postgresql10-plperl-10.23-150100.8.53.1<>,mc p9|s*Hr:+Pc~+hy#7Ar(>=̥yDk&m[,ZՏxqjN' Z*&8}zJؘ9/ ]{}reaиk'Z2s,>nps$RSkrp=0%{KO؍T ;_2P-~=%A 9I >d4?d$d * r *08   4   ]   D   ( \8 d59 85:M5F[G[H\DI\X\Y\\]]]h^^b`caldaeafalaubvbdwcxcTyczccccd Cpostgresql10-plperl10.23150100.8.53.1The PL/Tcl, PL/Perl, and PL/Python procedural languages for PostgreSQLThis package contains the the PL/Tcl, PL/Perl, and PL/Python procedural languages for the back-end. With these modules one can use Perl, Python, and Tcl to write stored procedures, functions and triggers. PostgreSQL also offers the builtin procedural language PL/SQL.c s390zl35vSUSE Linux Enterprise 15SUSE LLC PostgreSQLhttps://www.suse.com/Productivity/Databases/Servershttps://www.postgresql.org/linuxs390xxDglXrCoQx큤c kc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc Hc 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-10.23-150100.8.53.1.src.rpmpostgresql-plperl-implementationpostgresql10-plperlpostgresql10-plperl(s390-64)@@@@@@@     libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.4)(64bit)libperl.so()(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2)(64bit)perlpostgresql-plperl-noarchpostgresql10-serverrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)5.26.11010.23-150100.8.53.13.0.4-14.6.0-14.0-15.2-14.14.1clc-b@b|b[@aza@a\>@a.a$@`q`OL@`Gc@`/@`#__@_F@_5+@^@^א^G@^@]]@]QT]D%] \g\s[v[ͻ[$@[m~@Z@Z@Zw@Z}@ZaZ2gZ2gZ2gZ@Z@YZ@YY*@Y@Y@YJYaYaY@max@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commrueckert@suse.demax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commrueckert@suse.delars@linux-schulserver.demrueckert@suse.demrueckert@suse.demax@suse.commliska@suse.czmrueckert@suse.demax@suse.commax@suse.commax@suse.commax@suse.commrueckert@suse.demax@suse.commax@suse.commax@suse.commrueckert@suse.demax@suse.commax@suse.commrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demax@suse.commax@suse.commax@suse.commax@suse.commrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.de- bsc#1205300: Update to 10.23: * https://www.postgresql.org/about/news/2543/ * https://www.postgresql.org/docs/10/release-10-23.html - Sync spec file with postgresql15.- Sync spec file with postgresql15.- Update to 10.22: * bsc#1202368, CVE-2022-2625: Extension scripts replace objects not belonging to the extension. * https://www.postgresql.org/docs/release/10.22/- Update to 10.21: * bsc#1199475, CVE-2022-1552: Confine additional operations within "security restricted operation" sandboxes. * https://www.postgresql.org/docs/10/release-10-21.html- bsc#1195680: Upgrade to 10.20: * https://www.postgresql.org/docs/10/release-10-20.html * Reindexing might be needed after applying this upgrade, so please read the release notes carefully. - boo#1190740: Add constraints file with 12GB of memory for s390x as a workaround- Add a llvmjit-devel subpackage to pull in the right versions of clang and llvm for building extensions. - Fix some mistakes in the interdependencies between the implementation packages and their noarch counterpart. - Update the BuildIgnore section.- bsc#1192516: Upgrade to 10.19: * Make the server reject extraneous data after an SSL or GSS encryption handshake (CVE-2021-23214). * Make libpq reject extraneous data after an SSL or GSS encryption handshake (CVE-2021-23222). * https://www.postgresql.org/docs/10/release-10-19.html- Let genlists skip non-existing binaries to avoid lots of version conditionals in the file lists. - Remove postgresql-testsuite-int8.sql.patch, because its purpose is unclear. This affects only the test subpackage.- bsc#1185952: fix build with llvm12 on s390x. 0001-jit-Workaround-potential-datalayout-mismatch-on-s390.patch - bsc#1179945: Re-enable icu for PostgreSQL 10. - bsc#1187751: Make the dependency of postgresqlXX-server-devel on llvm and clang optional (postgresql-llvm-optional.patch).- bsc#1190177: Upgrade to version 10.18: * https://www.postgresql.org/docs/10/release-10-18.html- Upgrade to version 10.17: * https://www.postgresql.org/docs/10/release-10-17.html * CVE-2021-32027, bsc#1185924: Prevent integer overflows in array subscripting calculations. * CVE-2021-32028, bsc#1185925: Fix mishandling of “junk” columns in INSERT ... ON CONFLICT ... UPDATE target lists. - Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (boo#1183118).- Remove leftover PreReq on chkconfig, we stopped using it long time ago.