php5-fpm-5.5.14-118.1<>,\櫴/=„rf&-6CxkzJq pӝyqDq]IC|(4T :Aj+[uW& 7dIf7Dgo~pM:b)`'5qهBqd#P ۨBK tZH>FeqH9|?jяuh2\w <] B<[ӍHdQѳ]Q807e?,ICa4 Cѝ) >BT?Dd   <\`hl # @  R  d    Q  d     /x/ /(!8!$9$:6j=d>l?t@|FG H I X Y \T ]x ^b^cdeflu vwh x y!z4Cphp5-fpm5.5.14118.1FastCGI Process Manager PHP5 Module PHP is a server-side, cross-platform HTML embedded scripting language. If you are completely new to PHP and want to get some idea of how it works, have a look at the Introductory tutorial. Once you get beyond that have a look at the example archive sites and some of the other resources available in the links section. Please refer to /usr/share/doc/packages/php5/README.FastCGI for information on how to use this module. {> (>Authors: -------- The PHP Group See http://www.php.net/credits.php for more details\櫴lamb09qopenSUSE Leap 42.3openSUSEPHP-3.01http://bugs.opensuse.orgDevelopment/Libraries/PHPhttp://www.php.netlinuxx86_64 test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in php-fpm.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in php-fpm.service ; do # The tag file might have been left by a preceding # update (see bsc#1059627) rm -f "/run/rpm-php5-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-php5-update-$service-new-in-upgrade" fi done for service in php-fpm.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset php-fpm.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in php-fpm.service ; do if [ ! -e "/run/rpm-php5-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-php5-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in php-fpm.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG=$1 FORCE_YES=0 set -- php-fpm PNAME=php5 INSSRV_ARRAY="" while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 shift SV_B='^### BEGIN INIT INFO' SV_E='^### END INIT INFO' SV_KW=Default-Enabled SV_VALUE=`sed -n -e "/$SV_B/,/$SV_E/{/^# [^[:space:]]*$SV_KW:[[:space:]]*\([^[:space:]]*\).*/s//\1/p;}" < /etc/init.d/$SCRIPTNAME` test "$FORCE_YES" = "1" && SV_VALUE="yes" test -n "$SV_VALUE" || SV_VALUE="no" INSSRV_ARRAY="$INSSRV_ARRAY $SCRIPTNAME $SV_VALUE" done set -- $INSSRV_ARRAY while [ ${#*} -gt 0 ] ; do SCRIPTNAME=$1 SV_VALUE=$2 shift 2 test -n "$SCRIPTNAME" -a -n "$SV_VALUE" || { echo "SCRIPTNAME or SV_VALUE unknown"; exit 1;} if test "$FIRST_ARG" = "1" -a "$SV_VALUE" = "no" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} -r /etc/init.d/$SCRIPTNAME elif test "$FIRST_ARG" = "1" -o "$FORCE_YES" = "1" ; then /sbin/insserv ${YAST_IS_RUNNING:+-f} /etc/init.d/$SCRIPTNAME fi done test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable php-fpm.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop php-fpm.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" = "0" ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_STOP_ON_REMOVAL" != yes ; then for service in php-fpm ; do test -x /bin/systemctl && /bin/systemctl stop $service >/dev/null 2>&1 || : done fi fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart php-fpm.service ) || : fi else # package uninstall for service in php-fpm.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fi test -n "$FIRST_ARG" || FIRST_ARG=$1 if test "$FIRST_ARG" -ge 1 ; then test -f /etc/sysconfig/services && . /etc/sysconfig/services if test "$YAST_IS_RUNNING" != "instsys" -a "$DISABLE_RESTART_ON_UPDATE" != yes ; then test -x /bin/systemctl && /bin/systemctl daemon-reload >/dev/null 2>&1 || : for service in php-fpm ; do test -x /bin/systemctl && /bin/systemctl try-restart $service >/dev/null 2>&1 || : done fi fi /sbin/insserv /etc/init.d'Wr w8*A큤A큤\櫤\櫗\櫗\櫤\櫩\櫬\櫗\櫗\櫗1913f0d64333deb6c897f9b28d5cdf120d61c8f97a151e970dbaee5a8951113198782259e7f5f559f5f58e05f8eb006da9aa63f7ebf9f72dde34f0a1931376184ae51d321f8c0949a5f8be6c7bda407b96f7f7a6b3c8e1d134b89bb62f2f553dservicerootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootphp5-5.5.14-118.1.src.rpmconfig(php5-fpm)php-datephp-filterphp-fpmphp-pcrephp-reflectionphp-sessionphp-simplexmlphp-splphp-xmlphp5-fpmphp5-fpm(x86-64)sysvinit(php-fpm) @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@   /bin/sh/bin/sh/bin/sh/bin/sh/bin/shconfig(php5-fpm)insservlibc.so.6()(64bit)libc.so.6(GLIBC_2.11)(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libcrypt.so.1()(64bit)libcrypt.so.1(GLIBC_2.2.5)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.2.5)(64bit)libpcre.so.1()(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)librt.so.1()(64bit)librt.so.1(GLIBC_2.2.5)(64bit)libsystemd-daemon.so.0()(64bit)libsystemd-daemon.so.0(LIBSYSTEMD_DAEMON_31)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.5.2)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.11)(64bit)libxml2.so.2(LIBXML2_2.6.5)(64bit)libxml2.so.2(LIBXML2_2.9.0)(64bit)php5rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)sedsystemdsystemdsystemdsystemdrpmlib(PayloadIsLzma)5.5.14-118.15.5.143.0.4-14.0-14.4.6-14.11.2\\@\@\+@\M\~d\X)@[[:@[[9@[e@[2*[Z@ZS&RRR@R1@R@RSRRG@RG@RG@RG@RG@RG@RG@RG@R@RpRZ@RB@R(r@RZ@QMQ@Q@QKQ@Q@Qzl@Qzl@Qu&@QnQkQkQ^QJ@QJ@Q+R@Q@P@P}L@PvP;a@P;a@PO@Ot@OX@OLO-O*zO#@O@ObO yO@N@NxN2NN@N@Nu@NdNbNZ-NS@NENA!@N>~@N;@N98@N6@N5CN/N*N@NNN@NpN@M@MM@M@M@MM5@M5@MWMnM@M@M@M@MMx@MM@MwkMgMc@MS@M.@M*M*M)@M%M PM\@M\@M L@L@L@LLY@LXLEL@KQ@K@K@KKK@KRKKK0KVJ1@JG@J#JJ/@J@J@JJQJ@J_@J;}JB@I@pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comPetr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comsflees@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comabergmann@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.czpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comschwab@linux-m68k.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comadaugherity@tamu.edupgajdos@suse.compgajdos@suse.comhrvoje.senjan@gmail.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comRalf Lang pgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.comjengelh@inai.depgajdos@suse.compgajdos@suse.comadaugherity@tamu.eduadaugherity@tamu.edupgajdos@suse.comslavb18@gmail.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.organdrea.turrini@gmail.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orglang@b1-systems.decrrodriguez@opensuse.orgsbutler1@illinois.educrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgchris@computersalat.depgajdos@suse.czchris@computersalat.depgajdos@suse.czcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgro@suse.decristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdimstar@opensuse.orgvuntz@opensuse.orgaj@suse.dejengelh@medozas.decoolo@novell.comcrrodriguez@opensuse.orgcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@novell.comcrrodriguez@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decoolo@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.de- security update - added patches CVE-2019-11036 [bsc#1134322] + php-CVE-2019-11036.patch- security update - added patches CVE-2019-11034 [bsc#1132838] + php-CVE-2019-11034.patch CVE-2019-11035 [bsc#1132837] + php-CVE-2019-11035.patch- security update - added patches CVE-2019-9637 [bsc#1128892] + php-CVE-2019-9637.patch CVE-2019-9675 [bsc#1128886] + php-CVE-2019-9675.patch CVE-2019-9638 [bsc#1128889], CVE-2019-9639 [bsc#1128887] + php-CVE-2019-9638,9639.patch CVE-2019-9640 [bsc#1128883] + php-CVE-2019-9640.patch- security update * CVE-2019-9024 [bsc#1126821] + php-CVE-2019-9024.patch * CVE-2019-9020 [bsc#1126711] + php-CVE-2019-9020.patch * CVE-2018-20783 [bsc#1127122] + php-CVE-2018-20783.patch * CVE-2019-9021 [bsc#1126713] + php-CVE-2019-9021.patch * CVE-2019-9023 [bsc#1126823] + php-CVE-2019-9023.patch * CVE-2019-9641 [bsc#1128722] + php-CVE-2019-9641.patch- asan_build: build ASAN included - debug_build: build more suitable for debugging- CVE-2019-6977 [bsc#1123354] + php-CVE-2019-6977.patch- security update * imap_open script injection flaw, CVE-2018-19518 [bsc#1117107] + php-imap_open-script-injection.patch- security update * CVE-2018-17082 [bsc#1108753] + php-CVE-2018-17082.patch- fix segfault in pcre