libwsutil8-2.4.15-lp151.2.3.1 4>$  Ap] 쑸/=„Wbb~qޫh1@J#'_ E8)'i'tm!;mHِyvVw!&|_+F^E|oYgdu)kah}YyT=--WlƲZD?ߤbv|ql@& sAw950773cf893f30cea1e54a04cca8e787241429d6225254d94de8c1d3fd6596141eeb7607121ac16579da3b893e8743c639220d84<] 쑸/=„Rko/zCDr%EN;=dܣFK{%ÓD{WWK|iQj ],bovyT6 |~FNJsA*Z*S&#u00~5+!a8ޣo0ĺ $wȳeq[U\{Kd,o*/.pP D3Ae@J]ޜ Ơ_fYxHѵuJ8 >p@l?\d   @ !(0 4 8 @  h"(O8X<9H<: <>@FG(H0I8X<YH\p]x^bcbdefluvwxyz XClibwsutil82.4.15lp151.2.3.1Library for wireshark utilitiesThe libwsutil library provides utility functions for libwireshark.] lamb07Robert Frohl Robert Frohl Robert Frohl astieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comjmatejek@suse.comastieger@suse.comjengelh@inai.detchvatal@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comastieger@suse.comecsos@opensuse.orgastieger@suse.comastieger@suse.comastieger@suse.combadshah400@gmail.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgastieger@suse.comastieger@suse.comastieger@suse.comzaitor@opensuse.orgastieger@suse.comastieger@suse.comcrrodriguez@opensuse.orgastieger@suse.comcrrodriguez@opensuse.orgdimstar@opensuse.orgastieger@suse.comandreas.stieger@gmx.demeissner@suse.comandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.de- Wireshark 2.4.15 (bsc#1136021): * Wireshark dissection engine crash. - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.15.html- Wireshark 2.4.14 (bsc#1131945): * CVE-2019-10895: NetScaler file parser crash. * CVE-2019-10899: SRVLOC dissector crash. * CVE-2019-10894: GSS-API dissector crash. * CVE-2019-10896: DOF dissector crash. * CVE-2019-10901: LDSS dissector crash. * CVE-2019-10903: DCERPC SPOOLSS dissector crash. - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.14.html- Wireshark 2.4.13: * CVE-2019-9214: RPCAP dissector could crash (bsc#1127367) * CVE-2019-9209: ASN.1 BER and related dissectors could crash (bsc#1127369) * CVE-2019-9208: TCAP dissector could crash (bsc#1127370) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.13.html- Wireshark 2.4.12: * CVE-2019-5717: The P_MUL dissector could crash (bsc#1121232) * CVE-2019-5718: The RTSE dissector and other dissectors could crash (bsc#1121233) * CVE-2019-5719: The ISAKMP dissector could crash (bsc#1121234) * CVE-2019-5721: The ENIP dissector could crash (bsc#1121235) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.12.html- Wireshark 2.4.11 (bsc#1117740): * CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51) * CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52) * CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53) * CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54) * CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55) * CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.11.html- Wireshark 2.4.10 (bsc#1111647): * CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47) * CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html- Update to 2.4.9 (bsc#1106514): * CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44) * CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45) * CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html - packaging change: temporarily disable upstream tarball signature verification, use hashes from signed release announcement e-mail- update to 2.4.8: * CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, boo#1101777) * CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, boo#1101788) * CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, boo#1101804) * CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, boo#1101786) * CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, boo#1101810) * CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, boo#1101776) * CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, boo#1101794) * CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, boo#1101800) * CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, boo#1101791) * CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, boo#1101802) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.8.html- update to 2.4.7: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or cause dissectors to go into large infinite loops by making Wireshark read specially crafted packages from the network or capture files (bsc#1094301): * CVE-2018-11356: DNS dissector crash * CVE-2018-11357: Multiple dissectors could consume excessive memory * CVE-2018-11358: Q.931 dissector crash * CVE-2018-11359: The RRC dissector and other dissectors could crash * CVE-2018-11360: GSM A DTAP dissector crash * CVE-2018-11362: LDSS dissector crash - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.7.html- Wireshark 2.4.6: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or cause dissectors to go into large infinite loops by making Wireshark read specially crafted packages from the network or capture files (bsc#1088200): * CVE-2018-9264: ADB dissector crash * CVE-2018-9260: IEEE 802.15.4 dissector crash * CVE-2018-9261: NBAP dissector crash * CVE-2018-9262: VLAN dissector crash * CVE-2018-9256: LWAPP dissector crash * CVE-2018-9263: Kerberos dissector crash * CVE-2018-9258: TCP dissector crash * CVE-2018-9257: CQL infinite loop * Memory leaks in multiple dissectors: CVE-2018-9265, CVE-2018-9266, CVE-2018-9267, CVE-2018-9268, CVE-2018-9269, CVE-2018-9270, CVE-2018-9271, CVE-2018-9272, CVE-2018-9273, CVE-2018-9274 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.6.html- Wireshark 2.4.5: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or cause dissectors to go into large infinite loops by making Wireshark read specially crafted packages from the network or capture files (bsc#1082692): * CVE-2018-7335: The IEEE 802.11 dissector could crash * CVE-2018-7321, CVE-2018-7322, CVE-2018-7323, CVE-2018-7324, CVE-2018-7325, CVE-2018-7326, CVE-2018-7327, CVE-2018-7328, CVE-2018-7329, CVE-2018-7330, CVE-2018-7331, CVE-2018-7332, CVE-2018-7333, CVE-2018-7421: Multiple dissectors could go into large infinite loops * CVE-2018-7334: The UMTS MAC dissector could crash * CVE-2018-7337: The DOCSIS dissector could crash * CVE-2018-7336: The FCP dissector could crash * CVE-2018-7320: The SIGCOMP dissector could crash * CVE-2018-7420: The pcapng file parser could crash * CVE-2018-7417: The IPMI dissector could crash * CVE-2018-7418: The SIGCOMP dissector could crash * CVE-2018-7419: The NBAP disssector could crash * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.5.html- Wireshark 2.4.4: * fixes for dissector crashes: + CVE-2018-5334: IxVeriWave file could crash (bsc#1075737) + CVE-2018-5335: WCP dissector could crash (bsc#1075738) + CVE-2018-5336: Multiple dissector crashes (bsc#1075739) * No longer enable the Linux kernel BPF JIT compiler via the net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable to Spectre variant 1 (bsc#1075748, CVE-2017-5753) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.4.html- Wireshark 2.4.3: This release fixes minor vulnerabilities that could be used to trigger dissector crashes by making Wireshark read specially crafted packages from the network or capture files (bsc#1070727): * CVE-2017-17084: IWARP_MPA dissector crash (wnpa-sec-2017-47) * CVE-2017-17083: NetBIOS dissector crash (wnpa-sec-2017-48) * CVE-2017-17085: CIP Safety dissector crash (wnpa-sec-2017-49) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.3.html- Wireshark 2.4.2: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or infinite loops by making Wireshark read specially crafted packages from the network or a capture file (boo#1062645): * CVE-2017-15192: BT ATT dissector crash (wnpa-sec-2017-42) * CVE-2017-15193: MBIM dissector crash (wnpa-sec-2017-43) * CVE-2017-15191: DMP dissector crash (wnpa-sec-2017-44) * CVE-2017-15190: RTSP dissector crash (wnpa-sec-2017-45) * CVE-2017-15189: DOCSIS infinite loop (wnpa-sec-2017-46)- downgrade to lua51-devel in order to drop Lua 5.2 from Factory (can't upgrade to 5.3 because that is still not supported)- Wireshark 2.4.1: This release fixes minor vulnerabilities that could be used to trigger dissector crashes, infinite loops, or cause excessive use of memory resources by making Wireshark read specially crafted packages from the network or a capture file: * CVE-2017-13767: MSDP dissector infinite loop (bsc#1056248) * CVE-2017-13766: Profinet I/O buffer overrun (bsc#1056249) * CVE-2017-13764: Modbus dissector crash (bsc#1056250) * CVE-2017-13765: IrCOMM dissector buffer overrun (bsc#1056251) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.1.html- Trim filler wording from description.- Gcrypt is now default - gtk switch was redone to accept value at the end instead of 2 options- Wireshark 2.4.0: * SS7 Point Codes can now be resolved into names with a hosts- like file. * Wireshark can now go fullscreen to have more room for packets * TShark can now export objects like the other GUI interfaces. * Support for G.722 and G.726 codecs in the RTP Player (via the SpanDSP library) * You can now choose the output device when playing RTP streams * Added support for dissectors to include a unit name natively in their hf field. A field can now automatically append "seconds" or "ms" to its value without additional printf-style APIs * The Default profile can now be reset to default values. * You can move back and forth in the selection history in the Qt UI. * IEEE 802.15.4 dissector now uses an UAT for decryption keys. The original decryption key preference has been obsoleted. * Extcap utilities can now provide configuration for a GUI interface toolbar to control the extcap utility while capturing. * Extcap utilities can now validate the capture filter. * Display filter function len() can now be used on all string and byte fields. * Added an experimental timeline view for 802.11 wireless packet data which can be enabled via the "802.11 radio information preferences. * Added TLS 1.3 (draft 21) dissection and decryption support * The (D)TLS Application Layer protocol (e.g. HTTP or CoAP) can now be changed via the Decode As dialog. * The RSA keys dialog for SSL keys has improved feedback for invalid settings and no longer requires the IP address, Port or Protocol fields to be set in addition to the Key File. * TCP Analysis will detect and flag more spurious retransmissions. * Many new and updated protocol support * New and updated Capture File Support: ERF, IxVeriWave, Libpcap, and Pcap-ng * API changes: IEEE802.11: wlan_mgt display filter element got renamed to wlan.