php5-pgsql-5.5.14-91.2>t  DH`pZj@θ/=„Ng,Nd?8 ;B81GE.TiB$*e=@ [ ](!k9$ʫrd)sTe }`]Og$z)Q=ť@jVcx;p=yVB"$O16"`1!??alPONRo4B'a,gX]]^3i&JB$]u|QBh,W_=ki̸B?X"!4dbd25cdbb1c7b51f87554d142d212e765bc6992Zj@θ/=„-Gu%t.hn/Rm F\#ʬP[)1G-xi7\X4H/vQ97#Y HH o|KAզMCbzt )sp)ы;:qs-EҀ6%Hu_ع!]Hh izalbNBp]Ŕ!Gr^0i ]"}46L=ikI֥63H6.2Vkgvb]ٌ X>T>=?d   /+4= Vp    D HXl, \ j (89:fBFGH(I8X<Y\Z[\]^bcd3e8f=l?uTvdwxy zCphp5-pgsql5.5.1491.2PHP5 Extension ModulePHP functions for access to PostgreSQL database servers. It includes both traditional pgsql and pdo_pgsql drivers. Authors: -------- The PHP Group See http://www.php.net/credits.php for more detailsZj?cloud112openSUSE Leap 42.3openSUSEPHP-3.01http://bugs.opensuse.orgDevelopment/Libraries/PHPhttp://www.php.netlinuxx86_64UM؁Zj?Zj?Zj?Zj?984950362b0d8cf03480127e831dea722c4d8cd1ad3076ed43fa1f8bedaa2f82b5c11a1821afdf77478f990778d02c5daf791e0563440f4f65ef538dbab1e2aarootrootrootrootrootrootrootrootphp5-5.5.14-91.2.src.rpmconfig(php5-pgsql)pdo_pgsql.so()(64bit)pgsql.so()(64bit)php-pgsqlphp5-pdo_pgsqlphp5-pgsqlphp5-pgsql(x86-64)php_any_db@@@@@@   config(php5-pgsql)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libpq.so.5()(64bit)php5php5-pdorpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)5.5.14-91.25.5.145.5.143.0.4-14.0-14.4.6-14.11.2Ze@Z@ZY@@YYm@YI@Y, @XX9@X•@X*X|XQ4@X!@XXWv@W^@W@WWq@WM|WDB@WS&RRR@R1@R@RSRRG@RG@RG@RG@RG@RG@RG@RG@R@RpRZ@RB@R(r@RZ@QMQ@Q@QKQ@Q@Qzl@Qzl@Qu&@QnQkQkQ^QJ@QJ@Q+R@Q@P@P}L@PvP;a@P;a@PO@Ot@OX@OLO-O*zO#@O@ObO yO@N@NxN2NN@N@Nu@NdNbNZ-NS@NENA!@N>~@N;@N98@N6@N5CN/N*N@NNN@NpN@M@MM@M@M@MM5@M5@MWMnM@M@M@M@MMx@MM@MwkMgMc@MS@M.@M*M*M)@M%M PM\@M\@M L@L@L@LLY@LXLEL@KQ@K@K@KKK@KRKKK0KVJ1@JG@J#JJ/@J@J@JJQJ@J_@J;}JB@I@pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comsflees@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comabergmann@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.czpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comschwab@linux-m68k.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comadaugherity@tamu.edupgajdos@suse.compgajdos@suse.comhrvoje.senjan@gmail.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comRalf Lang pgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.comjengelh@inai.depgajdos@suse.compgajdos@suse.comadaugherity@tamu.eduadaugherity@tamu.edupgajdos@suse.comslavb18@gmail.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.organdrea.turrini@gmail.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orglang@b1-systems.decrrodriguez@opensuse.orgsbutler1@illinois.educrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgchris@computersalat.depgajdos@suse.czchris@computersalat.depgajdos@suse.czcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgro@suse.decristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdimstar@opensuse.orgvuntz@opensuse.orgaj@suse.dejengelh@medozas.decoolo@novell.comcrrodriguez@opensuse.orgcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@novell.comcrrodriguez@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decoolo@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.de- security update: * CVE-2018-5712 [bsc#1076220] + php-CVE-2018-5712.patch * CVE-2018-5711 [bsc#1076391] + php-CVE-2018-5711.patch- security update: * CVE-2017-9228 [bsc#1069606] + php-CVE-2017-9228.patch * CVE-2017-9229 [bsc#1069631] + php-CVE-2017-9229.patch- security update: * CVE-2017-16642 [bsc#1067441] + php-CVE-2017-16642.patch * CVE-2017-4025 [bsc#1067090] + php-CVE-2017-4025.patch- security update: * CVE-2017-12933 [bsc#1054430] + php-CVE-2017-12933.patch- security update: * CVE-2017-11628 [bsc#1050726] + php-CVE-2017-11628.patch * CVE-2017-7890 [bsc#1050241] + php-CVE-2017-7890.patch * complete fix for CVE-2016-5766 [bsc#986386c#23] . amended php-CVE-2016-5766.patch . refreshed php-CVE-2016-10168.patch- security update: * CVE-2017-11143 [bsc#1048097] + php-CVE-2017-11143.patch * CVE-2017-11145 [bsc#1048112] + php-CVE-2017-11145.patch * CVE-2017-11146 [bsc#1048111] + php-CVE-2017-11146.patch * CVE-2016-10397 [bsc#1047454] + php-CVE-2016-10397.patch * CVE-2017-11147 [bsc#1048094] + php-CVE-2017-11147.patch * CVE-2017-11144 [bsc#1048096] + php-CVE-2017-11144.patch- fix for CVE-2017-7272 was reverted [bsc#1044976]- security update: * CVE-2017-9227 [bsc#1040883] + php-CVE-2017-9227.patch * CVE-2017-9226 [bsc#1040889] + php-CVE-2017-9226.patch * CVE-2017-9224 [bsc#1040891] + php-CVE-2017-9224.patch- security update: * CVE-2016-6294 [bsc#1035111] + php-CVE-2016-6294.patch- security update: * CVE-2017-7272 [bsc#1031246] + php-CVE-2017-7272.patch- security update: * CVE-2015-8994 [bsc#1027210] + php-CVE-2015-8994.patch- security update: * CVE-2016-10161 [bsc#1022260] + php-CVE-2016-10161.patch * CVE-2016-10158 [bsc#1022219] + php-CVE-2016-10158.patch * CVE-2016-10167 [bsc#1022264] + php-CVE-2016-10167.patch * CVE-2016-10168 [bsc#1022265] + php-CVE-2016-10168.patch * CVE-2016-10166 [bsc#1022263] + php-CVE-2016-10166.patch * CVE-2016-10159 [bsc#1022255] + php-CVE-2016-10159.patch * CVE-2016-10160 [bsc#1022257] + php-CVE-2016-10160.patch- security update: * CVE-2016-7478 [bsc#1019550] + php-CVE-2016-7478.patch- security update: * CVE-2016-9933 [bsc#1015187] + php-CVE-2016-9933.patch * CVE-2016-9934 [bsc#1015188] + php-CVE-2016-9934.patch * CVE-2016-9935 [bsc#1015189] + php-CVE-2016-9935.patch- security update: * CVE-2016-9137 [bsc#1008029] + php-CVE-2016-9137.patch- security update: * CVE-2016-8670 [bsc#1004924] + php-CVE-2016-8670.patch * CVE-2016-6911 [bsc#1005274] + php-CVE-2016-6911.patch- security update: * CVE-2016-7568 [bsc#1001900] + php-CVE-2016-7568.patch- security update: * CVE-2016-7412 [bsc#999680] + php-CVE-2016-7412.patch * CVE-2016-7411 [bsc#999682] + php-CVE-2016-7411.patch * CVE-2016-7417 [bsc#999684] + php-CVE-2016-7417.patch * CVE-2016-7413 [bsc#999679] + php-CVE-2016-7413.patch * CVE-2016-7418 [bsc#999819] + php-CVE-2016-7418.patch * CVE-2016-7414 [bsc#999820] + php-CVE-2016-7414.patch * CVE-2016-7416 [bsc#999685] + php-CVE-2016-7416.patch- security update: * CVE-2016-7132 [bsc#997230], CVE-2016-7131 [bsc#997225] + php-CVE-2016-7131,7132.patch * CVE-2016-7129 [bsc#997220] + php-CVE-2016-7129.patch * CVE-2016-7130 [bsc#997257] + php-CVE-2016-7130.patch * CVE-2016-7134 [bsc#997248] + php-CVE-2016-7134.patch * CVE-2016-7128 [bsc#997211] + php-CVE-2016-7128.patch * CVE-2016-7127 [bsc#997210] + php-CVE-2016-7127.patch * CVE-2016-7126 [bsc#997208] + php-CVE-2016-7126.patch * CVE-2016-7125 [bsc#997207] + php-CVE-2016-7125.patch * CVE-2016-7124 [bsc#997206] + php-CVE-2016-7124.patch- security update: * CVE-2014-3587 [bsc#987530] + php-CVE-2016-3587.patch * CVE-2016-6128 [bsc#987580] + php-CVE-2016-6128.patch * CVE-2016-6161 [bsc#988032] + php-CVE-2016-6161.patch * CVE-2016-6292 [bsc#991422] + php-CVE-2016-6292.patch * CVE-2016-6295 [bsc#991424] + php-CVE-2016-6295.patch * CVE-2016-6297 [bsc#991426] + php-CVE-2016-6297.patch * CVE-2016-6291 [bsc#991427] + php-CVE-2016-6291.patch * CVE-2016-6289 [bsc#991428] + php-CVE-2016-6289.patch * CVE-2016-6290 [bsc#991429] + php-CVE-2016-6290.patch * CVE-2016-5399 [bsc#991430] + php-CVE-2016-5399.patch * CVE-2016-6288 [bsc#991433] + php-CVE-2016-6288.patch * CVE-2016-6296 [bsc#991437] + php-CVE-2016-6296.patch * CVE-2016-6207 [bsc#991434] + php-CVE-2016-6207.patch- security update: * CVE-2016-5385 [bsc#988486] + php-CVE-2016-5385.patch- security update: * CVE-2016-5768 [bsc#986246] + php-CVE-2016-5768.patch * CVE-2016-5772 [bsc#986244] + php-CVE-2016-5772.patch * CVE-2015-8935 [bsc#986004] + php-CVE-2015-8935.patch * CVE-2016-5770 [bsc#986392] + php-CVE-2016-5770.patch * CVE-2016-5771 [bsc#986391] + php-CVE-2016-5771.patch * CVE-2016-5769 [bsc#986388] + php-CVE-2016-5769.patch * CVE-2016-5766 [bsc#986386] + php-CVE-2016-5766.patch * CVE-2016-5767 [bsc#986393] + php-CVE-2016-5767.patch * CVE-2016-5773 [bsc#986247] + php-CVE-2016-5773.patch- security update: * CVE-2013-7456 [bsc#982009] + php-CVE-2013-7456.patch * CVE-2016-5093 [bsc#982010] + php-CVE-2016-5093.patch * CVE-2016-5094, CVE-2016-5095 [bsc#982011] [bsc#982012] + php-CVE-2016-5094,5095.patch * CVE-2016-5096 [bsc#982013] + php-CVE-2016-5096.patch- security update: * CVE-2015-8877 [bsc#981061] + php-CVE-2015-8877.patch * CVE-2015-8876 [bsc#981049] + php-CVE-2015-8876.patc * CVE-2015-8879 [bsc#981050] + php-CVE-2015-8879.patch- security update: * CVE-2015-4116 [bsc#980366] + php-CVE-2015-4116.patch * CVE-2015-8874 [bsc#980375] + php-CVE-2015-8874.patch * CVE-2015-8873 [bsc#980373] + php-CVE-2015-8873.patch- security update: * CVE-2016-4540, CVE-2016-4541 [bsc#978829] + php-CVE-2016-4540,4541.patch * CVE-2016-4542, CVE-2016-4543, CVE-2016-4544 [bsc#978830] + php-CVE-2016-4542,4543,4544.patch * CVE-2016-4537, CVE-2016-4538 [bsc#978827] + php-CVE-2016-4537,4538.patch * CVE-2016-4539 [bsc#978828] + php-CVE-2016-4539.patch- security update: * CVE-2016-4342 [bsc#977991] + php-CVE-2016-4342.patch * CVE-2016-4346 [bsc#977994] + php-CVE-2016-4346.patch * CVE-2016-4346 [bsc#977994] + php-CVE-2016-4346.patch- security update: * CVE-2016-4073 [bsc#977003] + php-CVE-2016-4073.patch * CVE-2015-8867 [bsc#977005] + php-CVE-2015-8867.patch * CVE-2016-4070 [bsc#976997] + php-CVE-2016-4070.patch * CVE-2015-8866 [bsc#976996] + php-CVE-2015-8866.patch * CVE-2016-4071 [bsc#977000] + php-CVE-2016-4071.patch- fix incomplete php-CVE-2015-8835.patch [bsc#973351#c14]- fixed libmagic buffer overflow [bsc#974305] + php-libmagic-boverflow-malformed-magic-file.patch- security update: * CVE-2015-8838 [bsc#973792] + php-CVE-2015-8838.patch- security update: * CVE-2015-8835 [bsc#973351] + php-CVE-2015-8835.patch- security update: * CVE-2016-3141 [bsc#969821] + php-CVE-2016-3141.patch * CVE-2016-3142 [bsc#971912] + php-CVE-2016-3142.patch * CVE-2014-9767 [bsc#971612] + php-CVE-2014-9767.patch * CVE-2016-3185 [bsc#971611] + php-CVE-2016-3185.patch- security update: * CVE-2016-2554 [bsc#968284]- security update: * CVE-2015-7803 [bsc#949961] + php-CVE-2015-7803.patch * CVE-2016-1903 [bsc#962057] + php-CVE-2016-1903.patch- revert upstream change in suhosin.ini -- suhosin extension is loaded by default [bnc#949134] + php-suhosin.ini.patch- security update: * CVE-2015-6831 [bnc#942291] [bnc#942294] [bnc#942295] + php-CVE-2015-6831.patch * CVE-2015-6832 [bnc#942293] + php-CVE-2015-6832.patch * CVE-2015-6833 [bnc#942296] + php-CVE-2015-6833.patch * CVE-2015-6834 [bnc#945403] + php-CVE-2015-6834.patch * CVE-2015-6835 [bnc#945402] + php-CVE-2015-6835.patch * CVE-2015-6836 [bnc#945428] + php-CVE-2015-6836.patch * CVE-2015-6837 CVE-2015-6838 [bnc#945412] + php-CVE-2015-6837,6838.patch - compare with SQL_NULL_DATA correctly [bnc#935074] + php-odbc-cmp-int-cast.patch- added php5-fix_net-snmp_disable_MD5.patch: If MD5 was disabled in net-snmp we have to disable the used MD5 function in ext/snmp/snmp.c as well. (bsc#944302)- updated suhosin to 0.9.38 [fate#319325] * removed php5-suhosin-php55.patch- security update: * CVE-2015-5590 [bnc#938719] + php-CVE-2015-5590.patch * CVE-2015-5589 [bnc#938721] + php-CVE-2015-5589.patch- security update: * CVE-2015-4602 [bnc#935224] + php-CVE-2015-4602.patch * CVE-2015-4599, CVE-2015-4600, CVE-2015-4601 [bnc#935226] + php-CVE-2015-4599,4600,4601.patch * CVE-2015-4603 [bnc#935234] + php-CVE-2015-4603.patch * CVE-2015-4644 [bnc#935274] + php-CVE-2015-4644.patch * CVE-2015-4643 [bnc#935275] + php-CVE-2015-4643.patch * CVE-2015-3411, CVE-2015-3412, CVE-2015-4598 [bnc#935277], [bnc#935232], [bnc#935234] + php-CVE-2015-3411,3412,4598.patch- configure php-fpm with --localstatedir=/var [bnc#927147]- security update: * CVE-2015-4148 [bnc#933227]- fix timezone map [bnc#919080]- security update: * CVE-2015-4024 [bnc#931421] + php-CVE-2015-4024.patch * CVE-2015-4026 [bnc#931776] + php-CVE-2015-4026.patch * CVE-2015-4022 [bnc#931772] + php-CVE-2015-4022.patch * CVE-2015-4021 [bnc#931769] + php-CVE-2015-4021.patch- security update: * CVE-2015-3330 [bnc#928408] + php-CVE-2015-3330.patch * CVE-2015-3329 [bnc#928506] + php-CVE-2015-3329.patch * CVE-2015-2783 [bnc#928511] + php-CVE-2015-2783.patch- security update: * CVE-2015-2787 [bnc#924972] + php-CVE-2015-2787.patch * unserialize SoapClient type confusion [bnc#925109] + php-unserialize-soap-type-confusion.patch * CVE-2015-2348 [bnc#924970] + php-CVE-2015-2348.patch- security update: * CVE-2014-9709 [bnc#923946] + php-CVE-2014-9709.patch * CVE-2015-2301 [bnc#922022] + php-CVE-2015-2301.patch * CVE-2015-2305 [bnc#922452] + php-CVE-2015-2305.patch * CVE-2014-9705 [bnc#922451] + php-CVE-2014-9705.patch- security update: * CVE-2015-0273 [bnc#918768] + php-CVE-2015-0273.patch * CVE-2014-9652 [bnc#917150] + php-CVE-2014-9652.patch- security update: * CVE-2014-8142 [bnc#910659] + php-CVE-2014-8142.patch * CVE-2015-0231 [bnc#910659] + php-CVE-2015-0231.patch * null ptr deref [bnc#910659] + php-unserialize-null-ptr-deref.patch * CVE-2014-9427 [bnc#911664] + php-CVE-2014-9427.patch * CVE-2015-0232 [bnc#914690] + php-CVE-2015-0232.patch - added added README.default_socket_timeout [bnc#907519]- security update: * CVE-2014-3670 [bnc#902357] * CVE-2014-3669 [bnc#902360] * CVE-2014-3668 [bnc#902368] - added patches: * php-CVE-2014-3670.patch * php-CVE-2014-3669.patch * php-CVE-2014-3668.patch- security update: * CVE-2014-5459 [bnc#893849] * CVE-2014-3597 [bnc#893853] * CVE-2014-5120 [bnc#893855] - added patches: * php-CVE-2014-3597.patch * php-CVE-2014-5120.patch- fixed crash when throwing and handling an exception in one finally block [bnc#868098] - that breaks Zend ABI 20121212 - added patches: * php5-finally-exception-crash.patch- security update: * php-CVE-2014-4670.patch [bnc#886059] * php-CVE-2014-4698.patch [bnc#886060] - php-5.5.10-CVE-2014-2497.patch renamed to php-CVE-2014-2497.patch i- updated to 5.5.14: This release fixes several bugs against PHP 5.5.13. Also, this release fixes a total of 8 CVEs, half of them concerning the FileInfo extension. - removed CVE-2014-4049.patch (upstreamed)- security update * php-5.5.13-CVE-2014-4049.patch [bnc#882992]- php5-5.5.10-CVE-2014-2497.patch renamed to php-5.5.10-CVE-2014-2497.patch to be consistent with other product php patches names- do not package latest_test_results.txt; instead, run build-test.sh twice: before and after source changes- updated to 5.5.13: This release fixes several bugs in PHP 5.5.12, and addresses two CVEs in Fileinfo (CVE-2014-0238 and CVE-2014-0237).