extension, CVE-2017-9118 [bsc#1105466] + php-pcre-replace-impl-CWE-680.patch- align patch names: php5-CVE-2018-14851.patch -> php-CVE-2018-14851.patch- security update * CVE-2018-14851 [bsc#1103659] + php-CVE-2018-14851.patch- security update * CVE-2018-12882 [bsc#1099098] + php-CVE-2018-12882.patch- security update * CVE-2018-10360 [bsc#1096984] + php-CVE-2018-10360.patch- security update * CVE-2018-10545 [bsc#1091367] + php-CVE-2018-10545.patch * CVE-2018-10547 [bsc#1091362] + php-CVE-2018-10547.patch * CVE-2018-10546 [bsc#1091363] + php-CVE-2018-10546.patch * CVE-2018-10548 [bsc#1091355] + php-CVE-2018-10548.patch- security update: * CVE-2018-7584 [bsc#1083639] + php-CVE-2018-7584.patch- security update: * CVE-2016-10712 [bsc#1080234] + php-CVE-2016-10712.patch- security update: * CVE-2018-5712 [bsc#1076220] + php-CVE-2018-5712.patch * CVE-2018-5711 [bsc#1076391] + php-CVE-2018-5711.patch- security update: * CVE-2017-9228 [bsc#1069606] + php-CVE-2017-9228.patch * CVE-2017-9229 [bsc#1069631] + php-CVE-2017-9229.patch- security update: * CVE-2017-16642 [bsc#1067441] + php-CVE-2017-16642.patch * CVE-2017-4025 [bsc#1067090] + php-CVE-2017-4025.patch- security update: * CVE-2017-12933 [bsc#1054430] + php-CVE-2017-12933.patch- security update: * CVE-2017-11628 [bsc#1050726] + php-CVE-2017-11628.patch * CVE-2017-7890 [bsc#1050241] + php-CVE-2017-7890.patch * complete fix for CVE-2016-5766 [bsc#986386c#23] . amended php-CVE-2016-5766.patch . refreshed php-CVE-2016-10168.patch- security update: * CVE-2017-11143 [bsc#1048097] + php-CVE-2017-11143.patch * CVE-2017-11145 [bsc#1048112] + php-CVE-2017-11145.patch * CVE-2017-11146 [bsc#1048111] + php-CVE-2017-11146.patch * CVE-2016-10397 [bsc#1047454] + php-CVE-2016-10397.patch * CVE-2017-11147 [bsc#1048094] + php-CVE-2017-11147.patch * CVE-2017-11144 [bsc#1048096] + php-CVE-2017-11144.patch- fix for CVE-2017-7272 was reverted [bsc#1044976]- security update: * CVE-2017-9227 [bsc#1040883] + php-CVE-2017-9227.patch * CVE-2017-9226 [bsc#1040889] + php-CVE-2017-9226.patch * CVE-2017-9224 [bsc#1040891] + php-CVE-2017-9224.patch- security update: * CVE-2016-6294 [bsc#1035111] + php-CVE-2016-6294.patch- security update: * CVE-2017-7272 [bsc#1031246] + php-CVE-2017-7272.patch- security update: * CVE-2015-8994 [bsc#1027210] + php-CVE-2015-8994.patch- security update: * CVE-2016-10161 [bsc#1022260] + php-CVE-2016-10161.patch * CVE-2016-10158 [bsc#1022219] + php-CVE-2016-10158.patch * CVE-2016-10167 [bsc#1022264] + php-CVE-2016-10167.patch * CVE-2016-10168 [bsc#1022265] + php-CVE-2016-10168.patch * CVE-2016-10166 [bsc#1022263] + php-CVE-2016-10166.patch * CVE-2016-10159 [bsc#1022255] + php-CVE-2016-10159.patch * CVE-2016-10160 [bsc#1022257] + php-CVE-2016-10160.patch- security update: * CVE-2016-7478 [bsc#1019550] + php-CVE-2016-7478.patch- security update: * CVE-2016-9933 [bsc#1015187] + php-CVE-2016-9933.patch * CVE-2016-9934 [bsc#1015188] + php-CVE-2016-9934.patch * CVE-2016-9935 [bsc#1015189] + php-CVE-2016-9935.patch- security update: * CVE-2016-9137 [bsc#1008029] + php-CVE-2016-9137.patch- security update: * CVE-2016-8670 [bsc#1004924] + php-CVE-2016-8670.patch * CVE-2016-6911 [bsc#1005274] + php-CVE-2016-6911.patch- security update: * CVE-2016-7568 [bsc#1001900] + php-CVE-2016-7568.patch- security update: * CVE-2016-7412 [bsc#999680] + php-CVE-2016-7412.patch * CVE-2016-7411 [bsc#999682] + php-CVE-2016-7411.patch * CVE-2016-7417 [bsc#999684] + php-CVE-2016-7417.patch * CVE-2016-7413 [bsc#999679] + php-CVE-2016-7413.patch * CVE-2016-7418 [bsc#999819] + php-CVE-2016-7418.patch * CVE-2016-7414 [bsc#999820] + php-CVE-2016-7414.patch * CVE-2016-7416 [bsc#999685] + php-CVE-2016-7416.patch- security update: * CVE-2016-7132 [bsc#997230], CVE-2016-7131 [bsc#997225] + php-CVE-2016-7131,7132.patch * CVE-2016-7129 [bsc#997220] + php-CVE-2016-7129.patch * CVE-2016-7130 [bsc#997257] + php-CVE-2016-7130.patch * CVE-2016-7134 [bsc#997248] + php-CVE-2016-7134.patch * CVE-2016-7128 [bsc#997211] + php-CVE-2016-7128.patch * CVE-2016-7127 [bsc#997210] + php-CVE-2016-7127.patch * CVE-2016-7126 [bsc#997208] + php-CVE-2016-7126.patch * CVE-2016-7125 [bsc#997207] + php-CVE-2016-7125.patch * CVE-2016-7124 [bsc#997206] + php-CVE-2016-7124.patch- security update: * CVE-2014-3587 [bsc#987530] + php-CVE-2016-3587.patch * CVE-2016-6128 [bsc#987580] + php-CVE-2016-6128.patch * CVE-2016-6161 [bsc#988032] + php-CVE-2016-6161.patch * CVE-2016-6292 [bsc#991422] + php-CVE-2016-6292.patch * CVE-2016-6295 [bsc#991424] + php-CVE-2016-6295.patch * CVE-2016-6297 [bsc#991426] + php-CVE-2016-6297.patch * CVE-2016-6291 [bsc#991427] + php-CVE-2016-6291.patch * CVE-2016-6289 [bsc#991428] + php-CVE-2016-6289.patch * CVE-2016-6290 [bsc#991429] + php-CVE-2016-6290.patch * CVE-2016-5399 [bsc#991430] + php-CVE-2016-5399.patch * CVE-2016-6288 [bsc#991433] + php-CVE-2016-6288.patch * CVE-2016-6296 [bsc#991437] + php-CVE-2016-6296.patch * CVE-2016-6207 [bsc#991434] + php-CVE-2016-6207.patch- security update: * CVE-2016-5385 [bsc#988486] + php-CVE-2016-5385.patch- security update: * CVE-2016-5768 [bsc#986246] + php-CVE-2016-5768.patch * CVE-2016-5772 [bsc#986244] + php-CVE-2016-5772.patch * CVE-2015-8935 [bsc#986004] + php-CVE-2015-8935.patch * CVE-2016-5770 [bsc#986392] + php-CVE-2016-5770.patch * CVE-2016-5771 [bsc#986391] + php-CVE-2016-5771.patch * CVE-2016-5769 [bsc#986388] + php-CVE-2016-5769.patch * CVE-2016-5766 [bsc#986386] + php-CVE-2016-5766.patch * CVE-2016-5767 [bsc#986393] + php-CVE-2016-5767.patch * CVE-2016-5773 [bsc#986247] + php-CVE-2016-5773.patch- security update: * CVE-2013-7456 [bsc#982009] + php-CVE-2013-7456.patch * CVE-2016-5093 [bsc#982010] + php-CVE-2016-5093.patch * CVE-2016-5094, CVE-2016-5095 [bsc#982011] [bsc#982012] + php-CVE-2016-5094,5095.patch * CVE-2016-5096 [bsc#982013] + php-CVE-2016-5096.patch- security update: * CVE-2015-8877 [bsc#981061] + php-CVE-2015-8877.patch * CVE-2015-8876 [bsc#981049] + php-CVE-2015-8876.patc * CVE-2015-8879 [bsc#981050] + php-CVE-2015-8879.patch- security update: * CVE-2015-4116 [bsc#980366] + php-CVE-2015-4116.patch * CVE-2015-8874 [bsc#980375] + php-CVE-2015-8874.patch * CVE-2015-8873 [bsc#980373] + php-CVE-2015-8873.patch- security update: * CVE-2016-4540, CVE-2016-4541 [bsc#978829] + php-CVE-2016-4540,4541.patch * CVE-2016-4542, CVE-2016-4543, CVE-2016-4544 [bsc#978830] + php-CVE-2016-4542,4543,4544.patch * CVE-2016-4537, CVE-2016-4538 [bsc#978827] + php-CVE-2016-4537,4538.patch * CVE-2016-4539 [bsc#978828] + php-CVE-2016-4539.patch- security update: * CVE-2016-4342 [bsc#977991] + php-CVE-2016-4342.patch * CVE-2016-4346 [bsc#977994] + php-CVE-2016-4346.patch * CVE-2016-4346 [bsc#977994] + php-CVE-2016-4346.patch- security update: * CVE-2016-4073 [bsc#977003] + php-CVE-2016-4073.patch * CVE-2015-8867 [bsc#977005] + php-CVE-2015-8867.patch * CVE-2016-4070 [bsc#976997] + php-CVE-2016-4070.patch * CVE-2015-8866 [bsc#976996] + php-CVE-2015-8866.patch * CVE-2016-4071 [bsc#977000] + php-CVE-2016-4071.patch- fix incomplete php-CVE-2015-8835.patch [bsc#973351#c14]- fixed libmagic buffer overflow [bsc#974305] + php-libmagic-boverflow-malformed-magic-file.patch- security update: * CVE-2015-8838 [bsc#973792] + php-CVE-2015-8838.patch- security update: * CVE-2015-8835 [bsc#973351] + php-CVE-2015-8835.patch- security update: * CVE-2016-3141 [bsc#969821] + php-CVE-2016-3141.patch * CVE-2016-3142 [bsc#971912] + php-CVE-2016-3142.patch * CVE-2014-9767 [bsc#971612] + php-CVE-2014-9767.patch * CVE-2016-3185 [bsc#971611] + php-CVE-2016-3185.patch- security update: * CVE-2016-2554 [bsc#968284]- security update: * CVE-2015-7803 [bsc#949961] + php-CVE-2015-7803.patch * CVE-2016-1903 [bsc#962057] + php-CVE-2016-1903.patch- revert upstream change in suhosin.ini -- suhosin extension is loaded by default [bnc#949134] + php-suhosin.ini.patch- security update: * CVE-2015-6831 [bnc#942291] [bnc#942294] [bnc#942295] + php-CVE-2015-6831.patch * CVE-2015-6832 [bnc#942293] + php-CVE-2015-6832.patch * CVE-2015-6833 [bnc#942296] + php-CVE-2015-6833.patch * CVE-2015-6834 [bnc#945403] + php-CVE-2015-6834.patch * CVE-2015-6835 [bnc#945402] + php-CVE-2015-6835.patch * CVE-2015-6836 [bnc#945428] + php-CVE-2015-6836.patch * CVE-2015-6837 CVE-2015-6838 [bnc#945412] + php-CVE-2015-6837,6838.patch - compare with SQL_NULL_DATA correctly [bnc#935074] + php-odbc-cmp-int-cast.patch- added php5-fix_net-snmp_disable_MD5.patch: If MD5 was disabled in net-snmp we have to disable the used MD5 function in ext/snmp/snmp.c as well. (bsc#944302)- updated suhosin to 0.9.38 [fate#319325] * removed php5-suhosin-php55.patch- security update: * CVE-2015-5590 [bnc#938719] + php-CVE-2015-5590.patch * CVE-2015-5589 [bnc#938721] + php-CVE-2015-5589.patch- security update: * CVE-2015-4602 [bnc#935224] + php-CVE-2015-4602.patch * CVE-2015-4599, CVE-2015-4600, CVE-2015-4601 [bnc#935226] + php-CVE-2015-4599,4600,4601.patch * CVE-2015-4603 [bnc#935234] + php-CVE-2015-4603.patch * CVE-2015-4644 [bnc#935274] + php-CVE-2015-4644.patch * CVE-2015-4643 [bnc#935275] + php-CVE-2015-4643.patch * CVE-2015-3411, CVE-2015-3412, CVE-2015-4598 [bnc#935277], [bnc#935232], [bnc#935234] + php-CVE-2015-3411,3412,4598.patch- configure php-fpm with --localstatedir=/var [bnc#927147]- security update: * CVE-2015-4148 [bnc#933227]- fix timezone map [bnc#919080]- security update: * CVE-2015-4024 [bnc#931421] + php-CVE-2015-4024.patch * CVE-2015-4026 [bnc#931776] + php-CVE-2015-4026.patch * CVE-2015-4022 [bnc#931772] + php-CVE-2015-4022.patch * CVE-2015-4021 [bnc#931769] + php-CVE-2015-4021.patch- security update: * CVE-2015-3330 [bnc#928408] + php-CVE-2015-3330.patch * CVE-2015-3329 [bnc#928506] + php-CVE-2015-3329.patch * CVE-2015-2783 [bnc#928511] + php-CVE-2015-2783.patch- security update: * CVE-2015-2787 [bnc#924972] + php-CVE-2015-2787.patch * unserialize SoapClient type confusion [bnc#925109] + php-unserialize-soap-type-confusion.patch * CVE-2015-2348 [bnc#924970] + php-CVE-2015-2348.patch- security update: * CVE-2014-9709 [bnc#923946] + php-CVE-2014-9709.patch * CVE-2015-2301 [bnc#922022] + php-CVE-2015-2301.patch * CVE-2015-2305 [bnc#922452] + php-CVE-2015-2305.patch * CVE-2014-9705 [bnc#922451] + php-CVE-2014-9705.patch- security update: * CVE-2015-0273 [bnc#918768] + php-CVE-2015-0273.patch * CVE-2014-9652 [bnc#917150] + php-CVE-2014-9652.patch- security update: * CVE-2014-8142 [bnc#910659] + php-CVE-2014-8142.patch * CVE-2015-0231 [bnc#910659] + php-CVE-2015-0231.patch * null ptr deref [bnc#910659] + php-unserialize-null-ptr-deref.patch * CVE-2014-9427 [bnc#911664] + php-CVE-2014-9427.patch * CVE-2015-0232 [bnc#914690] + php-CVE-2015-0232.patch - added added README.default_socket_timeout [bnc#907519]- security update: * CVE-2014-3670 [bnc#902357] * CVE-2014-3669 [bnc#902360] * CVE-2014-3668 [bnc#902368] - added patches: * php-CVE-2014-3670.patch * php-CVE-2014-3669.patch * php-CVE-2014-3668.patch- security update: * CVE-2014-5459 [bnc#893849] * CVE-2014-3597 [bnc#893853] * CVE-2014-5120 [bnc#893855] - added patches: * php-CVE-2014-3597.patch * php-CVE-2014-5120.patch- fixed crash when throwing and handling an exception in one finally block [bnc#868098] - that breaks Zend ABI 20121212 - added patches: * php5-finally-exception-crash.patch- security update: * php-CVE-2014-4670.patch [bnc#886059] * php-CVE-2014-4698.patch [bnc#886060] - php-5.5.10-CVE-2014-2497.patch renamed to php-CVE-2014-2497.patch i- updated to 5.5.14: This release fixes several bugs against PHP 5.5.13. Also, this release fixes a total of 8 CVEs, half of them concerning the FileInfo extension. - removed CVE-2014-4049.patch (upstreamed)- security update * php-5.5.13-CVE-2014-4049.patch [bnc#882992]- php5-5.5.10-CVE-2014-2497.patch renamed to php-5.5.10-CVE-2014-2497.patch to be consistent with other product php patches names- do not package latest_test_results.txt; instead, run build-test.sh twice: before and after source changes- updated to 5.5.13: This release fixes several bugs in PHP 5.5.12, and addresses two CVEs in Fileinfo (CVE-2014-0238 and CVE-2014-0237).- updated to 5.5.12: Fixed several bugs against PHP 5.5.11, as well as CVE-2014-0185 regarding PHP-FPM. - improved build-test.sh- build-test.sh: use relevant api for build; propagate build parameters to osc- php5-gcc_builtins.patch: remove unused patch- add build-test.sh and latest_test_results.txt for testing regressions in tests before and after update. Run sh build-test.sh after changes. php will get built and test results will be compared with latest_test_results.txt and differences reported. mv latest_test_results.txt.new latest_test_results.txt if differences are acceptable.- updated to 5.5.11: * Several bugs were fixed in this release, some bundled libraries updated and a security issue has been fixed : CVE-2013-7345.- fixed CVE-2014-2497 [bnc#868624]- updated to 5.5.10: * Several bugs were fixed in this release, including security issues related to CVEs. CVE-2014-1943, CVE-2014-2270 and CVE-2013-7327 have been addressed in this release.- Fix build on non-systemd distros (esp. SLES 11)- updated to 5.5.9: * This release fixes several bugs against PHP 5.5.8. * see NEWS or http://www.php.net/ChangeLog-5.php#5.5.9 for details - modified patches: * php5-no-build-date.patch (refreshed using quilt)- updated to 5.5.8: * fixes CVE-2013-6712 and build against freetype2 * see http://www.php.net/ChangeLog-5.php#5.5.8 for more * removed CVE-2013-6712.patch * removed freetype2_include_dir.patch- Added php5-freetype2_include_dir.patch: Fixes check of freetype2 headers, as freetype2 2.5.1 changed the header location- updated to 5.5.7: * fixes some bugs against PHP 5.5.6 and it also includes a fix for CVE-2013-6420 in OpenSSL extension - > removed CVE-2013-6420.patch- security update [bnc#854880] * added CVE-2013-6420.patch- security update [bnc#853045] * added CVE-2013-6712.patch- updated to 5.5.6: * fixes some bugs against PHP 5.5.5, and adds some performance improvements. * see http://www.php.net/ChangeLog-5.php#5.5.6 for details- updated to 5.5.5: * This release fixes about twenty bugs against PHP 5.5.4, some of them regarding the build system. * added sys_temp_dir ini directive - removed custom-tmp-dir.patch (upstreamed)- updated to 5.5.4: * This release fixes several bugs against PHP 5.5.3. - crypt-tests.patch partially upstreamed - use zend_extension instead of extension directive in opcache.ini [bnc#840350]- updated to 5.5.3: These release fix a bug in the patch for CVE-2013-4248 in OpenSSL module and compile failure with ZTS enabled in PHP 5.4.- updated to 5.5.2: * About 20 bugs were fixed, including security issue in OpenSSL module (CVE-2013-4248) and session fixation problem (CVE-2011-4718).- updated to 5.5.1 * bugfixes incl. security fix in the XML parser- replace php5-64-bit-post-large-files.patch with php5-big-file-upload.patch patch that uses def_t instead of signed long as suggested by upstream- updated to 5.5.0: * Added generators and coroutines. * Added the finally keyword. * Added a simplified password hashing API. * Added support for constant array/string dereferencing. * Added scalar class name resolution via ::class. * Added support for using empty() on the result of function calls and other expressions. * Added support for non-scalar Iterator keys in foreach. * Added support for list() constructs in foreach statements. * Added the Zend OPcache extension for opcode caching. * A lot more improvements and fixes. * PHP logo GUIDs have been removed. * Case insensitivity is no longer locale specific. All case insensitive matching for function, class and constant names is now performed in a locale independent manner according to ASCII rules. - buildrequire cyrus-sasl-devel explicitely - suhosin-php54.patch renamed to suhosin-php55.patch- update to 5.4.22: * About 10 bugs were fixed. * see http://www.php.net/ChangeLog-5.php#5.4.22 for details- updatedto 5.4.21: * About 10 bugs were fixed. * added custom-tmp-dir.patch by Per Jessen- build with --with-fpm-systemd and install systemd unit - php5-systemd-unit.patch: tweak systemd unit for openSUSE requirements - php5-openssl.patch: only openSSL_config() is really needed. - Recommended for 13.1 and Factory- updated to 5.4.20: * About 30 bugs were fixed.