- Wireshark 2.2.8 (bsc#1049255): This release fixes minor vulnerabilities that could be used to trigger dissector crashes, infinite loops, or cause excessive use of memory resources by making Wireshark read specially crafted packages from the network or a capture file: * CVE-2017-7702 CVE-2017-11410: WBMXL dissector infinite loop (wnpa-sec-2017-13) * CVE-2017-9350 CVE-2017-11411: openSAFETY dissector memory exhaustion (wnpa-sec-2017-28) * CVE-2017-11408: AMQP dissector crash (wnpa-sec-2017-34) * CVE-2017-11407: MQ dissector crash (wnpa-sec-2017-35) * CVE-2017-11406: DOCSIS infinite loop (wnpa-sec-2017-36)- Wireshark 2.2.7 (bsc#1042330): This release fixes minor vulnerabilities that could be used to trigger dissector crashes, infinite loops, or cause excessive use of CPU resources by making Wireshark read specially crafted packages from the network or a capture file: * CVE-2017-9352: Bazaar dissector infinite loop (bsc#1042304) * CVE-2017-9348: DOF dissector read overflow (bsc#1042303) * CVE-2017-9351: DHCP dissector read overflow (bsc#1042302) * CVE-2017-9346: SoulSeek dissector infinite loop (bsc#1042301) * CVE-2017-9345: DNS dissector infinite loop (bsc#1042300) * CVE-2017-9349: DICOM dissector infinite loop (bsc#1042305) * CVE-2017-9350: openSAFETY dissector memory exhaustion (bsc#1042299) * CVE-2017-9344: BT L2CAP dissector divide by zero (bsc#1042298) * CVE-2017-9343: MSNIP dissector crash (bsc#1042309) * CVE-2017-9347: ROS dissector crash (bsc#1042308) * CVE-2017-9354: RGMP dissector crash (bsc#1042307) * CVE-2017-9353: IPv6 dissector crash (bsc#1042306)- Allow opening capture files from desktop without asking for privileged credentials. bsc#1025714- Wireshark 2.2.6: This release fixes minor vulnerabilities that could be used to trigger a dissector crash or infinite loops by sending specially crafted packages over the network or into a capture file: * CVE-2017-7700: NetScaler file parser infinite loop (bsc#1033936) * CVE-2017-7701: BGP dissector infinite loop (bsc#1033937) * CVE-2017-7702: WBMXL dissector infinite loop (bsc#1033938) * CVE-2017-7703: IMAP dissector crash (bsc#1033939) * CVE-2017-7704: DOF dissector infinite loop (bsc#1033940) * CVE-2017-7705: RPCoRDMA dissector infinite loop (bsc#1033941) * CVE-2017-7745: SIGCOMP dissector infinite loop (bsc#1033942) * CVE-2017-7746: SLSK dissector long loop (bsc#1033943) * CVE-2017-7747: PacketBB dissector crash (bsc#1033944) * CVE-2017-7748: WSP dissector infinite loop (bsc#1033945) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.6.html- Wireshark 2.2.5: boo#1027998 This release fixes minor vulnerabilities that could be used to trigger a dissector crash or infinite loops by sending specially crafted packages over the network or into a capture file: * CVE-2017-6467: NetScaler file parser infinite loop (wnpa-sec-2017-11) * CVE-2017-6468: NetScaler file parser crash (wnpa-sec-2017-08) * CVE-2017-6469: LDSS dissector crash (wnpa-sec-2017-03) * CVE-2017-6470: IAX2 dissector infinite loop (wnpa-sec-2017-10) * CVE-2017-6471: WSP dissector infinite loop (wnpa-sec-2017-05) * CVE-2017-6472: RTMTP dissector infinite loop (wnpa-sec-2017-04) * CVE-2017-6473: K12 file parser crash (wnpa-sec-2017-09) * CVE-2017-6474: NetScaler file parser infinite loop (wnpa-sec-2017-07) * wnpa-sec-2017-06: STANAG 4607 file parser infinite loop - restore license in about dialog boo#1026507- Disable gnutls on SLE11 as we are unable to meet the gnutls requirements there- Wireshark 2.2.4: This release fixes two minor vulnerabilities that could be use to cause Wireshark to go into a large or infinite loop by sending specially crafted packages over the network or into a capture file (bsc#1021739) * The ASTERIX dissector could go into an infinite loop CVE-2017-5596 wnpa-sec-2017-01 * The DHCPv6 dissector could go into a large loop. CVE-2017-5597 wnpa-sec-2017-02 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.4.html- Obsolete the ui-gtk in the ui-qt to ensure clean non-conflicted install- Cleanup a bit with spec-cleaner - Properly set ethereal symlink based on UI and set it to proper subpkg - Update conditionals on wireshark to only build Qt or GTK depending on the interface, because upstream now only supports Qt5 - Update the caps code in spec but keep it disabled - Enable geoip only on platforms that support it - Enable libnl only on newer releases - Update desktop file and icon caches - Drop not really needed patch wireshark-1.10.0-authors-pod2man.patch - Use full commands for icon/desktop cache for gtk mode as on sle11 it was not present yet as a macro - Split shared libraries properly to subpackages- Wireshark 2.2.3: * fix export related bugs * fix UI bugs * bugfix and corrections updates for dissectors * updated protocol support for BGP, BOOTP/DHCP, BTLE, DICOM, DOF, Echo, GTP, ICMP, Radiotap, RLC, RPC over RDMA, RTCP, SMB, TCP, UFTP4, and VXLAN- Wireshark 