- updated to 5.5.12: Fixed several bugs against PHP 5.5.11, as well as CVE-2014-0185 regarding PHP-FPM. - improved build-test.sh- build-test.sh: use relevant api for build; propagate build parameters to osc- php5-gcc_builtins.patch: remove unused patch- add build-test.sh and latest_test_results.txt for testing regressions in tests before and after update. Run sh build-test.sh after changes. php will get built and test results will be compared with latest_test_results.txt and differences reported. mv latest_test_results.txt.new latest_test_results.txt if differences are acceptable.- updated to 5.5.11: * Several bugs were fixed in this release, some bundled libraries updated and a security issue has been fixed : CVE-2013-7345.- fixed CVE-2014-2497 [bnc#868624]- updated to 5.5.10: * Several bugs were fixed in this release, including security issues related to CVEs. CVE-2014-1943, CVE-2014-2270 and CVE-2013-7327 have been addressed in this release.- Fix build on non-systemd distros (esp. SLES 11)- updated to 5.5.9: * This release fixes several bugs against PHP 5.5.8. * see NEWS or http://www.php.net/ChangeLog-5.php#5.5.9 for details - modified patches: * php5-no-build-date.patch (refreshed using quilt)- updated to 5.5.8: * fixes CVE-2013-6712 and build against freetype2 * see http://www.php.net/ChangeLog-5.php#5.5.8 for more * removed CVE-2013-6712.patch * removed freetype2_include_dir.patch- Added php5-freetype2_include_dir.patch: Fixes check of freetype2 headers, as freetype2 2.5.1 changed the header location- updated to 5.5.7: * fixes some bugs against PHP 5.5.6 and it also includes a fix for CVE-2013-6420 in OpenSSL extension - > removed CVE-2013-6420.patch- security update [bnc#854880] * added CVE-2013-6420.patch- security update [bnc#853045] * added CVE-2013-6712.patch- updated to 5.5.6: * fixes some bugs against PHP 5.5.5, and adds some performance improvements. * see http://www.php.net/ChangeLog-5.php#5.5.6 for details- updated to 5.5.5: * This release fixes about twenty bugs against PHP 5.5.4, some of them regarding the build system. * added sys_temp_dir ini directive - removed custom-tmp-dir.patch (upstreamed)- updated to 5.5.4: * This release fixes several bugs against PHP 5.5.3. - crypt-tests.patch partially upstreamed - use zend_extension instead of extension directive in opcache.ini [bnc#840350]- updated to 5.5.3: These release fix a bug in the patch for CVE-2013-4248 in OpenSSL module and compile failure with ZTS enabled in PHP 5.4.- updated to 5.5.2: * About 20 bugs were fixed, including security issue in OpenSSL module (CVE-2013-4248) and session fixation problem (CVE-2011-4718).- updated to 5.5.1 * bugfixes incl. security fix in the XML parser- replace php5-64-bit-post-large-files.patch with php5-big-file-upload.patch patch that uses def_t instead of signed long as suggested by upstream- updated to 5.5.0: * Added generators and coroutines. * Added the finally keyword. * Added a simplified password hashing API. * Added support for constant array/string dereferencing. * Added scalar class name resolution via ::class. * Added support for using empty() on the result of function calls and other expressions. * Added support for non-scalar Iterator keys in foreach. * Added support for list() constructs in foreach statements. * Added the Zend OPcache extension for opcode caching. * A lot more improvements and fixes. * PHP logo GUIDs have been removed. * Case insensitivity is no longer locale specific. All case insensitive matching for function, class and constant names is now performed in a locale independent manner according to ASCII rules. - buildrequire cyrus-sasl-devel explicitely - suhosin-php54.patch renamed to suhosin-php55.patch- update to 5.4.22: * About 10 bugs were fixed. * see http://www.php.net/ChangeLog-5.php#5.4.22 for details- updatedto 5.4.21: * About 10 bugs were fixed. * added custom-tmp-dir.patch by Per Jessen- build with --with-fpm-systemd and install systemd unit - php5-systemd-unit.patch: tweak systemd unit for openSUSE requirements - php5-openssl.patch: only openSSL_config() is really needed. - Recommended for 13.1 and Factory- updated to 5.4.20: * About 30 bugs were fixed.- updated to 5.4.19: * These releases fix a bug in the patch for CVE-2013-4248 in OpenSSL module and compile failure with ZTS enabled in PHP 5.4.- updated to 5.4.18: * About 30 bugs were fixed, including security issues CVE-2013-4113 and CVE-2013-4248.- php5-per-mod-log.patch: It turns out that requesting per-module logging support in 2.4 will not do a thing if the expansion of APLOG_USE_MODULE is not visible to all files of the module so place it in the header instead.- php5-per-mod-log.patch Support apache 2.4 per module logging - php5-apache24-updates.patch Use proper API in apache 2.4 to determine when the module has to be loaded. I made this patches at least a year ago, but for some reason they went out of my radar and were not applied to upstream Will be submitted again soon.- updated to 5.4.17: Core: Fixed bug #64988 (Class loading order affects E_STRICT warning). Fixed bug #64966 (segfault in zend_do_fcall_common_helper_SPEC). Fixed bug #64960 (Segfault in gc_zval_possible_root). Fixed bug #64936 (doc comments picked up from previous scanner run). Fixed bug #64934 (Apache2 TS crash with get_browser()). Fixed bug #64166 (quoted-printable-encode stream filter incorrectly discarding whitespace). DateTime: Fixed bug #53437 (Crash when using unserialized DatePeriod instance). FPM: Fixed bug #64915 (error_log ignored when daemonize=0). Implemented FR #64764 (add support for FPM init.d script). PDO: Fixed bug #63176 (Segmentation fault when instantiate 2 persistent PDO to the same db server). PDO_DBlib: Fixed bug #63638 (Cannot connect to SQL Server 2008 with PDO dblib). Fixed bug #64338 (pdo_dblib can't connect to Azure SQL). Fixed bug #64808 (FreeTDS PDO getColumnMeta on a prepared but not executed statement crashes). PDO_firebird: Fixed bug #64037 (Firebird return wrong value for numeric field). Fixed bug #62024 (Cannot insert second row with null using parametrized query). PDO_mysql: Fixed bug #48724 (getColumnMeta() doesn't return native_type for BIT, TINYINT and YEAR). PDO_pgsql: Fixed bug #64949 (Buffer overflow in _pdo_pgsql_error). pgsql: Fixed bug #64609 (pg_convert enum type support). Readline: Implement FR #55694 (Expose additional readline variable to prevent default filename completion). SPL: Fixed bug #64997 (Segfault while using RecursiveIteratorIterator on 64-bits systems).- Explicitly specify cyrus-sasl build dependency- updated to 5.4.16 - Core: . Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE 2013-2110). (Stas) . Fixed bug #64853 (Use of no longer available ini directives causes crash on TS build). (Anatol) . Fixed bug #64729 (compilation failure on x32). (Gustavo) . Fixed bug #64720 (SegFault on zend_deactivate). (Dmitry) . Fixed bug #64660 (Segfault on memory exhaustion within function definition). (Stas, reported by Juha Kylmänen) - Calendar: . Fixed bug #64895 (Integer overflow in SndToJewish). (Remi) - Fileinfo: . Fixed bug #64830 (mimetype detection segfaults on mp3 file). (Anatol) - FPM: . Ignore QUERY_STRING when sent in SCRIPT_FILENAME. (Remi) . Fixed some possible memory or resource leaks and possible null dereference detected by code coverity scan. (Remi) . Log a warning when a syscall fails. (Remi) . Add --with-fpm-systemd option to report health to systemd, and systemd_interval option to configure this. The service can now use Type=notify in the systemd unit file. (Remi) - MySQLi . Fixed bug #64726 (Segfault when calling fetch_object on a use_result and DB pointer has closed). (Laruence) - Phar . Fixed bug #64214 (PHAR PHPTs intermittently crash when run on DFS, SMB or with non std tmp dir). (Pierre) - SNMP: . Fixed bug #64765 (Some IPv6 addresses get interpreted wrong). (Boris Lytochkin) . Fixed bug #64159 (Truncated snmpget). (Boris Lytochkin) - Streams: . Fixed bug #64770 (stream_select() fails with pipes returned by proc_open() on Windows x64). (Anatol) - Zend Engine: . Fixed bug #64821 (Custom Exceptions crash when internal properties overridden). (Anatol)- updated to 5.4.15: Core: Fixed bug #64578 (debug_backtrace in set_error_handler corrupts zend heap: segfault). Fixed bug #64458 (dns_get_record result with string of length -1). Fixed bug #64433 (follow_location parameter of context is ignored for most response codes). Fixed bug #47675 (fd leak on Solaris). Fixed bug #64577 (fd leak on Solaris). Fileinfo: Upgraded libmagic to 5.14. Streams: Fixed Windows x64 version of stream_socket_pair() and improved error handling. Zip: Fixed bug #64342 (ZipArchive::addFile() has to check for file existence).- Conflict with php53 packages so zypper doesn't suggest installing a mix of php53-* (from SLES 11) and php5-* (these 5.4 packages).- Fix build on SLES 11 (no firebird) and openSUSE <= 12.1 (no separate libfbclient2-devel pkg).- use current install-pear-nozlib.phar from http://pear.php.net/install-pear-nozlib.phar - php5-pear package provides/obsoletes php5-pear-Archive_Tar, see explanation in the spec- add php5-firebird providing php5-interbase and php5-pdo_firebird- updated to 5.4.14: Core: Fixed bug #64529 (Ran out of opcode space). Fixed bug #64515 (Memoryleak when using the same variablename two times in function declaration). Fixed bug #64432 (more empty delimiter warning in strX methods). Fixed bug #64417 (ArrayAccess::&offsetGet() in a trait causes fatal error). Fixed bug #64370 (microtime(true) less than $_SERVER['REQUEST_TIME_FLOAT']). Fixed bug #64239 (Debug backtrace changed behavior since 5.4.10 or 5.4.11). Fixed bug #63976 (Parent class incorrectly using child constant in class property). Fixed bug #63914 (zend_do_fcall_common_helper_SPEC does not handle exceptions properly). Fixed bug #62343 (Show class_alias In get_declared_classes()). PCRE: Merged PCRE 8.32. SNMP: Fixed bug #61981 (OO API, walk: $suffix_as_key is not working correctly). Zip: Fixed bug #64452 (Zip crash intermittently). (Anatol)- libc-client.so needs -lssl- fixed 'http limits uploads to 2GB' [bnc#812800], see https://bugs.php.net/bug.php?id=44522 * 64bit-post-large-files.patch- updated to 5.4.13: Core: Fixed bug #64235 (Insteadof not work for class method in 5.4.11). Implemented FR #64175 (Added HTTP codes as of RFC 6585). Fixed bug #64142 (dval to lval different behavior on ppc64). Fixed bug #64070 (Inheritance with Traits failed with error). CLI server: Fixed bug #64128 (buit-in web server is broken on ppc64). Mbstring: mb_split() can now handle empty matches like preg_split() does. OpenSSL: Fixed bug #61930 (openssl corrupts ssl key resource when using openssl_get_publickey()). PDO_mysql: Fixed bug #60840 (undefined symbol: mysqlnd_debug_std_no_trace_funcs). Phar: Fixed timestamp update on Phar contents modification. SOAP Added check that soap.wsdl_cache_dir conforms to open_basedir (CVE-2013-1635). Disabled external entities loading (CVE-2013-1643, CVE-2013-1824). SPL: Fixed bug #64264 (SPLFixedArray toArray problem). Fixed bug #64228 (RecursiveDirectoryIterator always assumes SKIP_DOTS). Fixed bug #64106 (Segfault on SplFixedArray[][x] = y when extended). Fixed bug #52861 (unset fails with ArrayObject and deep arrays). SNMP: Fixed bug #64124 (IPv6 malformed).- updated to 5.4.12: * dropped sqlite.so (no longer shipped with 5.4) * dropped t1lib support * dropped %{suse_version} 10.x support * see /usr/share/doc/packages/php5/UPGRADING or http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/UPGRADING for details * source changes: D php-5.2.9-BNC-457056.patch -- renamed to php5-BNC-457056.patch D php-5.3.0-bnc513080.patch -- there's no relevant code in exif.c D php-5.3.1-systzdata-v7.patch -- renamed to php5-systzdata-v7.patch D php-5.3.2-aconf26x.patch -- dropped, it is not needed yet D php-5.3.2-ini.patch -- renamed to php5-ini.patch D php-5.3.2-no-build-date.patch -- renamed to php5-no-build-date.patch D php-5.3.22.tar.bz2 -- old tarball D php-5.3.4-format-string-issues.patch -- renamed to php5-format-string-issues.patch D php-5.3.4-pts.patch -- renamed to php5-pts.patch D php-5.3.6-gcc_builtins.patch -- renamed to php5-gcc_builtins.patch D php-5.3.6-ini-date.timezone.patch -- part of php5-ini.patch D php-5.3.8-CVE-2011-4153.patch -- fixed in 5.4 branch D php-5.3.8-crypt-tests.patch -- renamed to php5-crypt-tests.patch D php-5.3.8-no-reentrant-crypt.patch -- renamed to php5-no-reentrant-crypt.patch A php-5.4.13.tar.bz2 -- new version tarball D php-cloexec.patch -- renamed to php5-cloexec.patch M php-suse-addons.tar.bz2 -- content of tar balls are actualy equal A php5-BNC-457056.patch -- renamed from php-5.2.9-BNC-457056.patch, not rebased A php5-cloexec.patch -- renamed from php-cloexec.patch, rebased A php5-sytzdata-v7.patch -- renamed from sytzdata-v7.pach, not rebased A php-format-string-issues.patch -- renamed from php5-5.3.4-format-string-issues.patch, not rebased A php5-crypt-tests.patch -- renamed from php-5.3.8-crypt-tests.patch, not rebased A php5-gcc_builtins.patch -- renamed from php-5.3.6-gcc_builtins.patch, not rebased A php5-ini.patch -- renamed from php-5.3.2-ini.patch, rebased A php5-mbstring-missing-return.patch -- new patch, missing return M php5-missing-extdeps.patch -- rebased A php5-no-build-date.patch -- renamed from php-5.3.2-no-build-date.patch, rebased A php5-no-reentrant-crypt.patch -- renamed from php-5.3.8-no-reentrant-crypt.patch, not rebased M php5-openssl.patch -- rebased M php5-phpize.patch -- rebased A php5-pts.patch -- renamed from php-5.3.4-pts.patch, not rebased A php5-suhosin-php54.patch -- patch on top of suhosin-0.9.33.tgz to work with php 5.4 M php5.changes -- this change log M php5.spec -- new version, etc D suhosin-patch-5.3.3-0.9.10.patch.gz -- dropped, seems not be used for some time- updated to 5.3.22: . Fixed bug #64099 (Wrong TSRM usage in zend_Register_class alias). (Johannes) . Fixed bug #63899 (Use after scope error in zend_compile). (Laruence) . Fixed bug #63943 (Bad warning text from strpos() on empty needle). (Laruence) . Fixed bug #55397 (comparsion of incomplete DateTime causes SIGSEGV). (Laruence, Derick) . Fixed bug #63999 (php with fpm fails to build on Solaris 10 or 11). (Adam) . Added check that soap.wsdl_cache_dir conforms to open_basedir (CVE-2013-1635). (Dmitry) . Disabled external entities loading (CVE-2013-1643). (Dmitry) . Fixed bug #64106 (Segfault on SplFixedArray[][x] = y when extended). (Nikita Popov)- updated to 5.3.21: * Fixed bug #63762 (Sigsegv when Exception::$trace is changed by user). * Fixed bug (segfault due to libcurl connection caching). * Fixed bug #63795 (CURL >= 7.28.0 no longer support value 1 for CURLOPT_SSL_VERIFYHOST). etc. see NEWS for details- fix CVE-2011-4153 CVE-2011-4153 [bnc#741859]- add explicit buildrequire on libbz2-devel (having to patch old .changes file to avoid "double entry")- updated to 5.3.17: * Fixed bug (segfault while build with zts and GOTO vm-kind) * Fixed bug #62844 (parse_url() does not recognize // * etc. see NEWS for details- use FilesMatch with 'SetHandler' rather than 'AddHandler' [bnc#775852]- updated to 5.3.16: * fixes over 20 bugs, see NEWS for more details- updated to 5.3.15: * fixes over 30 bugs and includes a fix for a security related overflow issue in the stream implementation (CVE-2012-2688) [bnc#772582] and open_basedir bypass, CVE-2012-3365 [bnc#772580]- updated to 5.3.14: * bug-fix release, see NEWS for details- updated to 5.3.13: various security fixes, CVE-2012-1823, CVE-2012-2311, CVE-2012-2335, CVE-2012-2336 * removed php-5.3.10-pcre_fullinfo.patch * refreshed php-5.3.2-aconf26x.patch- fix license to spdx.org format- fixed build with new pcre (php bug 60986)- Build with -fpie- PHP 5.3.10, fixes CVE-2012-0830.