- updated to 5.4.19: * These releases fix a bug in the patch for CVE-2013-4248 in OpenSSL module and compile failure with ZTS enabled in PHP 5.4.- updated to 5.4.18: * About 30 bugs were fixed, including security issues CVE-2013-4113 and CVE-2013-4248.- php5-per-mod-log.patch: It turns out that requesting per-module logging support in 2.4 will not do a thing if the expansion of APLOG_USE_MODULE is not visible to all files of the module so place it in the header instead.- php5-per-mod-log.patch Support apache 2.4 per module logging - php5-apache24-updates.patch Use proper API in apache 2.4 to determine when the module has to be loaded. I made this patches at least a year ago, but for some reason they went out of my radar and were not applied to upstream Will be submitted again soon.- updated to 5.4.17: Core: Fixed bug #64988 (Class loading order affects E_STRICT warning). Fixed bug #64966 (segfault in zend_do_fcall_common_helper_SPEC). Fixed bug #64960 (Segfault in gc_zval_possible_root). Fixed bug #64936 (doc comments picked up from previous scanner run). Fixed bug #64934 (Apache2 TS crash with get_browser()). Fixed bug #64166 (quoted-printable-encode stream filter incorrectly discarding whitespace). DateTime: Fixed bug #53437 (Crash when using unserialized DatePeriod instance). FPM: Fixed bug #64915 (error_log ignored when daemonize=0). Implemented FR #64764 (add support for FPM init.d script). PDO: Fixed bug #63176 (Segmentation fault when instantiate 2 persistent PDO to the same db server). PDO_DBlib: Fixed bug #63638 (Cannot connect to SQL Server 2008 with PDO dblib). Fixed bug #64338 (pdo_dblib can't connect to Azure SQL). Fixed bug #64808 (FreeTDS PDO getColumnMeta on a prepared but not executed statement crashes). PDO_firebird: Fixed bug #64037 (Firebird return wrong value for numeric field). Fixed bug #62024 (Cannot insert second row with null using parametrized query). PDO_mysql: Fixed bug #48724 (getColumnMeta() doesn't return native_type for BIT, TINYINT and YEAR). PDO_pgsql: Fixed bug #64949 (Buffer overflow in _pdo_pgsql_error). pgsql: Fixed bug #64609 (pg_convert enum type support). Readline: Implement FR #55694 (Expose additional readline variable to prevent default filename completion). SPL: Fixed bug #64997 (Segfault while using RecursiveIteratorIterator on 64-bits systems).- Explicitly specify cyrus-sasl build dependency- updated to 5.4.16 - Core: . Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE 2013-2110). (Stas) . Fixed bug #64853 (Use of no longer available ini directives causes crash on TS build). (Anatol) . Fixed bug #64729 (compilation failure on x32). (Gustavo) . Fixed bug #64720 (SegFault on zend_deactivate). (Dmitry) . Fixed bug #64660 (Segfault on memory exhaustion within function definition). (Stas, reported by Juha Kylmänen) - Calendar: . Fixed bug #64895 (Integer overflow in SndToJewish). (Remi) - Fileinfo: . Fixed bug #64830 (mimetype detection segfaults on mp3 file). (Anatol) - FPM: . Ignore QUERY_STRING when sent in SCRIPT_FILENAME. (Remi) . Fixed some possible memory or resource leaks and possible null dereference detected by code coverity scan. (Remi) . Log a warning when a syscall fails. (Remi) . Add --with-fpm-systemd option to report health to systemd, and systemd_interval option to configure this. The service can now use Type=notify in the systemd unit file. (Remi) - MySQLi . Fixed bug #64726 (Segfault when calling fetch_object on a use_result and DB pointer has closed). (Laruence) - Phar . Fixed bug #64214 (PHAR PHPTs intermittently crash when run on DFS, SMB or with non std tmp dir). (Pierre) - SNMP: . Fixed bug #64765 (Some IPv6 addresses get interpreted wrong). (Boris Lytochkin) . Fixed bug #64159 (Truncated snmpget). (Boris Lytochkin) - Streams: . Fixed bug #64770 (stream_select() fails with pipes returned by proc_open() on Windows x64). (Anatol) - Zend Engine: . Fixed bug #64821 (Custom Exceptions crash when internal properties overridden). (Anatol)- updated to 5.4.15: Core: Fixed bug #64578 (debug_backtrace in set_error_handler corrupts zend heap: segfault). Fixed bug #64458 (dns_get_record result with string of length -1). Fixed bug #64433 (follow_location parameter of context is ignored for most response codes). Fixed bug #47675 (fd leak on Solaris). Fixed bug #64577 (fd leak on Solaris). Fileinfo: Upgraded libmagic to 5.14. Streams: Fixed Windows x64 version of stream_socket_pair() and improved error handling. Zip: Fixed bug #64342 (ZipArchive::addFile() has to check for file existence).- Conflict with php53 packages so zypper doesn't suggest installing a mix of php53-* (from SLES 11) and php5-* (these 5.4 packages).- Fix build on SLES 11 (no firebird) and openSUSE <= 12.1 (no separate libfbclient2-devel pkg).- use current install-pear-nozlib.phar from http://pear.php.net/install-pear-nozlib.phar - php5-pear package provides/obsoletes php5-pear-Archive_Tar, see explanation in the spec- add php5-firebird providing php5-interbase and php5-pdo_firebird- updated to 5.4.14: Core: Fixed bug #64529 (Ran out of opcode space). Fixed bug #64515 (Memoryleak when using the same variablename two times in function declaration). Fixed bug #64432 (more empty delimiter warning in strX methods). Fixed bug #64417 (ArrayAccess::&offsetGet() in a trait causes fatal error). Fixed bug #64370 (microtime(true) less than $_SERVER['REQUEST_TIME_FLOAT']). Fixed bug #64239 (Debug backtrace changed behavior since 5.4.10 or 5.4.11). Fixed bug #63976 (Parent class incorrectly using child constant in class property). Fixed bug #63914 (zend_do_fcall_common_helper_SPEC does not handle exceptions properly). Fixed bug #62343 (Show class_alias In get_declared_classes()). PCRE: Merged PCRE 8.32. SNMP: Fixed bug #61981 (OO API, walk: $suffix_as_key is not working correctly). Zip: Fixed bug #64452 (Zip crash intermittently). (Anatol)- libc-client.so needs -lssl- fixed 'http limits uploads to 2GB' [bnc#812800], see https://bugs.php.net/bug.php?id=44522 * 64bit-post-large-files.patch- updated to 5.4.13: Core: Fixed bug #64235 (Insteadof not work for class method in 5.4.11). Implemented FR #64175 (Added HTTP codes as of RFC 6585). Fixed bug #64142 (dval to lval different behavior on ppc64). Fixed bug #64070 (Inheritance with Traits failed with error). CLI server: Fixed bug #64128 (buit-in web server is broken on ppc64). Mbstring: mb_split() can now handle empty matches like preg_split() does. OpenSSL: Fixed bug #61930 (openssl corrupts ssl key resource when using openssl_get_publickey()). PDO_mysql: Fixed bug #60840 (undefined symbol: mysqlnd_debug_std_no_trace_funcs). Phar: Fixed timestamp update on Phar contents modification. SOAP Added check that soap.wsdl_cache_dir conforms to open_basedir (CVE-2013-1635). Disabled external entities loading (CVE-2013-1643, CVE-2013-1824). SPL: Fixed bug #64264 (SPLFixedArray toArray problem). Fixed bug #64228 (RecursiveDirectoryIterator always assumes SKIP_DOTS). Fixed bug #64106 (Segfault on SplFixedArray[][x] = y when extended). Fixed bug #52861 (unset fails with ArrayObject and deep arrays). SNMP: Fixed bug #64124 (IPv6 malformed).