libwsutil12-3.4.10-lp152.2.21.1 4>$  Apa,I/=„h,rb̝6?7Sf qu,T>%K6{\>bʃxD^YܝIel ^ex㑦7-Sn > c!ORB•IZ8VHn_tObv]CVaPV+x/,F{&臃t"pNg_C/Uڮ(v:GeMaDzzĉ?*8- Z\s49d075f2cbdc8a94190855e707a065ca027c12d6a6ed6ac9d6961814535afabe78c6bafc1fd44755506705b8427d183041e752f6Љa,I/=„ĵoWۜ2oBgtQ3-f*~^<'hv0 m5b0u~6 Z>`>ksb2ʷV Oyl7@FvqoW?v޵noFC`a*fjIDq|n/qCIWc`v3(4%؉l!G= 6 (S{i߮ L-$X'ww̛ q6ٲdU0>p@d?Td " B #)08 < @ H  p%(R8\e9e:e>@FGH I(X,Y8\d]l^אbךcXdefluvw٤x٬yٴzPClibwsutil123.4.10lp152.2.21.1Library for wireshark utilitiesThe libwsutil library provides utility functions for libwireshark.a+Bwildcard2openSUSE Leap 15.2openSUSEGPL-2.0-or-later AND GPL-3.0-or-laterhttp://bugs.opensuse.orgSystem/Librarieshttps://www.wireshark.org/linuxi586a*a+ac21ff7443082fc4d676d5282df93d298235edc38ce7b58ea8e734329e8d82b9libwsutil.so.12.0.0rootrootrootrootwireshark-3.4.10-lp152.2.21.1.src.rpmlibwsutil.so.12libwsutil12libwsutil12(x86-32)@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgcrypt.so.20libgcrypt.so.20(GCRYPT_1.6)libglib-2.0.so.0libgmodule-2.0.so.0libgnutls.so.30libgnutls.so.30(GNUTLS_3_4)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1a@@a^@a'@`t`@`e@`dd@`c`J@`/@`J@` @__@__@_@_@_l@_3^z^3^^@^b;@^W@^)^ P@]f@]@]N@]@]]y@]6]0_@]@\@\@\@\|\w@\5@[[[[Q[W[WZ?ZVZľ@ZSZX@Z!D@YY4YW@YbY@YyYm@Y1S@Y;@XX@X@XAXlXbWXQ4@X-W@WҤ@WҤ@W^@WW@WXWcVяVV^V@Vl @Vii@VMV U5@UU@UU`kUSRobert Frohl Robert Frohl Robert Frohl Andreas Stieger Andreas Stieger Robert Frohl Neal Gompa Robert Frohl Robert Frohl Andreas Stieger Robert Frohl Robert Frohl Andreas Stieger Andreas Stieger Andreas Stieger Robert Frohl Robert Frohl Andreas Stieger Andreas Stieger Michel Normand Robert Frohl Robert Frohl Robert Frohl Robert Frohl Robert Frohl Robert Frohl Robert Frohl seanlew@opensuse.orgMarcus Rueckert Robert Frohl Andreas Stieger Robert Frohl Johannes Segitz Robert Frohl Dominique Leuenberger Robert Frohl Robert Frohl Robert Frohl Robert Frohl Robert Frohl Robert Frohl astieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comecsos@opensuse.orgastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comjmatejek@suse.comastieger@suse.comjengelh@inai.detchvatal@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comastieger@suse.comecsos@opensuse.orgastieger@suse.comastieger@suse.comastieger@suse.combadshah400@gmail.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgastieger@suse.comastieger@suse.comastieger@suse.comzaitor@opensuse.orgastieger@suse.comastieger@suse.comcrrodriguez@opensuse.orgastieger@suse.comcrrodriguez@opensuse.orgdimstar@opensuse.orgastieger@suse.comandreas.stieger@gmx.demeissner@suse.comandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.de- Wireshark 3.4.10 (bsc#1192830): * CVE-2021-39929: Bluetooth DHT dissector crash. * CVE-2021-39926: Bluetooth HCI_ISO dissector crash. * CVE-2021-39925: Bluetooth SDP dissector crash. * CVE-2021-39924: Bluetooth DHT dissector large loop. * CVE-2021-39922: C12.22 dissector crash. * CVE-2021-39928: IEEE 802.11 dissector crash. * CVE-2021-39921: Modbus dissector crash. * CVE-2021-39920: IPPUSB dissector crash. * PNRP dissector large loop. * Fix forward compatibility issue with the I/O Graphs preferences. * OSS-Fuzz: Heap-use-after-free in ROS. * Allow for '\0' (NULL) character as filter instead of requiring 0x00 for the character match. * Dumpcap with threads reports double received count vs captured. * HTTP2 dissector reports an assertion error on large data frames. * Shark stops capturing when capturing with multiple files and packet printing enabled. - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.10.html- Wireshark 3.4.9: * TShark PDML output embeds "proto" elements within other "proto" elements. * Filter expressions comparing against single-octet hex strings where the hex digit string equals a protocol name don’t work. * AMQP 0.9: dissector fails to handle Content-Body frame split across TCP packets. * IEEE 802.15.4: Missing check on "PAN ID Present" bit of the Multipurpose Frame Control field. * Wireshark ignored some character in filename when exporting SMB objects. - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.9.html- Wireshark 3.4.8: * Dissector bug reported for Bluetooth Cycling Power Measurement characteristic for extreme angles value * Raknet Addresses are incorrectly identified. * Editcap saving files as ethernet when specifying '-T ieee-802-11-*' * CoAP dissector confuses Content-Format with Accept - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.8.html- Wireshark 3.4.7: * CVE-2021-22235: Fix DNP dissector crash (boo#1188375, wnpa-sec-2021-06) * Fix TCP dissector - Erroneous DSACK reporting * Fix No wlan_radio.duration calculated for PHY type: 802.11ac (VHT) * Fix NAN Dissector has wrong minimum length for availability attribute- Wireshark 3.4.6: * Fix DVB-S2-BB dissector infinite loop (boo#1186790, wnpa-sec-2021-04) * Fix Macro filters handling of escaped characters * Fix Display filter crash * Fix IEEE-1588 Signalling Unicast TLV incorrectly reported as being malformed * Fix IETF QUIC TLS decryption error with extraneous packets during the handshake * Fix Statistics - Resolved Addresses: multi-protocol (TCP/UDP/...) ports not displayed- Wireshark 3.4.5: * CVE-2021-22207: MS-WSP dissector excessive memory consumption (boo#1185128, wnpa-sec-2021-04) * Fix TShark not printing GeoIP information * FIx TShark error when piping to "head" * Fix missing parts of ASCII representation in Packet Bytes pane * Fix dissection of NDPE attribute of NAN packet * Fix TECMP: reserved flag interpreted as part of timestamp * Fix DNS IXFR/AXFR multiple response * Fix File too large issue - drop patches: * cmake_3-20_compatibility_1.patch * cmake_3-20_compatibility_2.patch * wireshark-0008-move-glib.patch- cmake 3.20 compatibility (boo#1184110) add cmake_3-20_compatibility_1.patch and cmake_3-20_compatibility_2.patch- Add patch from Fedora to fix build with glib2-2.68 + Patch: wireshark-0008-move-glib.patch- Wireshark 3.4.4: * CVE-2021-22191: Wireshark could open unsafe URLs (boo#1183353). - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.4.4.html- Enable ITU G.729 Annex A/B speech codec for Tumbleweed only- Wireshark 3.4.3: * CVE-2021-22173: fix USB HID dissector memory leak (wnpa-sec-2021-01, boo#1181598) * CVE-2021-22174: fix USB HID dissector crash (wnpa-sec-2021-02, boo#1181599) * Fix bugs in SIP, Telephony, QUIC, SOMEIP-SD, SRv6, TECMP, AUTOSAR-NM, Fibre Channel, f5ethtrailer, ZVT dissectors. * fix TShark crashes with -T ek option- Disable ITU G.729 Annex A/B speech codec for SUSE based distros, but keep enabled for openSUSE.- provide helpful error message if user doesn't have permissions to run dumpcap (bsc#1180102) add wireshark-0001-dumpcap-permission-denied.patch- Wireshark 3.4.2 * CVE-2020-26422: QUIC dissector crash (boo#1180232) * Fix IETF QUIC TLS decryption errors when packets are coalesced with random data * QUIC: missing dissection of some coalesced SH packets * Fix false expect error seen on FCoE frames * Updated Protocol Support DOCSIS, FC-dNS, FC-SWILS, FCoE, QUIC, SNMP, and USBHID- Wireshark 3.4.1: * CVE-2020-26418: Kafka dissector memory leak (wnpa-sec-2020-16, boo#1179930) * CVE-2020-26419: Multiple dissector memory leaks (wnpa-sec-2020-19, boo#1179931) * CVE-2020-26420: RTPS dissector memory leak (wnpa-sec-2020-18, boo#1179932) * CVE-2020-26421: USB HID dissector crash (wnpa-sec-2020-17, boo#1179933) * Fix IETF QUIC TLS decryption errors * Fix failures or crashes in various dissectors- Wireshark 3.4.0: * Save RTP stream to .au supports any codec with 8000 Hz rate supported by Wireshark (shown in RTP player). If save of audio is not possible (unsupported codec or rate), silence of same length is saved and warning is shown. * Asynchronous DNS resolution is always enabled * Protobuf fields can be dissected as Wireshark (header) fields that allows user input the full names of Protobuf fields or messages in Filter toolbar for searching. * Dissectors based on Protobuf can register themselves to a new 