- remove unapplied patches- buildrequire libjpeg-devel- remove apache module conflict with apache2-worker [bnc#728671] - amended README.SUSE instead- Update to version 5.3.9 * Drop already applied patches * This update only contain minor bug fixes, it is a stop over php 5.4.0 that should be out very soon.- security update: * CVE-2011-4885 [bnc#738221] -- added max_input_vars directive to prevent attacks based on hash collisions- add autoconf as buildrequire to avoid implicit dependency- apache module conflicts with apache2-worker [bnc#728671]- security update: * CVE-2011-4566 [bnc#733590] * CVE-2011-1466 [bnc#736169]- fix license - there is no 3.1 version of php license- build php against system's libcrypt, which drops extended DES support * crypt-tests.patch * no-reentrant-crypt.patch- security update: CVE-2011-3379 [bnc#728350]- Fix wrong PAGE_SIZE assumption, must use sysconf() instead - Fix integer overflow when attempting to use more than 2 Gb of memory.- call openssl_config too in order to load user-provided engine configuration.- Cleanup patches for upcoming release.- Fixed typos in php5.spec- Fix very publicized critical bug in crypt() implementation- Add mssql support with freetds - Update PHP snapshot.- Update snapshot, more static analyzer fixes.- Update snapshot, fix converity warnings- Update snapshot, several check if malloc() succeeded.- Fix build in Factory - Fix Segfault with allow_call_time_pass_reference = Off - Using class constants in array definition fails- Add sqlite3 session storage, this is no more than a forward port of already existent sqlite2 backend- Update snap, PHP 5.3.7-RC4- Update snapshot again.- Update snapshot.- is_a() function is throwing an annoying warning "Unknown class passed as parameter" which is noticeable when you use PEAR, fix it, if your code uses it you should be using the instanceof operator anyway. - Update bundled pear.- Crash in gc_remove_zval_from_buffer CVE-NO-NAME - Crash in zend_mm_check_ptr // Heap corruption- Fixed missing Expires and Cache-Control headers for ping and status pages - fix crypt() issue with overlong salt - Fixed bug #52935 (call exit in user_error_handler cause stream relate core).- Fix crash in error_log (strlen with NULL) - Fixed exit at FPM startup on fpm_resources_prepare - Added master rlimit_files and rlimit_core - Removed pid in debug logs written by chrildren processes - Replaced shm_slots with a real scoreboard- Enable mysqlnd compression protocol.- Update snapshot to 5.3.7 RC1- Allow bison 2.5 -File path injection vulnerability in RFC1867 File upload CVE-2011-2202.- Update 5.3 snap - Fix compiler failure that happended after compile error. - Stream not closed and error not returned when SSL CN_match fails.- Update 5.3 snap - Update bundled PEAR - Case discrepancy in timezone names cause Uncaught exception and fatal error. - SEEK_CUR with 0 value, returns a warning - Restore fix: do not accept paths with NULL in them- Update to version 5.3.6.201106031621 - Crash when calling call_user_func with unknown function name - Fixed double registering of browscap ini directive- Drop Update alternatives usage, there are no alternatives PHP4 is gone and PHP6 is not coming at any time soon. - Remove "mm" support from session module, virtually nothing uses it and it doesnt support proper locking, mount /var/lib/php5 in tmpfs instead.- Update to 5.3.6.201105291701 * Fixes random crash with apache2 SAPI and php_admin_value in virtualhost configuration.- Update 5.3 branch - Fix a few memory leaks - Check if tempfile can be created in phar extension - Fix problems with __halt_compiler and imported namespaces - Properly handle out of memory conditions in mysqlnd- Update 5.3 branch. - Fix user after free in xmlreader extension.- Update to current 5.3 svn version. - For practical reasons now the hash extension is built-in,hence deprecates package php5-hash, it is nowdays required by the session and phar extensions but must be statically built to work. - Drop php5-session patch, needed only to workaround compile failure when hash extension is built as loadable extension. - php.ini now clearly says that by "3" in session.hash_function we mean SHA256.- Update to a recent 5.3.x SVN version, mostly bug fixes * track_errors causes segfault * classes from dl()'ed extensions are not destroyed * Crash when assigning value to a dimension in a non-array * use-after-free in substr_replace()- fix crash on destruction. - allow openssl extension to be built w/o SSLv2- Add a default to date.timezone because php5 warns that this is a required setting and clutters up the output in zypper installations of pear packages and other places - Versions after 5.3.6 may make this fatal- Intl extension failed to load [bnc#659868] - Fix update-alternatives usage,will be dropped in the future.- Add tcpd-devel for building the SNMP extension on SLE_10 and apache_server_SLE_10.- Update to php 5.3.6 final * Enforce security in the fastcgi protocol parsing with fpm SAPI. * Fixed bug #54247 (format-string vulnerability on Phar). (CVE-2011-1153) * Fixed bug #54193 (Integer overflow in shmop_read()). (CVE-2011-1092) * Fixed bug #54055 (buffer overrun with high values for precision ini setting). * Fixed bug #54002 (crash on crafted tag in exif). (CVE-2011-0708) * Fixed bug #53885 (ZipArchive segfault with FL_UNCHANGED on empty archive). (CVE-2011-0421)- Upgrade to PHP 5.3.6.RC3 * Drop obsoleted patches * fix some rpmlint warnings * Hundreds of changes, see NEWS for details- Fix more date in binaries causing pointless republish of pkgs.- fix for macros.php o devel pkg must have Obsoletes/Provides: php-macros- security fixes * CVE-2011-0420 [bnc#672933] * CVE-2011-0708 [bnc#671710]- extend macros.php o __php, __phpize, __php_config, php_version o __pear, php_peardir, php_pearxmldir o php_pear_gen_filelist - add README.macros- security fix: * fopen_https_proxy_auth_fix.patch [bnc#656523]- export PHP_MYSQLND_ENABLED=yes to solve the mysqlnd problem when extensions are built shared. [bnc#661464]- Go back to libmysql as there is currently no way to build shared mysql extensions with mysqlnd. [bnc#661464]- Use mysqlnd driver, this is a newer PHP-native mysql extension, that does not require external libraries. Now you can use mysql, mariadb or drizzle without extra libs. fixes bnc #661464 and other old feature requests.