2.2.2: * CVE-2016-9372: Profinet I/O long loop (boo#1010807) * CVE-2016-9374: AllJoyn crash (boo#1010752) * CVE-2016-9376: OpenFlow crash (boo#1010735) * CVE-2016-9373: DCERPC crash (boo#1010754) * CVE-2016-9375: DTN infinite loop (boo#1010740) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.2.html- Wireshark 2.2.1: This release fixes a number of issues that made it possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (bsc#1002981) * wnpa-sec-2016-56: The Bluetooth L2CAP dissector could crash * wnpa-sec-2016-57: The NCP dissector could crash * Further bug fixes and updated protocol support as listed in: * Bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.1.html- Wireshark 2.2.0: * Bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.0.html * Drop wireshark-pkg-config.patch because code is now in upstream * Drop wireshark-1.12.6-fix-QT-PIC-PIE.patch because no more need for build. And create errors at build Tumbleweed. * Rebase wireshark-1.10.0-authors-pod2man.patch- Wireshark 2.0.6: This release fixes a number of issues that made it possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (bsc#998099) * The QNX6 QNET dissector could crash wnpa-sec-2016-50 CVE-2016-7175 * The H.225 dissector could crash wnpa-sec-2016-51 CVE-2016-7176 * The Catapult DCT2000 dissector could crash wnpa-sec-2016-52 CVE-2016-7177 * The UMTS FP dissector could crash wnpa-sec-2016-53 CVE-2016-7178 * The Catapult DCT2000 dissector could crash wnpa-sec-2016-54 CVE-2016-7179 * The IPMI Trace dissector could crash wnpa-sec-2016-55 CVE-2016-7180 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.6.html- fix permissions warning on appdata, does not need +x- Wireshark 2.0.5: This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * PacketBB crash wnpa-sec-2016-41 bsc#991013 CVE-2016-6505 * WSP infinite loop wnpa-sec-2016-42 bsc#991015 CVE-2016-6505 * RLC long loop wnpa-sec-2016-44 bsc#991017 CVE-2016-6508 * LDSS dissector crash wnpa-sec-2016-45 bsc#991018 CVE-2016-6509 * RLC dissector crash wnpa-sec-2016-46 bsc#991019 CVE-2016-6510 * OpenFlow long loop wnpa-sec-2016-47 bsc#991020 CVE-2016-6511 * MMSE, WAP, WBXML, and WSP infinite loop wnpa-sec-2016-48 bsc#991021 CVE-2016-6512 * WBXML crash wnpa-sec-2016-49 bsc#991022 CVE-2016-6513 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html- Drop external wireshark.appdata.xml file, use the upstream bundled one instead. - Use the bundled appdata file as a template to generate the proper appdata files for both the GTK and QT GUI applications; install separate appdata for both apps.- Wireshark 2.0.4 (boo#983671) This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * The SPOOLS dissector could go into an infinite loop wnpa-sec-2016-29 CVE-2016-5350 * The IEEE 802.11 dissector could crash wnpa-sec-2016-30 CVE-2016-5351 * The IEEE 802.11 dissector could crash wnpa-sec-2016-31 CVE-2016-5352 * The UMTS FP dissector could crash wnpa-sec-2016-32 CVE-2016-5353 * Some USB dissectors could crash wnpa-sec-2016-33 CVE-2016-5354 * The Toshiba file parser could crash wnpa-sec-2016-34 CVE-2016-5355 * The CoSine file parser could crash wnpa-sec-2016-35 CVE-2016-5356 * The NetScreen file parser could crash wnpa-sec-2016-36 CVE-2016-5357 * The Ethernet dissector could crash wnpa-sec-2016-37 CVE-2016-5358- Wireshark 2.0.3 (boo#976944) This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * The NCP dissector could crash (wnpa-sec-2016-19) * TShark could crash due to a packet reassembly bug (wnpa-sec-2016-20) * The IEEE 802.11 dissector could crash (wnpa-sec-2016-21) * The PKTC dissector could crash (wnpa-sec-2016-22) * The PKTC dissector could crash (wnpa-sec-2016-23) * The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24) * Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) * The GSM CBCH dissector could crash (wnpa-sec-2016-26) * MS-WSP dissector crash (wnpa-sec-2016-27) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.3.html- Wireshark 2.0.2 (boo#968565) This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * CVE-2016-2522: ASN.1 BER dissector crash (wnpa-sec-2016-02) * CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03) * CVE-2016-2524: X.509AF dissector crash (wnpa-sec-2016-04) * CVE-2016-2525: HTTP/2 dissector crash (wnpa-sec-2016-05) * CVE-2016-2526: HiQnet dissector crash (wnpa-sec-2016-06) * CVE-2016-2527: 3GPP TS 32.423 Trace file parser crash (wnpa-sec-2016-07) * CVE-2016-2528: LBMC dissector crash (wnpa-sec-2016-08) * CVE-2016-2529: iSeries file parser crash (wnpa-sec-2016-09) * CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10) * CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10) * CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11) * Ixia IxVeriWave file parser crash (wnpa-sec-2016-12) * IEEE 802.11 dissector crash (wnpa-sec-2016-13) * GSM A-bis OML dissector crash (wnpa-sec-2016-14) * ASN.1 BER dissector crash (wnpa-sec-2016-15) * SPICE dissector large loop (wnpa-sec-2016-16) * NFS dissector crash (wnpa-sec-2016-17) * ASN.1 BER dissector crash (wnpa-sec-2016-18) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.2.html- Recommend