*rwc NZYNZ3`,;M?o^vT|$Ң|新 ot&0Wщ*N#>h;?2-m{WyCw/(0&?tH^wԚB|ٴ0ڸt&JDL]Dj*I.f}I4#DN=%(Gtk̷I(nyW95bA5K&^0UC\AxW_͜:[b)(^x¦%wx2i8