- updated to 5.4.12: * dropped sqlite.so (no longer shipped with 5.4) * dropped t1lib support * dropped %{suse_version} 10.x support * see /usr/share/doc/packages/php5/UPGRADING or http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/UPGRADING for details * source changes: D php-5.2.9-BNC-457056.patch -- renamed to php5-BNC-457056.patch D php-5.3.0-bnc513080.patch -- there's no relevant code in exif.c D php-5.3.1-systzdata-v7.patch -- renamed to php5-systzdata-v7.patch D php-5.3.2-aconf26x.patch -- dropped, it is not needed yet D php-5.3.2-ini.patch -- renamed to php5-ini.patch D php-5.3.2-no-build-date.patch -- renamed to php5-no-build-date.patch D php-5.3.22.tar.bz2 -- old tarball D php-5.3.4-format-string-issues.patch -- renamed to php5-format-string-issues.patch D php-5.3.4-pts.patch -- renamed to php5-pts.patch D php-5.3.6-gcc_builtins.patch -- renamed to php5-gcc_builtins.patch D php-5.3.6-ini-date.timezone.patch -- part of php5-ini.patch D php-5.3.8-CVE-2011-4153.patch -- fixed in 5.4 branch D php-5.3.8-crypt-tests.patch -- renamed to php5-crypt-tests.patch D php-5.3.8-no-reentrant-crypt.patch -- renamed to php5-no-reentrant-crypt.patch A php-5.4.13.tar.bz2 -- new version tarball D php-cloexec.patch -- renamed to php5-cloexec.patch M php-suse-addons.tar.bz2 -- content of tar balls are actualy equal A php5-BNC-457056.patch -- renamed from php-5.2.9-BNC-457056.patch, not rebased A php5-cloexec.patch -- renamed from php-cloexec.patch, rebased A php5-sytzdata-v7.patch -- renamed from sytzdata-v7.pach, not rebased A php-format-string-issues.patch -- renamed from php5-5.3.4-format-string-issues.patch, not rebased A php5-crypt-tests.patch -- renamed from php-5.3.8-crypt-tests.patch, not rebased A php5-gcc_builtins.patch -- renamed from php-5.3.6-gcc_builtins.patch, not rebased A php5-ini.patch -- renamed from php-5.3.2-ini.patch, rebased A php5-mbstring-missing-return.patch -- new patch, missing return M php5-missing-extdeps.patch -- rebased A php5-no-build-date.patch -- renamed from php-5.3.2-no-build-date.patch, rebased A php5-no-reentrant-crypt.patch -- renamed from php-5.3.8-no-reentrant-crypt.patch, not rebased M php5-openssl.patch -- rebased M php5-phpize.patch -- rebased A php5-pts.patch -- renamed from php-5.3.4-pts.patch, not rebased A php5-suhosin-php54.patch -- patch on top of suhosin-0.9.33.tgz to work with php 5.4 M php5.changes -- this change log M php5.spec -- new version, etc D suhosin-patch-5.3.3-0.9.10.patch.gz -- dropped, seems not be used for some time- updated to 5.3.22: . Fixed bug #64099 (Wrong TSRM usage in zend_Register_class alias). (Johannes) . Fixed bug #63899 (Use after scope error in zend_compile). (Laruence) . Fixed bug #63943 (Bad warning text from strpos() on empty needle). (Laruence) . Fixed bug #55397 (comparsion of incomplete DateTime causes SIGSEGV). (Laruence, Derick) . Fixed bug #63999 (php with fpm fails to build on Solaris 10 or 11). (Adam) . Added check that soap.wsdl_cache_dir conforms to open_basedir (CVE-2013-1635). (Dmitry) . Disabled external entities loading (CVE-2013-1643). (Dmitry) . Fixed bug #64106 (Segfault on SplFixedArray[][x] = y when extended). (Nikita Popov)- updated to 5.3.21: * Fixed bug #63762 (Sigsegv when Exception::$trace is changed by user). * Fixed bug (segfault due to libcurl connection caching). * Fixed bug #63795 (CURL >= 7.28.0 no longer support value 1 for CURLOPT_SSL_VERIFYHOST). etc. see NEWS for details- fix CVE-2011-4153 CVE-2011-4153 [bnc#741859]- add explicit buildrequire on libbz2-devel (having to patch old .changes file to avoid "double entry")- updated to 5.3.17: * Fixed bug (segfault while build with zts and GOTO vm-kind) * Fixed bug #62844 (parse_url() does not recognize // * etc. see NEWS for details- use FilesMatch with 'SetHandler' rather than 'AddHandler' [bnc#775852]- updated to 5.3.16: * fixes over 20 bugs, see NEWS for more details- updated to 5.3.15: * fixes over 30 bugs and includes a fix for a security related overflow issue in the stream implementation (CVE-2012-2688) [bnc#772582] and open_basedir bypass, CVE-2012-3365 [bnc#772580]- updated to 5.3.14: * bug-fix release, see NEWS for details- updated to 5.3.13: various security fixes, CVE-2012-1823, CVE-2012-2311, CVE-2012-2335, CVE-2012-2336 * removed php-5.3.10-pcre_fullinfo.patch * refreshed php-5.3.2-aconf26x.patch- fix license to spdx.org format- fixed build with new pcre (php bug 60986)- Build with -fpie- PHP 5.3.10, fixes CVE-2012-0830.- remove unapplied patches- buildrequire libjpeg-devel- remove apache module conflict with apache2-worker [bnc#728671] - amended README.SUSE instead- Update to version 5.3.9 * Drop already applied patches * This update only contain minor bug fixes, it is a stop over php 5.4.0 that should be out very soon.- security update: * CVE-2011-4885 [bnc#738221] -- added max_input_vars directive to prevent attacks based on hash collisions- add autoconf as buildrequire to avoid implicit dependency- apache module conflicts with apache2-worker [bnc#728671]- security update: * CVE-2011-4566 [bnc#733590] * CVE-2011-1466 [bnc#736169]- fix license - there is no 3.1 version of php license- build php against system's libcrypt, which drops extended DES support * crypt-tests.patch * no-reentrant-crypt.patch- security update: CVE-2011-3379 [bnc#728350]- Fix wrong PAGE_SIZE assumption, must use sysconf() instead - Fix integer overflow when attempting to use more than 2 Gb of memory.- call openssl_config too in order to load user-provided engine configuration.- Cleanup patches for upcoming release.- Fixed typos in php5.spec- Fix very publicized critical bug in crypt() implementation- Add mssql support with freetds - Update PHP snapshot.- Update snapshot, more static analyzer fixes.- Update snapshot, fix converity warnings- Update snapshot, several check if malloc() succeeded.- Fix build in Factory - Fix Segfault with allow_call_time_pass_reference = Off - Using class constants in array definition fails- Add sqlite3 session storage, this is no more than a forward port of already existent sqlite2 backend- Update snap, PHP 5.3.7-RC4- Update snapshot again.- Update snapshot.- is_a() function is throwing an annoying warning "Unknown class passed as parameter" which is noticeable when you use PEAR, fix it, if your code uses it you should be using the instanceof operator anyway. - Update bundled pear.- Crash in gc_remove_zval_from_buffer CVE-NO-NAME - Crash in zend_mm_check_ptr // Heap corruption- Fixed missing Expires and Cache-Control headers for ping and status pages - fix crypt() issue with overlong salt - Fixed bug #52935 (call exit in user_error_handler cause stream relate core).- Fix crash in error_log (strlen with NULL) - Fixed exit at FPM startup on fpm_resources_prepare - Added master rlimit_files and rlimit_core - Removed pid in debug logs written by chrildren processes - Replaced shm_slots with a real scoreboard- Enable mysqlnd compression protocol.- Update snapshot to 5.3.7 RC1- Allow bison 2.5 -File path injection vulnerability in RFC1867 File upload CVE-2011-2202.- Update 5.3 snap - Fix compiler failure that happended after compile error. - Stream not closed and error not returned when SSL CN_match fails.- Update 5.3 snap - Update bundled PEAR - Case discrepancy in timezone names cause Uncaught exception and fatal error. - SEEK_CUR with 0 value, returns a warning - Restore fix: do not accept paths with NULL in them- Update to version 5.3.6.201106031621 - Crash when calling call_user_func with unknown function name - Fixed double registering of browscap ini directive- Drop Update alternatives usage, there are no alternatives PHP4 is gone and PHP6 is not coming at any time soon. - Remove "mm" support from session module, virtually nothing uses it and it doesnt support proper locking, mount /var/lib/php5 in tmpfs instead.- Update to 5.3.6.201105291701 * Fixes random crash with apache2 SAPI and php_admin_value in virtualhost configuration.- Update 5.3 branch - Fix a few memory leaks - Check if tempfile can be created in phar extension - Fix problems with __halt_compiler and imported namespaces - Properly handle out of memory conditions in mysqlnd- Update 5.3 branch. - Fix user after free in xmlreader extension.