'protobuf_field' dissector table, which is keyed with the full names of fields, for further parsing fields of BYTES or STRING type. * UI improvements * sshdump can now be copied to multiple instances. Each instance will show up a different interface and will have its own * decode, play, and save opus payloads - features not enabled in the openSUSE package: * decode, play, and save iLBC payloads- wireshark 3.2.8: * CVE-2020-26575: FBZERO dissector crash (boo#1177406) * CVE-2020-28030: GQUIC dissector crash (boo#1178291) * Infinite memory allocation while parsing this tcp packet - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.8.html- wireshark 3.2.7: * CVE-2020-25863: MIME Multipart dissector crash (boo#1176908) * CVE-2020-25862: TCP dissector crash (boo#1176909) * CVE-2020-25866: BLIP dissector crash (boo#1176910) - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.7.html- Wireshark 3.2.6: * CVE-2020-17498: Kafka dissector crash (boo#1175204) * Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.6.html- Wireshark 3.2.5: * CVE-2020-15466: GVCP dissector infinite loop (boo#1173606) * Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.5.html - make verification of package source signatures compatible with source_validator- Add _constraints for ppc/ppc64le that need more than 3GB to build- wireshark 3.2.4 * CVE-2020-13164: NFS dissector crash (boo#1171899) - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.4.html- wireshark 3.2.3 (boo#1169063) * CVE-2020-11647: The BACapp dissector could crash - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.3.html- Remove dependency on brotli, only the library is needed.- wireshark 3.2.2 (boo#1165241) * CVE-2020-9431: LTE RRC dissector memory leak. * CVE-2020-9430: WiMax DLMAP dissector crash. * CVE-2020-9428: EAP dissector crash. * CVE-2020-9429: WireGuard dissector crash. - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.2.html- Fixed build against SLE flavors- wireshark 3.2.1 * CVE-2020-7044: WASSP dissector crash (boo#1161052) - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.1.html- wireshark 3.2.0 * Brotli decompression support in HTTP/HTTP2 (requires the brotli library). * You can now follow HTTP/2 and QUIC streams. * HTTP2 support streaming mode reassembly. To use this feature, subdissectors can register itself to "streaming_content_type" dissector table and return pinfo→desegment_len and pinfo→desegment_offset to tell HTTP2 when to start and how many additional bytes requires when next called. * IOGraph automatically adds a graph for the selected display filter if no previous graph exists * WireGuard decryption can now be enabled through keys embedded in a pcapng in addition to the existing key log preference (Bug 15571). - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.2.0.html- wireshark 3.0.7: * CVE-2019-19553: CMS dissector crash (boo#1158505). * ws_pipe_wait_for_pipe() can wait on closed handles * suport for 11ax in PEEKREMOTE * reassembling of the two TLS records not working correctly - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.0.7.html- since we only have one gui package now move the gui related files to that package, which in turn reduces the requires in the main package for headless installations.- wireshark 3.0.6: * extcap: Several issues when capturing from multiple extcap interfaces. * Expert Infos Incorrectly Displays Info Column instead of comment. * Wireshark does not support USB packets with size greater than 256 KiB. * IS-IS: add support for decoding TE TLV Type 138 as per RFC 5307. - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.0.6.html- wireshark 3.0.5: * Fix Qt interface crashes on a profile with packet list only * NET-SNMP EngineID Length handling Warning * fix Crash SIGSEGV when decrypting IEEE 802.11 EAP re-authentications- wireshark 3.0.4 * CVE-2019-16319: Fixed an infinite loop in the Gryphon dissector (boo#1150690). - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.0.4.html- Added BuildRequires for spandsp-devel to enable decoding of various VoIP codecs- wireshark 3.0.3 * CVE-2019-13619: ASN.1 BER and related dissectors crash. (bsc#1141980) - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.0.3.html- BuildRequire pkgconfig(systemd) instead of systemd: allow OBS to shortcut the build queues by allowing usage of systemd-mini- Wireshark 3.0.2 (bsc#1136021) * Wireshark dissection engine crash. - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.0.2.html- Added config.h again, which got lost during the wireshark 3 update.- Wireshark 3.0.1 (bsc#1131941) * CVE-2019-10895: NetScaler file parser crash. * CVE-2019-10899: SRVLOC dissector crash. * CVE-2019-10897: IEEE 802.11 dissector infinite loop. * CVE-2019-10898: GSUP dissector infinite loop. * CVE-2019-10900: Rbm dissector infinite loop. * CVE-2019-10894: GSS-API dissector crash. * CVE-2019-10896: DOF dissector crash. * CVE-2019-10902: TSDNS dissector crash. * CVE-2019-10901: LDSS dissector crash. * CVE-2019-10903: DCERPC SPOOLSS dissector crash. - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.0.1.html- Wireshark 3.0.0 * The IP map feature (the "Map" button in the "Endpoints" dialog) has been added back in a modernized form. * Initial support for using PKCS #11 tokens for RSA decryption in TLS. This can be configured at Preferences, RSA Keys. * Conversation timestamps are supported for UDP/UDP-Lite protocols. * TShark now supports the -G elastic-mapping option which generates an ElasticSearch mapping file. * The Ethernet and IEEE 802.11 dissectors no longer validate the frame check sequence (checksum) by default. * The TCP dissector gained a new "Reassemble out-of-order segments" preference to fix dissection and decryption issues in case TCP segments are received out-of-order. * Decryption support for the new WireGuard dissector. * The BOOTP dissector has been renamed to DHCP. With the exception of "bootp.dhcp", the old "bootp.*" display filter fields are still supported but may be removed in a future release. * The SSL dissector has been renamed to TLS. As with BOOTP the old "ssl.*" display filter fields are supported but may be removed in a future release. - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.0.0.html - removed wireshark-1.10.0-enable_lua.patch, because LUA is enabled by default.- Wireshark 2.6.7 * CVE-2019-9214: RPCAP dissector could crash (bnc#1127367) * CVE-2019-9209: ASN.1 BER and related dissectors could crash (bnc#1127369) * CVE-2019-9208: TCAP dissector could crash (bnc#1127370) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.6.7.html- Wireshark 2.6.6 * CVE-2019-5716: The 6LoWPAN dissector could crash (bsc#1121231) * CVE-2019-5717: The P_MUL dissector could crash (bsc#1121232) * CVE-2019-5718: The RTSE dissector and other dissectors could crash (bsc#1121233) * CVE-2019-5719: The ISAKMP dissector could crash (bsc#1121234) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.6.6.html- Wireshark 2.6.5 (bsc#1117740): * CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51) * CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52) * CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53) * CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54) * CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55) * CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56) * CVE-2018-19628: The ZigBee ZCL dissector could crash (wnpa-sec-2018-57) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.6.5.html- Wireshark 2.6.4 (bsc#1111647): * CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47) * CVE-2018-18226: Steam IHS Discovery dissector memory leak (wnpa-sec-2018-48) * CVE-2018-18225: CoAP dissector crash (wnpa-sec-2018-49) * CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.6.4.html- Update to 2.6.3 (boo#1106514): * CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44) * CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45) * CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.6.3.html- update