- boo#1179945: Disable icu for PostgreSQL 10 (and older) on TW.- Upgrade to version 10.16: * https://www.postgresql.org/docs/10/release-10-16.html * Reindexing might be needed after applying this update.- bsc#1178961: %ghost the symlinks to pg_config and ecpg. - boo#1179765: BuildRequire libpq5 and libecpg6 when not building them to avoid dangling symlinks in the devel package.- Upgrade to version 10.15: * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD and firing of deferred triggers within index expressions and materialized view queries. * CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb. b) When psql's \connect command re-uses connection parameters, ensure that all non-overridden parameters from a previous connection string are re-used. * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from modifying specially-treated variables. * Fix recently-added timetz test case so it works when the USA is not observing daylight savings time. (obsoletes postgresql-timetz.patch) * https://www.postgresql.org/about/news/2111/ * https://www.postgresql.org/docs/10/release-10-15.html- Fix a DST problem in the test suite: postgresql-timetz.patch https://postgr.es/m/16689-57701daa23b377bf@postgresql.org- update to 10.14: * CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers * CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure. * https://www.postgresql.org/docs/10/release-10-14.html - Remove postgresql-regress.patch, it does not apply anymore and it does not seem to be needed anymore. - Pack the /usr/lib/postgresql symlink only into the main package.- Let postgresqlXX conflict with postgresql-noarch < 12.0.1 to get a clean and complete cutover to the new packaging schema.- update to 10.13 (bsc#1171924). https://www.postgresql.org/about/news/2038/ https://www.postgresql.org/docs/10/release-10-13.html - Unify the spec file to work across all current PostgreSQL versions to simplify future maintenance. - Move from the "libs" build flavour to a "mini" package that will only be used inside the build service and not get shipped, to avoid confusion with the debuginfo packages (bsc#1148643).- update to 10.12 (CVE-2020-1720, bsc#1163985) https://www.postgresql.org/about/news/2011/ https://www.postgresql.org/docs/10/release-10-12.html- use (and package) sha256 checksum file for source- update to 10.11: https://www.postgresql.org/about/news/1994/ https://www.postgresql.org/docs/10/release-10-11.html- add requires to the devel package for the libs that are returned by pg_config --libs- Update to 10.10: * https://www.postgresql.org/about/news/1960/ * https://www.postgresql.org/docs/10/release-10-10.html * CVE-2019-10208, bsc#1145092: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution.- Use FAT LTO objects in order to provide proper static library.- Update to 10.9: * https://www.postgresql.org/docs/10/release-10-9.html * https://www.postgresql.org/about/news/1949/ * CVE-2019-10164 bsc#1138034: Stack-based buffer overflow via setting a password- Update to 10.8: * https://www.postgresql.org/docs/10/release-10-8.html * https://www.postgresql.org/about/news/1939/ * CVE-2019-10130, bsc#1134689: Prevent row-level security policies from being bypassed via selectivity estimators.- Update to 10.7: * https://www.postgresql.org/docs/10/release-10-7.html * https://www.postgresql.org/about/news/1920/ * By default, panic instead of retrying after fsync() failure, to avoid possible data corruption. * Ensure that NOT NULL constraints of a partitioned table are honored within its partitions. * Numerous other bug fixes. - Overhaul README.SUSE - Make the server-devel package exclusive across versions.- Update to 10.6: * CVE-2018-16850, bsc#1114837: Improper quoting of transition table names when pg_dump emits CREATE TRIGGER can cause privilege escalation * Numerous bug fixes, see the release notes: https://www.postgresql.org/docs/10/release-10-6.html * Remove unneeded library dependencies from PGXS.- Stop building the client libraries as they will henceforth be provided by PostgreSQL 11.- add provides for the new server-devel package that will be introduced in postgresql 11- Update to 10.5: https://www.postgresql.org/docs/current/static/release-10-5.html * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state fully between connection attempts. * CVE-2018-10925, bsc#1104202: Fix INSERT ... ON CONFLICT UPDATE through a view that isn't just SELECT * FROM ...