- Update to current 5.3 svn version. - For practical reasons now the hash extension is built-in,hence deprecates package php5-hash, it is nowdays required by the session and phar extensions but must be statically built to work. - Drop php5-session patch, needed only to workaround compile failure when hash extension is built as loadable extension. - php.ini now clearly says that by "3" in session.hash_function we mean SHA256.- Update to a recent 5.3.x SVN version, mostly bug fixes * track_errors causes segfault * classes from dl()'ed extensions are not destroyed * Crash when assigning value to a dimension in a non-array * use-after-free in substr_replace()- fix crash on destruction. - allow openssl extension to be built w/o SSLv2- Add a default to date.timezone because php5 warns that this is a required setting and clutters up the output in zypper installations of pear packages and other places - Versions after 5.3.6 may make this fatal- Intl extension failed to load [bnc#659868] - Fix update-alternatives usage,will be dropped in the future.- Add tcpd-devel for building the SNMP extension on SLE_10 and apache_server_SLE_10.- Update to php 5.3.6 final * Enforce security in the fastcgi protocol parsing with fpm SAPI. * Fixed bug #54247 (format-string vulnerability on Phar). (CVE-2011-1153) * Fixed bug #54193 (Integer overflow in shmop_read()). (CVE-2011-1092) * Fixed bug #54055 (buffer overrun with high values for precision ini setting). * Fixed bug #54002 (crash on crafted tag in exif). (CVE-2011-0708) * Fixed bug #53885 (ZipArchive segfault with FL_UNCHANGED on empty archive). (CVE-2011-0421)- Upgrade to PHP 5.3.6.RC3 * Drop obsoleted patches * fix some rpmlint warnings * Hundreds of changes, see NEWS for details- Fix more date in binaries causing pointless republish of pkgs.- fix for macros.php o devel pkg must have Obsoletes/Provides: php-macros- security fixes * CVE-2011-0420 [bnc#672933] * CVE-2011-0708 [bnc#671710]- extend macros.php o __php, __phpize, __php_config, php_version o __pear, php_peardir, php_pearxmldir o php_pear_gen_filelist - add README.macros- security fix: * fopen_https_proxy_auth_fix.patch [bnc#656523]- export PHP_MYSQLND_ENABLED=yes to solve the mysqlnd problem when extensions are built shared. [bnc#661464]- Go back to libmysql as there is currently no way to build shared mysql extensions with mysqlnd. [bnc#661464]- Use mysqlnd driver, this is a newer PHP-native mysql extension, that does not require external libraries. Now you can use mysql, mariadb or drizzle without extra libs. fixes bnc #661464 and other old feature requests.- Update to version 5.3.5, Critical Update * Fixed bug #53632 (PHP hangs on numeric value 2.2250738585072011e-308). (CVE-2010-4645) Only 32 bit binaries affected, confirmed in factory i586.- revert unsuitable patch php-5.3.4-dlopen.patch- Add php-5.3.4-dlopen.patch from fedora,makes dlopen to use bind_now instead of lazy. - Compiler is now in C99 mode for both core and extensions.- fix format string bug in Phar extension I just found http://bugs.php.net/bug.php?id=53541 and the underlying issue, which is the lack of format attributes in several core prototypes.- Update to PHP 5.3.4 final * Fixed crash in zip extract method (possible CWE-170). * Paths with NULL in them (foo\0bar.txt) are now considered as invalid (CVE-2006-7243). * Fixed a possible double free in imap extension (Identified by Mateusz Kocielski). (CVE-2010-4150). * Fixed NULL pointer dereference in ZipArchive::getArchiveComment. (CVE-2010-3709). * Fixed possible flaw in open_basedir (CVE-2010-3436). * Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950). * Fixed symbolic resolution support when the target is a DFS share. * Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710). * Key Bug Fixes in PHP 5.3.4 include: * Added stat support for zip stream. * Added follow_location (enabled by default) option for the http stream support. * Added a 3rd parameter to get_html_translation_table. It now takes a charset hint, like htmlentities et al. * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend multibyte at runtime. * Multiple improvements to the FPM SAPI. * Over 100 other bug fixes. - SUSE specific; * enable PTY support in proc_open (temporary)- xft-config is gone- Update to 5.3.3_svn201011020214 * Fix Performance issue, array_diff may take hours instead of seconds in some scenarios,regression appeared in version 5.2.5- Update to 5.3.3_svn20101027xx - Fix init script again.- update to 5.3.3_svn201010140300 - Fix php-fpm init script.- Update to an slightly newer PHP 5.3.3.x snap, fixes around 100 bugs including open_basedir problems. - add the fpm sapi to the package.- Clarify changelog this update fixed: * VUL-0: php5 new unserialize() flaw CVE-2010-2225 [bnc#616232] * VUL-0: php5: MOPS-2010-021: fnmatch() Stack Exhaustion Vulnerability [bnc#605097] * VUL-0: php5: MOPS-2010-017: preg_quote() Interruption Information Leak [bnc#605100] * VUL-0: php5: MOPS-2010-022 use after free [bnc#609763] * VUL-0: php5-phar: MOPS-2010-0{24,25,26,27,28} format string bugs [bnc#609766] * VUL-0: php5: MOPS-2010-0{32,33,34} use space interruption in iconv functions [bnc#609768] * VUL-0: php5: MOPS-2010-0{36,37,38,39,40} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-0{36..46} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-047/048 information leak [bnc#612555] * VUL-0: php5: MOPS-2010-049/50/51/52/53/54/55 memory corruption and/or info leak [bnc#612556] * VUL-0: PHP5: Session Data Injection Vulnerability [bnc#619483] * VUL-0: PHP5: multiple heap based buffer overflows [bnc#619486] * bugzilla numbers 619487,619489,619469,609766..- Update to PHP 5.3.3 RC3 - Massive lot of security fixes see list here http://www.php-security.org/category/vulnerabilities/index.html- possible fix for [bnc#610633]- use FD_CLOEXEC flag to avoid annoying races.- remove obsolete buildRequires- remove build date from binaries so they dont get republished every time - fix invalid path- add missing patch, refresh patches with -p0- Update to PHP 5.3.2, see NEWS for details- Add php5-autoconf-2.65.patch to fix build with autoconf 2.65; it's a backported combination of svn commits 291283, 291284 and 291332. - Workaround old php bug http://bugs.php.net/bug.php?id=21153 by replacing -ledit with -ledit -lncurses in the resulting configure scripts. This became apparent problem due to libedit being built with as-needed now. - Add php5-bug51224.patch to fix buffer overflows happening in strcpy. It;s a combination of upstream svn revs 284097 and 284099- Remove unneeded gtk-devel BuildRequires.- Remove obsolete build requires of orbit-devel.- avoid alignment crash on alignment-sensitive CPUs (bugs.php.net#46074)- update patch to fix build- Fixed wrong harcoded mysql socket [bnc#544516] - Fixed wrong default include_path- make php5-pear noarch in Factory- remove obsolete patches - apply ini patch - enable mhash compatibility in the hash extension and obsolete php5-mhash - add macros.php to the source list- PHP read_exif_data() only returns the first letter of UTF-16 strings [bnc#518300]- fix missing return values of suhosin extension- fix build on CODE10 products- fix horrible broken open_basedir functionality- update suhosin extension to version 0.9.29 - mysql extensions now use mysqlnd instead of libmysqlclient. - enable sqlite3 extension, part of the php5-sqlite package - enable enchant extension - enable fileinfo extension - enable intl extension- add suhosin patch and newer suhosin extension for compatibility reasons- Upgrade to PHP 5.3, see http://www.php.net/ChangeLog-5.php for the huge list of changes - remove dbase and ncurses extension- disable as-needed to fix build- update to PHP 5.2.10 * Fixed bug #48378 (exif_read_data() segfaults on certain corrupted .jpeg files) * Added "ignore_errors" option to http fopen wrapper. (David Zulke, Sara) * Fixed memory corruptions while reading properties of zip files. (Ilia) * Fixed memory leak in ob_get_clean/ob_get_flush. (Christian) * Fixed segfault on invalid session.save_path. (Hannes) * Fixed leaks in imap when a mail_criteria is used. (Pierre) * Changed default value of array_unique()'s optional sorting type parameter back to SORT_STRING to fix backwards compatibility breakage introduced in PHP 5.2.9. (Moriyoshi) * Fixed bug #47940 (memory leaks in imap_body). (Pierre, Jake Levitt) * Fixed bug #47903 ("@" operator does not work with string offsets). (Felipe) * Fixed bug #47644 (Valid integers are truncated with json_decode()). (Scott) * Fixed bug #47564 (unpacking unsigned long 32bit big endian returns wrong result). (Ilia) * Fixed bug #47365 (ip2long() may allow some invalid values on certain 64bit systems). * Over 100 bug fixes.