- Update to version 5.3.5, Critical Update * Fixed bug #53632 (PHP hangs on numeric value 2.2250738585072011e-308). (CVE-2010-4645) Only 32 bit binaries affected, confirmed in factory i586.- revert unsuitable patch php-5.3.4-dlopen.patch- Add php-5.3.4-dlopen.patch from fedora,makes dlopen to use bind_now instead of lazy. - Compiler is now in C99 mode for both core and extensions.- fix format string bug in Phar extension I just found http://bugs.php.net/bug.php?id=53541 and the underlying issue, which is the lack of format attributes in several core prototypes.- Update to PHP 5.3.4 final * Fixed crash in zip extract method (possible CWE-170). * Paths with NULL in them (foo\0bar.txt) are now considered as invalid (CVE-2006-7243). * Fixed a possible double free in imap extension (Identified by Mateusz Kocielski). (CVE-2010-4150). * Fixed NULL pointer dereference in ZipArchive::getArchiveComment. (CVE-2010-3709). * Fixed possible flaw in open_basedir (CVE-2010-3436). * Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950). * Fixed symbolic resolution support when the target is a DFS share. * Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710). * Key Bug Fixes in PHP 5.3.4 include: * Added stat support for zip stream. * Added follow_location (enabled by default) option for the http stream support. * Added a 3rd parameter to get_html_translation_table. It now takes a charset hint, like htmlentities et al. * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend multibyte at runtime. * Multiple improvements to the FPM SAPI. * Over 100 other bug fixes. - SUSE specific; * enable PTY support in proc_open (temporary)- xft-config is gone- Update to 5.3.3_svn201011020214 * Fix Performance issue, array_diff may take hours instead of seconds in some scenarios,regression appeared in version 5.2.5- Update to 5.3.3_svn20101027xx - Fix init script again.- update to 5.3.3_svn201010140300 - Fix php-fpm init script.- Update to an slightly newer PHP 5.3.3.x snap, fixes around 100 bugs including open_basedir problems. - add the fpm sapi to the package.- Clarify changelog this update fixed: * VUL-0: php5 new unserialize() flaw CVE-2010-2225 [bnc#616232] * VUL-0: php5: MOPS-2010-021: fnmatch() Stack Exhaustion Vulnerability [bnc#605097] * VUL-0: php5: MOPS-2010-017: preg_quote() Interruption Information Leak [bnc#605100] * VUL-0: php5: MOPS-2010-022 use after free [bnc#609763] * VUL-0: php5-phar: MOPS-2010-0{24,25,26,27,28} format string bugs [bnc#609766] * VUL-0: php5: MOPS-2010-0{32,33,34} use space interruption in iconv functions [bnc#609768] * VUL-0: php5: MOPS-2010-0{36,37,38,39,40} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-0{36..46} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-047/048 information leak [bnc#612555] * VUL-0: php5: MOPS-2010-049/50/51/52/53/54/55 memory corruption and/or info leak [bnc#612556] * VUL-0: PHP5: Session Data Injection Vulnerability [bnc#619483] * VUL-0: PHP5: multiple heap based buffer overflows [bnc#619486] * bugzilla numbers 619487,619489,619469,609766..- Update to PHP 5.3.3 RC3 - Massive lot of security fixes see list here http://www.php-security.org/category/vulnerabilities/index.html- possible fix for [bnc#610633]- use FD_CLOEXEC flag to avoid annoying races.- remove obsolete buildRequires- remove build date from binaries so they dont get republished every time - fix invalid path- add missing patch, refresh patches with -p0- Update to PHP 5.3.2, see NEWS for details- Add php5-autoconf-2.65.patch to fix build with autoconf 2.65; it's a backported combination of svn commits 291283, 291284 and 291332. - Workaround old php bug http://bugs.php.net/bug.php?id=21153 by replacing -ledit with -ledit -lncurses in the resulting configure scripts. This became apparent problem due to libedit being built with as-needed now. - Add php5-bug51224.patch to fix buffer overflows happening in strcpy. It;s a combination of upstream svn revs 284097 and 284099- Remove unneeded gtk-devel BuildRequires.- Remove obsolete build requires of orbit-devel.- avoid alignment crash on alignment-sensitive CPUs (bugs.php.net#46074)- update patch to fix build- Fixed wrong harcoded mysql socket [bnc#544516] - Fixed wrong default include_path- make php5-pear noarch in Factory- remove obsolete patches - apply ini patch - enable mhash compatibility in the hash extension and obsolete php5-mhash - add macros.php to the source list- PHP read_exif_data() only returns the first letter of UTF-16 strings [bnc#518300]- fix missing return values of suhosin extension- fix build on CODE10 products- fix horrible broken open_basedir functionality- update suhosin extension to version 0.9.29 - mysql extensions now use mysqlnd instead of libmysqlclient. - enable sqlite3 extension, part of the php5-sqlite package - enable enchant extension - enable fileinfo extension - enable intl extension- add suhosin patch and newer suhosin extension for compatibility reasons- Upgrade to PHP 5.3, see http://www.php.net/ChangeLog-5.php for the huge list of changes - remove dbase and ncurses extension- disable as-needed to fix build- update to PHP 5.2.10 * Fixed bug #48378 (exif_read_data() segfaults on certain corrupted .jpeg files) * Added "ignore_errors" option to http fopen wrapper. (David Zulke, Sara) * Fixed memory corruptions while reading properties of zip files. (Ilia) * Fixed memory leak in ob_get_clean/ob_get_flush. (Christian) * Fixed segfault on invalid session.save_path. (Hannes) * Fixed leaks in imap when a mail_criteria is used. (Pierre) * Changed default value of array_unique()'s optional sorting type parameter back to SORT_STRING to fix backwards compatibility breakage introduced in PHP 5.2.9. (Moriyoshi) * Fixed bug #47940 (memory leaks in imap_body). (Pierre, Jake Levitt) * Fixed bug #47903 ("@" operator does not work with string offsets). (Felipe) * Fixed bug #47644 (Valid integers are truncated with json_decode()). (Scott) * Fixed bug #47564 (unpacking unsigned long 32bit big endian returns wrong result). (Ilia) * Fixed bug #47365 (ip2long() may allow some invalid values on certain 64bit systems). * Over 100 bug fixes.- add temporary backport of openssl prng function- Update to version 5.2.9, security and bugfix release * VUL-0: php5: memory disclosure by imagerotate() [bnc#480850] * VUL-0: php5: mbstring.func_overload set in .htaccess becomes global [bnc#471419] * Fixed a segfault when malformed string is passed to json_decode() * Fixed explode() behavior with empty string to respect negative limit.php5-pdo_pgsqlcloud112 15169126335.5.14-91.25.5.145.5.14-91.25.5.14-91.25.5.14pdo_pgsql.inipgsql.inipdo_pgsql.sopgsql.so/etc/php5/conf.d//usr/lib64/php5/extensions/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:7720/openSUSE_Leap_42.3_Update/45544a591c6eb88a5139d70eb2beb64b-php5.openSUSE_Leap_42.3_Updatecpiolzma5x86_64-suse-linuxASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=5cddb0463305c669e7b3951de4241da2c7d985c3, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=f194dfcb81160956cae54f4256db1e5ccafa88c7, strippedPRRRRRRPRRRRR˗e{ \n?0] crv(vX0zbdNҏpaUA6~]/tk#dCXiD?LlK,.#L|*sykQx5t)"`s631k,.k8T CUM$GZ+zvn24Ijɜ{CP+ɔb+Qh^Kay9..bL~␿vY6!Ȏ/_4%K.[BQ~Ӷ-_y=v1u.hڦ~'ڡ/(w^c x!f&n*dыVm :/ڐۯB,0! 