- Update to 10.4: https://www.postgresql.org/about/news/1851/ https://www.postgresql.org/docs/current/static/release-10-4.html A dump/restore is not required for those running 10.X. However, if you use the adminpack extension, you should update it as per the first changelog entry below. Also, if the function marking mistakes mentioned in the second and third changelog entries below affect you, you will want to take steps to correct your database catalogs. * CVE-2018-1115, bsc#1091610: Remove public execute privilege from contrib/adminpack's pg_logfile_rotate() function pg_logfile_rotate() is a deprecated wrapper for the core function pg_rotate_logfile(). When that function was changed to rely on SQL privileges for access control rather than a hard-coded superuser check, pg_logfile_rotate() should have been updated as well, but the need for this was missed. Hence, if adminpack is installed, any user could request a logfile rotation, creating a minor security issue. After installing this update, administrators should update adminpack by performing ALTER EXTENSION adminpack UPDATE in each database in which adminpack is installed. * Fix incorrect volatility markings on a few built-in functions * Fix incorrect parallel-safety markings on a few built-in functions.- bsc#1091412: server prerequires server-noarch to make sure that the postgresql user and group exist.- Update to 10.3 * https://www.postgresql.org/docs/current/static/release-10-3.html A dump/restore is not required for those running 10.X. However, if you run an installation in which not all users are mutually trusting, or if you maintain an application or extension that is intended for use in arbitrary situations, it is strongly recommended that you read the documentation changes described in the first changelog entry in the link above, and take suitable steps to ensure that your installation or code is secure. Also, the changes described in the second changelog entry in the link above may cause functions used in index expressions or materialized views to fail during auto-analyze, or when reloading from a dump. After upgrading, monitor the server logs for such problems, and fix affected functions. * CVE-2018-1058 bsc#1081925 Uncontrolled search path element in pg_dump and other client applications- Update to PostgreSQL 10.2 * https://www.postgresql.org/docs/10/static/release-10-2.html * CVE-2018-1052, bsc#1080253: Fix processing of partition keys containing multiple expressions. * CVE-2018-1053, bsc#1077983: Ensure that all temporary files made by pg_upgrade are non-world-readable. * bsc#1079757: Rename pg_rewind's copy_file_range function to avoid conflict with new Linux system call of that name.- Use Python 3 for building PL/Python (boo#1067699). - Don't %config the symlinks to /etc/alternatives to avoid rpmlint warnings.- also package %define pgcontribdir %pgdatadir/contrib- enable support for ICU (new BR: libicu-devel) - enable support for selinux (new BR: libselinux-devel) - enable support for systemd (new BR: pkgconfig(libsystemd))- make sure that also the server gets at least its own version of libpq5 - also change all libpq requires to >= %version instead of just %pgmajor- port /usr/share/postgresql/install-alternatives usage to the new scheme- update to 10.1 * Security Issues - CVE-2017-15098: Memory disclosure in JSON functions - CVE-2017-15099: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges Prior to this release, the "INSERT ... ON CONFLICT DO UPDATE" would not check to see if the executing user had permission to perform a "SELECT" on the index performing the conflicting check. Additionally, in a table with row-level security enabled, the "INSERT ... ON CONFLICT DO UPDATE" would not check the SELECT policies for that table before performing the update. This fix ensures that "INSERT ... ON CONFLICT DO UPDATE" checks against table permissions and RLS policies before executing. * Bug Fixes and Improvements This update also fixes a number of bugs reported in the last few months. Some of these issues affect only version 10, but many affect all supported versions: - Fix a race condition in BRIN indexing that could cause some rows to not be included in the indexing. - Fix