tcpdump-4.9.2-lp151.4.9.1<>,̉_鯸/=„!hP֋V3c;#ue|evbi폷yTGEE)V/M wUyҽ#Dz`ӵr8;Tܯ;ybDN=%ïErw≫BKN3t6X/|& gAhMmMjl$Q]x~OmKI1^`f(\vq@P#-.Ny:wm}5Ax_%?d>>H?Hd   - )AGP         y     Fh 9(f8p9: FBGB HC ICP XC`YCh\C ]C ^D=bDcErdF eFfFlFuF( vF\wG xH yH4 zH`HpHtHzHCtcpdump4.9.2lp151.4.9.1A Packet SnifferThis program can "read" all or only certain packets going over the ethernet. It can be used to debug specific network problems._armbuild19:openSUSE Leap 15.1openSUSEBSD-3-Clausehttp://bugs.opensuse.orgProductivity/Networking/Diagnostichttp://www.tcpdump.org/linuxarmv7hl S :H $%>7iSTA큤A큤__YzYzYsYsYsYsYsYs_Ys_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.mdrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootroottcpdump-4.9.2-lp151.4.9.1.src.rpmtcpdumptcpdump(armv7hl-32)@@@@@@@@@ @@    ld-linux-armhf.so.3ld-linux-armhf.so.3(GLIBC_2.4)libc.so.6libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libgcc_s.so.1libgcc_s.so.1(GCC_3.5)libpcaplibpcap.so.1libsmi.so.2rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.8.13.0.4-14.6.0-14.0-15.2-14.14.1_@]z@]6]6\ @Y@Y@Yn@Yx@Yx@X@W@VU<@U0U@TԬPedro Monreal Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez pmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comro@suse.debg@suse.comastieger@suse.comastieger@suse.comvcizek@suse.comvcizek@suse.com- Security fix: [bsc#1178466, CVE-2020-8037] * PPP decapsulator: Allocate the right buffer size - Add tcpdump-CVE-2020-8037.patch- Security update: [bsc#1153098, bsc#1153332] * Buffer overflow/overread vulnerabilities - CVE-2017-16808 (AoE) - CVE-2018-14468 (FrameRelay) - CVE-2018-14469 (IKEv1) - CVE-2018-14470 (BABEL) - CVE-2018-14466 (AFS/RX) - CVE-2018-14461 (LDP) - CVE-2018-14462 (ICMP) - CVE-2018-14465 (RSVP) - CVE-2018-14464 (LMP) - CVE-2019-15166 (LMP) - CVE-2018-14880 (OSPF6) - CVE-2018-14882 (RPL) - CVE-2018-16227 (802.11) - CVE-2018-16229 (DCCP) - CVE-2018-14467 (BGP) - CVE-2018-14881 (BGP) - CVE-2018-16230 (BGP) - CVE-2018-16300 (BGP) - CVE-2018-14463 (VRRP) - CVE-2019-15167 (VRRP) - CVE-2018-14879 (tcpdump -V) - CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220 - CVE-2018-16301 (fixed in libpcap) - CVE-2018-16451 (SMB) - CVE-2018-16452 (SMB) - CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled) - CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled) - Add patches: * tcpdump-CVE-2018-14468.patch tcpdump-CVE-2018-14469.patch tcpdump-CVE-2018-14470.patch tcpdump-CVE-2018-14466.patch tcpdump-CVE-2018-14461.patch tcpdump-CVE-2018-14462.patch tcpdump-CVE-2018-14465.patch tcpdump-CVE-2018-14881.patch tcpdump-CVE-2018-14464.patch tcpdump-CVE-2018-14463.patch tcpdump-CVE-2018-14467.patch tcpdump-CVE-2018-10103.patch tcpdump-CVE-2018-14880.patch tcpdump-CVE-2018-16451.patch tcpdump-CVE-2018-14882.patch tcpdump-CVE-2018-16227.patch tcpdump-CVE-2018-16229.patch tcpdump-CVE-2018-16230.patch tcpdump-CVE-2018-16452.patch tcpdump-CVE-2018-16300.patch tcpdump-CVE-2019-15166.patch tcpdump-CVE-2019-15167.patch tcpdump-CVE-2018-14879.patch tcpdump-disable-smb-related-tests.patch- Security fix [bsc#1142439, CVE-2019-1010220] * Buffer Over-read in print_prefix which may expose data * Added tcpdump-CVE-2019-1010220.patch- Security fix [bsc#1068716, CVE-2017-16808] * Heap-based buffer