to 2.6.2: * CVE-2018-14342: BGP dissector large loop (wnpa-sec-2018-34, boo#1101777) * CVE-2018-14344: ISMP dissector crash (wnpa-sec-2018-35, boo#1101788) * CVE-2018-14340: Multiple dissectors could crash (wnpa-sec-2018-36, boo#1101804) * CVE-2018-14343: ASN.1 BER dissector crash (wnpa-sec-2018-37, boo#1101786) * CVE-2018-14339: MMSE dissector infinite loop (wnpa-sec-2018-38, boo#1101810) * CVE-2018-14341: DICOM dissector crash (wnpa-sec-2018-39, boo#1101776) * CVE-2018-14368: Bazaar dissector infinite loop (wnpa-sec-2018-40, boo#1101794) * CVE-2018-14369: HTTP2 dissector crash (wnpa-sec-2018-41, boo#1101800) * CVE-2018-14367: CoAP dissector crash (wnpa-sec-2018-42, boo#1101791) * CVE-2018-14370: IEEE 802.11 dissector crash (wnpa-sec-2018-43, boo#1101802) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.6.2.html - drop wireshark-2.6.1-fix-Qt-5.11.patch, upstream- Fix build with Qt 5.11 (boo#1093733) add wireshark-2.6.1-fix-Qt-5.11.patch- update to 2.6.1: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or cause dissectors to go into large infinite loops by making Wireshark read specially crafted packages from the network or capture files (bsc#1094301): * CVE-2018-11354: IEEE 1905.1a dissector crash * CVE-2018-11355: RTCP dissector crash * CVE-2018-11356: DNS dissector crash * CVE-2018-11357: Multiple dissectors could consume excessive memory * CVE-2018-11358: Q.931 dissector crash * CVE-2018-11359: The RRC dissector and other dissectors could crash * CVE-2018-11360: GSM A DTAP dissector crash * CVE-2018-11361: IEEE 802.11 dissector crash * CVE-2018-11362: LDSS dissector crash - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.6.1.html- Turn on ssh, maxminddb, c-ares, snappy, lz4, HTTP2 support - Use capabilities to be able to run capture as a non-root user. In easy system permissions mode all users can capture traffic. In secure system permissions mode, must be added to the wireshark group to capture. bsc#957624 Drop wireshark-1.2.0-disable-warning-dialog.patch- update to 2.6.0 * Bug Fixes - The following bugs have been fixed: - Dumpcap might not quit if Wireshark or TShark crashes. (Bug 1419) * New and Updated Features The following features are new (or have been significantly updated) since version 2.5.0: - HTTP Request sequences are now supported. - Wireshark now supports MaxMind DB files. Support for GeoIP and GeoLite Legacy databases has been removed. - The Windows packages are now built using Microsoft Visual Studio 2017. - The IP map feature (the “Map” button in the “Endpoints” dialog) has been removed. The following features are new (or have been significantly updated) since version 2.4.0: - Display filter buttons can now be edited, disabled, and removed via a context menu directly from the toolbar - Drag & Drop filter fields to the display filter toolbar or edit to create a button on the fly or apply the filter as a display filter. - Application startup time has been reduced. - Some keyboard shortcut mix-ups have been resolved by assigning new shortcuts to Edit → Copy methods. - TShark now supports color using the --color option. - The "matches" display filter operator is now case-insensitive. - Display expression (button) preferences have been converted to a UAT. This puts the display expressions in their own file. Wireshark still supports preference files that contain the old preferences, but new preference files will be written without the old fields. - SMI private enterprise numbers are now read from the “enterprises.tsv” configuration file. - The QUIC dissector has been renamed to Google QUIC (quic → gquic). - The selected packet number can now be shown in the Status Bar by enabling Preferences → Appearance → Layout → Show selected packet number. - File load time in the Status Bar is now disabled by default and can be enabled in Preferences → Appearance → Layout → Show file load time. - Support for the G.729A codec in the RTP Player is now added via the bcg729 library. - Support for hardware-timestamping of packets has been added. - Improved NetMon .cap support with comments, event tracing, network filter, network info types and some Message Analyzer exported types. - The personal plugins folder on Linux/Unix is now ~/.local/lib/wireshark/plugins. - TShark can print flow graphs using -z flow… - Capinfos now prints SHA256 hashes in addition to RIPEMD160 and SHA1. MD5 output has been removed. - The packet editor has been removed. (This was a GTK+ only experimental feature.) - Support BBC micro:bit Bluetooth profile - The Linux and UNIX installation step for Wireshark will now install headers required to build plugins. A pkg-config file is provided to help with this (see “doc/plugins.example” for details). Note you must still rebuild all plugins between minor releases (X.Y). - The Windows installers and packages now ship with Qt 5.9.4. - The generic data dissector can now uncompress zlib compressed data. - DNS Stats now supports service level statistics. - DNS filters for retransmissions and unsolicited responses have been added. - The “tcptrace” TCP Stream graph now shows duplicate ACKS and zero window advertisements. - The membership operator now supports ranges, allowing display filters such as tcp.port in {4430..4434} to be expressed. See the User’s Guide, chapter Building display filter expressions for details. * New Protocol Support * Updated Protocol Support - Too many protocols have been updated to list here. * New and Updated Capture File Support - Microsoft Network Monitor * New and Updated Capture Interfaces support - LoRaTap - drop patch wireshark-1.2.0-geoip.patch, because file to patch no more exists - accumulating fixes from previous versions: * wireshark 2.4.16: - CVE-2019-13619: ASN.1 BER and related dissectors crash (bsc#1141980). * wireshark 2.4.15 (bsc#1136021): - Wireshark dissection engine crash. * wireshark 2.4.14 (bsc#1131945): - CVE-2019-10895: NetScaler file parser crash. - CVE-2019-10899: SRVLOC dissector crash. - CVE-2019-10894: GSS-API dissector crash. - CVE-2019-10896: DOF dissector crash. - CVE-2019-10901: LDSS dissector crash. - CVE-2019-10903: DCERPC SPOOLSS dissector crash. * wireshark 2.4.13: - CVE-2019-9214: RPCAP dissector could crash (bsc#1127367) - CVE-2019-9209: ASN.1 BER and related dissectors could crash (bsc#1127369) - CVE-2019-9208: TCAP dissector could crash (bsc#1127370) * wireshark 2.4.12: - CVE-2019-5717: The P_MUL dissector could crash (bsc#1121232) - CVE-2019-5718: The RTSE dissector and other dissectors could crash (bsc#1121233) - CVE-2019-5719: The ISAKMP dissector could crash (bsc#1121234) - CVE-2019-5721: The ENIP dissector could crash (bsc#1121235) * wireshark 2.4.11 (bsc#1117740): - CVE-2018-19625: The Wireshark dissection engine could crash - CVE-2018-19626: The DCOM dissector could crash - CVE-2018-19623: The LBMPDM dissector could crash - CVE-2018-19622: The MMSE dissector could go into an infinite loop - CVE-2018-19627: The IxVeriWave file parser could crash - CVE-2018-19624: The PVFS dissector could crash * wireshark 2.4.10 (bsc#1111647): - CVE-2018-18227: MS-WSP dissector crash - CVE-2018-12086: OpcUA dissector crash * wireshark 2.4.9 (bsc#1106514): - CVE-2018-16058: Bluetooth AVDTP dissector crash - CVE-2018-16056: Bluetooth Attribute Protocol dissector crash - CVE-2018-16057: Radiotap dissector crash * wireshark 2.4.8: - CVE-2018-14342: BGP dissector large loop (boo#1101777) - CVE-2018-14344: ISMP dissector crash (boo#1101788) - CVE-2018-14340: Multiple dissectors could crash (boo#1101804) - CVE-2018-14343: ASN.1 BER dissector crash (boo#1101786) - CVE-2018-14339: MMSE dissector infinite loop (boo#1101810) - CVE-2018-14341: DICOM dissector crash (boo#1101776) - CVE-2018-14368: Bazaar dissector infinite loop (boo#1101794) - CVE-2018-14369: HTTP2 dissector crash (boo#1101800) - CVE-2018-14367: CoAP dissector crash (boo#1101791) - CVE-2018-14370: IEEE 802.11 dissector crash (boo#1101802) * wireshark 2.4.7 (bsc#1094301): - CVE-2018-11356: DNS