wireshark-ui instead of requiring it (boo#961170) to support text-only use- Add CVEs for boo#960382- Wireshark 2.0.1 fixing the following dissector crashes boo#960382: * NBAP dissector crashes. wnpa-sec-2015-31 CVE-2015-8711 * NLM dissector crash. wnpa-sec-2015-37 CVE-2015-8718 * BER dissector crash. wnpa-sec-2015-39 CVE-2015-8720 * Zlib decompression crash. wnpa-sec-2015-40 CVE-2015-8721 * SCTP dissector crash. wnpa-sec-2015-41 CVE-2015-8722 * 802.11 decryption crash. wnpa-sec-2015-42 CVE-2015-8723 CVE-2015-8724 * DIAMETER dissector crash. wnpa-sec-2015-43 CVE-2015-8725 * VeriWave file parser crashes. wnpa-sec-2015-44 CVE-2015-8726 * RSVP dissector crash. wnpa-sec-2015-45 CVE-2015-8727 * ANSI A & GSM A dissector crashes. wnpa-sec-2015-46 CVE-2015-8728 * Ascend file parser crash. wnpa-sec-2015-47 CVE-2015-8729 * NBAP dissector crash. npa-sec-2015-48 CVE-2015-8730 * RSL dissector crash. wnpa-sec-2015-49 CVE-2015-8731 * ZigBee ZCL dissector crash. wnpa-sec-2015-50 CVE-2015-8732 * Sniffer file parser crash wnpa-sec-2015-51 CVE-2015-8733 * NWP dissector crash. wnpa-sec-2015-52 CVE-2015-8734 * BT ATT dissector crash. wnpa-sec-2015-53 CVE-2015-8735 * MP2T file parser crash. wnpa-sec-2015-54 CVE-2015-8736 * MP2T file parser crash. wnpa-sec-2015-55 CVE-2015-8737 * S7COMM dissector crash. wnpa-sec-2015-56 CVE-2015-8738 * IPMI dissector crash. wnpa-sec-2015-57 CVE-2015-8739 * TDS dissector crash. wnpa-sec-2015-58 CVE-2015-8740 * PPI dissector crash. wnpa-sec-2015-59 CVE-2015-8741 * MS-WSP dissector crash. wnpa-sec-2015-60 CVE-2015-8742 - adjust wireshark-1.12.6-fix-QT-PIC-PIE.patch for upstream changes- BuildRequire pkgconfig(Qt5Multimedia) too.- Enable netlink support, requires libnl3.- Wireshark 2.0.0: * Completely new user interface (QT) * ~/.config/wireshark now used over ~/.wireshark * File format debugging support for BTSNOOP, PCAP, and PCAPNG * New and updates support for 3GPP TS 32.423 Trace, Android Logcat text files, Colasoft Capsa files, Netscaler 3.5, and Symbian OS BTSNOOP File Format * Support nanosecond timestamp resolution in PCAP-NG * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.0.html - adjust wireshark-pkg-config.patch for upstream changes- Wireshark 1.12.8 [boo#950437] The following vulnerabilities have been fixed: * pcapng file parser could crash while copying an interface filter. wnpa-sec-2015-30 CVE-2015-7830 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.8.html - drop upstream wireshark-1.12.x-allow-gdk-pixbuf-deprecation.patch- Wireshark 1.12.7 [boo#941500] The following vulnerabilities have been fixed: * Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241 * Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242 * Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243 * The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244 * The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245 * The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246 * The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247 * Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248 * The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html- Conditionally set lua52-devel BuildRequires for openSUSE versions newer than 13.2. Wireshark does not compile with lua 5.3.- Fix Factory with QT (PIE/PIC) adding wireshark-1.12.6-fix-QT-PIC-PIE.patch- Wireshark 1.12.6 - The following vulnerabilities have been fixed: * WCCP dissector crash CVE-2015-4651 wnpa-sec-2015-19 boo#935157 * GSM DTAP dissector crash CVE-2015-4652 wnpa-sec-2015-20 boo#935158 - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.6.html- force -fPIC build to make QT5 happy.- Wireshark 1.12.5 [boo#930689] - The following vulnerabilities have been fixed: * The LBMR dissector could go into an infinite loop. CVE-2015-3808 CVE-2015-3809 wnpa-sec-2015-12 * The WebSocket dissector could recurse excessively. CVE-2015-3810 wnpa-sec-2015-13 * The WCP dissector could crash while decompressing data. CVE-2015-3811 wnpa-sec-2015-14 * The X11 dissector could leak memory. CVE-2015-3812 wnpa-sec-2015-15 * The packet reassembly code could leak memory. CVE-2015-3813 wnpa-sec-2015-16 * The IEEE 802.11 dissector could go into an infinite loop. CVE-2015-3814 wnpa-sec-2015-17 * The Android Logcat file parser could crash. CVE-2015-3815 wnpa-sec-2015-18 - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.5.html- Build the qt frontend against QT5 in Factory (only).- Add wireshark-pkg-config.patch: actually install wireshark.pc, which is part of the tarball. Seems only cmake based setup handles this for upstream. - Add wireshark.appdata.xml in order to show up in AppStream based appstores.