crash when logical decoding is invoked from a PL language function. - Several fixes for logical replication. - Restored behavior for CTEs attached to INSERT/UPDATE/DELETE statements to pre-version 10. - Prevent low-probability crash in processing of nested trigger firings. - Do not evaluate an aggregate function's argument expressions when the conditions in the FILTER clause evaluate to FALSE. This complies with SQL-standard behavior. - Fix incorrect query results when multiple GROUPING SETS columns contain the same simple variable. - Fix memory leak over the lifespan of a query when evaluating a set-returning function from the target list in a SELECT. - Several fixes for parallel query execution, including fixing a crash in the parallel execution of certain queries that contain a certain type of bitmap scan. - Fix json_build_array(), json_build_object(), jsonb_build_array(), and jsonb_build_object() to handle explicit VARIADIC arguments correctly. - Prevent infinite float values from being casted to the numeric type. - Fix autovacuum's “work item” logic to prevent possible crashes and silent loss of work items. - Several fixes for VIEWs around adding columns to the end of a view. - Fix for hashability detection of range data types that are created by a user. - Improvements on using extended statistics on columns for the purposes of query planning. - Prevent idle_in_transaction_session_timeout from being ignored when a statement_timeout occurred earlier. - Fix low-probability loss of NOTIFY messages due more than 2 billion transactions processing before any queries are executed in the session. - Several file system interaction fixes. - Correctly restore the umask setting when file creation fails in COPY or lo_export(). - Fix pg_dump to ensure that it emits GRANT commands in a valid order. - Fix pg_basebackup's matching of tablespace paths to canonicalize both paths before comparing to help improve Windows compatibility. - Fix libpq to not require user's home directory to exist when trying to read the "~/.pgpass" file. - Several fixes for ecpg. - This update also contains tzdata release 2017c, with updates for Fiji, Namibia, Northern Cyprus, Sudan, Tonga, and Turks & Caicos Islands, plus historical corrections for Alaska, Apia, Burma, Calcutta, Detroit, Ireland, Namibia, and Pago Pago. For more details see: https://www.postgresql.org/docs/current/static/release-10-1.html- Use /usr/share/postgresql/install-alternatives in the respective scriptlets. - Fix the logic around restart on upgrade and stop on removal. We bring the binaries, but we don't own the unit file.- Update to the final 10.0 release. Major enhancements include: * Logical replication using publish/subscribe * Declarative table partitioning * Improved query parallelism * Significant general performance improvements * Stronger password authentication based on SCRAM-SHA-256 * Improved monitoring and control A dump/restore using pg_dumpall, or use of pg_upgrade, is required for those wishing to migrate data from any previous release. Version 10 contains a number of changes that may affect compatibility with previous releases. See the release notes for details: https://www.postgresql.org/docs/10/static/release-10.html - Reduce the number of version-related macros in the spec file.- Break a build dependency loop in the server packages that led to bootstrap problems.- Update to 10rc1 PostgreSQL 10 RC 1 requires an upgrade from beta 4, or earlier either using pg_dump / pg_restore or pg_upgrade. Changes since beta4 include: * Add psql variables showing server version and psql version. * Several fixes for partitioning * Several fixes for logical replication * Several fixes for transition tables * Fix for query that could end up in an uninterruptible state - Adjust dependencies to the new packaging schema.