dissector crash - CVE-2018-11357: Multiple dissectors could consume excessive memory - CVE-2018-11358: Q.931 dissector crash - CVE-2018-11359: The RRC dissector and other dissectors could crash - CVE-2018-11360: GSM A DTAP dissector crash - CVE-2018-11362: LDSS dissector crash- Wireshark 2.4.6: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or cause dissectors to go into large infinite loops by making Wireshark read specially crafted packages from the network or capture files (bsc#1088200): * CVE-2018-9264: ADB dissector crash * CVE-2018-9260: IEEE 802.15.4 dissector crash * CVE-2018-9261: NBAP dissector crash * CVE-2018-9262: VLAN dissector crash * CVE-2018-9256: LWAPP dissector crash * CVE-2018-9263: Kerberos dissector crash * CVE-2018-9258: TCP dissector crash * CVE-2018-9257: CQL infinite loop * Memory leaks in multiple dissectors: CVE-2018-9265, CVE-2018-9266, CVE-2018-9267, CVE-2018-9268, CVE-2018-9269, CVE-2018-9270, CVE-2018-9271, CVE-2018-9272, CVE-2018-9273, CVE-2018-9274 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.6.html- Wireshark 2.4.5: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or cause dissectors to go into large infinite loops by making Wireshark read specially crafted packages from the network or capture files (bsc#1082692): * CVE-2018-7335: The IEEE 802.11 dissector could crash * CVE-2018-7321, CVE-2018-7322, CVE-2018-7323, CVE-2018-7324, CVE-2018-7325, CVE-2018-7326, CVE-2018-7327, CVE-2018-7328, CVE-2018-7329, CVE-2018-7330, CVE-2018-7331, CVE-2018-7332, CVE-2018-7333, CVE-2018-7421: Multiple dissectors could go into large infinite loops * CVE-2018-7334: The UMTS MAC dissector could crash * CVE-2018-7337: The DOCSIS dissector could crash * CVE-2018-7336: The FCP dissector could crash * CVE-2018-7320: The SIGCOMP dissector could crash * CVE-2018-7420: The pcapng file parser could crash * CVE-2018-7417: The IPMI dissector could crash * CVE-2018-7418: The SIGCOMP dissector could crash * CVE-2018-7419: The NBAP disssector could crash * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.5.html- Wireshark 2.4.4: * fixes for dissector crashes: + CVE-2018-5334: IxVeriWave file could crash (bsc#1075737) + CVE-2018-5335: WCP dissector could crash (bsc#1075738) + CVE-2018-5336: Multiple dissector crashes (bsc#1075739) * No longer enable the Linux kernel BPF JIT compiler via the net.core.bpf_jit_enable sysctl, as this would make systems more vulnerable to Spectre variant 1 (bsc#1075748, CVE-2017-5753) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.4.html- Wireshark 2.4.3: This release fixes minor vulnerabilities that could be used to trigger dissector crashes by making Wireshark read specially crafted packages from the network or capture files (bsc#1070727): * CVE-2017-17084: IWARP_MPA dissector crash (wnpa-sec-2017-47) * CVE-2017-17083: NetBIOS dissector crash (wnpa-sec-2017-48) * CVE-2017-17085: CIP Safety dissector crash (wnpa-sec-2017-49) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.3.html- Wireshark 2.4.2: This release fixes minor vulnerabilities that could be used to trigger dissector crashes or infinite loops by making Wireshark read specially crafted packages from the network or a capture file (boo#1062645): * CVE-2017-15192: BT ATT dissector crash (wnpa-sec-2017-42) * CVE-2017-15193: MBIM dissector crash (wnpa-sec-2017-43) * CVE-2017-15191: DMP dissector crash (wnpa-sec-2017-44) * CVE-2017-15190: RTSP dissector crash (wnpa-sec-2017-45) * CVE-2017-15189: DOCSIS infinite loop (wnpa-sec-2017-46)- downgrade to lua51-devel in order to drop Lua 5.2 from Factory (can't upgrade to 5.3 because that is still not supported)- Wireshark 2.4.1: This release fixes minor vulnerabilities that could be used to trigger dissector crashes, infinite loops, or cause excessive use of memory resources by making Wireshark read specially crafted packages from the network or a capture file: * CVE-2017-13767: MSDP dissector infinite loop (bsc#1056248) * CVE-2017-13766: Profinet I/O buffer overrun (bsc#1056249) * CVE-2017-13764: Modbus dissector crash (bsc#1056250) * CVE-2017-13765: IrCOMM dissector buffer overrun (bsc#1056251) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.1.html- Trim filler wording from description.- Gcrypt is now default - gtk switch was redone to accept value at the end instead of 2 options- Wireshark 2.4.0: * SS7 Point Codes can now be resolved into names with a hosts- like file. * Wireshark can now go fullscreen to have more room for packets * TShark can now export objects like the other GUI interfaces. * Support for G.722 and G.726 codecs in the RTP Player (via the SpanDSP library) * You can now choose the output device when playing RTP streams * Added support for dissectors to include a unit name natively in their hf field. A field can now automatically append "seconds" or "ms" to its value without additional printf-style APIs * The Default profile can now be reset to default values. * You can move back and forth in the selection history in the Qt UI. * IEEE 802.15.4 dissector now uses an UAT for decryption keys. The original decryption key preference has been obsoleted. * Extcap utilities can now provide configuration for a GUI interface toolbar to control the extcap utility while capturing. * Extcap utilities can now validate the capture filter. * Display filter function len() can now be used on all string and byte fields. * Added an experimental timeline view for 802.11 wireless packet data which can be enabled via the "802.11 radio information preferences. * Added TLS 1.3 (draft 21) dissection and decryption support * The (D)TLS Application Layer protocol (e.g. HTTP or CoAP) can now be changed via the Decode As dialog. * The RSA keys dialog for SSL keys has improved feedback for invalid settings and no longer requires the IP address, Port or Protocol fields to be set in addition to the Key File. * TCP Analysis will detect and flag more spurious retransmissions. * Many new and updated protocol support * New and updated Capture File Support: ERF, IxVeriWave, Libpcap, and Pcap-ng * API changes: IEEE802.11: wlan_mgt display filter element got renamed to wlan.- Wireshark 2.2.8 (bsc#1049255): This release fixes minor vulnerabilities that could be used to trigger dissector crashes, infinite loops, or cause excessive use of memory resources by making Wireshark read specially crafted packages from the network or a capture file: * CVE-2017-7702 CVE-2017-11410: WBMXL dissector infinite loop (wnpa-sec-2017-13) * CVE-2017-9350 CVE-2017-11411: openSAFETY dissector memory exhaustion (wnpa-sec-2017-28) * CVE-2017-11408: AMQP dissector crash (wnpa-sec-2017-34) * CVE-2017-11407: MQ dissector crash (wnpa-sec-2017-35) * CVE-2017-11406: DOCSIS infinite loop (wnpa-sec-2017-36)- Wireshark 2.2.7 (bsc#1042330): This release fixes minor vulnerabilities that could be used to trigger dissector crashes, infinite loops, or cause excessive use of CPU resources by making Wireshark read specially crafted packages from the network or a capture file: * CVE-2017-9352: Bazaar dissector infinite loop (bsc#1042304) * CVE-2017-9348: DOF dissector read overflow (bsc#1042303) * CVE-2017-9351: DHCP dissector read overflow (bsc#1042302) * CVE-2017-9346: SoulSeek dissector infinite loop (bsc#1042301) * CVE-2017-9345: DNS dissector infinite loop (bsc#1042300) * CVE-2017-9349: DICOM dissector infinite loop (bsc#1042305) * CVE-2017-9350: openSAFETY dissector memory exhaustion (bsc#1042299) * CVE-2017-9344: BT L2CAP dissector divide by zero (bsc#1042298) * CVE-2017-9343: MSNIP dissector crash (bsc#1042309) * CVE-2017-9347: ROS dissector crash (bsc#1042308) * CVE-2017-9354: RGMP dissector crash (bsc#1042307) * CVE-2017-9353: IPv6 dissector crash (bsc#1042306)- Allow opening capture files from desktop without asking for privileged credentials. bsc#1025714- Wireshark 2.2.6: This release fixes minor vulnerabilities that could be used to trigger a dissector crash or infinite loops by sending specially crafted