- Wireshark 1.12.4: - The following security issues were fixed: * The ATN-CPDLC dissector could crash. wnpa-sec-2015-06 CVE-2015-2187 [bnc#920695] * The WCP dissector could crash. wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696] * The pcapng file parser could crash. wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697] * The LLDP dissector could crash. wnpa-sec-2015-09 CVE-2015-2190 [bnc#920698] * The TNEF dissector could go into an infinite loop. wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699] * The SCSI OSD dissector could go into an infinite loop. wnpa-sec-2015-11 CVE-2015-2192 [bnc#920700] - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.4.html- Wireshark 1.12.3 - The following vulnerabilities allowed Wireshark to be crashed by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. + The WCCP dissector could crash wnpa-sec-2015-01 CVE-2015-0559 CVE-2015-0560 [boo#912365] + The LPP dissector could crash. wnpa-sec-2015-02 CVE-2015-0561 [boo#912368] + The DEC DNA Routing Protocol dissector could crash. wnpa-sec-2015-03 CVE-2015-0562 [boo#912369] + The SMTP dissector could crash. wnpa-sec-2015-04 CVE-2015-0563 [boo#912370] + Wireshark could crash while decypting TLS/SSL sessions. wnpa-sec-2015-05 CVE-2015-0564 [boo#912372] - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.3.html- build with PIE- Allow build with functions deprecated in gdk-pixbuf 2.31.2, fixing build for openSUSE Factory, add wireshark-1.12.x-allow-gdk-pixbuf-deprecation.patch- Wireshark 1.12.2 - The following vulnerabilities have been fixed. + SigComp UDVM buffer overflow wnpa-sec-2014-20 CVE-2014-8710 boo#905246 + AMQP crash wnpa-sec-2014-21 CVE-2014-8711 boo#905245 + NCP crashes wnpa-sec-2014-22 CVE-2014-8712 CVE-2014-8713 boo#905248 + TN5250 infinite loops wnpa-sec-2014-23 CVE-2014-8714 boo#905247 - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.2.html- remove gpg-offline, now part of source-validator, also fixing SLE 12/sbin/ldconfig/sbin/ldconfiglamb07 15611278712.4.15-lp151.2.3.12.4.15-lp151.2.3.1libwsutil.so.8libwsutil.so.8.0.0/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10498/openSUSE_Leap_15.1_Update/afc5b7f5a85a2a1a818b51dd515653d5-wireshark.openSUSE_Leap_15.1_Updatecpioxz5i586-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=c3de9de7c9a0a48f0a477d7f4137e1bea43228a4, strippedPRRR RRRRRR RR R R RR)ػوbc钞utf-86f0d12daaacfdeda5ba951eaf7acec65ed14029834e8e0acb64db0bad7b7cf12?7zXZ !t/߳] cr$x# JMj=?BxWw.!4q)99CgyRUZ8yVaej[oW8O )_lfVD+E&Bx*3z`%NwpG^V]u5̍DSPZ 4jT5 b3'*lc6b; sY\k}<5Uvh B>Luzd逌{Җ^mpl>C lbD=4yWZEd_B+-D}2 fA[-UgS}f-àsJh"۷2 xOa#I .t3'd8: Pt,$D)ϊ[784<Iezay;E{q0p|t]hQ?SH;^2ꄴ/)'9&l0fJU LY,DaG;;̠IH^u)/vU,J,6Vn-ݱ";~3EJT/҅Sa.V`7=чLJhLuBH-]ر̇UC^S5ljfJx$ c9=o(1)֢!cC)k]hG [.O2c%9|\ܨ?Yc}ÜkW{黸I)fPqWz>~bDRmb#8l}P_-G͹&n y0SוI*d;]; x̿xϤa;|$=a}K8#x$Ng~ozNtKŤ8dofTwX+a=c} "kBѨJ|`[Y 530U>4hԖiU9?<C7?I|| *;j7pN>=E孚P9 Dh#vPQn~n1 o0aQ(j 3Gb|(ijR1~1 t[F)vwբNlTd\gZxkyIw|(E1y)$e;%brBt<}"q/&b1wC c=W [Cn퐱!ڛ }PKUmוʬ H΋EV}(MG f;׹`0!ǵIn[^3L+6f<)9yؖj7U!zz^9C (u(zW|}߲Eɥ57}~+msvP ->ZEN`dtcL&I!>7\ <fFK/ *^A%iy}8& @{Oc_ Dp3#zCX0P9)4dlLZ{k%B/]-99G@W2P< iV+W. ?`i^DHpkijT_x/=Ģ$QS:ۥc;>q/i?8ۚd<$Yt7}7>Id;38ZQaŤ:=**b&6ോXC!E \.o B 6(U󾓃eniyc/4Gb$sk^ 'AvgV uTMY(i9guX7ttCtHsO fߨ:fp@@ٳ̲v@D QPl#1TSX)-K)=^p= p7c 2JFnϨ? a3ͽCX+] 9wHlvŴ$}3ÇY$-tCSKyg |\Vӝ~y@^"W0  q ՔwKo@]@~ŗݦ4᳁M[)HTn:DoFr}0{VM7'?Kj|"3 QpۅI^VMgմZCFR`՟(с^oᷓĹIt}?p?^ZKjm+a "߆)lisihKzf8LלA)jwAʾDҙu}Cϲ6`6{$SKĀYDd^Sp%;,yBM X wXؑp]B!<)]W#Ɵ43(:?ܝ ZNF&;86%ʉ&XoiJ/J ѮU9-y6w?w)w09# _CDE'O@9.3 mx ]p4MThjl"2/v\[ |uL툊;)F5idB`A!F|IJ*l-ۂ.`+#17+a􂅮°`ޖ\@ 1M}Q,dե pXYZ"0=ܺ²9ִ8(J={K'#pGt7 #qҢF ^yy(:1}:\A<YINㆢX6rW<ܮ?~ Cy$;4ݺ:})xrhuހi솣AG 5e]ŽEc1 xRFSϽ[ HĶ? 3mrzsmd%6JϿhCuBl ) 0TGU{&YH X9~.9b~KBOt*0KRif2{uPR=ئ06ΐ W'jd2$ R92` #hU~,?3:rY/&>Zx%B qNHf^m[v"%$7lywWȆpf`/`|/μ?'Y@ϬxBVPgɯw ;& >pX |e!VtKFrF5 ݅ @YnK>a6DM,̽,+]="q^h('/-vRls^R>+.@KMVo/'GJa&f=ZGG=c[C#sM3#$^ȝ8:-{(d>r5G![ziC) hNpU-I#9/?=VX_}M_4IH''W2}&iAbSckQnd)Ʌ3^9Z]JYRMdنtwĕ {1[zwR#<\ lWl J*s@ƛs"| 1FpOD-<]lq}z@䍤Ʉe`dg-7KlBt#3 #xUX~pɔauԞ$^AXy|fg}4.~!9@nj2A$r%u-|ZT#Ubhg 8b~wt3Y!ϗR\4.U\sBc;(m`֮\MHÂ`)?"$5(ķ` wnwԭKO$W-ȷ;L1O7,}w"$Ag- d?I>u;*azm-,cs9cg/Tv}NTᱰ+y9c z~ P[< _5h+_oelT[#}𡄸U:}!2M19_iԧS'T4)UaxRdf ugv%ȳO^O(6i16a{ XD6>>C~>sU:`#rlb[!j4hR5D/ $H{eSzzܿ޻湕 Ȯ5%oq*#|A'#%\DK}[A[挜r!/D2ϫ(1P!Ń<<> hrLy@ %OtR+ :H^-C98B&7$@lJ{Ծz޳nlryt33HH6qdtBБzPaK$C˿<&S&.F慿Pe~GxOQƖ;063hwyQ~}rY\c_{02B]ٮrBn\ oô <4xBͰyMV(4<@LS49zAϽt Ѩ.Aqn/#)ʗ)G[?d)_c| kx95Q<;k 4B] nmTMNu,VjW NaF a.)igLPi$J h%Bxi2f4TɀǪJˆ7E&PCD6הm;*S-?=kcy$-r'| ee[g [C?Hntո ,cTQal>neKh=H`Us8JviT0-*N`XdRgOK#R*Y!{>'iA{RZ{rǪPTB5*L)$B7G[+_s<_ A|Ƙ8ٗ*iGh!z֡=_B%5|8x6NƼj8zXǤdW3PKh.yVZbc*ih2& ] 22\5bݐoCkGZaqNwVI-ֽvymnk{\ɮ'9h9)z4A}E֠- X=LplLUB\)n^fE։gAފp%|h,<(+v*cmWs 62)NgWnەXPXp1qJ$ pٸ N-J>)8>,+$PL\+bhKʻfVڣO[#0$f!R,(AآT5ˣ~gx5/FeWAKX%+5zܽm[ ̠VHӋK*1)|w[ٱJ@;$~FR! YDʘ#"5dLIE=aRBd>9@Du :?6y}g5rAGbs]o#O#nbo SyG&E@}r_#}8zWYieN_| nLG$D:*%׷0~LvVHbRM:&%<3Tw&icYheFIP{Ex)Iǩw Ej[ԝ:-KSxS3Eh}qa5Ŕy,}IJ3s6=&)fȫڹq0j"U̓8TӐx1lArm׆VcLQ/IPqqd_!sѱk/V]U.c1/&7>M=cVdK&1pA5&s'^*zz3@@:q7klzxD>qgT|)U[tmDxG3vj #yJ/Bk ~IE%^Y4 ȝ;Š~"wau{i*11;JP`6oeF"9^cr} &%>f\܄ahlF@p69rO||`payS?m.n`nT߉$gcY+pZ8Fu'19 dKZȁ|F=N?MY"0v D tAvFlxθڷ6šl}(sR!)]dA:<< ;sʍ[ga[ۊ~4ݜ݀tUW/Ĩ4nbT }3glAw޸e0+J9H(QQVc)=T`>6Vvp/:*Dg3x>F[ >R3%pH5!ļV}`DCK {/XEE2m m3؍zb ?‡O8U8Z {:~j.1WޣK!t .C9|o+ϩx~|SI>Q&gJzTU\X# tlX/Nk4sSӉ?A aV'g9?!m?p>fEYk6\RR0ǔ^N7<( 'J|pU:ïf&]ƺdΈ֙Vi-}#hp_ _|Ekl|Q8+}Μ խMrjڲ.?S?0/!={SDF~LOJ#%kŀa,szF;;dXUEmqWx/`D/9bagQTsŏɜ5R2S{L9*pT28z^6K/bKê?{AonG Fi-|'2km#֩j{ĉ&$lZ4&LqP׌cw w˪>Qї ԩV.a#bF#4[FUOvI տsoz71k]%i'Oi4漗SfYXps~x*;y}MT;Dɮ/ Cˁe54ɕ鯳 ,?C1 @bBX#lIVA z F'g%]SE,.KDtV"Yto J):`>iwoh|^ؚd=(wڔK {,GdM &NF8+;L?