1^E%`HςPo4VǐZC]9hj*P6RP@ Tk`-j6^ZmpyΒ$/2Z3",vXp[+Wf+(эYTk{.}} $#Եi$_i5R6diqY :;fQ3n{fRI_Rk7rƽ*=9WּO2x׼->sTaƥä၊Un<W+!oO8GC8وF`dЧGvw療 %6&@=9EHoL JHhf謉T|{;.0hW%Hq=^3ENiIʁT!YeEoz۲. #U!&wb,8+L</־'Ayj-?oJiNewVmZ1qUC<X:V] W_mcgƲcmeL!oA@ 917m9Reﲫ+8a ,[-,F5پ .nF͐VVζlݫkP 1 3Yen)>5#Z!]i7֤ͼ.be{;v.P![$#Y7<hhX^<|1QwuC m91 l*D*Y٢K:WZjԿnW`m94~|IrwAG4 {nͼ"ϻO2#w #׻dnݡbE2 {iuQoK`#[RU=R#'<-<5(c$ޘ%gӛT,7LӦ61HAGH''἗acN3oRQj kkH#WΠ~8w'#ƧLeoľ(: ה4w(*-PZѓbY[|-z~A u<ƍ+ Dczśh.~ Wb͆_}Cqn`ߧ/Z;ᝎDTS.Lr_Q}'f4 9hZ[Q9 r~Ku䖛?"nYD~)eTY~r ߭دO3\Xyݝ|m״o]5@Q~)"A9J_~*Cl4]I}fڷ!@oxǃbO2o)?tA_$JɽW; f0/0hx{1>g69_Y7EoO)4M`Z eX()Nwm뽌0YoOC Tk*K0-R#w(w~D3WVz땇hg=1PZxjnݾH%|cڻ62%ɶnRb41ds&`(c &pBtc;@/8;ҕ\t+%cӦf}qY0y8p+uf)߃JHJ A:% ,.N&zOQ &yg~yF*r%-[zЉSΎq5YGgIfetSƿUՈZ;Tya J`g_! <*ddHcxgLOX +I(M v|_^-TiYA7cYdb\[!.3 ZT Sم?WnH "/Ƶ nP&t;vZS닟(c}UZ#í&Bﶙ<|D*' .p|ǒEvoJD]c^7c M;pB_9v9 Cf1ܸ&&e8x "HCSGsJO67kwwElhtа0Sd߭ tZk߰hu/CO'ԋ9Z$>ose~U-,}QaN^'d(fh)JY)`(Vtj[Ն ʋb-A|hj^2o[LrFPpM5vK‰em6Ȇa 6OF"THg4\ =5s>7%!Ɛ0|gJh>ɖV8#G>&K0/jeK(QrO?ڬj߈92#]eyz%8>8`ʙ1ٓ7&3f.={RN}u"m{=l(:UiM>쇤'ڧr>IFWk=omSzܺM(-ǏX1K]˖XƻzV|1\NE+[ý&tC]`8rANvQmzyVA~<%XXNJW,lxC*,8Z/Lh^<0dmF5l< ؂"zA!&-wcߗ=k ɵ={}VLl DrFކ Bۗ> >"lxR.vZ`h"^7 ilڭk)mp-Od\h15u'cɒ4~Un1/<.T"7Ňb6\ز;ne*m׿bX5^Yl׬mڧ.KX e 0 %֦'a/;R!G4&UveR֐ SS R%ckjB.4p=0&["Ecڭ_C@ -~+b*x}[` D@@O g|_GA9g3S*\?GԚp e{W8*Љ5{v͢ `jn6v\Ryʔ Pp+$UzꋸZVaȞUe*vB0J|ڒaxeFzOҴ:QG)Ab9L%'W%Sxu]$_# ,x1ސşƬx@{N)VfiLO7 <1Jn=Nú$ຜ"dIr4]ݒZṄ K2a`>qmȶyhh^=2[}XiC._^'xJ&WkK$(q2X4g}뮨<wV&Փ?oQ7.Z U?~KI5@-9t% ]̟Z9`hefR!' \$jQm"gͬ"'ݩ1` & |Oh;lzҌ쳓z`|U kO=n*5tM,2-5g)˽*Tr.Mq/Eԗ~1U ~ݫP[#ȄZIbW#+~,u]f>rxłm^awLzBVʁ6;!CT;>ӅeZ-SjtpAm3gN d pҼb* ;HDV'8^}HY+}ESmIx~MtA&v:&X-d(ٵj+7ٸ3yxB+ T.Fu*F"`E+OJH.i>b(`T,w5;3I`odPW#u: zuI_E~MN![osݝc[}LZt2 Sq'iޞakw1GVFA\Gf#4a/yh9ZgX%NtCYνu(m-0TUlJolCX SKdrfBj j&5==8V'I[N`ƾ;f'S(9#zYQ^%Ff8M}硆rUhK{ :3(!bP`t# Hsgɚ13̋\4F6)cTICQWwT\( cw׵i!"Rhtfd D4Uize|\ sAM_ 9ݹSb|qJ4VmTfRG HT?3?^ԑi!Y157;ybiDJ3$*5]1+DZvn9|b4C| TȌb+t<@Ln؝CSuuձ6RSCLr".WX8V{]䭻qS}G%;FHڥ:ڛRgGJuTP}M#"mNnAr֛+/tYc.Cր"@|:m2kt*aL};֐s=W] +C8.?*.nچy!УAlmfHQGAW*''G9*>;CnsŠ 'DK w mhRϖWz$T LkR$"V6gw c 6~U[mY;)kDŽ-zN.$}4?~""{;nx6r7"A}h "'Ę2{*`lʣ"[W:U3 <ͩ'} @hŶ1JL)ժ-mkH,~ џEHz,Z₴af<mawzee-U["wسx0e4޳ZD@O8^bޚwg E5I&Egp۠ \""<[; gl 6'6IdW~X*UtO8]4 r'VVcFRP%s2<}̹YK[_#g\fi)0Kx! }GvWw6]b/U-Cf/)j.0T9Me) +4s vui9[Ԡܛ?BҼg!4qS/*Ѹq[7_jP/dП#'q֜_$Eļ"R٩S/LQm-3KLHQڈJFgbxUPmOS%څtKN}x{\!@9 Mu̢{hW-(e:PRzZ.'(}*@Eeklk$]M\˛pX Mn vJg4('Gc .L|A~&m'_'j/M,x7jEAXۢFǡfaj|} ^dt+"<#FS%vXvnl -ٞ"oAFΑ6~^k``ktBRBrG^s[uf:F]6RSy;Kp}zU}N2fW!UZȝPch k^zWrn` +#[PxZ<3ziBT)Uo1zPcw_/Ǧ.bΙoUPw, SEMl%"@T@@pL8g¶@J!dpMthI܊G}ʦwq:[m8RǬ W~ 3=/e͚b=2= ǑOUH/3;9j^ )`- qojJ?)ߊ:B1||.̳fۚ2jvij/ aMݣ,uxI*]cm2o},~C2kQTfcO:o 0ufVi1_s[MB>2 [`XzH9toN D,6ʟMX->KP%!'z~Fᄰq,,ƽ|v`f]8ށ o 3mPP 6 ¸jWJ\vIX&ՄN0!X`: O|o9!x!<ҲR}. ZAa .XQty/: P/h.:6x]U,P}4^2!:+tCD-Ld^äblU1ar{y kߤ#m!W1y2&YB 5g:k $zfk2bD$dD갰7 5EzN x9$X WqKw }u+(M$ >Nc4_eIb D0jGU2=-r`@ܯF? b'/H v X.aH ̸?bsEBr3.c黎՘r)-9kGKĜH+՝` If}_۰alVŸ*5Tyl(ϬZ1Ӕ |rjLqL`ȻUlYP~Rrr1um8xW"؉h(,$9S)!R2yRY.1'i 9FxOQǍ" Xe[ڱi ˆ]#.a#.:w"ye]::pZ; {C_%:7_4/ORkj"X3l,jw 0+ޞ`YiRvLn<;+J(n6js=֎d!&q=y?, ߢYGb(H% 9L.]r԰16ٌ&V€\К4沤%P&?$`bψy6 YW}(?-MFA<8 I\WͲ6 6:&n("߅1w;iaP/c&?Ym%yL}ck$wpKvNM:VNkkєflEXoXj+(ٯL 3mH$BULp_[,f֋`[7 y 1-bf8UcvhCF䶰B8[!ȼ3z_RIW!E⏟qYc406 R!Zy! R 0ѝli+0=s9=|5g(oh3Tґ=_ڄc(명5O"G oBWC\,cI^\ %ҭ ?';|Kh ȷv''mO~-N)pHp` #`'}r_)x<\i#?D %p㹰M;OPBKWe/ rl7:\H\{fXLw`C"g_zD/m{gcI[Nϧ3KҊ"1`\5Uѻ5J.m;- vL`6lq,6oa4ըܦ؊yZ (=7FbrCtZTOVIvgLƒ590#G2NyF[_OVLUJ=>QZ5e\vYmsU׹U:%猼wԱ礀6ƒK@,H.C+0⟤_g""ƈe gR 8k좢bj!dKB#UHEe5>^i;&hx[T1u-:&]#6hyl<'K s|UVe?.FxOx Z4#ܕ&"F fp{ +ow|Df K#Eg8;ʣ =?!lbCa()c/$[υ/Ͼ|DUݵNB% ?tikDj#3jH[KFZSו ;Ldb:3SAuճwf 4 ^f wcWBk @Ye]ڧ`xx&r/2ds̭w'?g4}ADoLHrꘞk!7| ?$E0/I/^MAM.zɨW:/Lg PH47wǛncFeHp''6XF_9N΀%{brqi|4H nsA=7`F=9au4q1Sya}^ fk+EOZߛCDl`:<`VD}t{],<мHbZɆ"pGo-ͥF[ B-fJ_^U1MO%EQt[ݮ²6*vҌC6g*݃3r?o#s  N8vѴJKgNh*_Qgxy#~^3%ŅUJǢI,9cYܑ9m~EVHL- +ο-5N4 v| !<*J"|%=t*D(e>-j[$ tƌqRqzVw5v!{8(Kh7\poBnoVxh sLG./Nw/}(6jjgje*Y-O&s;Eprw#!p9LZ.nsMX`g`4[kzbi.Dx|D̰=){} C#)gܒ+3ʞtTv?Svv3(!A>!,9[sTHWA peZ.^%ll&86JWh+td_$Q UG^ə:u Z'h(U}t\9&9@WN!<0N&lT bVjMfˋ5؜U3IY>_9vHݑ Z)8 ,+S߿ɠʺNi1փ xcG7՗陘cA鈃&(9c*JA-TbSb&rPc#peG8S!S)FDk:3QbΆzdt'YtrH<8(|VLjl%grTf_€x&@.֓mOe%zi5D&l>ihZ*|o' Oe.&dw7aD2d|ε۶n9C#TH'\5:FMEcK{ꇼxw xh00qDV4-.n~)/a>wI|'-1eh-$NgN 670 YL.<w08T<S>ԫ6.Dh $űgZf.K?w vWיW_ssC=7GYGΛٿW:1K\gnLdih~kT_Ed4p:EN Q>Ts=NW@B|<7N>] ="#-$WufOKJeң+׹G~eK_/ WH9냬~֑4gpb'>r68yHvUn6&eR; UgIbZ ZfBI- =WWuҸyqbIlyv/~2P؈hⵧCti\A`zBXWA=m9Swi=K:Ix ɫ>߂4>.z8ZR<":A9KhXTCY56FqAJQ\Eǻ(?@WT,^߂Ocn(N($ϓ+?-q933iڥ' `dh[NsYC'^Vԟ̐C'/;̎S4to-/Arg(Җ:hP=bѯt3iv)y.@5oF؀e#Mɐ/jmRr[Q^hؿ|OH;7hooUՀJAGE]v}x4#겜y@gX%Ӱ+kB3JnJT{<t̎FSUml J6jw_E'spNi򫙝z#5莏zVu #69O++ pՌ?S(С6lm}KwE )y%|w3: .O`0nqo╹|lp&=Zk3j)NKm'gD#eML$~ӒU+&̧-RŪ=QaݨMnv E3yXҝ(7댮DHR(.99;C4 kmU#߿iB@_",.v;Kr1%Wnqm4Cф3uN?eJU%.t=(lx,pB#cZא5^LfA!&Q̤u" `DŽQE P1ܒ eJk߫-IO M Nk=Sc'٨P; Z n ,!0kr=J= lBmۈzmMQiO X 6-(gҿ0brЂ3 誀y ">{,[sG5a*?{0^u1~RE+go@B:O(UhLnp=iұyuxlAm$;Vs,^C_&BB3$5mYY H"8ͅ~;ku5 qNa=ۖBe>)UĿP,{KQObEg.EܠPiΌ|T,$E1:JђK݁\9,84w3ST_*hʇZF ZuC3~،#Wg. Ͱ~z[8f)K6鳿U{ʁEԫ{є?-#''[xP6h OJ-jc2K 8?߬$M9knVta`ڀR~=8]J8IoOxj}:]zQ-b֊V+n)3O&Z}!QSĊՂ`)=f:T/nrUr j6 h av(B5)rrc)3qG4ӭ& >t1Oi0o^3wV<̴풁P]0Z3JF}sw:jJ'QTl `P_,5?ا'K U\s]9Hrroo ZeVhTM2e< @64IkWrͲ9fWZ[,u2)AJBa"RKըynC 'faZ:?s惘4Ol#-84Ca[8A,\e[e- C8cxAaYg[]^ –`an@'+T Hm)mp zZWZPo֫%ZX÷tR+LMGPv&گ'ƂFZI\YYc@H/LV hXӟq 9i3A(@YBW V{)N/f]L.CRGKr+̀wU+|gݿc fj.N]07o6gk/CB_ς}) Cn-x=zX; xtu{#;8ݠ4n umm?!=*ff_7F|(Ur_US]؎z*4ot'ؙpHxb Z*. 9 /JS[mˣh =4+meST-V7x)r/Z]XF$,b W]OepQq1Ζ\U-aSj{tnK *N15.uYR\iHi+Xx8=ȘaP`N~3p䠲z$cgMAQ׵ly5]| c#>8sqK VG/q[]5s.O}Iz02uÅ/KQ|.=PwmJˮ;FU/~s=P ܦ) DLq[NCwDϱm~1*ļ GV߀?8š{p?bW&Q;|'ҴmpPKU+J߯)u)zXUE^|B\U{#BX]0inp]h,xk

eP.DVRj8۲zP'dDnTQO>0Ms~ tq^Oz6^kE L7l(p~uuPRa[KSyׁW 8yYUaPnI0k51bksuqt'&FRjuzt̓ bpw>{uk8Q[t}qI:j̷.QGWdce@Y'4K#!+#q^jd-KP)VjDW, _fZWp]-_+-DAA!ٝ}&n&JMV9YCd"w̄]|jLH_S&8S@\|>i_iW`"=9Jo96TTND^HClZBppmhޫٟ3nf(A_V .íeCHntUI:hiL,PA%,X8?›rx83Sw?F6 |"Z*1]R䨁;.YÆsi<8,j^6H2DŽbsFq?jXG,d܍8 ]i`b(xtXbX*s+U%VȜ)SgaR,toG^&i_WϠU?P fw^Y$X?Xp@t}*p wokӏ0\yoKҨA8^ a(P!t3ToB (;@+apx3Z;Emu/Jc\CX__Z?~?NքtkDl_S\]hIEb 5E*XSzH*P MK975Oz$L6*!:+C?6jkHme+$;@?4H~2VU P]ؘt^h@ƴ} +&o juU+Ů_Tu"Fh8Fq5*bZ"ƮB,(Bd4̷`O(tmNɼECWe*KQlU9?e ֻ TI \[Է CJ?}ig|*F[ XjP\ÒIT$E+|>r اb<=aRጾ!̤| O(Ca",TVU(W\[!;(Ho^ ijť҉PKizh %ϯe\DK'fJI8HzWBrom.e) 4 m/"f?0gfֹiD4nM ϊըVWE2k>Ya-K{DEmYkYBB+5$g0G18kt+75e]N-EC Nl#]J o fռP%ыROd2L]7vj_84tEen̈M/6H I҇.hy0T̖`-_iL" Hg 1߼crևZLzO`5Q?Pٹv\M/:7+7 3 C`)$?C *LWIbw!@dt7z)%[B0.|[$啂>8V L2´be.`a94(.%ܲ;Or?墶mVn CCӑrׁ#tۚZfIoy %<<WxqMHJmJM@Y#R3PڴkI>C=UB2-:,af@SI햂wsX#TQ4z+7J/׌yu60&.0{z*ms"g)٘ /_ڂ/O|ڮnwo{^pةUhW[U Y!Лwyy9ɑ̧´% ܉;|)ps;i\Ԓ̭m WyXvZ'u rN쒹1·٤9ؓ J+vAqtj'^ ` A] Tk1E#+*TD}n+/Ҭ4M]>r۸ 0}{3VUG@Pm&%?545lN\oT/Nu$,p3^;o 9ӜeNN&X5YD%J~H,2L(~: 2Z?=(q~IV Q7^AeYY. =c5Hǒɧ}Lwrf.W3_fMWH8{z!o\$É%Iݱ=WD7|k;<YgxZLe$ !YGeJoI^T5Rb˯v4ʑ&^ÔR^?c_;8v]&Wћz+96kiwX|[?HF ??:Jȉ^ jeD&?p}X+?hR96Mr{@rKשXQyџ 1 )z']UZ\ӻ},¡}B^aqRCB /)g~!?`IrFN3D^N]Tt#azN}A p"W3a<¤M\i9X?f/o=;׋~XiCv%=k%.겡cc|hYΚѸ?݀C?%߀]&c%?IpQ b}^=op cG1tJ?94A' ɓcjK>-ټZ@j}.Ƙ/%hO~$Ҵއ^Y.@" &LjTK5"ѠlZ5AvWdf>CzX䡵a&3=Mg!QL@@蠝Y Zt9;/ cM/_8pzGt?fb|F}Nnr S .пZ,BI̼rRl'\ҧJd/EcȨX;AU<:f:QƼzWuKzƟХ5Dܚ"f:zaq%b:֧Η'G9# 9x~~eÞ3գ:s#lG"aeov3tld6Buk]b["wbsgeIw;(B@Ͱ߷?6J}BlB`WE/v&?Ȟ^܈9ΞϽs@)2ǡ#}<@W"ӗ%8S.K߹ך,XiGdA 8Ip$pysk.3Qo-O҄'\O+ف@72^U;0MВC;.5Rl[F gX0T)Y͛[6^Xр|{F*o.vog٥#OD,?Pq7 b't {>匶 +gE5Hd\r {}X2 FF[J6g7/W␎w=zZ+}9bʡV<2ͦtLUKJo]Y>>^#dEú]Im7Z7 'q%οKf[sTv;ǗCy"ř0%q(FNZ^=$xVoM@i5ɡ,?jqPt ali~5Ұ x)%|sTbJ¶'";U'~}L/($<ΤIL>E՞B ۦm ٯ ‘V$Ij2&qJjs; \Z6 ScvadE+pqcs!rj,]P/o5 tO)_<]>Y 0щ{$hՕvN}sAjb"r0& vrA -'1XP1L$/t&7$afYUю:mO:td݁UUlb}-{%zԞ.1_&D8Я[dݵfY7j4H* ~IjdtY IDq٥8b) 5 K~' R`؇z9\3(XD9{3g]*/hca:]@f(]T K\W͟ٿ.WoJ+kcps9{-bkw)[j_@~pvYtʾ5WGQطZk@7o#JD0fEUԉXCݟ<8 uRꄦ]+,5{mZFn$Yb*m)A$}$o=)֑8u^N>RGf@HK'W9[Vs '5aBGH]jxG.4\/H~Ck1E4WF]rzJuu?vt\iEw٨.R]j!xΌߟ(Ҵt*s[y|P] ޷5Qz06b|!YbI424=񐚆pV2Նrzpzu8HT|J2l^}|f0QRa8r^ ONX!