- add temporary backport of openssl prng function- Update to version 5.2.9, security and bugfix release * VUL-0: php5: memory disclosure by imagerotate() [bnc#480850] * VUL-0: php5: mbstring.func_overload set in .htaccess becomes global [bnc#471419] * Fixed a segfault when malformed string is passed to json_decode() * Fixed explode() behavior with empty string to respect negative limit./bin/sh/bin/sh/bin/sh/bin/shlamb09 1558621108 5.5.14-118.15.5.14-118.15.5.14-118.1php-fpmfpmphp-fpm.conf.defaultphp-fpm.servicephp-fpmrcphp-fpmphp-fpm.8.gzfpmstatus.html/etc/init.d//etc/php5//etc/php5/fpm//usr/lib/systemd/system//usr/sbin//usr/share/man/man8//usr/share/php5//usr/share/php5/fpm/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10271/openSUSE_Leap_42.3_Update/0790b8e2222867029969a76fdf812b8a-php5.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxPOSIX shell script, ASCII text executabledirectoryUTF-8 Unicode textASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.0.0, BuildID[sha1]=56e28fc7a9770b9b7673d8236c77401f2d128315, strippedtroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)HTML document, ASCII textRP RRRRRR$R"R#R%R!R RR RRR RR R RRR RRRRRRRRR&abK?]"k%as:o/JѾhZ$<8P&$J^1 !Vy]r$Hz!ڙ5bt )GmMox}uki.y'&dQSPԞOapk * y{ Q6՗%y!'" X;K~< :34+uG#.hDu xGs"Er{|ضrEs\5*/tDwtHuY-4Uo- (}Q =F9X46w_? ufYw7qN"g3M+ŷ+`eUX_AL@ [W=q%yWw[-[boz1*~B?=M]+?. sND&oax { 4 m{{fPރ3Sr0D`wN\]ga2r-#I>nǟ 1NЍEmn|TJ$-*۪˾{ Mg^kNuWe]ܖnn_cB?A9䔔˿E N5If{8 5#|4[ps']]4ϫ63&30g9{7A25r6yŹ*zÑl$^d;HK%JƂa;+=.'\{SΪA䫓n1g-$qb;Y^y͏}cXoҜa&G4) &o&ty)/Q^G@ZumRNYeaW^ S vj:W 5j%\8N=FWcԦ0ɿt+cRK]`YaiRYViQjfꁒмSL腞n~꼾dO6nG$hd4wئr~O!Ɋ\K%GLyCޮ'$; h~3m0nUC$bޖ-/.%ƓQA~-|f{#HmZΦ۩{4_5S(T<.DXD?7߾0t91uϧVtul0jbP_Er兌jnO3t$:g@R.Ru::+V+zնY,'7edwֵTck(VW_KA2œ9;qP [ʪbbPjnw//^HaNF%CU\MƮג(%0Y!+[냜̆h1D2{It gT¨0\8 T '{";lMD=eSp]M]Z31k"yb~C#,dJB1|b3"Զeb^e0L  di{r(\´fy'"N6B ME7ڙo|`{=gxLy2&6ԕ۬'MСvW-hi~Q<}K\qM$kdrPzYC'X}Uv֎DG'Ǿٗ{?^ЗPj#vP/FEtyA.f|؃Ru(e9NsAD&M@t툵(WSc!\pH5u-o3$S{qixrXn^=j2C4 $˗6y%S,܀Pl ]=4 ѰxQm y~%)t޸sX%ٓ#?PN4ԟXCK4W0ᇴZ$t.4RduS00{p#.ʂ.({[0=|SzW[ g`d߭\흡jp6Xm LoySkgp};s# !'.tDRxccc)Rtpdj.gf{,瑪8mhr+Kg$Ѿ% '*&$czY;C7\rÌ.e{/)0NT`fKjK#Xf~,Ɖ*gAHثGr P㓸h}M |':k36O %.m7#V$)Y>qGYLPt=4uAdQ.JhSY'P5C92-6>Hnhʩ@5>*,ŲLQEt,cC~%G^:vf +ǧYnij;)v ]|jNT{+B$Z]Sf1(z晴1@tIDSr IޅcD!9}7M3 @&v9sO _ѿiT\4auw'{tC=uct66Ezq5h3@/b8JlTTꔥ :ls}}+Hx=!X;Y G®zKT g1 qԙeK"F@ 2Dza=QX`nyZF&$)҃Zx LLqVi ݫMڏz"N\":9|=[?K>y P4l= qv*V^'I&q^CvJ+d~GD\vmV5f)PNx:7CsY>3Ǣ@fQhئ<7h6ySgLJMtcQN7`En oͱ%OmCHECܘ:pmA #|aE.a.RB-ŅF#XA4L2qմs=-XE, y<Đo2ܘ])ɇ=BnANخ f-AAy|ӫZ!L@4\= hL )1T?ȡD ܪp?A$oStH@jxL+3AC;Cb-m^@&Q7 , [!Z`UbJtm*Pנ8:]`ī/0> ~>p0|NXc$ٜ9;uūpSs8VD|5a*K3jbdy|e뱖9A>dFfi3)?LbqI=; khNkwnTmD6*&r8#vvĹkT^ mlؔCo׳jc%W*)Z!|d BWFu'\(̺uZl!ǡd 脩;UȣZ-=2us0ƒh1wt2ZuC6*މPbH$ I["zt'}'=XWb) ?b2kI0):^/RGV͗yqj2z>;|bgͅ] (`, O*Ay!"~~fG<-IwomP>1|(9(|œ e'C݇ Ra~{NMQn.|&!W1k TH.WFbTteSt8 W#xO*7"$ '&ڝRb_~M]cV޲:̇!Fp⁵af@7=;-PHsrR6ќY cSQj0t-5pD.HP#wu4"jZ'Y0HO'Uּ3#7-Hb$VfOT8nA .4DR7sYwӥmߺxD6rC52ܲ;fF Uz<ӆFFA)7&Xo'Pj7F HF{5Z= k SNn]"3'aG^U;/oK\Q(>1N),H< #,ɣy}  m61utAG| R#;Cu[VezV׉X.^$FFjԒ:7Ԍѯ67>۬_RDZjr<]##_ɊQa8șڹIQX{掗:3*4Y2nN- )~ZoTP1ϞˀqŐzy{ȕtʂK)_6@w!_增f!aKi:94Vz?7<'⾕qRJ#dc7C'w pX(t”=G6Ĉ0wyf8lX}%-2uQS+_~SG[ܵ>L.? |G.^ WžY61n۽g+zNr O]sSq5>D lnNcntM./Z+~`r>|GKHm 4s'JEmNMk(o?-vvz[#۟v Y;R-21 ¹9w<d1?s̥[~hHҚ+jsvрVl"pX/-$׸=cqkǔ${NDW?5A8҅}?Htac^y"NQ%~`0?sg7#\7+9)Z<&1AvV)o1M~ 1Y&P4鑀;X݀C!Q [9eIHcC1xE!%TdV}v1=lLA{, V] jN` ѾF"9|0QRro#D2QaW|rWJa=9mWX3iktš^Q "qd xyagLCF90|Mrc~_gE̅YW JusNHoylR2$Ԑs<ҿ |ZtA;xV9)gkP@Wh:ҼCy30lIXJx7 џ= ZltqJ^fq7s›2+b40ͼ]@&虄p)p/U mf ;|bl8_eh[3=J< >/?@%(.x.t* |..PP0u,fDY NL,>=%_,<ػa\ %Av#rTg <#L R=|åyd0Wr?:CSƪ Gl4@$\|_KTCy޹N "  hrBRW`ŽˆzWq;2,<{5ngnsRZ1|=w|*f7 66iEpQ&Ҹve OnGm6%=UQ?x@zNnm?hxcVg?bn\iңgQw'HRK a7Nf225/ڠ7 cgrZʥ 1|ҳeJ5"TK˳kB;P1({VlJ=Yڅ-,d.yboG1wg-3>k#@w i@곉Y*9a'F=Iآw!hcO#ģ4 |DCۈ/QJ܊5v-fh,%{-VC Ob3ՙN2m@l ɋ`!!FTz2)h߼hU Gr$/Cn5aoբB7?nǮ^Xy}͋AF.l9?Kҙ^0no)2 Lf:Jm4z ˳3pp_@lY8c+ oQ}JDWF,N "dΧ,G`Eaޱ>|Z_1 Fyл41}yJ&tA>.o ~JBDaUxxaS*Vuh< պIgOuH|6j;mFs'JKfANz: J HkK *z'f1+`bn}A: xy=:e/ :gjbC5y2rK2HŞa664lgQsY.!_@=F Az60C|) 1tQ bQq[NIc%0uĠ@2Kk*kbĤS"2:-e_z؁fuuYlg$ iy$m#~I2m+goj<: ͑E{=e7}i8pb^G_N2A'T3anY߂:%6ՙ8;MUp0οH(@xWA3sHv> ׀ףՖ3UR$c7K{N) N >( CsK[:76uXŘVCS(r,MLz{/&x#,ˁC]vem#,w v=0_o+r>MAyz:ۑU)@^z.9:_(]tn)>Owiw|^ݶg'tJJ] EESu{fG_I#AE!~$ p .G()=]yFhjm0AţΔ3mL!vazy‚KS`X$Q'cQ¶JpF8`|[RVM iMbdQqqWXbͯ~+2=*Gt5x|&ףP!S^Ju(:g5vBSI ڗ TafJ!Cyϊ!<&&J-KΒg1}$>1{ѐAXO!{s S$T\+1dQ}x/R@-;{l/>5y 秮?ɡVD wz@AqVɲ?;\m[$|lI$HփÊq^e87e7C8eӈ9,̣̖5TԖY!RZ}~?kcźW O")PLԤ* N1xXoޯ.4_`P?oJ;ϯ/%,I V)Alj*U͘Ct٧Jv!Ĺ.[MRM+/*RxOQͥ=.xu/pV,*;("N{ï79(UL ׯ,-MɃ\FPtj֒S_o=S$nޱN¿;?]IBc<{rwFPˉg4$&~B6z6 XvӁLD?E(Śj4JX|4?(H.4m,J$qW@gPa(!=rG czb#^y@ {ٹ׭Lo[$ cŢXې\YT("HHt`oš+wTNƥukwm|# {Kj9-1q~[eD;~3+%_׶ aݐI!RRhOP6򕖍vnD57mg(H$c;)gd=ʁm~~X Z."_.roESUlx-#JF),.iCIuį8AdʍX7 +H w+|Ad5 l!2,(?/ =vvBɷRE* 9Vl?+R֍܂%-*usf5ޥA깕*_yǣBƃͥ{~xccF8)Ey6<9ܔeJnpF%2t׏ t^+7, 3or12]1 ^ Z0+I>`FM8P@fVU11Kߨ\*TGg=eSQa`$B ewaeiPql&sM7 xn&Ss i7(|Z\y{`0:B9G;h;HH,(PS5cRşI=TISnE绵pj/y9' Q4}:TDY$TQ?ٶ.rx=J}{c >)!ۯ"WۮB$]1&BJ,Z+e#w;H%phpF9#dyJ"oB^ uY1i hI<&o,S/ؔ6̙_jNL{|.uq쑄旚E1fO=A?a.BQTS,ʌi$`O)$c!> 17c'9}&i=9A`2[ Nk)n 9;-P B|aO 5`\V3r+u|r}~,*^8Gwǎj4;I"%TGZHߎس >  i0AYp{_髜 Pn~C& 8To&؅gmf&]%ҵf=I(6]bb;0pd_TE}.q o;-K OJc}D^PI< RJzVb̢Imi^I vZg~@LZ3[諪p\h E4>C"J)5:0 QhEK)Ee&L0bv{լwњ+j_P)S|]q(!wŹn칼[ojPYH`PM9m<zi}9gT>&4~) VVxjSuh ]M+FxFy?M'p"[D^O Er")soh r*) V5?|t(,7*P Z<8;MI\ן,C~-Kɤ% ѥ*w!7ޭWE3 Ml:JψA[~E_0[/wf֟z, r(G}Ȃ ͚6Xw;AA%BYU􋗝w ֎DQw,_ZDWfz[TzIdh46\LD샧ǯМ5tXS:@9_VD*siDPIO78x|$kw~y.t^ZӖx zfIzhس`=8Z:4[g>r ˧EZё,:n-eZI+D-U|mc v4IOM\p !͠vé!LIUBˢ/:Ξ5m 8nreu3)Vu,L@&L펒m9hSMjd7k=^}A,=L*b$ތ9d\zQW 43vɸVzokL w(,!iO;% zzɨIDRùrZbh = .D;\:x ޯ-{So>@0נW` *_{&OJ&+q$;Zp@4qg b{.HR.C=ITZnx %pK#t u9/iwJ*`3VlEf%k%W.lD>"Gj AL联pU(uH:Ȧ9wnyCXh- &jA,4>u^19;:'xºXDSE'ú>{ xsf`wwS=xMKe~݅( ^^Gg.]`߶a/nnK@uxI^3 -2vaJDяyFN}8u H(F =:|׵= h¢m]{ B\~1?Ǫ\|Fr UA&J"u sSNEBȠ?j[")j$ oE"z LJus XݭNxOL1|njWqRlдmD}>bm*/7/,6$C<0 &N= V2A+5w;h{LEP> = $hGC!Tط-DPʷD`zOrEr(k>-T9Oz#U^,[hF#r/*,|qіM%Ϭ%줄O)(_pSJzf,&A%g+h,sb.N='-=yB~w/h}?E(!|ćZQ(ڒ^r%w]b &'?Xyˇ,.{$tLwʝh:YU*xCfډq b҃#_Cو?A l. L4X=F ׫OAtsA3 n3q$r: p!/ܶ ˢOoBW=IlӺk+Ul=aZagZ8g0\RXZn`D]Veaݖ5)\M'c<QU]O9 {f28%(Zyf{ҁ A#Z{5 '}?hX3-uܰP彪zFD,h/{>|q~;cm Dޤߕ`f9`D9CNQ UxLJ`ƍ'pArdU_C 7*C38#j+Lk-b Zu-6>jS J rj/E'lZ$>iAvM3{(N7U\^qƛH+)_0s]"LIy&"b`VBfĵ9p/63._͍N16|ՒwNy1%?OpY`a/΀D(J`VȐހ͍_hP e\l$/o*!-SyJf~W뱗>si'IJCTŻ"Zް ICe*9qv kJs.IK"`nHd9d\s [Z-Xrw ǵYsIBepR Sվ$"Q͏/@aϽ^Zh>j  sj6ػg&@ 6JqL;襍9'3] ZT%U4|4Y2ci<,H ;+$ph8zXn_(FD g[F WK*a+b`;LYldODyE > B6=BM^p6hPűmr8<#x_irL`!ح4.u9=9;93FFcl8O,)Fg\4Y@ԏg9|qz` N5GpͻZpq5Tkحs5*%X)o2xcjrk.oT ^L }@ٮKT(jpp+cE\9^=>i5GOE˼<]ȋ`] ӖD5(,*g&_U  Er]d:DCM'J)P{4@ݏNbvYn!@lYieΖ&M$H8ÁT&[2x}g>1[U58rA38yڧg+8fFL6EBP=rvAG/!s߂߿Jܷƃn7\5@DY@ ,7)a5cQ^ Vq̋, CeI- $&Wt+*8_ OG͢,P>BƤxV. V6ΧOR7T!);z"Nz:\ B9wLqdqsZE+2c$p!'C/uFjqD[SM8[ÚZ v-RD x?bgxT<@ϚHL^(.)J $. G"K,EA8Y=ve۲:8Hk[b>&.N0R>֧#Ǒ$#1u8^x , 9[~U#~N8&ZdNxHNcw |L Tcv_?I&UQge#5P8 7u[W;ϲ R;蚺b?+R4j);,,EWDX)!w#җ/0n?~ؒ^h^V$B{Aĸ}9!]^ϺfQ|b,4Q-DNِo&g=$9 hW,,~ie εcۣx2krm+8!_$.%!t:aZ\'-WdĚ^GSt= %b56C]3)fWg4ibձ{KfV%~q|hTѣbr{#LE53! ϗlYo@q 0}Cە )<wTd.Q:{T-׍S0q(dӼ+A#唡(Y! ";\FkM) mDh 7<"K/FuE_..EǞŪ|Ztli`y(t3);ta_\r2% -C\SE xמ~^FEW{_M׀p$>Raǐ ̸+٨;GAP99E0ѶEv./v- 4G`n5XVِ-P6`TY)8+$.Ta3י(&. ݃Rc@0NCsEAiVY9xR$ΌX\ŜuŇQm%i|k$1| Jn1:~d6r 7u uJcً]#pnB=)eg %P{YĹAp  >t'fs IZHDtBpNA/}xD2QfhPRSO<2lm}{"OƦDdC/wͪ&}$Nk!l8R[E|Z7ZwVw#Lc X>ac_7|\T*q[p}\Np_|xy%/J|ԃKWs^R$my+ARNJ+>AkmձeaiM<29Pq񀝶d:lӣ<ކČ:}{f1 }odn?Oh;Ʒ_mXҼ[Xz_g.;I-UrØ[e{c$ȺC[V;oUBƃvC;Tj3Y^M32&!P;7W[Le_R vVJ ÒO.