+u(lNqσuqZ#v5s\+,pOHUT…Qqr>xN[gy #h $h!M:.f۹=\n/8Άz~Y.; 0k'8 m| S9IpPx )%5V }v$|sҊeBt\DBV[Ak Ǣhd,/$^]es'Te!E<=ɜRtӠ%e 8M8y!]6Ko V ~z.JcFmrB>.u5\+їT /UB hR#k5 1)Ȟ(25YQs 4TymĐeewA#w LQǺ#=,Eu9tMJzyV3XZ<KнWc-hjJa-ytLE4{?{r|'o,*ڬV:wDYSqҲ1ð?{Eg3NBRu]N$q%D6]Y 6{S58gVYo2E≘Q*o50wkfI`2_%ai5T!,ֲ5 ZɔmYt8l^ ` !&#"߮'ލ<]̢XW/GdBUiY$bO\;/MF @W>2?9gL? HAcMY`͘7oY6J# _K2);a澗*),ۤH:ƽ?.L4 Q/dNM`@Iťeg2I6B63GG#.:wKݕVQPS/V4o`~<7~ζnDLmq>0[] >V FXb5qb RJő)ߌt K}F\]XJZ{-C [/fk֣8M䍲ƨK &mĄxXJ&UHŠFbGC`7  sm$.!׶ڐV; L`]B vщojr8",tAYo!ik*kTk2_ hRS-r.8w6qwg^B޵2ӍIioG??qI%}~,x\:hx鴽nIx̤@j|a=at(ƈv9BR_ ;9 #ΝUnbñ8ݱGPq4JenSg%nz<"":j%m?.HAu~j*a/= %g.i0cd7vVJ~Qީug66όach:f†?*Tiѳy`&V@T~W=~D)~М g&(oi+;p~)B0%ς^;ac ;Òb\* 4vBv,cNfƙ wz 69HWy-ˌݷ64|xCҀ@<|J ic6r.J*av1sK2)hWޝyjf.x||@>vf#6#ú 2L[yU;[Y(,ߟշ$ƝV_xW9t3qxdEʤ? oU0 r1)MoF_SFҢfIb6go9?iE3㧣v&uY142ǚ+3_#@#Җ\r%ɓ)cr[:k]nOCSy',Uu\2ɢN5Fy>2'QB(훢<À\?>-ײc !GL-yi.RztYxc0&ki) 濸X=PA,e[L1!4 [)O28uԒ \hIPA@4Q-0 7BTiaKhln^ 5>?(~׹H6mR( J3%#d6x<꣓ʖ͖⏢ަ]3MC9 _5h+։Î{mW1)WO0TGzjc#B[˛ )N>{wPʞp| g4IA,wޟ 8>8%o%Ve(nJYa* {a@1;v4 a6zoff=cL KBItxO =K'GF.d ˸on/;jW#$<ht;JA0]B Y)#"b%V[^xT>W5+0CSd9nr Nq wqY4d4H^-gz<[`8!2L1Bnz$8cŶb"\^ '2=XJCt,쭭,BxB"kݓζ`WRMΝ|}f#WtxVh?,nupuGi!yt8o# q9 ̮NPDSRFc:Ү`1#flIʰŒN-֋!XJ..DSLojP|L*[n#X0$8kmکk; ༁vS\;b-gـV>$5|RdO˗혵 'AOa`>tDa/\DaykmMopa5*%=h#*VviO R)^q#YClKL'0?fkE`M6.Z %/{ PD3HhEy䯟C}F}M,ΰ%+烃:y[XB V驓,08\(Q3e 5ac Cr5TP"ޫag롔Wu^i2fmx~8piz∎z3[X SI`bE!,$Do,p#%-,"O2+sPgf<#]#Co7ozoHUꊁ/:VunLs)PCmR}qm4j gυ)E|pH(Xa 5kV^BHaVdPi5u=[%wpsO[p4%d) zz ]fIjfҫa>?Y}TԖR}dԶ_j3?0; t#YJVJo`7'lTtf+15&@a?'ڠ߽EK%/A,UphrHi2_ R)Ơ[Q =5l\\|W4qŤd|퉋Ǚ7۔kHphfѲ€ '0 ~^@6ٱ׀i=Reredy29t_)5rn,C>$_]*gKWxIN" KáNtq%35o 9˒6+'SU;sDK H\Hswrl#&&>@t7ZZ~$褜М=eS/,qfHرn"F:$or1 Y)(o0<8f\Л v{&],fGka uC}6ԁGvX7 斡iab8.dQmַqr#zWO9} u_ 3x(U4't̓vN(Wτx?I_0QHcHq k] \rYRK}ן4 ^ZN^)aҮh{|=LUpJaA=6dkrBvfi }ڋ{iDQ5lӹOl?n&jB/'1a#KqԝŒzxjg-ЃG'/ç :Kt a uk-u܄bq3@j{BZ> Jmhf(MYFVq5vGXiC|ШaH6;&a 1_ ґ6I"B-auP"a}C!VRn7b AY'W|.A*$C;u1hWV].Kw}`h1FU eqb rA =vo+$ (MhhL IڮtTO>(k*{E4~].lMr h1{+R7̎ML G>";=mH˭ԡ>FǢд@2{F$2q TtbSXQ,*b^Dn rlK>0i.jWL6ZFz0'V.Wt&jxǞ HwWCLf4k+4-OrKߟ{t/kr'QOuO<RS RFI(9Vʀ!il7a0@bW}j|Cn:=Mun0r)_Lz8'*M%g"v2(ndLK\ [@Z65kkHTUΧ: 疒A9.Rɤh$0r ϳUOFkxn1,V"{ؠJlVI.{n$ $ 8MrbX'0@doQatca]LL>Z'WhUEy7iʀ)ǂQ|Z;*_ vu&*h[vOP 0 -oE3% YW9󡁺RN8O{O sN0‚6 .iʇ9Ӡz!R ‘ϿfTFSfjTAM 2K/I,8yKb[41g@d_i~}/7,-V>&6cDE&ψ,L/BPq{@%$ձȨn/iV$'-=_nw7'<PFz3W"]CPz 3bH>D; RQ66PWfa,maIqLuq0>AcE3G6ղ\83+LrГI(C\.3MsBJd8cm#(^x禂Yx~ŕ~nIʾ5nu^a-Ja@^&`'x. ih::43g-"|Zki?w鑔ၯ.9:io0Cά<,7S'#N1~ I9!+%%ovz*GK"UҴ],id2ą$Jۢ˳H}*VJEHfΙlԘm5:ꢉ#C)6P-_K0dHp!JLn&8{kiOI'I{e [oc0جbVLR[iLTjk+Fl1"ocFuF6ڂ=W'7ydPx*.9'5[-x*+AUj> g a _)ԓC&F1[sFԬEsRRI BkưG="Z\ ?!3MuNydWխ ̟ b.eI@OOlaC|$`_nڐϧI8#;t8M){)O4!d`Wv{ _0Uf҄/MY'Ӿ o$] UoK\%Ca݂v<ȉ8/] jpdb1hDŽ#iA fCt% + ]xG)MW_7?e.}`xY },1w=Ig :n( 5 >?2t* xjrbH?riFARIv[tdU) xV%*zӯxXW^YEm'Coрyɝf^@z :5uva8bQ?/\w2ܥ@N) \!:A)H|U6(jlGKvW+ k+"ڰ cpda))_ǖ HD ka>Gg us?~,>˼8{I^$qHCnպU6./M=JC_8#zk{طA!ն9"WZCwp: h {@ li@>΃^zLJ3n9w'7^,V~@{zæOoo2w8LJOeunn?bD5RL<7@g%)lېv!}/}h5nP&PiW xhoJ44 B)J^Y"Ш:>Cˆ&7KT+ȔvO, Da=+"bLȈg,qy$y֏ہ"9M o)t?G ,mK;ҝߵ{Z9q5,P )Y=kS?jq1lH K0A%Zƿ*OTiUTB m `^Gƴ;kwDLjȻX$HszǷ/xo68S 6|`Q϶Jd 1n5ȋHSи"=\9B{k,'oK߯o>xJ4B#JGD{ ѷ+i.ݶ ޠvi3 C-~o]d!fu}E3DǕ]ڙpiohyEx WfIA9?IKHAiJD0aGPq)V.Q0~GDEdj;wXfO7մ)t>U=ơC %Ě W#UҪ9 ;9)kٽ5gCk1w w4F=m^Mx^*e_|`KM~R W=Tge@E&@uVV=x$CvqܒWpۧq4xcIw $/@ ֌.3t.!5'%v;11.vIjP¾1dt=,M KI#^ҋа3#q[@(Knc;V46F'!T NQ]H5^qjܮgH ]-ʽ<_Ђ?XD8N>B;Υ <"?.|b^^٘3-- @AE2O({IL&MN/-$GU>% u)rpb3 q90/+^%L<}$%Pv14p&6!mpSy N,7pdqJxK/XHdYMFK=^:^q›2#j+ *}(t!fģxI9,(_óRh~:%U|>\:2n1CT;2%t'\2bpK=We?(ñ_ Н]^)\(e%L- TqfHdt0 пlc߃x lcW݌|kw?9E-9"_3c0%Gyhƹͻ =hBZp p`"JZJ[ҽҔx Ў~{'/~->a=yOpsT,pRpkpewzjguNѿjusNt،:I!ٽWBN.xqncrrRߓ9z-12qk<&haX).eeYK#)(y56?\l'kԽ2:A._,8RU\9L fFhbŨ-Ok5BG4s`@T%w)#W+C"z Fqh%Up`y3t0<UʹS150@Cb%=Q,(!H xaz[D1u_T6́1DR7T1EU_~LBӛpH~/8̸9 :ioc$|ꓼjlhV;?9{eb$KU .pBµ%F{g {*t'$K᣷7JHvgqS7|עljl!wOңiIʕc *AIp{1bh,& }F^>TPtϴb{O%ɡ&;Aްܞ"w,r!O.t(`eFq@?;:SC>O*OCxF`un/BK|0M,v*lI&?7(ys#Wm]k <{ig/bQ2/MЁo@#5ˊO) <|Z*( #?`>/~NΠ\LqJP9G(|v?Re~K,c1O+ZF_4MV | Փ{fED!+^̏-Fn :;c"Fp[0aV(0C3Է ytE }c+n5GY/J4~}4u5G'5J!>+M)[XɰY):pwG*e^ei&h` wfl{S[utI8 9 EԶ${[m,dm8$W[P*@M_B`K{f4**8f =PM[]p~+-4a(];K&Wf NPwJ`Vۊ<7T®%6I:I_?tP1tk8K1vQNC gXQJz'Ss,h=ؠrlP`8/᠚x#֨3:!|0ӵs2vGc&]%Z9 0d8L&Ӓ͞ : Hjc^%_'#k9%kCϝ@`jɣP?0E9E蘡-sR6v. K'# ?iS͇v*՚R=+3ڀQѐձ@pLq^[%=:gBj>CT3?-d$ز+ߩr+5Ka<51[ 7"IN~1Chon{Ǒ,Hss`W(H^?iY=)Cu@F {5K &̢ld$ T$$dSs'LW"ҧWrkH4pibqؼ0f1#;#uD0']z4wCĶt.f2>%Rbd2$o!0 jsL $>ɗqACGdo7 0lZzbHt8<<@Y'Pä6pQ&ɪjUGEl5˗IgIlG?w4| "|-Ow3, $"Kx^ MCu fZۭ{7jDA>ͷ ,D5E31E=ܗ Ҩkyy jd[o>f#.gŪ}uX7\՜ҮvgXQ7bH:G!:y=@Gi`HsrcWNCK"gh|1O&qmQ Uz(JDy KyN1THkbrWT sԕ~nւ?} Gُy5LK[C~VN`SnВ;[ 8 ]Ŝj5.OeOhߜg9iJe{~ yk&*e) 9Nr 5Uc d\Xlr?.d6Ѫzjg(\b֏=ZP&C(K.r,ۼ0ȼngt/7.zjWbkM sl649G\9qݙh[*?5V7o|cD`.?7NZȡf5dehhk(w26f oOҎGNx 5^3^]odGzw/9K\b1/Hps,"Ba͑,]Ah5 wHHǹAr#.ǒXVVucZv%_M''+p Y[JڛoFfo So6l^28c!dAԔ8yfdRwA{j+ f/>#4 /ZE}J3!iOΖi{Mm2q(}֒4I|DᢅoO84Q |ܵw \ O¥uJ /L zc,9UMV&lŬu@rseZ(]FE >|N7t5N /z8:7cߞlծ'5ZhbDbeU JNCJ|>hylyڎn%#*,阻:q,zc/ŋwp>ZV90& ?ObW&n #ziOQJpҾTzmV"Khc@[x ;€EGIFB< DJ` -+737wKRQK6xSL\QǍ0+ ]lyx"%([Nt%Nc}[Ȋ30o0!>ZEuXe:mQX&4VL1 =":sM3+j_3uZ}~3y-a E3Q+l#mȿ_QpYY=܈ɞ2jJ4S?4x _}#W#@5-z5BL-#bFe;ʅ/^Fx!69w|]GNmo`g"ri[ H‰i5BaA4N>&-\%땥2o{bDvJ^i{8g h(U(IO=63? PvA(')bo:l#-\ u)Φk4/T83rсE!KGk O}60.r ө `c(p<׼`#+kZwal=GkV3I"A`g A:'2}].f]ח܆}ϷA!