ܛ8H X4 ;O/s98L^cu;pG'O({-b;)bJ1 aL:0Q݌bx ̍g,Kݤdad}Mp/҇*w&DU2g= -dӠ9{9"K JN0ƶȢ蚥3O?_NT́/Mc%ޢyȏs~RU0C|YJlRpwEIǡzF)+e(7Wއ9S.K̕&UZb,6_qe6O xL/T\* ST{'W߲ׯP+]hyaK:)B4 qZ X%,R ,mzT 1AP?fR?JY}ZStSwg-BmHmg8K y|ED˽wVqLlk a9x0:?{Na;x%\בh"eOij2{V;&QDLutw4: x`KYQyB<>8Z(a%Xp=橿 [mAT^{uὖط)<+,l ӚO5'RdtjVYٶƢ>sR*٨y:#۷br RD[3IcT zη: tfo)FzB\qWL[;l?:)`ob;,rW"zfE7e.󐲬8|5vV\,YE O,[4V07x wW!v7gQ7B{P!qJr\LP|c|B6 7)VRp&Fܼs8j Öܮl`1_P>a D/Q6-mF]@2-d<Ӷ">s#vpMgZNt+Gl%/MXn߽ Wt y: fmH9l]_8.HxjqfZ)~c1K=.ϊ02c4 U!ΛXUC2)O7faPNy3?t֗na%8b8S0&mLcqVݔv!X@Mphl#<%xc6w2%MPi3<WݿɄ{CD\5m%P^nY50v7z~2q NK!F ȕE(yΰWŸ o`DAX%v}nLìqx3} @@o, gvB*521-$&]J1i)\qӓ9SEVml!&;Rr?h浯"_9TFMY6r;5 B=L-G`%wxldbbջfpQS޻ߞMK1@ j|%KB>֠rߍ>}4ɥ5szxb~7<ড4WKw8~8E;5i[W<#roi݄ɊEKf{WBukW5z 0;1^L t9q_ 2_ 0MV-G#$6 "d{{6Yf> #4.6aRm|7(、Aϒ݁6JA(²ek=ɕ4;`خ+x.FQྑrsC/qSrC *֭ K__qK*=u^9jT|9}U @whs 9W$Q탷 V6 -$WaWX!g**{qx9Ŕۯ53w," ,QzS K-31%S D;ʹ6P"raM 2zQ/ W?!c Ho'Nkd`S5(߈4gΧ)HPы ̑ wuk!p^ ko'F\m)/w{ YJZ@Q2S0fmTz+[d!}+'brv-jQfߜ0lmuP}l ]}EP"3lQ's*iѮ N˭mjW%$98wdoσ؍.o[8ZU\aVhTtQ^0}, ؠo\S%vμ7W;Zdօjk˝@ȳ:2nTMN}Xt_$-+a6PB7,RLD;/)^;S0w]IdW^9y8x$}JYTsm(GфPN\ i"#K0e["~>x&-NJM5-G ;JRRU~[_+):#,wzIp˗=\e5~jV)&PABhJMK棃̊+7*:SL9lCJ1gMHԵGYAVy9 %^.q}]O|jJ?:!cKO^.rUs2,n 27?t :̍(2' :"9i]#[)Y%"ܗ=J=+ۏbӴ1g$q|nzg'J@l=x Ήu2g3 n8z= Ʈӭ9=~4rhhO7=7e`K-L1a$2SlKܽl]FK8mnoGW^9*XYr+ W tƑYk~<,dC^ qkUksҵk "mm!46UEg=3 9R%e2E9 -Y4 )&Pd9-pdM(@?Kk*;>l0r hO ~\y8}rYx$i_Snkacg~uz VbGp£?nG+6& U튜Y 0xe15/ a㗜)8hJ*g=9 :53(ܢ0L#\xȰ6پk.;O6#!S:Bׂʱ3>Tg)q4ͧ~J#_<`922drߌW+;"Nj̢FkmEKm+ jQ9/βe 2h=">@ bQ.9kgwFAA'/AX&4[0"L$.9-,W!γr5g] ٰٓ]~*66Rl"0x c_Z*{. Xa<:ѻ, *=#oTg6wdMO(-,q6^\;,`EL8'lgL /$e5Ÿ>]@r~rv٧Hzgsp_N=bB&` @Ռ5oHV> T}pWlj߾yEYUNA^?~Hv5Q.>>z~wԹCWdz;Q+xgWq_rOMG(Ӝ(>>8^`H#ĵttk6XcAobZ; \"HR/zk1{XG>_ z M`ArYYqҒL~i`?rŕ!°G{C\Sv>xbYX; e՟q@Lb3ygwz"&D\Pp2fjnthDIT0@uu yVnbLϟ"ef\u~͵d {7+alAhX?fyڴ=}:d+ozb6`ׄ$_Q|cնfǂ:)W%Enxx.IfjFaQ#@{X^,DJU(s?{yݴҌF#Q)YC%U<=>,K/[y}y ]?b16=끫(v͉ Ǫ98'.]i7oy~%YM²`S, 4,4;#sE0\`2.4X~F4UPdu&[ SKIJM"X(҆3Oĩ5,M ä}puGvW*hY)q񽚟<)jQ^aHlEz+X?rݯHL\K^`1&9Ʋv8Ҩ >˛ϟ^ԩ7çS4yi@ h3s"!8]mI;V$UEoToO71P?孠<7v R/_550G1~|p ^^ΆnN~0)لu?CnrjJ_+Z\|N+(<+ᏮKy #㜢ַyC~F>RhN)RN4voVׇ7{hQ:Eleo=/H 1;bWeA id+qrLTs_K~d?]7u[+ 0h2Ϗqw!`%EaRƷYW0@+2J0F=D"DM)c;yݒm8\V-rBx,[и5manP (QhѷĶOzfۭ[}g2 +2f UJk D{65/˂#}w(i^ &k8uICf&`UA?~^g+s0AZqhG֤יpeK#zŷm>Ogts aͰ!58cҿꈮ߽_Fui3|&:W΀[@"(MPn j?zvgӎZ7A\ Rч|5!ȞRpn+i{'~&̗9XV]\-/H 2)RDtt*zAwNXEUrWV{hGrA/V_lR`{UROOC"`MrY)]dBھϳ <ƯH1n8]Mc>O6M&)hDhwO0nwuh0HF,!3z}hFizsCv~ OӼ0 atigW=/(:,f G`~*}=Uu# ;O*1NMa]wP՘&Dh[0R&VNr{_P㒓(j(h\J:n=ɻ5ce`/4 Gam kJi^7ǥ.A4Hq /bNV7TY.> F_{>9]I,,hr@B "G}Kn!-7EQuK.؝"x}ڧᄽ^0uyehh^E% *Ԅ )S"rKYKw/p|3_ƪ{86ʸ&##)ST1$,T*tߐˏ+9!)PJB(:v˺oiI]+ZǶf‰[Bݘ"1{`Wɨ;-et#)l4dշ`{#*6xpP^ ]m|ʦ`܎ qk((ٕӍHDmWw9Bu/鏪FG?kB\/I*~S>>l bWk+P#5msxvAW5ͨ8Nf-Vq 8 %Ka'W^-iiGK-.^\#)7F11[u!Bn0C_jlRũXt-u' B߅&TTZ-iJȓkXp `dÙz!fPF 1#qu*Xcl|~[G8?erMꌑ6glk[A1cF=lN/"xNT%8*k@O0\ lrMfoZ|ud~1Wվ@:<`x%XԠ_=|E0}W0r̤k8_?L 3ݴRN DjѝH:9`S<iz@|dWIxn|EnN/,7\U듞tߊzI߁|їH!o !k;0O8V,!IoG3Ҍp-@_҇Qcݺoe/6S,UxA k%| x]VXz :s,.KFPC"lɫn|zOY1ј[,ŔI[W#] =__*mXD\Tq;Jy`X ]vKK՝gzM V`]=J騋i^*K4Q6IG>ƸU xnvv;(Dw#h<sS45,lg/ 8yg?3kc-6V}2 15&QkSri,5'MJF/yEYyY$Wh.'j#=Y`[j^CZz+rRf oD~X > UL\ n6zhk;B#-JzZV M1C(\_4FaZ(=df &-*E%Ţrxf+& NoF m"h޹Spĺ+Rdhm 2 "ٙB\j ۃޒu&K>nzƹл*n[. ޹^ۆBhse_^ /?l 8=p?|[ħͮ?y`B2wm+Rg\U(5 TDOl\nY4yJ<_;w Cя%L܍+Oij4U]))D~x÷9ݼ. ]QE{s9&GAN6+z+-PQ5,&VV4pOՔ 49Bj5;Gs~|`ܮC%"`'P# ǰ ˅^3[;%ąYMuk<4b7סroBrGx )ݘy0e"8zE_UuN>ZvaOm:6в&KL{B$- 0_,?ḅVS`o*_1//KI$n{{M&o &0af4E^Ǹ>Mū S,@sS@t8d@dDoÚS}]rE3Nl7g \6r&Cn&eyS!z} b}BNSIpW}@r䭓U_.di9E`^x$aU7G9_=ݪM@ºèMkٻ.&4a5I>ivv /l*3S hA <)=ꅂ306n4+Ǹ 3ffCf>J2/_ì(rg%咣ä`hi՞uh2PƷfs8d_7j3||Mg.Ԧ7RP|c ?*k٥Y*{TJK̰}[9>%Z /x\RNYcn2Esd|?Jrtp V S1 z$BQ ,mxIOo8|-va_4zL&P%hmdžϡ#uص`\WwF ]RjaڶJ;R-ШH[bޯtn ];hU_kRw0LbPLXl%zKd~P^aot4vH Cω9e@7xCJÖyT({Dd}K29ZfNY"'OsV;:~yE47YյcYzj0?9d {d-d|{&p;(b~r\G俲fiS4j 5 r2 ^m EM UJ{vEC# En:Rڔ/xV]h観c|OɏwLADžV],~093Ǘf4}{Xe;,¦a͙~N isQagz4ktz:0(HUMZyu1o47hRC5ft.o ZW<đYGh)Q\S1Bx]wujhlYHrf/LjS]i;D mYA EF.bgA/2B6z;U&[b\'H^HG;>DPЈx0c 0ZZ T#$D$;K c)zcosIp )$頖8NӵB" 8433;Oޕe4$=3Ȱ[?B)˞{:ף=6=!q'=ՙ!F9)A~,+ 1DYdl? }}4,1} m%а;<{|W&!pt(jBJ -OHMJ{&zY %5sGmB ?3BNjo>}b8YQh~ 1)y\7O)!S'Hb ygNkMŬ@砾}ksI-'sd  Gq 2ï Ttjf2񀯘#.АWGX11MDٴm/wCwTDvziC$x6$|9cc$!\`,މ& GM*jV7q\gG!1tDPJae %9;2{OޢCtyZm4†'Ln L]ND69Vi:DSݚ?(O*5e^>pҀODBQPq8M*UC7Dܐ^@*iڹӺ֍dR+ِОEqP1MK5*Mn^Bt=VYBZưy݊>ro^:8_6ށ\=* m)ܜ8*%n8> o %7]JUv)FloUmwa?Զ>v9 ^cAwHr[K'iqjbMCiXR!!v+~b@@6µBd5 ՜R&Vض$-ƊYUi/,۴ǐYEz mk>L/5Oѐ=UzY<)z$HX g m,HDf-vS,F16!Iٰ' NSd/r6FKM4( ((o}mmQtGר c.na w&,4(H`bYݥO^Bې>H:6=.\3 K.gI5`eu {vtO0Aw$;"T_iV~+ܿ,XD2Aqw]Q{q90~A֬xxޅ@7H`kT18R'YT R_x,>]@XIMeVʜˏzީ]qC%i4QǪR>Venh^rG`MDv5vMJ/gS( eFJ]=bbmy!e F{_'} *fG2վEbY11ze:cn_?h5 uWB4j<#;LO[7Ce|ok R{Yc{тѵ;0\eynls)\֖]ǫc& uJ&$ JS3l?KM!tsOgA%<Ȧ_HTl %iCTKuG8O |6s- t4rIOP%,?'xR_sKim&E2 u1 473!9R#iMۡ2{Mս8WҦ(c1 32 #O[ZY*|-**Ѕ_vsQfSg+0@ں\*4Z`it¬az;ҺFn=e+5=0x+(InРUk "C>xzyFc0go&2lj<#l m32S G jZOw&JP-Φc<=DNG6[Wn+Rf sg>7#J ںC53u|W9xIIL9N7`)Sq5j`.W;N/ltEL`[[pŶ,؍17G?JFA3-ś <9:PDP:JR9G$/Tw`Ok̅f +JࢭНΔEiSMO[:gk=рW5U˹Ggg;uWa.>"4M-.tn\w>ߓ~{s yyB/b !G,fyV n5h|P;RlY)fC"C/z!5(Wۋi$y$zP5G߁_^BǜՙF\-gd=G15cG*M\|L]v]9?ۺ5VRG  6"?T}zWb6tB+6A`lphʮ_H?$T$L%[7d=ŒVkW߸"^Ј<|ΒkM@V3)*:KRd _$e&P~eBm!=5׆3|0zudUΦ5c; I*}uF.2OH9VBҊyW1\3ݎ[aJj<;ۖLC3 `tC+6%F]`L~:-u\>S F:hO0fEYHW?OzN`XnǴ kVvEh )W !Kj5Jg|Nی/d\>I[VCiJCNl__uYǨR& cC-z 0HM$ʜ/v0L4a Є8Ͱe#ȓQLj537r6CdJ+<< 7'5][-0p>@4Ѽ W@e ^hr!Qa 8B>Jn(K +0| b0{^po7a\W:NeN;>=}Vۭ[,>%=Fo-hciS Ob Cw߇ӹ)J[^ (J>ّgO/[߬`ANX&z>V0O/|אb!򯥎 _χR?/!aNֵ8G),PX`jtxQ^(E׼)~*@Rk/D|" ΩH21zI/܌2Ne@ >*H !J&mz,.n|F9|+ rc!G{ zf2X{np1y =D- 7J,_IQ:_$ = VR|fnC5b'B2[58Op`sV`QW5[:]~/;NuOW)T!A; P C'G!ղOr{&pf'H4Uߍ\&(1[- Ϡ7KY@MHYΤP"7"M+CQlJ|l.ݜ?u0 H<(QʈMeY>WtlW"rD4cs$(>1dB*gߖ #T X{c#eHx5-d2\ O WHiH)LHyF#3<3 ^DvݒO e)Dg;ό;tŰptl̎QN06ъ.0rOBBL ~?wǭ66d,%?o|-]fH+2H^-ݐ(C2>X)x\\Ϳԛu#SJ8hOUGQ〃,N;N8;goY,-iA6C  7e1 "? H0`Bpy)5a<,zrׁh+ma [wu/͗ f:NyX-bL\oGx(~9\Z\D:{S`eOj+,}v7ۂh^'rF^F-ucA*b&$o$?Ule9y.7UcH91x@]~| "/&kQ.}+5yst\9tVI:. ڑVYU{% <%ЈOO݇:3S6X't񍔨?_{%!(;& :V$^7yX1SAkpA6Vj盺cj[|j {v Vcc|/A1mSԺ]$[3{FvcC|RC% CqZde`QV}qq#;y(#(;9)O$-? P-[8>Q !AxԲbFj ab; 3A0 G6ɂ7Qis7` e&"w5+QM|П1Gp&kI1|z|0ї{,Gk`.ړg7Uqx."^f2 E5K?ˣŢunHg~f:vN)A%5.~,4QDoUGC,=``prh}{&d!{7CYs>+ ~K;V[0)T T[A:/M,ATj$"4=N+Υ@ɍrR*Sq oS4g;5.=5oxA !k$!o,'4%vg2 uڣ/A4 \PǐٝRz 2M-'2VGS^| | j4385%[=دtigpkz[t)DigŰ@) h%^ ~Sn.IAC/ve35^Vxqc90 7LVnxTⷥӹ/M|UxaJ| ešY:kd'FuJq~ 8N=#s9l 9j0OĦxwP/lO`S,q>u[}/5QY.п=Oaߵdە;iΓ")`E]B~<Έ,ҭv,nl( {cH6_rVfFc^sN%E (:xF, DhBt l^ .J+9ۛo/2+@RvrOVnEk@n|6L,$ UQAs_<@s^/L +BEn2%6Xq74;p !t=gvmHcs6D;f!tQf  (ֽ`+ϿXO#%.k]viY숧$+]Qy)!ID̕9e C?O| /04LOxCQ V[ɮ9XqLǻzn[u|]Qe(,|=Y9k9ogKXdD^(VuaFVsara Akh e|8v-ˎSKԤcj=~3'hvu˵=(WXV##E@87:yZ0@>k5 lmPA5_ 6EA6B-+ O|W*TЭZ&pf% ];Vǎ[p*2D"  W2/T3uWFDSAPH#2ۣ!,;>lACjan!-s-.r}J ,ab߫@:#F5 Aiz&hI=(IL.y~m*X|Z^Izb{M gcٔε[Q s:`$ZrSHI`n ipfg4G&'@mz] ^#[~΀*IɢDfۻhuQRw[)Y̽S ?v'*ut zBqa xDqjW&Y>_5fr@0GEakf1.4p?U i̚ vn3ezο$ʮ%A2<0Y6QM#:&֨_fg-~߽deAtD2G9(Ma)xHMTI#ocMin'| 5QVU|wʘb' (3ć{+aC+MpHhs|Ƙ QSgMpt1KFNA5lH֩;,B3A åq"s q4I4Xr;Γ5IIH2QgXNӛƃY6C:F3qWҮVjӻ; &MVR0m\8+ 5ވ]7"3VOV>ހ{S;d@Qҕ;G7s=dolWؤMZ|x4ŬGf.-|8pY'1vt'wnXYc/'9?Jқ8Is?U՟ G*UC3t{G^gi0ZfA=^ಐUIn ̖cez8/%;=oVe|bz{ӸRឦ|kTi PE8+><[7mO[N\~xqf%^"eܠwA.t+KAST Ҭ:J,22uʛ R:5`.!uNP&AҾ8PF~/{D)[n[= XARMoZ,zV)8ʆޏ X@:MjcTB5I dO_NQ{2ntNMT] $6eaE357qW QܟQ..@RF~W-䝷9*`L<