*UNF.`h ~u2A7Bύݙ(E:1N_ ~ǀnTrkr1F'jm"7R|[VKy51ѐL[JL1قw9~|CmGB,bٜ[&r0Isv :2ZOs&OC?PR rzacGX,u`,q9dyH.xi¥⌰i@}>MXƕ?]bvGUw>?V%_XAܮAx7қ)<@: M$#D4Ӌaeij7ŗZc8'ш_ZV?$67O9\cV3@ޠpݯw"8:ą@\xf#]k$VעBh`-I%S+kNdxl.ٜd<zvV13£#2\uA|e@V9,@#h pY8h >}cEGH);[}JQs%v?AYs{[Pϱ }`%f/*6$gb b!2`B?q7Yzxi,>ڸ lG7e AL f b$jſHr&DaWKm1$$mf>5kD};xV7`2 (Iʅ/ΩۚR3(8bY9A:/8^{lTK&2^䪒~!Rޢx un˟ݿ  CT2 ]~<5Ĕ":%C8#5&{7G4 @j=M;J^w>RN`T=7QyfjKaK !BGK B r !e[k[ZUTl5a6-7,ÀΆ, ϊ521ooJ^x[}<}-P{O7CqΏxPAن7CSAyH^ع+}[ ?7BrT;cנbCT#2]*: LqOZ1k TNBƋcD4;@[BHZ]$:*XiVܞ )7m{*i->QDfDT';ZP|iT7EVsjl* 3CSi*?[4O QP[^& .Z( GX=5'Q9k\"FDSƴ ?zpm\W[-ۖd2!̛kZMt7_@yD5L]vf-> 4Qli{D~^Mn cae'%nJ5ƪƌ/o#*/~ P"0|_B\@QsVڝlҕ9/wQ~bkBM誛CWxP$oXJ-%oܪ ڹX(|s`!b#B&0d5 ˜Dn4_.+< 'dwO{c;hX"Lg :VCi]:fu۲mkң0p"l S(I[b#7οcb6W4 kxk@{)*=r>D%-W$%BZ9gYk3|eԾVd[e`qfƬOcyRÍ9bBOwz*7SY&aX4Ywbwv&w0'ey9j/VOBaJ  Nu0&Y '}R !cc3 % rQVrhܸuaI%p T]E')cV@]G BY.RGb. eE If$fk׋PpoQgI?GQccrwhbyP * sO:butcuM+ȚQ҆uuuPpSmݴQ/b.QĒF]Ld m*z 6ǣ N=[HcYiA_Pt=E~@hbg՝um{`fFT퐽96UG@Vgwɬg _ Xmf}\+jPji /P}sa*C_mf~{Jr ֿS܃C3) p!(jC: =a#B BƵ')L@UG:7yޱKwʵ@ cƩAny<ŸOwxUŷ+鯀/dO_( od 0@{ՠ6La/bi,KD}r&4.]TiƵbQ%' i%æ^:Wf)`B,Ti7lCFf懼e:]K_̵pؐc+fҸ|>c+zD=N\w:LaTymMjFAI 뼿z8L6\g9;3,J[k0s_2L94XMjៜвsA.,iSP)w 6DzV0^ٶ`+'H6nw赋9tD;fU8?i̠2OhozeIU z& \;ABR oM$.1DN 'z_<e0H^}i1e[mIyp b<&#/yzJ a}\ѣʘi&꿖Ĩ0^&ٚb)?#!%! Rzqi*^ K?nI~rnBp5DA{9Q:Ϟosou#x2ŢmgTdwDpɳtx́IOT ],qwT$ RB2J%g>łWM4|b<9sl RVS*j]JEECuIBNۭ%F?}g: )ф"DūdaVRylw5˵F`hz[iտazPxᤏ >>8{'j)9RU?c6 0ujk3O n=EspqO7)CRSr1^kf:qˆ`bD:4Ğfe  3/TRWXI6Y.G.l<]?}(kvժJ h hɗIgԶ|r"6x [g Tb^Ų?nFCEJ(BIzmt1{6v#FgjÚ~O!ߐ|, \f_mϷ rkӎ, `뀌Jq-uabo#XR9h*/"S5Qㄇp5NyuͦNzm-vz{10n%8EjB ?d^>$yw!MD7u 1LSp/ȵjk5%-[/wv9(8BS_;Mzi0O?L^p=)lcU#uwcq=Xo_,yB9.">r{|*. } V|#'W"sjK76^W6^+ v.83ZŵBm\v Xo~JGc)F@;q_{&uWʍ%: DɇxᄎN fQC!+B@R&%zԎ+ ڙYe; d– =;&ʬЅ ]9?JN8bty{Ɔ)/H{ 83E=9?e!D0[sUw[(|r]:^0ZFހ`aq;(ւb F%Rix?h<`f~bx^$`N%'^[] gy%0=L_G͌*Н شܧ%)EMoY8a 6Ȼk;)\@ү;ψs}F o5H5~T]B "ʕЅWWpEζ#KU$ET ;p3;Ad9Z3;Ӎ+:P~k¸MU|dsJ|(eBvFr@bjLl`[SFIbRIxߦ4|51Ujl!Nch$WI>07?Pröof軥 dy]f0q/iHuavyaQkz 4ahL1#'˷'/9ZEVvG ۮ&tH* tocMZq{W=wZtsrnMN)agm<Ә \>2D0B`E["ppk~A.%1oMB"7${_>'A_~ӝRGRߵ.*|G\<ޤ^ݳO`-14ZO1Gɟ"2+&m"-"<"=KPme 7װZ:loҜCyc1_<3o l6˯Ƭ%;]rǁ vޖ42::ov58b)_,hr> iyoB'#kj(A+f bާWi&R]S)`w%y5$?}Z10RZ'b 5;SdgbX.tZ]~%vDnOv$ d pw*wн-3w<Ԋ ZX9&Q4 Q&g6٨!;W}H=8|޾c(cWi@YV&}dwE{=f#7=[ޯaSqxmV@ze_A-_pY߭wkČPR#BKO榖 AMq$Ţ5όkQ0Vیm$y(H%;`^g/Ѣ#ۗ=gEs'Cہ=r Zim ͫc*kE/ F,>͊9^2}<? F+_v4'A[ @GeЁ[N%9^RߕxD ~ n]+fHMb=Nw|Cu#M%Lۙނƺ׮,furwc@/_/Wo*?wŢg*/s8S;KT]U"$ A!V?t/ԫ.jW6Z}*MPDâxb-]LDs羱0YIol)~ &V[Hwha6[4*smx~TOȻό |*  59Y+p%MDi,(-Zzwxѱ֪CV,hwZ/ dњ6\r2R}3Un<}X։A9a_w68d!Z qb+[b)V޽3Ax8 z[6PM_V? gU3Hh0 &_DH Cǥ(ucτ!-FDJQ1g"AW\D-oj_CAGq^0sAG ˭,~yrEE;=X>Sl,:v8'~= a4ªx &3Lw|3 w)Pf2Rڧ(5wE|-y% C`;Ҟz4yPC "Mr|vX RR~&FUV {-p#Ҙ`,>cJsDdoBB'UnZ`NecX#ъ $NL.cucqKU +v[?\Ezh0vc&-KCM[Ԋ97 eWzHf[`瀄}j4^}#ҙ['"yϧʿ8~xrɒk{DnগtBL(stxv!}o{)00+ ?7F(eDaA5\aWqy_<9V(ͽ[!&/1:ţTфfȰ`RԸؤ:V nSdW;i+eIGejL7|A])oJ]h:ƼB~!16G!뼯55CnMt f$!EK !cA0s|M=,> hixXJEtՖ;0c:ǡ㸨&܃گS>aUdfߨSz*YA8ɿ^,U4LC>$!tz.SdT&.טTUQeA1LP⺅, ww;)ϾL5'h>dxy8KyR<8D-_$%"8G0ݪig`X֋m Z \$gC^J;oNipO5]̴|<R- (-Hce7dr]j{L=\DfQ&3i e2[ Te@+568e@"xזJ;gOt22rJ,|8۝L0Y/+ ۚVLt}V^0H -dG 8Eo͎r-b"cF ^:H<#4xЅ1%n՞m'|+.oxl&fMtS !n#i5<)' 顕. #6RZ˹[/Y D2f`pHjL_)`dFܩڞ{)!fxubvLyS֗.:*atJHMeUUn{(ZkDx/JI XI5э &WL3 dbgqpv~-c@Jo ,I`9j3;E-O(.6yBk4 GuCq~j8]31nKlȹN9},ۑ̔ ih3We- $ pԇc!ZGk_stso4oO,7jɯUXҶܵAm;D@yKN"3 Mӌt7DmFΊ ~ Rn)J}0`nSXfy@e|5XsI3C.,-8CK 2t ?~3LeTX`]Gӕ9(oϢvuast2z5Y1z| [Z2l Z3f \~!G-A *©X,dcබ$+bAiة.=Zg:n?o+ٞ y$&wX64~qu$,>r&X~4*~W92fe ͧKuϧImqhWLF5#C"˅9= *_8ޑb]dh¿%ybG{}WA5UmIXTv$Y8p&FNoGΝ*u_g6 Vo^"&hnCk4(8 =l*};OdN ]g)5hx$Db%TaM'[s/TιHZ95M$iu}`녠-:6Rc'M".^@FԢ+ݦtL2SȒ%tIUUs-4gN,ᗈJ0)<qR^>2 !49"GbeoUAʹ lOP0% ]쟜\vظHWULd]A/Zb20UL9)B8GaΖ7VvΞBBo0OnfBE&Su`"ˠJoyJ"U~ZrxAMeK_U oQ6`LVg 9/bЍ2^ sE- TcPph bc]O0bC>y^dRx#JRr)qHP]զ] $/;5xCDAUn-9~ ?Tva$+Cꯃ ED۹MvAv[K{=X;ZV'Scq8f n?s~å W,"sWBkA|T@&s8hBMo{nIQ^jD ZmчwSLolnM`<08X^c`eana޹1UѮl[7ZY?qۅ~6'}[U?'DR{$ D%U iJ457\uG}ʾ,Rr O CFqmPRopK 9|4Nd8hwVfS*I>LW>,x.4h\1R n$DŽ\oxa0_8Ҕ^.#"xu~l- yct}81&ZtYtS"1TJB߀C} "=ꋢ"7( (`{u i فd17jhT=lNh])羷H{ϰԓlmRnpj @ojerFkŸ,#WrX1[[--p)vdmݒ%N<ВAA3:kikŋqit$4p^-9jGs˛*.,4BLL"tud\7 Hs e&XKcZ6x&D]h_SHE"9 Frgkyy qG.U!˛TG9a␒CE%5Z7T%*8\JI|y*/ nc]3T"O5?nt-7?,HUР :G~랁P-=H.&%^6lIFZzzҚ=#a]o!¥7,cd{z(#U(+ sCD6LT, )x/Akj~cV1uªg['{ AMm5o{6~1e_]S3Ty"׿\BM3DfTP|+P݅S2c.^븊˚5]quֺ)0Y;U c'_^2JJ/e^i(ys9*/g$")?z|SG=IꪰL+uHʇOËŌsJ\/>A6wLslsѼS 1tGax%>BAMGPq`/R <s#gs' 1Y/ũϫӲke9⣰*pYL Ü!ʃRc3+tZҟ1ڗ7~LO Fw^v eqŃHx\Ul^w 28mCy9`PBG.|f_S PۋA ,0kNPc3G6LN;K8: X?D@/0Ӎ9t#7L5` ̣v"z9y%`Rf02o3{=)} ":9crm(-4Q1 tg{9)lPQE0O~y#[ HNPk^[D~|u/ߏUG:Y%)ެ`)+Fd6x3;UAs6] 08K!6^U paGp6F'k@ԵUсCR΅/Ha_|0 );& PGLVǰgƐ:o~kx5l_G5%)EM`>x3E@n^[y7d)\*iP% N[7TiE3_+aSŁҵy)cnK6uŕ )$zg˛.+ܤ-bOG/0;jvϡ<6y_V?9O(ߡ=n<9<޷LW%;Ķ4 ?D"|= {(H^3w4ͪq#ƿdqÕ.1/DiDW+ vb%cǻU+x!.)jo[KG"#YqF8UxU1YK'NFP=VI8JvjoKk4|z zQGR,QPwSMk6yCl0LMSF~_zALn2nȽF_*vKG<'(7UzȆwNNAx=k\c;+5JڙzK$@RF[҈JHTM2,;U˛EqՒ_vlry{PT1I U/I5ibyv-"okz v|Tt{(y Fg<"avdkL&t Y%"w};q+HQ7شс a2xjF na>z>Fm̪2[xNEt8o:̩5, zgﴭ L|h5+<“Y.{ʛ~!`d>.9R//Eӹ^hlc_Ց2OY~V9)&H^cT2.WMr<CCĸEc[Hʘ hqRݱ됿W/Z,{y, :YO .A& A^ ; ,x["cJ*{q3cNdk<Ȇ*OkL9{ّ tcsdNϾ.>HHd79YغRIЁ*5%b[3u DKይS|'h0R<ݱ Io/9+BISծrϜ.JG*u .2n#{UCSҲg>b:-^!i$&OTA3K.F2N?DWHl#K)"rѭï' "U*{Fo@sDq`vc*3r{_=} EV/̢p*W8aR}NB"(2}p`rD1i \lNܥm M@PMVJ_:V& %ˆ%uvUs|Uitiݎٹ,|*GmjQ4Vj^H"G6c~:iۏ)i}5u3{hۏ#=C::[B7/aeM& a~ʬ8sGn5#ܝYrٖv }o4ُhpl-KC-]g77Zo~sB΀RF?ZW^X8lFxy@ǫ)N^:xV.6hxH<^u/*xcN)=鄰N1{(䑃t*@t y\A2|3NܻE]Rp$ 0j[7<Ϥn`|Z&t`]yC@:ľ%vk=H=9q=oV_3nM0cl>A ^_R{r(1#_0#B45ˢf'= kϛ:Ŏ2Z[]8?"-=6hRm1#Ƽo7r "T*$i%/v;#صmt/wnLIV7#xڋ0Ŵ^KhxWPZyb1 tZ3v&Ns3U(Fڷw;Ы.ePlNCN &01*-[pؐV 6р`'_+f3Bвɺa*C$NG@" ބH^1>t!=a^֙kq/qt)TEP]zEpd)U>v?ν [ 1uww$gE]FiϴbB2ߙphL0_k҇nRI۶܆I]ko嚗Q1!TY+;ü7 ێhWoKJ|W؏ZN{:l""`"'$qVw˭~~e>X,ZLZ!3sVAk!tlW9tI.jxۦf"/Nآk7@@,??-TYl=Xگ'WAKU`184̓MgOr,^Q7):Ȗeأ&͕,گ6XcfSaTnsqRju^ aBk5TyZC7C )xERU7RN^QC+fo:6w[^R r-%aNuLO˂ŐF/ЍZW_Nr'?"U QΒѥ qIK#y=6*ca's%| ;isyԗze{aڀ t audɾyv),L\Szb⮏ç|q 8F_B;QWG0O^38TcK30he4qk-M9I :!tst|/)ѦW 4Ll`m-}=xj?t*2w䷧K [@Mߠ{ON z`e`xO xA1F|A g*.ls0"‘텄{=$CJᡆ0x$螗N g2 b#wOyҗt-A~E#.:8 =FW~;^8x>tf ƴ!$,aTU<!4UL .9cr ,_MdVuv$<Fd^cfH6wJtFq[ I3aEbnEF`P][ WݳL*4iL hJL yz@](޳\m"EVBbWFsŸ{d(rEJ/6,N{_QԋX/< .K' ؄7FcBLpO:f)reg+)N4-T ]Iq`Wprm,utgD-6k8las1ZM {ÑE) 3v4O"՚/|vL׆^=V֩Wۛݑ2I#Ӹ^.ތ w%M?gN!wǓdn]aA_2o/X'iM+_sZ8wP{R+!c".C*Y`gxrn987X O$Hi"q@3]JX#V6(P7DvE*~s%/b(J2ԁI-_uXm'[u t0Va?|6L$(U!} П41p+W| CERZcMB}4x T-iH tב2.П0_&!3gzqԈy{6ܟ޳:tbJV9]8pEruO Xk<.Usv1U{1eƴGxSgY\Iы͋p-HF*.DJ!55Έ֍ސoq9P%Q5%}P(́[*1'ITV}9d&]؞[ 1CV\)I+o&3:H8-EAN\2n,Y~ӑ`jPp.}[ېemO+j.; }QzV +m%9(g8sE!֎hEG3'&\,Ãr1"Oe*s徟.2%N$f[S2j1Q ԉ[&Lh21*VGoȖOKw҅:Ytd->׈[O!E{ ]-v 8,b[ZAO%qnoƴ'AvRR,2%)q 8L|7y![3Oq;T.:iy>)_xC6=Gyh(XDEqmu WP/5 {3Lm0F3^[ˑ r3_8Qߏ#jƈݪȄ<W}i9WyFE%xֻk?؋٫>Y5U4^]W] hMhE\eof%aqTZQmX91 GzM'4x &&eӂ@vu̾ n->wTfq囊N)碵rx{&O؄_:S t &`Ie+dV5T%GS6rWNDUROX}YwOIJ{7]'55mTJVY6,?hi0i9SS qNЎnH]:|[%a2q8.Ei2=Q}X)q?) pIrM6+Bt|tO%j`sB1;ק_߼Y"&^Bx>VV6Is&"$tD9,rϖ"}tmGH|T@ }H)Klm) 1 QeIJXv78WDJ]WeťoBWI௕eTHjxLh+Tg+hqp*t=BZjV" '^wRt`^UMUU;Q:J%RZA^ WW'b4[k"i;]3er皑cB 8uso_2`\sD᳃YO$#:/ce[ : ;)V!2OAw/QJLؿjhԺ:UΪ_};,q"g ȏS]ё *2ߝ{oĐq_7^0ϙ {2D w -.qw2^3ߟzkт$;\ ӞtB|ˢ'DLƘV-i/G p:R"̟:5}}mcI9^.s9FU}',8Dm?ifН&IY׊ʦӲ%HԱ m`|Y+T'tݺ(8QXGsEh:VoҶ:E\)E]tHF#1/=9@#..XuU(+Ontl`ʞ\ e`iϋAQ ZQW"ߵuė`RhO,|0;;w x6X(" e g_d+Ǜ~ZlkfЈb]pQ* :P,W 2kktivIX=5祛xGI`{|kWzq5 !-ݕp&Y5T](D>awARc5μC&q4T^Vߔżp9n ͉q(x,ɵ.Hi3[dw8ZzyQ,P~<G$iwZx݆E\1BYKy)؞yZ|nq"dYu4{ai "붻5'P+/2afԳ5CrAS/CC>d406קb:-YAu6et>ɭXwH^*gp)ʕԋAFZ#9ui^;NnM] .ME^YqP/ֆ!WFL\ğ/Szɡz-_q)-wb7e`se&g'vgTo~ ʺƣ+!):O :Lv6ĨF.aR##>\UmaGSk|DBpL OemAǃGx- Kw{3hn7çQ_B]/LE.(35C5)yej۞TTHi4_r^ {䮾zħ|6qcG45D(kjzF"̩Xn9a#s5=YN Zݙ$g>/;%QXi0oX ̈ts/`ZE3;}WM,2f; ϩd} ף3OZ>mO% D,֐B v}R+,#9*u q]Uǐ7,hV'.4n $iwqt Hg3i &s"⚹IZ1eZ+ nAUt]J+zpNߖ@M /t0<|L;?dMrheWsL0rv'=x*DZW[-d.Uf;giCn~WOQ_BKΓ{K<+_cLrҚ'dzLmߤ#==Xb@%^*1CaˀCOkf~&>  3|$'WI7\A 1j z7=N1Uv틈1`ⳜFNW.WWbׯt:aD4cqT)ЇO\72ކbqm-@*hRF,NJ%hCQ,43f&nRj͞ V,V'Tf6 (쳳v]+ {b P08eN% -\S9:DH.%f\)껡isnjȠǸ UA Ky]MK:罾O JoJXDةCPjψ\ 6>.CO-χ ZJ WqŲ>!Oko1 p c5lCMfIk~CBt\iY`0RI,VMtwͣ݋|6 s^̪찥P@dž?±b+Aԗ5)8smGnSu<Խnmq}U>X>UjAsۅτ4 !YE̒&/_P0]lKL!])]H-W/_ط`M"IR?AmcB=Hs%P*Zv o``C-,)` B":[s ͘@Vx|<²ty"\5dQܣC̅I% mDf7k6UF /cγñ_)J uim&ā\xzA>tgYmtlkS hFhjd>ǯsMn ӻ+vSԭB}#ک l.:u`\0`<9x ud1F:Tm֨-)/,;