packages over the network or into a capture file: * CVE-2017-7700: NetScaler file parser infinite loop (bsc#1033936) * CVE-2017-7701: BGP dissector infinite loop (bsc#1033937) * CVE-2017-7702: WBMXL dissector infinite loop (bsc#1033938) * CVE-2017-7703: IMAP dissector crash (bsc#1033939) * CVE-2017-7704: DOF dissector infinite loop (bsc#1033940) * CVE-2017-7705: RPCoRDMA dissector infinite loop (bsc#1033941) * CVE-2017-7745: SIGCOMP dissector infinite loop (bsc#1033942) * CVE-2017-7746: SLSK dissector long loop (bsc#1033943) * CVE-2017-7747: PacketBB dissector crash (bsc#1033944) * CVE-2017-7748: WSP dissector infinite loop (bsc#1033945) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.6.html- Wireshark 2.2.5: boo#1027998 This release fixes minor vulnerabilities that could be used to trigger a dissector crash or infinite loops by sending specially crafted packages over the network or into a capture file: * CVE-2017-6467: NetScaler file parser infinite loop (wnpa-sec-2017-11) * CVE-2017-6468: NetScaler file parser crash (wnpa-sec-2017-08) * CVE-2017-6469: LDSS dissector crash (wnpa-sec-2017-03) * CVE-2017-6470: IAX2 dissector infinite loop (wnpa-sec-2017-10) * CVE-2017-6471: WSP dissector infinite loop (wnpa-sec-2017-05) * CVE-2017-6472: RTMTP dissector infinite loop (wnpa-sec-2017-04) * CVE-2017-6473: K12 file parser crash (wnpa-sec-2017-09) * CVE-2017-6474: NetScaler file parser infinite loop (wnpa-sec-2017-07) * wnpa-sec-2017-06: STANAG 4607 file parser infinite loop - restore license in about dialog boo#1026507- Disable gnutls on SLE11 as we are unable to meet the gnutls requirements there- Wireshark 2.2.4: This release fixes two minor vulnerabilities that could be use to cause Wireshark to go into a large or infinite loop by sending specially crafted packages over the network or into a capture file (bsc#1021739) * The ASTERIX dissector could go into an infinite loop CVE-2017-5596 wnpa-sec-2017-01 * The DHCPv6 dissector could go into a large loop. CVE-2017-5597 wnpa-sec-2017-02 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.4.html- Obsolete the ui-gtk in the ui-qt to ensure clean non-conflicted install- Cleanup a bit with spec-cleaner - Properly set ethereal symlink based on UI and set it to proper subpkg - Update conditionals on wireshark to only build Qt or GTK depending on the interface, because upstream now only supports Qt5 - Update the caps code in spec but keep it disabled - Enable geoip only on platforms that support it - Enable libnl only on newer releases - Update desktop file and icon caches - Drop not really needed patch wireshark-1.10.0-authors-pod2man.patch - Use full commands for icon/desktop cache for gtk mode as on sle11 it was not present yet as a macro - Split shared libraries properly to subpackages- Wireshark 2.2.3: * fix export related bugs * fix UI bugs * bugfix and corrections updates for dissectors * updated protocol support for BGP, BOOTP/DHCP, BTLE, DICOM, DOF, Echo, GTP, ICMP, Radiotap, RLC, RPC over RDMA, RTCP, SMB, TCP, UFTP4, and VXLAN- Wireshark 2.2.2: * CVE-2016-9372: Profinet I/O long loop (boo#1010807) * CVE-2016-9374: AllJoyn crash (boo#1010752) * CVE-2016-9376: OpenFlow crash (boo#1010735) * CVE-2016-9373: DCERPC crash (boo#1010754) * CVE-2016-9375: DTN infinite loop (boo#1010740) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.2.html- Wireshark 2.2.1: This release fixes a number of issues that made it possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (bsc#1002981) * wnpa-sec-2016-56: The Bluetooth L2CAP dissector could crash * wnpa-sec-2016-57: The NCP dissector could crash * Further bug fixes and updated protocol support as listed in: * Bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.1.html- Wireshark 2.2.0: * Bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.2.0.html * Drop wireshark-pkg-config.patch because code is now in upstream * Drop wireshark-1.12.6-fix-QT-PIC-PIE.patch because no more need for build. And create errors at build Tumbleweed. * Rebase wireshark-1.10.0-authors-pod2man.patch- Wireshark 2.0.6: This release fixes a number of issues that made it possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. (bsc#998099) * The QNX6 QNET dissector could crash wnpa-sec-2016-50 CVE-2016-7175 * The H.225 dissector could crash wnpa-sec-2016-51 CVE-2016-7176 * The Catapult DCT2000 dissector could crash wnpa-sec-2016-52 CVE-2016-7177 * The UMTS FP dissector could crash wnpa-sec-2016-53 CVE-2016-7178 * The Catapult DCT2000 dissector could crash wnpa-sec-2016-54 CVE-2016-7179 * The IPMI Trace dissector could crash wnpa-sec-2016-55 CVE-2016-7180 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.6.html- fix permissions warning on appdata, does not need +x- Wireshark 2.0.5: This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * PacketBB crash wnpa-sec-2016-41 bsc#991013 CVE-2016-6505 * WSP infinite loop wnpa-sec-2016-42 bsc#991015 CVE-2016-6505 * RLC long loop wnpa-sec-2016-44 bsc#991017 CVE-2016-6508 * LDSS dissector crash wnpa-sec-2016-45 bsc#991018 CVE-2016-6509 * RLC dissector crash wnpa-sec-2016-46 bsc#991019 CVE-2016-6510 * OpenFlow long loop wnpa-sec-2016-47 bsc#991020 CVE-2016-6511 * MMSE, WAP, WBXML, and WSP infinite loop wnpa-sec-2016-48 bsc#991021 CVE-2016-6512 * WBXML crash wnpa-sec-2016-49 bsc#991022 CVE-2016-6513 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.5.html- Drop external wireshark.appdata.xml file, use the upstream bundled one instead. - Use the bundled appdata file as a template to generate the proper appdata files for both the GTK and QT GUI applications; install separate appdata for both apps.- Wireshark 2.0.4 (boo#983671) This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * The SPOOLS dissector could go into an infinite loop wnpa-sec-2016-29 CVE-2016-5350 * The IEEE 802.11 dissector could crash wnpa-sec-2016-30 CVE-2016-5351 * The IEEE 802.11 dissector could crash wnpa-sec-2016-31 CVE-2016-5352 * The UMTS FP dissector could crash wnpa-sec-2016-32 CVE-2016-5353 * Some USB dissectors could crash wnpa-sec-2016-33 CVE-2016-5354 * The Toshiba file parser could crash wnpa-sec-2016-34 CVE-2016-5355 * The CoSine file parser could crash wnpa-sec-2016-35 CVE-2016-5356 * The NetScreen file parser could crash wnpa-sec-2016-36 CVE-2016-5357 * The Ethernet dissector could crash wnpa-sec-2016-37 CVE-2016-5358- Wireshark 2.0.3 (boo#976944) This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * The NCP dissector could crash (wnpa-sec-2016-19) * TShark could crash due to a packet reassembly bug (wnpa-sec-2016-20) * The IEEE 802.11 dissector could crash (wnpa-sec-2016-21) * The PKTC dissector could crash (wnpa-sec-2016-22) * The PKTC dissector could crash (wnpa-sec-2016-23) * The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24) * Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) * The GSM CBCH dissector could crash (wnpa-sec-2016-26) * MS-WSP dissector crash (wnpa-sec-2016-27) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.3.html- Wireshark 2.0.2 (boo#968565) This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * CVE-2016-2522: ASN.1 BER dissector crash (wnpa-sec-2016-02) * CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03) * CVE-2016-2524: X.509AF dissector crash (wnpa-sec-2016-04) * CVE-2016-2525: HTTP/2 dissector crash (wnpa-sec-2016-05) * CVE-2016-2526: HiQnet dissector crash (wnpa-sec-2016-06) * CVE-2016-2527: 3GPP TS 32.423 Trace file parser crash (wnpa-sec-2016-07) * CVE-2016-2528: LBMC dissector crash (wnpa-sec-2016-08) * CVE-2016-2529: iSeries file parser crash (wnpa-sec-2016-09) * CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10) * CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10) * CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11) * Ixia IxVeriWave file parser crash (wnpa-sec-2016-12) * IEEE 802.11 dissector crash (wnpa-sec-2016-13) * GSM A-bis OML dissector crash (wnpa-sec-2016-14) * ASN.1 BER dissector crash (wnpa-sec-2016-15) * SPICE dissector large loop (wnpa-sec-2016-16) * NFS dissector crash (wnpa-sec-2016-17) * ASN.1 BER dissector crash (wnpa-sec-2016-18) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.2.html- Recommend wireshark-ui instead of requiring it (boo#961170) to support text-only use- Add CVEs for boo#960382- Wireshark 2.0.1 fixing the following dissector crashes boo#960382: * NBAP dissector crashes. wnpa-sec-2015-31 CVE-2015-8711 * NLM dissector crash. wnpa-sec-2015-37 CVE-2015-8718 * BER dissector crash. wnpa-sec-2015-39 CVE-2015-8720 * Zlib decompression crash. wnpa-sec-2015-40 CVE-2015-8721 * SCTP dissector crash. wnpa-sec-2015-41 CVE-2015-8722 * 802.11 decryption crash. wnpa-sec-2015-42 CVE-2015-8723 CVE-2015-8724 * DIAMETER dissector crash. wnpa-sec-2015-43 CVE-2015-8725 * VeriWave file parser crashes. wnpa-sec-2015-44 CVE-2015-8726 * RSVP dissector crash. wnpa-sec-2015-45 CVE-2015-8727 * ANSI A & GSM A dissector crashes. wnpa-sec-2015-46 CVE-2015-8728 * Ascend file parser crash. wnpa-sec-2015-47 CVE-2015-8729 * NBAP dissector crash. npa-sec-2015-48 CVE-2015-8730 * RSL dissector crash. wnpa-sec-2015-49 CVE-2015-8731 * ZigBee ZCL dissector crash. wnpa-sec-2015-50 CVE-2015-8732 * Sniffer file parser crash wnpa-sec-2015-51 CVE-2015-8733 * NWP dissector crash. wnpa-sec-2015-52 CVE-2015-8734 * BT ATT dissector crash. wnpa-sec-2015-53 CVE-2015-8735 * MP2T file parser crash. wnpa-sec-2015-54 CVE-2015-8736 * MP2T file parser crash. wnpa-sec-2015-55 CVE-2015-8737 * S7COMM dissector crash. wnpa-sec-2015-56 CVE-2015-8738 * IPMI dissector crash. wnpa-sec-2015-57 CVE-2015-8739 * TDS dissector crash. wnpa-sec-2015-58 CVE-2015-8740 * PPI dissector crash. wnpa-sec-2015-59 CVE-2015-8741 * MS-WSP dissector crash. wnpa-sec-2015-60 CVE-2015-8742 - adjust wireshark-1.12.6-fix-QT-PIC-PIE.patch for upstream changes- BuildRequire pkgconfig(Qt5Multimedia) too.- Enable netlink support, requires libnl3.- Wireshark 2.0.0: * Completely new user interface (QT) * ~/.config/wireshark now used over ~/.wireshark * File format debugging support for BTSNOOP, PCAP, and PCAPNG * New and updates support for 3GPP TS 32.423 Trace, Android Logcat text files, Colasoft Capsa files, Netscaler 3.5, and Symbian OS BTSNOOP File Format * Support nanosecond timestamp resolution in PCAP-NG * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.0.0.html - adjust wireshark-pkg-config.patch for upstream changes- Wireshark 1.12.8 [boo#950437] The following vulnerabilities have been fixed: * pcapng file parser could crash while copying an interface filter. wnpa-sec-2015-30 CVE-2015-7830 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.8.html - drop upstream wireshark-1.12.x-allow-gdk-pixbuf-deprecation.patch- Wireshark 1.12.7 [boo#941500] The following vulnerabilities have been fixed: * Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241 * Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242 * Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243 * The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244 * The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245 * The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246 * The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247 * Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248 * The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html- Conditionally set lua52-devel BuildRequires for openSUSE versions newer than 13.2. Wireshark does not compile with lua 5.3.- Fix Factory with QT (PIE/PIC) adding wireshark-1.12.6-fix-QT-PIC-PIE.patch- Wireshark 1.12.6 - The following vulnerabilities have been fixed: * WCCP dissector crash CVE-2015-4651 wnpa-sec-2015-19 boo#935157 * GSM DTAP dissector crash CVE-2015-4652 wnpa-sec-2015-20 boo#935158 - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.6.html- force -fPIC build to make QT5 happy.- Wireshark 1.12.5 [boo#930689] - The following vulnerabilities have been fixed: * The LBMR dissector could go into an infinite loop. CVE-2015-3808 CVE-2015-3809 wnpa-sec-2015-12 * The WebSocket dissector could recurse excessively. CVE-2015-3810 wnpa-sec-2015-13 * The WCP dissector could crash while decompressing data. CVE-2015-3811 wnpa-sec-2015-14 * The X11 dissector could leak memory. CVE-2015-3812 wnpa-sec-2015-15 * The packet reassembly code could leak memory. CVE-2015-3813 wnpa-sec-2015-16 * The IEEE 802.11 dissector could go into an infinite loop. CVE-2015-3814 wnpa-sec-2015-17 * The Android Logcat file parser could crash. CVE-2015-3815 wnpa-sec-2015-18 - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.5.html- Build the qt frontend against QT5 in Factory (only).- Add wireshark-pkg-config.patch: actually install wireshark.pc, which is part of the tarball. Seems only cmake based setup handles this for upstream. - Add wireshark.appdata.xml in order to show up in AppStream based appstores.- Wireshark 1.12.4: - The following security issues were fixed: * The ATN-CPDLC dissector could crash. wnpa-sec-2015-06 CVE-2015-2187 [bnc#920695] * The WCP dissector could crash. wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696] * The pcapng file parser could crash. wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697] * The LLDP dissector could crash. wnpa-sec-2015-09 CVE-2015-2190 [bnc#920698] * The TNEF dissector could go into an infinite loop. wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699] * The SCSI OSD dissector could go into an infinite loop. wnpa-sec-2015-11 CVE-2015-2192 [bnc#920700] - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.4.html- Wireshark 1.12.3 - The following vulnerabilities allowed Wireshark to be crashed by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. + The WCCP dissector could crash wnpa-sec-2015-01 CVE-2015-0559 CVE-2015-0560 [boo#912365] + The LPP dissector could crash. wnpa-sec-2015-02 CVE-2015-0561 [boo#912368] + The DEC DNA Routing Protocol dissector could crash. wnpa-sec-2015-03 CVE-2015-0562 [boo#912369] + The SMTP dissector could crash. wnpa-sec-2015-04 CVE-2015-0563 [boo#912370] + Wireshark could crash while decypting TLS/SSL sessions. wnpa-sec-2015-05 CVE-2015-0564 [boo#912372] - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.3.html- build with PIE- Allow build with functions deprecated in gdk-pixbuf 2.31.2, fixing build for openSUSE Factory, add wireshark-1.12.x-allow-gdk-pixbuf-deprecation.patch- Wireshark 1.12.2 - The following vulnerabilities have been fixed. + SigComp UDVM buffer overflow wnpa-sec-2014-20 CVE-2014-8710 boo#905246 + AMQP crash wnpa-sec-2014-21 CVE-2014-8711 boo#905245 + NCP crashes wnpa-sec-2014-22 CVE-2014-8712 CVE-2014-8713 boo#905248 + TN5250 infinite loops wnpa-sec-2014-23 CVE-2014-8714 boo#905247 - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.2.html- remove gpg-offline, now part of source-validator, also fixing SLE 12/sbin/ldconfig/sbin/ldconfigwildcard2 16388042903.4.10-lp152.2.21.13.4.10-lp152.2.21.1libwsutil.so.12libwsutil.so.12.0.0/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:17244/openSUSE_Leap_15.2_Update/93e548cda363fd5d38d2819e16e34acc-wireshark.openSUSE_Leap_15.2_Updatecpioxz5i586-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=682badcd533d819e4d6e76d69c52dfe4121ab786, strippedPR RRRR RR RRRRR R RRpSy.:@utf-8c646ef384b265617f9e7402af3c23c67e05449dc497469329e1857022eb15cd1?7zXZ !t//] cr$x#E55煣>Nn1I|ʺuCaß I;Pơk)|mFQFg1c3= Ȁ)rRؼaOsEn WEim0tU`΃+<*yH’|&Y"7.d-&QEn3X95l%KY4G <'9 ڵh; 2Spi7Nx$@k}ٶ-q!)k̎[nZO4MMP* P--9<B-2W9nt"nA|ȊrӦ լE>QOG_wIiہB!x!0,uѹHcʏsrU#]z+ k>y>xuvGL1o:)%y~k];|S$8'~Vv@e*?b/t+4ǹYvb}$Bk~xc۶9 S>5u'\]t:CgtgEQ֫[9aQ@݊P[0<ջ2S!݊6rft`#4v P]MCɄl&Ƃ~coZpźn$9Y5Xv]Y'awP=@?7t3Dnc*ސliltfH 9Lj[jbs//[p_lv;EK[bgޒ)> Y^?Zv7| d19Hw d#mBtOν<Ѐ?uBj\ڭ*%X1R>obֆdw<;GԶ GaRNœ^f~L6 _CKW;`Į\Fs#0P;aKGl딌1W3P] {c$Ӈj{XA571Gd!$ 4*0Vl;+ЀA}9VpىsOZ[,WMa'_DDUmQ '甪c1,WvJɖӴ)7.o+R8{ Ԑ58wio˝[ȵ m!hD AܙQ?jHEڍo{ a .e, gR ~$B(w>CmĎXֱcK}H<}x:e@ /Oͅv,M:e(RHX\f -NKF ؒiKWy-[-I$m YY~ ? 