- update to 10beta4 PostgreSQL 10 beta 4 requires an upgrade from beta 3, or earlier either using pg_dump / pg_restore or pg_upgrade. Any bugfixes applied to 9.6 or earlier that also affected 10 are included in beta 4. Our users and contributors also reported bugs against 10 beta 3, and many of them have been fixed in this release. We urge our community to re-test to ensure that these bugs are actually fixed, including: - Show foreign tables in information_schema.table_privileges view. This fix applies to new databases, see the release notes for the procedure to apply the fix to an existing database. - Clean up handling of a fatal exit (e.g., due to receipt of SIGTERM) that occurs while trying to execute a ROLLBACK of a failed transaction - Remove assertion that could trigger during a fatal exit - Correctly identify columns that are of a range type or domain type over a composite type or domain type being searched for - Prevent crash when passing fixed-length pass-by-reference data types to parallel worker processes - Fix crash in pg_restore when using parallel mode and using a list file to select a subset of items to restore - Change ecpg’s parser to allow RETURNING clauses without attached C variables - Change ecpg’s parser to recognize backslash continuation of C preprocessor command lines - Improve selection of compiler flags for PL/Perl on Windows - Fix make check to behave correctly when invoked via a non-GNU make program Note that some known issues remain unfixed. Before reporting a bug in the beta, please check the Open Items page. https://wiki.postgresql.org/wiki/PostgreSQL_10_Open_Items- update to 10beta3 - hash: Fix write-ahead logging bugs related to init forks - Fix oddity in error handling of constraint violation in ExecConstraints for partitioned tables - Use a real RT index when setting up partition tuple routing - Fix serious performance problems in json(b) to_tsvector() - Fix problems defining multi-column range partition bounds - Fix partitioning crashes during error reporting - Fix race conditions in replication slot operations - Fix very minor memory leaks in psql's command.c - PL/Perl portability fix: avoid including XSUB.h in plperl.c - Fix inadequate stack depth checking in the wake of expression execution changes - Allow creation of C/POSIX collations without depending on libc behavior - Fix OBJECT_TYPE/OBJECT_DOMAIN confusion - Remove duplicate setting of SSL_OP_SINGLE_DH_USE option - Fix crash with logical replication on a function index - Teach map_partition_varattnos to handle whole-row expressions - Fix lock upgrade hazard in ATExecAttachPartition - Apply ALTER ... SET NOT NULL recursively in ALTER ... ADD PRIMARY KEY - hash: Increase the number of possible overflow bitmaps by 8x - Only kill sync workers at commit time in subscription DDL - Fix bug in deciding whether to scan newly-attached partition - Make pg_stop_backup's wait_for_archive flag work on standbys - Fix handling of dropped columns in logical replication - Fix local/remote attribute mix-up in logical replication- bump version in update-alternatives call- use multibuild- initial packages390zl35 1670319240 csdeesfritjakoplptrorusvtrzh10.23-150100.8.53.110.23-150100.8.53.110.23-150100.8.53.1 plperl.soplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl-10.moplperl--1.0.sqlplperl--unpackaged--1.0.sqlplperl.controlplperlu--1.0.sqlplperlu--unpackaged--1.0.sqlplperlu.control/usr/lib/postgresql10/lib64//usr/share/locale/cs/LC_MESSAGES//usr/share/locale/de/LC_MESSAGES//usr/share/locale/es/LC_MESSAGES//usr/share/locale/fr/LC_MESSAGES//usr/share/locale/it/LC_MESSAGES//usr/share/locale/ja/LC_MESSAGES//usr/share/locale/ko/LC_MESSAGES//usr/share/locale/pl/LC_MESSAGES//usr/share/locale/pt_BR/LC_MESSAGES//usr/share/locale/ro/LC_MESSAGES//usr/share/locale/ru/LC_MESSAGES//usr/share/locale/sv/LC_MESSAGES//usr/share/locale/tr/LC_MESSAGES//usr/share/locale/zh_CN/LC_MESSAGES//usr/share/postgresql10/extension/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:27040/SUSE_SLE-15-SP1_Update/ab0af6c59961f67fdbcd857857eb5b45-postgresql10.SUSE_SLE-15-SP1_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=a54486b881d2b8605a507a05bd3713d5f9765dbe, strippedASCII textRRRRRRRi}xO?ueNkYutf-8b0e8f514db2a38bd59fb84d2e4b0e29fd7a6621491f56b13833115063100b592? 7zXZ !t/]"k%Ň0#J:fVǟ2cq7.U;\1? W'|A1.QSZ6|1GX|Z܌^6ʭ!T$L^2ۉQ]aa:iZ*`W_YXxA8cEW18/XԏFR[=qH%J&rZ咂02q,MuHb +zd6&vqaR8p}@ɗȥI1V(6W*#x}p6lقI_{HE< ƒ abf` p%|ȜXe^E!s2wU.}{P}߇&D-JUwz!وѺ@#&SahYl˧l㡜wO}+\GӉ!0)B8W'6ß0J9;]ҩ` G"`4P =]J.pmGVؽ5}gg+W%8ܱY3E~V@zIpYJIxdC]~6j:o'W>mb@*~Ҁs!$;@su4d 7maT}wj%r<^& "fѠ=|O"Cn6CohDe>rA3%rW'.eGϸ@I9"y#@Ar"g !NOjt5}d6 Z<o}%Ot~ =_q`l8 a֡7ˈ\ %.l38fiڇ$mgDێ=P :1  D% (L) F}7q]G=?G1zqZTx& !s:_%9, N#ֽLj5,Ǯ.48D`@:XWȲ- %keZ 6' ?P/ߖcӦ\⳨b^w\uM|{b?>&EQ;AN@L#q/,fgb;#F5O*@"*r n]d_Ɛr4޻N]ְ*ޠEXM)7if@$^)<{%ۏ" hOư]Yoj㫺/jB:  f00$̧ܸL%YB "C +ƱCٶ YZ