ȋAQ[ CxN~qHPu(M yr''*WmS$r]m ٘G?=m!0\5+abbHV9j*Dpvghߺt<&KJO^pϸc0ef<+ Qm~Mt6Yv_)0+~mϋ"#a\lTkee=8b:εF\"c?=[Ѣ\(&%\`׼Ne̅zMU~w?Z=6Bf'} ybYOA *d2zkc9u};Q>cމvo7v^S-ZtOND5!!B 8~}ԡVo>\ԡƎd-u]s1WJ:"LKT,7f͊/@U3]"yˣAsH Vg"fIℿs:Aq)/0[\x$-GI.5b 'zn ޔ^ąKo#D4#Iw>H2^NoI"ds‡Zw248yTo]$9 #5v`]4};V*(= E%kH~.G|NM_5Nfcl ?%"q6^ZqHG qKrBz}0#EQm`Do=`kSuK}LW)k,I;piF'l89lim8NL\EMF~NDzvhII6$ꯢ~S_Z+jScs,u/WdIpB:8c+5,FlA#6%Yh[QE i{pgSL nyZI*HJw3)oe4 ue c.t nUHBJ:| $ ;$"xsvmzV/ڶ'ZELFN9I}2ӑ"W |8&Yy@n7ЙDom|?ʓ ug'hKޖ%]6{ oN.3ٹST*FdMHd߄|**d PeWLE&k`uTȦIzx2/dӿQ&Al钳,+5Z+|4ڦm MKP|~VANAɥn?~k٠UoiȔ!S3r^>v=}T8aY[ć }ˬU_&;r<ᠰmF_?c Iw73J^f_ eZ8XAG5MoJ2o =\0z,j;tfNMeg'NYhG+<4?i=iQ6ew!>Fw&cԤE"KTИ_M7Xi{>#-V Ba5T^=:y {Cb/kÂkS'{ɑq.zP" ]p*@2]R/ X#Tb"ȨOF'^*J;L/Xe^sRoy9vY>]N/36;0ϳ7q]F(ZW 6ev}zD^."卵D%3(_^߽^iyt51i\ڢgyd Vu~!P?Hc8ݹsT2..n7"d.y@EjΓ}_NkOKMI2𶐔gMy UJ lfǧ{׿GY+3Rv?*>'TGQh=(TJ?_4a٦é :VC'_ɹ?1Vn R|[ jKВ.C:jߵ;5(m7a 9~$pBydPmeGRma֡Pu͜~`b8'H.,U/]Zp~&!M6dRI^VSg 3]K6|`Mg`~) h&.V2zX7Ky}زuDmQ,d\k5- zQ33i\˼1#*9zր6٘PRkz˂ s; XQaVKpۈ3^ )'Y-2geqóQT %IY[+t?:֛-[]p:q` $t[hJ8nX܀lX0QS s9(lKjMeQ"0"XLq&ƲS]0,_ hK_Rz^WoRk$ l؄ϿC^sϥQq?0r]@io<͞ۮM[{b~vF&ڄ\seӜUxg"ڌǜ-$++]mb EF};r !ɉwG&m*SPf)4)j/d4OO!anژ̳ԢrMxN焔o .* KUyxcyardkZdgkh14_}O<5GCbBOEⴓT6aps\./ZDE<0l]ݯHn=> A1Epm{Y٧:h^Ŏ{_`I-R3TO>rMPahKzxnүx"YrxDᏰ8)y)N++Shvи_$OSvR&SXc'tm-E S~uLaHCDOg*W1eb! c u5DbdBO x!gg>@l}n=JDOu٧IU#a1. h.8cp*CD7gH0ww.JeS9>,7O@O<b?Q-5T!U'AQWMTieF0Lwv]<_rFK#Ē%J.曂<||4 9$ sܳ$SŀgS>۾naIVZ찑b. Hc][̿eہ5kY2k[Wuɬ LqBC /zCO3ҩc ,6)省L*.I,n$}XӑjmnnNF >n!2FпvX`?P0Rwf;InAZryQV6'Sf7DMTk%vSLod%n|0Uk(Wإ"E Mr\rWd;@NTh֞Ia^Fǯ:7bMUj A4|9䇖1Fl+ʑEF b/V N!&)%\q#3MC6|{ECW&6ʛYchC+r,&6=ɶ?]U=SY\$/ RXFxDe6iEaD∘gHT 03+czR=uÛ3טs@F$o _׸v(*:1vJfQ5+) $6 `6lXwƽlfge)[C~N=s7]ѣcթXLpcym KzIYD;A/ ,^&!!u!@:|Gu/0aDC`?KhC~nP2u9O I8c}~YVB6*HNStAb21mLaܶʨ~q,!Wv؊V_qc ˞yco]e~hZ_<vQEo q4z 낼u_vn𶑌_kp.`_АEalرlSwmFbmb̘Uu % ǐ҂+ť6ZSCȪQc8 Ոm7e)PTSI9&S('Rdpo5]nbFz'y8(({!*𳈥-~5b!wp7(!܇ck(Q-KsBLF@lmƷ9NTED-=5!vs) $ Lzƍ&xU2y#;`!o.' W^͏׫ PIz} yj.k i]m pWVFFLyJb!|Ü @5 zJc"oQjS"a$aY(+"Q@!w`'n*(To|vn\8S=c,v\'ə5bB)X.B nL=0poukH>ty|$T''<YE xZmv|ŸΔz\PbdaS7_G%$L7>X1h.es6Fc4.PE-^\nTUxY8` Ma`p 8/^`iCXԭ9?>{ҟq<D3✇L$}|~z]mnHνmԲmV:];IT7ў%P:Ԧn)xpSi% 4-g Ò)_pȿW>T(@dQ̊ٸdt˜B3AsԌIj3)4? N;Ź)']p@El1DDwd#9sA::&ٙ5(e粈ᤏE&|'a"cD^ץ?#i yiSa,s=ws澏^ (O@8YeF1pfi#|qodB8 O.|wA9U2vbd.{D[fJPv 늾 ΡO-1iTo>g;^f #E9HCmkr!'Ԭ!X1=\3&_͑#< Pc``X/ +=xWh oߎbD{_̂^`UjqwĚ:&و,n'nv@=6U7<3Fs7;Օ` S |kPvPYd+mtX@֩'GA2~2wgwZJ*3N]9Px4 7%>6Gdx7Dm鰆ó8Ő[iQO|}VWȡۙ y9H4nυNm:98^Hg39~:}tߚPdF+6j}1)J,@ ~Rޡ}hp-#"[ffB^]:hO YN@$8kфSjbw!t ]G[Ce ОTbC3BbD {Vҷ){c4]EvҨL#wc8 GCZik+d^Z,R^ϓSVJ晨'Xa\@"s:-v:"-ݑZ\z(nl:'k@ZNǻ%`! $&I~G7ؓNUqcHntAQ<^\;$ pk!p2`߭ d%QP,L65i,N~0gſwĕR eHc[P7/K"!=SG$o0X69=%ދ br>S",6#B|-J]IZ4y~QTznB(L'0Y~r3|4)\Hڸ:]B;;o}}5PZhu2ɵMڜ 9WF޾yy Rӣuo >Mx",[FsP  5W?({5*(l{U@*DyBח#afD,6ƠC{`u %Ž8.cZx9i6pB:\ywCVpAQ]9JTONeI%qwCSȋ̲ms*|m&`!IT/Mγ~xM@S'5$l "wd\˭MdrR% rTWnctr2+7jI-wnxAHKfQ~PDLs vb5Jpޜ2tګ81s`Z(CŸ4-]0Z509Z~s참働{DZjDCƭWb tGzncY{cp3Ո 4"aCq}M/8 .I#R&h^8.aVt)(O]L؈.&|,Iӎ@>;;jeӞd tOx&Yh>֢>I?e|U|;{5'Mc9_pښωBϰmţ(wˇYӟ*S:NКcf]FN8 ӽL\֮ ﭧEb5hMh{+|(RC6f(5MdZK;d W0ae SUay\g4>_Am)Z3Uxڎ8̗-uly\ChW|)E)OR(萯my;(lO@. ȴ_9s> Pb("9L9򵞢DDu6Tp&aRSB3z`&"[8Co=8ScDO,byOz Oq=?T80`nlXI;ZF t Gs3ݕ. G ®f=. nhSLɞ($F\<*{ֿ3{ C FM;T雧 ڮ{Hhx"$=g&);㘗U(M hjwr б F'pXa-M@_yǿ&MXr咿FϜD+C5\:O 㪑j.G颚PCfQmT#] @%-]x|: Y;-?$.{SR>(=`RLw!A^Xvy> KMk[28 ؘ1q;n$Ktnn/RSMCҨ^_xgZSQyWdrZ:khw+֑Օ*sUdKKܵqj+ޭTH@WHen|[~ oX կmDl&ƺg3$>W}ΟNawF 뤂(/ҭV# .tĖD=^-~[JD̉UMN+U9dW♻~ɲa]\Ip93]BD\5NE w*8=ZafuGRbF\cM'&P8K$|6:WGЛdr5,4m8#{˴{v " 4x+dI%/Yҷ~LޡG W [2<]K=ǐBE&sqfْ]6՜$+q|z!n[ڛmJ-n\Gi&1קb"@_-mUӰ~kA|#N˻Atvi/C;bxC01IʥŁ }IWGwCQ?>2IŝAd9yUˁn^":y-XUj@DCk&*qkM|-Qf@h k*gHߚ2VLsI"|yEr/rߋ*בGmXyZn~F:_0/LH6-fFr\ZI@Gt:M/J 1XV rn1 \% Ōs(w37}\_I,҅{)Λ',`oW]y5nnJpEτ.K1b7IfE Ka"wvztqM3r AO3߮AS.pګd`ݑG8Y)z}3O] )By}r@ӳpR~7~0FX:ь|"i.=i4lo0G>s+}\p*e,ڱYxtϒ/3k9eI>dyl v{5f^nQ"=y>rnpd&+Bw 7k4s=nD<ěY=BY&n(TOܔNdܙm6'Ύoڼq;YiB,=iaKv6$>`nG`.fGLc^`_yx j?+Q4Y cao>Î.ۨ?Ӣ m zI D9#Cy;0XAYCbW~q9Joxf&#ߑ^r$0-TnZoRzCs8 . D4601e߂ۢ$ZD%F xT۾ ЖGSkJX\w63{ ,gEm8Y9ؔO֢Faߩ Q8}Y^(OLȾt\`xISF MRwDcb%iG\Ŵ>Hy׷Ͼ '}n(n7(ÕVzuig͓\[|Uؽ^ߝ,C[w?1Xuvo7%4x ڴ\rBMSCtx!/  ]A8T݆m-$ @6NwgDf"o b$~!2Vx,@\'o~`F o];&3'&~_oHe#vMdyo.-t 'jqn:7Jr5i$dCOc'g4ӿvp `?pk ڤ|[~d~=cNK tPD [%%Bto:j*Z*,g3x ܶ_x/H_wc(̈́2ě#-HfJaQBQ,3*Qƺh:=ˇ~W\GKC>8yٖr:3m:q@RM4iU(dj|oƢ q ٬*˸04sFm)7%~b2(6 Jd6u_@) v`@' 1Ч `ǯ_Y&`7_-24I#[8}b! ^9aER@kDp9ۅ'gLd3zZu!@ U<tjJ%OWoG UC#6VRF`iλH_JJU`vGN*;bUzF[JS.`d ,#MQ%Kt(@OX|Gц, +EI$N $T]ș: Ԃ&>0sUx`sh$rv:tI#ؓ1! CͣO*:͌riL\'U־o$6oLr1SLv|cә滝>̞^5Nbf?%9˲ʌ\e2il,I XL %lb$I8+S,.)" $$q3k݆ڤ1 Y Κh:I罍̂mZh>%{7 4V?QgԕEfА塗;z.X4 o{ۿ2oz~G^=AclLb|Hh2~׽ r om'h|WhO\'wnɩBkbBU`")Ӆx%;O楩f>[7\ iV`v*UZ Bx$usٗɈp@P218almKFlmd5d#~{/Vã F%cK1%w9q,H`b~-<Y2sPY\ѺD:#cn&C:.Z+7mfvM#&>%(qn똁) 3GA3>e f1@ӅP X)`klKJ k'̑4\z>]7 )\%,gzulGt+/k]r}.ԙM$%՘]v@Ye'Ks L }hC+= s&O zaBg1[qDa흪a mЫ %S5"PLla@(KGu@+fVsU*C=Ը}q4L<uy9XAbNJNްy.Pd,fg}7Qwk"ջߛ{G>S(oDžgF'm]+̪f,$߅E;;aǡE0ZnɃX&j '&юNqŤZ%lڐ4Ԃ+Py>Dc}8{/cuW=48#>'rGlwZTKTs j0V5'H$C%jQB`悛~!b{s2VQpì{xZ>q䅾^y5ec]51Ղ{]t|n ]0>cROnE<30uIpS$adb_d匳 ZێmMؽUT \:@! Xͨa_San&dh ~G_u Nti(2(ZŬmIe ,P<%|Z)R"E=o i\gDx>g'* U)wA?^i+ \Aɀޗ>Ga.-H-J Ӷ0Qu'P>QIqf? î4n~!n5p.葟dd{ 2lzSYM3j`Zo[CxoZ5Qg3Cj;umcbuz5>#z;~ALM]JiUj5E| #u{]T2Kw?53G?%7L6\qA?tWFęЊ=Œzz1:_?W7!IM*<V[eapfCit5zA3aGMX*蝵yn) c$`ZGط|(ԊY3g@