0 ٫ʼn/DO4{͜[07DJjdYSfc>E=[!D⊵2Gj\Uᖸئp q˫zTͶ7;rLɕ#]@=RXԿΚդcL?wi^Xt&WRQD.2Q$pF@s,)b"hC';JM^uPB>A.l`oV: %1Ԡ1'ǔ-Lݕ1/)-Z+F@7-Q!by $$SY9v0_AΝ\g|V#r[[4+[!J٣e@y06qĥƮot6< s ŽLQBqYD~+;1Diww&t.MMWzZW Dag}aܰ@1ABܦclѪĪv|Kt %^+RzfIVŬͩoD5z8Vtʔ 칚]ݤ;ĥ\P6LxkdXssKUDB|f0F+׽z!TGdI&v//&GE&Lg a L9{Z z%?c%Y6=/(ǭao sO?ˤ QA~%M=NRvS ak*m%B/; n2oȵH1SY\K<. w5[[$ t㱅Y(\Cm7>2OiR@ wCM=mDd,slS$\ 3tCl~Z)iCX !pi^-} rGDTjolM#w}kEdGҖ]-,ii} U+2RDS \DnpL:x8N_,^CsXڎIvIFcꪢV @BХW"7rG77QȐ:ut ] dU0Z bDt/2k(9Ϯޏv` wAy| (ܡЂ?/L,!OX~4qH&F:RgàfEØ(+zX}̽M4Ѥ^ Z䶀b`)U-D%ld;z~E}QVŬ :iB/e%1:KaVVZc  rQA ɶR=f!Dאq?t7kONY^iF {`T[fkɕy@ydwWҍ UsuXpcrJ]q"#J9JAsYcE5.B聛A깃5ɛ/t5b&Q2ړ\mtu?5!$GMY U@wݼ HUM{<]^0"ۦd$L:[ˋOpǝJ" `oZ&Z!&/p-k/fV>Geԯccybʋ<[<ndpoCfΒڨpXqQQb$nh!g@N$:kG$|%ܼ˵vw@C-%ؖY=73w>W_a)L8T {oÎ]mk`yTS _(%yXiVD*]#)-'K9^H 'D]ws=i7wڛ2%#>K[cZxNʵG ѝȖmZkt؄m5蚺[nEN|%7hA+Ԇ@<Ư'i( +Mۼ8˃U`tGSGY?f XA5`B-u/Ŭ_pĻ?N`Q(b#T߉^ I^>{'[EmBǻƕMTNb> DlU偬Va L@LTz㉇A [:jTև5gi(dYFa~ajKX[-`0㮶5m#ĀXE Fo)XCF2|+b{5Eyd Kl r\54k+3tp4 ړ 5^ aV3O"6w7J R$Z̰Ğn D{^o  X+LmB.ec`z>b补 i J%|Y%e)a%5e1VV]Y.Vz^z =٢]\Ŧ>!DM&?f;r@b##̦!r@@j]{m![Nצ[~q8 M D֬\i*x"{2ef-"U~iz;Q76_XW&~y:3lg+BLi6hr@uqTԦ9r(Qӱ 0j[,M) bYf%V>T΍]M$"P81E}ؚfl6?7BS~d ]8<2 ֺ|m K@CGX#zLIBL"UMH+_1aT)]2 A/,DK[V0?BABwB~҄ mTr?~黹/OS [ĭ-jE;4".nsxM-O3]N &]|+` Ʌ򼥽s>mÕ[2y|l}?OveǪH6 !śS[:X&d\:,Wك??{Уyg6~wa 8Z1کޒhP,sϦ6[c;s ɩͦs)ȋ;6I9F+ {= irA8LBՐF[T~IGnS㦜 P(9(SJd`}d qȌIJ JW(5 G&JádY%󹣐ykl1m9Ŷ<@l%PIܿ> 9d<[] Daw{.D4@·Ł2HeIW.%'|qVGRϨ?BW ,PuyJx-քlwaT] l)@bi=g.B0vC4q5ϕAzxOUJkͲ1-#&_?L itDB*OcBO6wf.@x՟eyn_1W6qԺ'@g8Xj1gJs|P⡮[P M.J#DO"vEqbl s>l j"h6֜=0Æ`27p%kV/Afܷ(m,/}+hmw:r fb|MpZ]po襥&|ٸr0Q'BGFަzCh(al( *S+~Zu0FPX0e2ۻZA%8w<Y*,j-OB h٬:>w7S]nδhR -&N( 8aM_;*B#G{9` uw6DS~<$$a 8SgJBq]WH0"r:K2Oh, D x =iIHn}*-8-Aصr\)ᎀB(Wܾ2gH]%Xk>yvO gpC{=ϻ\u1/F5&+s[]Yjm#k?!joɜIǎ178uPW#6kvhB".e?'6~IO< |-*:c,gaWY#WXq+حlJv"?!gDIκ$ͼO;=I5@qFi`6amZnw~=7X%+*Vv $ݵ(pr'Ís:+cU㌿@uhzh46wQz|23E5$͖0A89k;B7n<"D:%?&} 8dl\7YP@]?L&r~϶Vƴx.v6g-ydG/|7-L~9i1]L誺ʈ'\)4{@?l,3r Ԅ5&rg[3sG&ܿ]YۋN'0v DAv^q!n3`]0Tܭ~ոt|&c0~*k9QԴ0"! lη2n.5= "!o \L9_> tI/&y[-!?! F>ˇF[]L4gF Ad)'7L8^FieS+vVau"K 7Rp|e NQV|M|:)8|4ʴ] mTY^2!YS\  Lik0-2 6#늍Q1 %J,ȁ2~\0|̺L%i2x:G{{1h-q"EPj]L]/0Pע" f<owҦmEЧjU6|RcA!?<_v+ 7' ^ȓiEcKxtc`>hE(#*7y7KiShr %kK,5npoi\]0kv|g?RYf%@pp~7z0ٹG14<R^S)qQAw<ɚn׵Sϔ Jf' qM Oiē~FbU#Z\ߗ6a}˗U'&:{k1o^kg!K |JJI}ɄO9-e蕙|e &4NE ܍)̕µkܮz.]3J/'wk_9 =l0P#Zd%GՀ{;D*,={Ok6 vF=q~䤠 '6ΘHhyY=+ S.xHo^~ ?8m9qSn%z`F"_*V"|kn "rtkJP~cm@ӣ}f7fP{L>+ J^<ڍ}ZguΛ{0{ >pyX{4̇>=eqi @*Q_Z 1>2.Hb6*"ï@~gȋ"N[gpýfg<%yI&e"YRl<[bc'Vqj D\5hQpUa+\qp5>1@I[~ 8 +p;| O+5eN><+nF 77ޫ8L9@C{3aC&8ÄerhI+R w)?4Yp2?ѰMKle V,@VM|9pG^]ї$bkwUռ},PuDPwaC~'2gu|녉u.(!B0<0vfxrͥ׶P*PF\< 5 4a9rCv=1DˤNRTGzWyie1sް\)#a{YbUvWѣFrbu5:tzT#ΟwF*퐌ya(e6lb}C⢷-!Ȍ;ka8mL鴩u9~_HHsK%&ߝJ.yscFH]8!u5SVz f\fO;HKOdbwA5l}v˽f ( 2nIWp-cj*:ԍ|(}j?AmO16]Li;.,,C)5܅n`|lew }s gepIA >LX2@Qǃj(cʜmh| 5j=`[xwh۳ fb%. 5rOÜN!8Կjjd95gX:b 1 cU8btd-ul>sKYppeS#[ \P*; Cǘ/]Sb CT0oUQBRQ5*͙N6+r;oRdDa_k}0q!*?Ip mD]UO XEzC9 Hq*oID<1Bl׬Cԃk1rhާKS1|gL09ghVO(D 0rK^Mr[ f'=_vcc{  DMlۦ?˙SJ_ Tج1o +˭nO!$d(տ7Bޓ^Ϻ1l&1faSP*+SL\%Lƪz>-\2,6q=ij[}0q rXߧߡP<,2#><2{1l+@ԉJH7~LF4/ FHg LD=p/.#{~i exoM ʢj@r%e؇ri6pz_nu637Š7kJ I7,N%ph@tś孙)O{.end~0ֲSeUU$;tc4|rzwjJ#1(#mP"DwzyI"NrJ:P_+}v"Qh/\ 65D* H,&HYO6 *?o¤ְ.@DHj 3=GX$TB1a5wK乙0?zy`y|3 S$R@wUuT'nYq>H1妙/-td%bI})I8bt q\ӶqŚuX~^Tཙ$kPlyQjfl+̪WA|e;YAmG!] W[g1k4Y9߳ K@Y?*,\)߮WB2F}oճ9v茙hBM= c9 wdR wUK M#w[;dmՈ NV~9ỳ8"q'^?B|W¶H- Xs?HKĈ$GڟK~)~)@:3` D+nv <'O>cG]nޠIR 0z;hdt cgf)LožԾ`ΨԟRr79H#^ȭu6񤈘ߵ,e@f6 )DY91zWc gţ$krqn#r:hDZIڦ[lԜOEHV4"qB[ s;9ʛI%ڷd!թ5k~y&xJLt-=;-5%} C:^vbRJ@>oCro*t7ۏYyƅ@!f AHG=&qk ߜa1Z+ }\=f?^<4o [.qݖ[eR߾n1ZٱlXZۖ0X#p聾KfY7DKE;҅ h.W.SB Aiz-nuoޜ@\cg͐Uki(b\Qo#mhqfp8&/pwjFB@XTdK9ڹ2_ܙ9 Ek?_ ~޲ OϏS#ﯬ؞GYQ9}>y2!by Q|_c‹H W8(a\MH5V2;Tc"Wut03\+pYDeD W4s֛NU[NXK]3ڻ:YY筌9}K, <+{$xekŔ^~W~¯Xܶ%͘@bSU+Q|ڣ)#4fWɠE pXT>2q_(uw4ˤJ|&NYDQPkP$//f^tD / IJYz::^veh T 0N`y2°{|e? G,{K9zc :a} !GK5C`j3~YZgON(<6k٫ #Se1bag0b brGWAFhvTT'mdҿ}xhа'뗾 à [hMY ƃ7F2:Dv:3ԹwD1 ¨L~#>l\NͼLHF)AO[=A*\#}F:eUJ jH`eƎ;q\d%^ȳŰKt IߖVIC`G 0b~Fp;L[$\ziZ=dޒMDΔI SmlnEoUԝIDx4N+M`?;6 I>ϓ` ODvG7tIҊ5EaY,h_^ )lb@x/ rO;@O!scўoPml;g%4V'kk>OĵT@) pӵBw,F?B%$5kZd`I UQfZ;:̠t֋D?@59.0!GvE@2JaU:v%+_{ i!<,evkv5S!zgߎgCZ|\{OHvZ#f?n,PfU^ N(]q RXbLoˬ?,Rc V4{x@tzk|st=9H^ dLD*䎗h 8' \)kV̧a?'tOY0ubf;ڬٱÖ߹BW]SPUG³X ]A^4pƝ{4K" /Ʉ1;I*ͤ|]o/C.CWvW,V$0Vu/Fq^^Eη)'~Jt,"P#Jh;t nL`BA>9~"׭V^N8Qvx%GYc,OIg#]̫c>'׿v#No7<Ҍ 3 JJ nąo6PnW / ښЕW{cJD ]&MoP Ճ\7OU՚wW҆OI}{N {7#~ר~eɠ {Nڍ0k( {($ߗ[ԲVy ǁ::c Iַiobz9PN[ܪNdX僃"r@a|#PSH@x?B܅o MX*Hb~0=`)0~-Ni2rq$cg^;)"rj 3FUůHߣԮ@i[(O4P[b:T]>Mb&. im"FJַ 35<螤Qu]D2W Er=@+MaPd[B܆yӎ[LI( 5́GS__(gMLLRV d0zlgۣ#,~l+pOp>@O:!12&+k{DZrq]S:FˋщANt>Q|Md^³./6'ړOeb Ce\v!nޥqtت,'6|UHkj%t v ܈ w.W\QoD+w=ԯnB6T9EB|_u=I8tݩ*Ҕ:@䊦)i oό"즺EїO Q LjĭT,շG}dY! % 9p h˖j8k9[ѯJ9l\ ZduP;!<.=Ѝs2W Lw.^3wq)vcxdRDuxs֡^wycNcb}i=HQ}U?k=qz})  rf@ho" {.FVsĪ=VBl}ήPFfjrݴ8=:yɞ ˝!B|i( ^Z]g=pQp?>t6]sdl((Y5#!6{,p"N] >ohL>\ݩ5e, l0&U<Bx>w\cZӞ#43|'!Z"u|Dh[]=|$$;/jn=_6->Q;#{~/ E~(½c Ga8 5v3F|RrLN<ןӲkQN!6*a]HĜ8BS!Z[951 uA) fm݋X~dN3bvA;xȢTs@°pEY 'iG|(6wqwCRv'k]OfdeC䤸Z@Fp!To4o1<\e&7o/7u_ʏTYNU}IFW3FA+rw&J=$R7>Gf&3$MYBm^eD|$վ&.Wpۋu?$+f\omJe8p9;L8Rķ5 UZ@GÆz lm Ley(w *ܶb~ɔʢn=m#PLLi榠EE\qQo5?+t`}*D!U ')|Q@QtwQhNwWqܯl];^UX$r^BZp`O D3^Sja*{4E^]x–͢[I(zSed||T$ZV Ypt?lfOSC=RSE}Mu0ҘhH<zfG_/GOSh{)lLgޓ._%!(T|ai){ t R]ri ;H7m}kfG@L?Hu:|/Y_>h*n{b ;Wg/ B}R7PԬx+[Zd\CBHk3^T0/V7yǫD)rs9l@*=q\USt7Qbo87Ӂud>tIQ@Rr\OoaEYYdfZ23e*?_k8;˕dWt_97]?"wj&l25x!ӉޔVpjP˴o\4/^އ>!YT7ڲ 9,/̦YŒA.{GU?|Xo԰eN6f1u _/%UY=w!D[XB]GH1 J=-fl' ,*:#C'>kD,C+;+]5\~[VOL4/mG =fi3v:Fm9$LPƅ{rDVʦs8aJ'$`Y]>D߉Ј4V@Yx@H ?jJB~[(֋" wQ>Е+@Z@CT|O Wm\cK^JPP䩥GK I_6W#p[0FοmzA3ԢkGApحd=UZ `ym-GsTIhx' z@ |UiڞbPt^J@bhzh"i#4T)M./ |`$Ыf bjXk? ]}4]]KYn8*S~:QP T*5aXWOLXʇyn@{ZZbM\MF\b1AdMlKd]_[*& ZAx[QU >_Îf\|EsDaJ4nGg[yjNL109$ƲwEhyS UeΎwr* Á\}G̐ǁbW݀3~W/g&}~;_s SrPm!Gsɕb)PKlYy]CA9ps - :!JFk~@B_ܕ*Xm6iԌ4G!y\48[;0y$feq⠈/v^bps*F 'T~,E KS.zmֽ]7)Rmj+>4CJVΈ4p Wg'B0 ɱ[( t\ MN*gaqҠ}]yM7{s H*e0N{yw!.9Hq:iTCʕlÿk OF#.U=DTg)Li`FgݡC!l[ "\G(yk#wn# V`6qdei]KΉU@v£`Ŧ*'N *߆}6&3/t9ϏdzUrwfBI}irxL$Ef#Go{'hĹ«ySyM3+n{=Z&J78/PABn$04-~b&yd-VNAFY`֜SVu#nda$v&b uϘКL[SqJIʣ2ܽ/筳B Ee8L?ER,XJGO'( zZ7#%u2or춖UŒTGAXLZ'Vٴ\S@M*~?(XCL]$adDo%Y[zo)kXXO@ACrvM^9wEl}eO3uUSyQi-mIiZ[P&kL8 eEx|]ubEkKh52ޓJdAH!8 Puh6Te z5~>kgF7(l7ҽH܃)u4#GЋL?@if)uһtAUnˮS ׉a }7˝d3&$L%; Tccz*"bFnqAxJr?13?Vv z/3Ӊ v_)QQ@>E`)ׂW4&L?jV*vH;S)}_"qFsI:XCVE|Tn5w[s`IP6O%YYO(Qw7\,d=I! GHn3}Cs+ưWo}z^)⑿>D;`2{ٺժetl?/A9Ǥ oTG\̌/N + O ՚[M΂:}cI5-!gOAXGGQ gkl \ '9cO):pDlg|T3`%ΣJene"t1x"ARhl!4N̎۱:gEipfPW  a/N`[E"ѭ;˵q-30巎_}Z$ V-"mF />'϶ܨ,|bCS 8ڕr헪t<7/iB%O1IBH'> ^܈nmW3Jp3_Vגk[5TT߅ZG$Tyw6J1еD 0k;T *hdqA R/rncfw^a^.c rB W͚yYD(**6^!y5=3bJ˥eCŮ M'gk>i[ܷ"H ~CF $`QAm9˗2;.R].GH㳛 ժ@o|\y(4E^H>pΌBvA*@nn-! 8ijy@N!پY5& >HU x&Κ{0cz3&S L2hq|D~Ⱦ& \\rLcʳ{)ڮpLOc'aY cxoW72a\kLZuID@cD/QC g-%x+cM)n $N#`~ڸ&ALjmׯ/ʳop='ѭH1ޫg{]~yx8GLUKtJWxܡ#ƣ-òچϨI!|z >8F]7}ѳ&Q 1'_nBş 4HGKn{2Oŋh2o$D`$F-]%NP:5;CJYN!E|@ٹ0:(UEs#ZU!il#`#O4?3m2/曌trVv[!-NbjCC8M2Or6XFfHݗ'B|uF&7or>Vg$yO C(CLE. >&AZxgpNњ:8ꛫ1#筵|lOe Nw_&fxUSWXg#)Cc%oBIcg5,}y ƫM,ߚxxfeFpHd1 1SkMD.-.6 *pN&#)>r|ȓ`~77lI]1fl`UpçD 0Q(RVauz<ǯe2=2O|'#8\@UH46(+v%Knv9<<*Fr D>,39W섧%w3p7G/Qzit[vb0ׄ hqU3$_)Tӛi@3zSn`焉& Wmx~roڿhD'!) a6J=b<lj| O@l:bJ(T 50:!qtJEzyfQSCﶻ>Uڏ~PI.5 ^ٷ&88C|v,sVODNQP58=BoI;b|K7Jn F]2EHTϗ;<# *b 4 bp wCcedOӃn^ H+K9]ZJ>Qx֗pC[\vp(@K\L=D6vn3uG%v yJ 9pgKO L |dc0Ts(da=7R~)U":Jp:nFW#-/[$;R|eNRCPQS=WGԻk̍3n&UW uվ6-zs-jmOȿDPWC)bl|{on@vαPϡk!*Ο&\2&GayI(^26i:!'̥>H*{43Or-Xݯ,Q B<^K_T~jINN:l OP CXF {aD N!zMpDMs9ǝd}9ڛezf%pp<10pJ)<ؠvD4`Kh2.7e+2ddcB3H.11bQh{R}ܰ3BjE21L5P_/)};c]5$0KeUh4qc6N'dR:F>j2szbso7gSbiOָ_L(J NG9y}]0EJ3Ϻ,$lA;z/Ǵ'Hث3onІ"江Q}:j.Gξ);8k$ZGʺAY .p_x9cڲ-<drP[΅g.,/CS!Z̠#/㠝=.Dj ۾R$lt`{9*CN:A}QKo# ]TuQ7)i1AّV߈z I6@tqAEEιpFsx^Pvyv'hfuG.Dv6=jCvb~3*ȹs.Wv⦕)40K0v"~N`jd甪A]Q %Z{'dCS>`^P{'i[BL#|3 rxpM%s&o[tŸؐ MŻ1Չ;|pH] OSev\[sq{Q|U"B!87K)uH!3~53-;ůeKCƣ $WN]3!Z-,MRXXh}=Gb|cZTAݯuXMmY(KH,6es,l1<,VL^H Fmc";I5]aۋ~,@F )kQQ5n*pw{uz=>Y<>giC> H(5˓hnjpM?] ewI{Z8T <ϟ:ǿ,86bi⾏;'*0IU "໡kDhY\a3}f.x "u*zwY\:-xL=6$e)ېH%. S:FN\~ D1 <5Bc*,~ N̸NW$?pb7ۥT] _Az갛UDCϙ>Ch:"$ֿ~pm@9&k5]0 "XrKug 1e? !۔scݩ=-~,8NC=o Y'ɡ<B\U|TjEiDF9,Dj+`o5qz >ڰ"!k*Yo\%5-8*xK: :ծ_+b2$!ͫ!%xXF 簔Fnq_YxNb &ϟQ29#"dffu`45/ٷ m +2(ӳ@Z g|!JoC 4'6 dRt X_oxPN\LeNƴlP9nHeJ#*{4`:#nuUǺ ݧ(T|eU @:%pF451 >PJR/sTRbс7wy! Um=ՓARҩDqf`btpU7%1zΏ7+똾8+<˅"KUj[Y}L~M]гg=_W gpNu.^5G-zPU5(FEEEZ5?=_fmV$.x$sgh+UMh~]d=_sT XĘeh 9§"OD@UKM$Ydp:2C9p:%' :'2/i->.H*bMe[gs,ǨgwKLhQż×(Z84^+ bBrxe#Q2ZO!/vom6 q}j,3غzr]ʠ$eW[)$x@3; FEj7ß&.~ _1icf ?L!Qb_]l.BuzΤ bK@&Ɩb$+uc]nm/^.94*wbk } O_ RE Rl}n+g߄oՑė0Ȧ} $OtaFFڴ˕+dHͿLxpb#i_S>(mϛ8bpLj4fh >jh] [d¼*s.S.igTΟA0ïݕ3)L[" IM qwm"f.uP'`zH1zcE[1i-Ps/_VY mWl^$ſ?=^LxxR=,odGt$9lR߅=ؒHP_$~0E`oه,umFe&rPs=[(zܚQK3+Dn W<h΁cN5FOӲB4ix_=^#G ڛѽ~,BiRM7( lPב&fr`Ș SK0G:pu }p91DhFتfP!on3S&7 NCK1E>x^^Gv%s*eTōJ]'K?VAמ`x`h7ZN8" Oʀ_pggVC32*tb7Qu4lc٥ޛ!<X2@9{V58kQ Mqλ1_ohqjӍejSQc4>k(=Dב3 ,xݬ9feG6wݛ؏±̦nx;M6D jܿ?L\Kj\2.v42Mޠhʒla8jE:7dAhgOJ@eâ4d(/.Ȗ1O JJ; #c%./2?ZLe-Ҿ4aV cV% FGetQ%{ @Ӈv:Iq5ݞZ25sM*4O 5q߫ApY,J@TzkBEj#f(f㦨#:hR#+o Lfޤv px$od:VZ 0SN M\7D-DE7NxYӓ'-( =;zѦ BRN>|a*42&ˈ& onmoK48~,{#իd@n_,-L5;vl~7T.DJMԙz m~Y^O2ᇘ_!(㰜 /jYД,$xvJQ0:=mt~pk\c63EA~& Ny 'wWI€jT/;%S&toZvj|w ygVfڝvg~ лNт޸*)zFיּJҿKmdC{bRiOo[s+ XgGoc}]kZbv}kQ?bkYC=%*"o,M'kV9액 Ioه0PB1n'|4+Y^"˟4 Uրs1 b"d _DR !;JR=i_9(T kp蛐ٛbрwʠ_$Z4ҕRiCU.2$+e9K[]n< `Mo" h|SXjk:V8@Idj">Eـy {q37CsA3 ?'jN3%GUbN#e|/yP1MͽD(}ឆyA3ؚq&lnҕ*8n^^[RXF+qY|}m cZ2uZ[iDIܻ17!>mq80@GT_YKᑏ1,Jd΀;f%$U' I[VBР2XL 8a~:2@HHti R!&%3D'<>)ҥGsAqwQŨD jM+ekq!`fƋ;ea'OBvU3_>\.Lϖƪr4glGuݸWx̰i.#AKO '5&ky!h=_qDpY=KKMjO^oR4S\ !M@ /+ lj)yf* VE~ 9ڟS(i^(Q'ᙩzc[dԨlXǯ:;iT7LFE~ dokXQz,=i* ( Vm ^$㔺1Ps!W-eH ϩt~RCĖmt`ZڬMӺK_T%f\V010$({F ^T1?%ᰈqsJc[5!a JmDwee_H:xL-*ab9cHC9wYe|ȣo(;v@!e؀N}f/#CdMF*_߇o2)q]EIPPgPipm@~=.9[i~kD(#@I >[]Íyt<$D7T]_.4kZQlN&hKdUC;_X@@dB=chSۡ\;c([ׅ. 8b&gQ!@LN3KC ~Xl >N}vMG) 7tWZ{bEWqE %-ʛrM\:7v 龦 ~X9.h2bI@ӥLIKߊt[t^x &0ٮ8i=hݔCfס]hh%<ΫU4Z1=)Lk"ZJ*/f|6+ex]l I`ur tXo\H[2pfY1m֋A`MsG5ۖjdԳM#SY`di DE^x''Zx9>?i[Ѵ& :i|dH-C--߷aF(o_) WXO .4=Q )4rQ`"ŤT鐉YG䮖EM<h?[4G cr A Q$no68_ێNyJJ0h E!/XN >e`%O> ݅;5w :l)ܵ}Dd)zïL2;vuGX_mߒ2.)9p@kqUoX~kQOz7/̵mj޺g DM0>_m<g"߅ۢ^S(_hAKֽdV_bW+@ KH7F ik:1QsyQ4/8}˴+h_vTmK7wx"4^2s V'ܚ=K u)h!S G&<ɫCā9v';u 6K^ D' go> u}UK'bO cYiF#Nz.>q'tlb;zfleb^*'Sc$^LkgC%,]z^p)# r2GwH61衰 Jv{m3s<̾gc"y"KϒJ6GՅۊ$k,hn8`*[Ho?;T=m5xE~B>h#hiL|Z[t9Gr @S5]|PcG[/UAq"MSن<=G44!|@y:tu@c`:4cހʵfPz;t/eElDa}?9DMGhf㔜p+Y(?t ?hS$5o-̢6!Sn9|v䎯qSdh|a@M7_?s 穵%aSz؄yx,?):V Pk5DOAum͇/1e,fXNYUs06T-F@:uԥJ/GYIםԡn)fX]f_xEg^TzU*jughgy!­-/v^8o :k{Ns TW 6e_:WٽA M^xPĊǪ|:I\jo\˰}*4ۨ#9_?^_& Ѯ%X-rvns/[sn q!I[.ٻm/޹%6.&۱3@VAf7BOft8#Js?X 5}!x(/_vVV*!iW}~fbwF"BF2ϋ&-H`[[osm/ȑwǔ6ʑgbq taǼRlNh\rzFxƙĜW8rW@ѤVU+*Z|(B!}F6RdiPpMak܂5# swHǻb$yF^CT %b,NgeMD#vy/golU`:ԧ9UCJ3ML X%h@GH^ 1|ob'U?bu_7΅v "5g ޠ(9B5f\L_dtXn~3rkh;yjObxcUTed.["ـ|i* !>Q(zwS*-(x=@p7#!`&eI>[ uj8.`.8a7bWϘe ^3T"S/"lsa?~jZj8Kͻ{m9Q-oPC튦 X 9MMҵn"nt)­^h~wnfMj|blx`e5sb⾓KHm(3ˢ;W"ډ}Ԛ˜Hmӯ>8_ޭ-(X!5{z R96ۯ 8ڞ,o+kڥ_V񠷆;ަs'Ȳ&P 6N ‰cz)%' ^>v܁t/TuF1'Asl^=eyx nS0B$z h5Tpy[˧?駽yx?nGqVm)66ssqSc<&>iIL.RqlbHOB5߾.lT rs mwLY$J Q=ZK*;@eoaXF9zU?b%ik|pF-/U IS.XY*4]*/H c;+j#z=>Zܒ촋,r$GʅQC#Y^.ڜ"A&տTuwCKKWA=-=GDl" fǧHC>8:Loj |n!XXBMOaZ;| kN}wbg a nGQsm'G>-rqo}᪇{ʲPҬC ?Y$ط|MEє| UAaiE_LI\4,D[-mS"$i!r8j!jLoXb5)08C_n%qy_Ί7GϢ\` -"H$8=4awg8S@%a憈S&Yt5;_` Oq*ͭc8z›ʃTH4;mV$!o\4&ж)P^>wNX&! Z渦.=_ U]ݭz~u T12L'>R\ғu<CS=80p\C`s}=0QGۋWL=iIJ^ 1x\TT9'tT΃. v#)L͟!x<$&C)BrpVjeUDƁnLbb&j}5HTEg*_RSNŴG)-6ctEeޡ*O.t-& ֯PRP r䐃~ʼ4P\ Ab=]3~/k)2&z">=uϤ/d˘Fkv۫'-JlsЉ=7h984Nk5oVw)5>;6548({fZ'Z[Į8Ac3P4D25N0Iz>-vwneWe}iAI7|W@YK-QVK<(~_[J~vi5QGjeh -^XhZg s|L:vRG/,7RjJ-%[k2qeU1 t%~֨OLI9&KAerZ㸪5'o&⃰'\-8?xqkI\#ip9?,?nGObV@Csq:?> WݛyFNa8&/vHP\0J۴1ejBL7VV<~(z_(6gA+ DeXuUJ?ق3J/e6|7096zg\Sct3XaxV,@ |NjTcDa|˚pgJFѩA.{cջ|#e碈 4"PPb() y戾C-sK F+iWׁLnl$ad୥Ҍ9,9 sJWA`Ǡ}Lv4{w$J:$̃ȈOJCWu?4-\@4)>EWdRe}а5ˁiobH}/P+>5n v8ӗTs??_:d(UPQ:0F[/G (,_jiCNWh=cJ+z_^?\ ȳ ̥I1|ZT{en |[c˚;*2*;(uQF H~u(P2e*cp #櫋.{f1@Lg%zW"d&S##Zx;DJws1fh[D$udn bf8pnmUiĠer#Mۓ:>6yKǬ WW ,M5AL/!юRi/#K8 ˋաmUt?ζv*U[;7wL:vwi22r@owc&<m!Kwg"Q' ~ :C~ ,9nF3FpnNfn|-5m,Ļz`j[:^z :\ K/3:LN^P[t1~C&y9Bz*}-GCXŧ_F .j`q.̬ܻ@2įp<]OO {Ub5ʻ6R-]'dQB!e9Δ*UJ!,> tCz I!PŴjKaۓ\eH=^JvNdF9A"J#݋Wym'&!^eKd@u^ T\:~f#NhC= V_+TMPR;|Ph+-—;[Z{4 ya#9|pyfcgZ["pv!)5aj7sP~Oqy+ J{lۑh@JGx0X4v sO(Db ?K[poV>MaǛl1a♤F͔iQ߼33;ŏ5JY1 A$~Co)d3V S{Kll$F4<}U]gaR\)YAkulPp:T@`؂e/q@UT'={ Z."[]-$yJKKs*X .Rf^qo7)xw>ApWq#Nt͛#ݫPhy0pċzqVOcHX!8_eZ_K iҒ步&*8)ܔsYםe22d>Y΋lZ09)坺+,M/=Ucl2W~&GY̐Y?R&A A2Co#Dw[i[EPt;K)*|ꭈ:Q_o =E?r$ݹBVҰ2%UgSݵ@_eF&:!#$1iϸxւ`H9| !,-n7%lمڞ4V/ L/шL;1ܨM aQ1=\=}Qnm-qF!Ϸd:ęܦp =RD;!*N8[By5P04 fIlz,R} ;^¯p8DJ~J qwJBv&yź@8Ӕ/3MW!:9߄ n"lj_V?WvУ`hѡX8q|,ϗDB:O&-~dԆg^0z8w 1W =4+ҽ+ '4X ύcjse%s2* ciF@ҚJ@-(#-KoZܻh"e> ԿϨhWBc{VQ̝ d\YjCL0f!vX}ګNc's&A1;w|y$/G\rX-=OR|OX K6qOkɯ?s-9kTi-7qn`18r[}/C]%YUZᴂE]p/hM9}cSv2KK|dyyLZF[U-$ܖ$!)E<ޙ3dA:sQ|\Fnd}n:ۀ#ZI+IF.nК-{ҳCO+mwBQ%xSrZQy=%f?%Q8ɐl14h>A 90Dxc[9B+J& QjzV|)}%owb`wcZ=Z*ztIޱ9kgyvr @B6q:eƆR?`q7$Q;Ps؍syG&*DKCՒ!wni0b\B'wo{lsSH9^ dіtw|e7Cee&AClrw;cWv%(d: 1n͈=V}eD2uV.&nEyPzs9S$% 3u=hI|=Mga. ?g6^^6;v6շFͶ;w\GTO ]W2w6D/}`srAYuײ> #30!p>i.a vbqK3fBk|{Ww6 mr_˰tWmwBD4,ZH:ưՍ-,CSaFWV)b4! i51|ӽمQ=֤㋓/bHgg{Rb`UGbD!t},yxiDr#}m/ JEڑ75Fva!HuRj qU"$POAf^rpspDM3!N$t7?N6I">)/,.`VL;` c֌`.aߞOm}$‹S% HA)Cp|,0u[M٨NUgkhGl#VuaQ1DOS&1ֳܲߓ.TMR,26u ғrmЧ>mC(LMlRB0]3+V9ߨŸE&מq<#$@#Da6+SMSaY_\,fζapPK=U[DJ %XW_OȀ&+2m=B^j 4.Hۑf/.5Zvn6J~aP2~!$Ө3l+V8[ýB3js|cu\6c,P>e&bxV u1=MyBo||OoTN0dQة߆Ն\C+icbcJ-U/}VL eZZ%Qf-}9xNi"6 ݔjPN1emT|v˺ B8j25@7fFuo!\%1D6$DiCX-S 3ˤ̹e_Qg2SޘUQ`,HXBFH>pTV0ja~ᙐ> ^Cy&VkdIgz`ALbb(T\=":U͚<@ma[ SJmh8cG:_ ٱԬQPcK`PY3!ОNBV+[%wI[5Czғ"ǡ+gʒ(HJ{JʪSBKP}`GtdLn b;;>Cێ3YɈiQj| /CVL| 4 DQC8V`DSݿ>5!˱OU@zUQ7K;P Sjpڋ<#.}!ni5˰\)xgب8uG ̊qa0)v {#pN#.LK< >һ q1Ẁ-'^Kc߮ r'  !Q܂vS3b}d?aUUGlVZ炵 JcF ٳ*YbŎa:n&f}_+\F/RMf9 @+3\:ߐ1jM/|8C!yXKvaUx[#E6LeǪ:0|6k{?5e9K* ^|5dKDm!ۘ]8zVlh-¤\7c kTୂdFiJ zA4s(b{׶'8"==ǡqK cCnnW Jes̕?;8X^PLZmDcCߩQ3v/M ziBɱsIjM iST&4+hMSuᜧhlIͪ6_(\ P&byx4 {V҂ )c{LH:Ќ69|_+-ΐ $vuYLox >i$U{ťT)U כ#c$S{Xb6|a /ynz53/Z-eݖǑ?ƮR!KeE} ~9}jSc%B63*xY95Dc9[1z$:I'|֠2) ib3P̔Ͳ} yZ_ àr:LNV!]Ïos 穨SأTpS_P6ȎșTKfZHmd-foBܙ>Z̜?Ƨn|=d̔ <-55{+5tM!Y3X׸uXIz<"W |_g ;ut)e@g\t/dK`qðZq:H%> $·@z t6x?Tb=kuY‚[UFӘl01C՟Hʳ5F,&af){Rk}.ŕ@8G5,1} @q7J#[< v U6x[!wgܩI"Fr@TQqd ><ï DKbv[R$]+Vl K[&1c7|["'PQ`5ڻ2?=<Þq2oi F/6!SN2ʉgf4gv֜%Pwp)V F .Yd3ݲFC։N; Mu$ڷ0ױй-~a_33)Ubd-- yQk|U,N܏ bi6. s`?s$]kx$$xڗg ' T2S<|  !g_jjdXvQ{~op/:/ yiT>vɖŒ~d>}UI6H!HKsaU]$.KWm-Gec'G~hSfSJV2Λ ;v!DWDj T`AZl4"z p;+b7kw mԡ(Qo3|6R **tP^8i~gm,>of԰ قzUsm S[`Mk'DggC8[AoBQ6rMMwu8#[@:d0U$*X巧lпάѼ1D*3u*J{=x:\Uʳd^ VO*eLj?!"ì>&/jIk-A Bx}VB|E˷fʋ}g >4 lÁqoNr*{HdƭL{>p9}W,oͨҦu˦H(TZsyqүn4A: _+W+@Vl̊n1y 0C`cڈGskۋp1NeHGڔ't̃/lcxF؅EЗ;5(`'cM7H8q2ɀE_nrA-# : ~uS֋mQ2>[ʵ'{=RjJiR K(|EPkp]cDB\ݶ;əN z `dUmeb TÄi=C#bᢣňX"Q>zT!ΓxL+.lx/^s/ZŹE\xe:Y{љ!dyi,]^u $~{qEVpƕu!["/ s>AyU v hy*@o+C֔gޠ+A UpgJ0T!J))۶Rq:Gtvq~6p/h^Ip74zmڙ=ѳEIye7=Ɵ ;bI'k*>IZwҷY cp3A8{e v5`ΐ [{oΏWnM>^=LsQ۶o2}n(Ɩ[.>0.x7^Via]y-U,X{6P5Ayы{&,.m&zSV+N 4kނ MVSr_O<`nmu(ߤrM۳\ [OI7Ngzk_j0V8ſaMa8M G*$pWWOK5Oh1SNqoPP(D5*ܸ/D2Fi**/б4|'WEDZ)l2BsTc8F(5Wș6Qaȕ "vWh3]H[RǝA[xg25ObERb'QZ*/1qq8G@V;[*3!q) Fm,Zy?9var"xj b:9fU ԰_CI#:"Pg*ƭ7x6ސߧ&QOt=UHpHZ$7}wpR:{+sb#Ԍf#pq$_(LnL oP4iEЀ_O:5UN7KXZW ab!׉дgp\=.WCڦ}E]T!3'|G+nѠX0P4%DRij$fJ̃hOiC#@,76(䡀nm:/>7|9*Q79.IÓsyݪCÁ3DKQ,.A*≰cդX9~$f})BmaG3%Rst VӴK17qbYSb H,?T1OAG`>R$ܥnLFʀ5&W0|] 967n|kkCA*;֫w ) Q} o”1`Lf .7Z 2W f: ɛ >谿JYD`Ynf6Hpws5>sRU(SWOjf֥-7½\L yT-ܝLhRͱIA 0MBD<(q]AZ:4}n(n!Ce)A QÄG6M;#EeL_"k4h?4k1M#@ا>7˒Y8 zM|I}^fgf<0{Mv0'HQ{2A#=M@K{&wL?* ~儊;gC}+\=JUՊ=]@jJ6"y~(ҧXp$!iMo:X2/׊R?71OwF,o J~R1.~}P/ `[6􏖋F*zMbJ?Br[Fj8rW]e=āz)D,CJ:C@3nX[n3WΟDzcP(?ZԊ=b[540V!X8C =#H$tI)̬h)NJY.zrV`H/NFE#S*+HRB-#'7_~)|cook1na1xtJK'@OGTV/݆#˛5F^$1쏎"oVt'ty+$ :Q i8#4׌ΐ}>@d0 pOhB0A ^4j_U>n6"Mw{v4XHw_)}mxxz0u){QAB Ě |GQqBZӲ+iwyգجqBm+U?]"AfB9"p3X[~BoTP c "(N&3iخ5z4hn4(l0+q/_<3 ɖ4x[J~y4'Ue " &?xem'E&qbu2j9p%jNLE=?*A)s Fk8+љW[#Ӷ/OObm*:}Hх4pA~z -=s&@̫Epj`OkVi$FLB]%DT>rg/3ze2uVjb+ ػWCr#$8`(oWb"7 5,(Yj!݃n ؓ*,Z_t ρƒҠ6뛤GF,R@ Sxwaq>qc5m4 4$Pr3RĠ35fF0g@D5l9@l"yL,h:jӲ;sـ8/ԁnbT_anKTom xj,8Nt1E'1:s<'/ {WatskYfq]͡+tb5 4rg~{Zm+SzM(p(lDSu >} VismOp-jI$'՗ C'_^8 B"- ͥ(Ld*`&}yw39H3Vیk[5aGA"YS]3{roM縬vb| zR -9y& oL'ЭK@bdW,ĺ2t3z-ZM|W9SZKl,PReA;t?{"ЬہִQDf^V|5Ku~ÆVwWV<Ȼh5V 2"hV0~&T(X+i F? g]~I!qZ<Н.% M [;E 8Sj/Bo3Su֖u@)U=G44`õ/LZGa;W;ϼ3xKቋC:H2-]ͯݏĦ&x{c++WE?z|`^a i jCޕjPi9o谡twXƝ_xys(o'dMjAwƄYi^;T"tœ,j>r}'D!`u%[&F5 5(VlyΰJӕ3ߚ1x?Ko9(ןU?|Չut3ICow~iğGޠ|%=E7dΤ)ve#>m0v";/tlNLQ{x)Ӫ$eЋ˕̏AmwX/g(BX=*  gZEyz^S~1 cƁDwCs@Y 5W uN'*1R 9 -:Bhۗ N(ۦ=/=]I̚~7m=~1=ErADJʅ'RlUF.1TP$ΫUF:c8DX{Y ۶>sMʽIrc7P(qz@Hu=CW?qp?׎9Xg[$*#FCaDӡ1\HJ'QᏮ!2G盘ͦm)ڹW'Tc,s.jZڵ%#k w.Lbь˴0[ (!Z) ̹hȖXBYg[MXlk2qu3Bdq<.bmGdl N<R%s.-To yCeLoJa>|=lp4WaD/AH2fjzib)!uڦIPh6Gp_ܹ <4*XYQh^w+k+ȡJ6s•oL!$'hzi#zЬ{觎RmILImmIl^ZE6+gCS锐4ҧC,ғ3WaӊN՝ߓB}; UpvZkȣ}r=qk\:U} (ģҹ` |,ShnJoQE1)i=ȧ~yɑDiK"qW"UT!.!!]c,Nh apm^ƎxbEueuO ގhLaWYy)#_K7H Z <ؽKKJxDP 8&䠏 !p?-b4 YZ