over-read related to aoe_print and lookup_emem * Added tcpdump-CVE-2017-16808.patch- Security fix [bsc#1117267, CVE-2018-19519] * Buffer overread in print-hncp.c:print_prefix. * Added patch tcpdump-CVE-2018-19519.patch- Disabled ikev2pI2 test that fails on some architectures * Added patch tcpdump-ikev2pI2.patch- Update to version 4.9.2 [bsc#1057247] * Security fixes: - CVE-2017-11108 segfault in STP decoder - Segfault in ESP decoder with OpenSSL 1.1 - CVE-2017-11543 buffer overflow in SLIP decoder - CVE-2017-13011 buffer overflow in bittok2str_internal() - CVE-2017-12989 infinite loop in the RESP parser - CVE-2017-12990 infinite loop in the ISAKMP parser - CVE-2017-12995 infinite loop in the DNS parser - CVE-2017-12997 infinite loop in the LLDP parser - CVE-2017-11541 buffer over-read in safeputs() - CVE-2017-11542 buffer over-read in PIMv1 decoder - CVE-2017-12893 buffer over-read in the SMB/CIFS parser - CVE-2017-12894 buffer over-read in several protocol parsers - CVE-2017-12895 buffer over-read in the ICMP parser - CVE-2017-12896 buffer over-read in the ISAKMP parser - CVE-2017-12897 buffer over-read in the ISO CLNS parser - CVE-2017-12898 buffer over-read in the NFS parser - CVE-2017-12899 buffer over-read in the DECnet parser - CVE-2017-12900 buffer over-read in the in several protocol parsers - CVE-2017-12901 buffer over-read in the EIGRP parser - CVE-2017-12902 buffer over-read in the Zephyr parser - CVE-2017-12985 buffer over-read in the IPv6 parser - CVE-2017-12986 buffer over-read in the IPv6 routing header parser - CVE-2017-12987 buffer over-read in the 802.11 parser - CVE-2017-12988 buffer over-read in the telnet parser - CVE-2017-12991 buffer over-read in the BGP parser - CVE-2017-12992 buffer over-read in the RIPng parser - CVE-2017-12993 buffer over-read in the Juniper protocols parser - CVE-2017-12994 buffer over-read in the BGP parser - CVE-2017-12996 buffer over-read in the PIMv2 parser - CVE-2017-12998 buffer over-read in the IS-IS parser - CVE-2017-12999 buffer over-read in the IS-IS parser - CVE-2017-13000 buffer over-read in the IEEE 802.15.4 parser - CVE-2017-13001 buffer over-read in the NFS parser - CVE-2017-13002 buffer over-read in the AODV parser - CVE-2017-13003 buffer over-read in the LMP parser - CVE-2017-13004 buffer over-read in the Juniper protocols parser - CVE-2017-13005 buffer over-read in the NFS parser - CVE-2017-13006 buffer over-read in the L2TP parser - CVE-2017-13007 buffer over-read in the Apple PKTAP parser - CVE-2017-13008 buffer over-read in the IEEE 802.11 parser - CVE-2017-13009 buffer over-read in the IPv6 mobility parser - CVE-2017-13010 buffer over-read in the BEEP parser - CVE-2017-13012 buffer over-read in the ICMP parser - CVE-2017-13013 buffer over-read in the ARP parser - CVE-2017-13014 buffer over-read in the White Board protocol parser - CVE-2017-13015 buffer over-read in the EAP parser - CVE-2017-13016 buffer over-read in the ISO ES-IS parser - CVE-2017-13017 buffer over-read in the DHCPv6 parser - CVE-2017-13018 buffer over-read in the PGM parser - CVE-2017-13019 buffer over-read in the PGM parser - CVE-2017-13020 buffer over-read in the VTP parser - CVE-2017-13021 buffer over-read in the ICMPv6 parser - CVE-2017-13022 buffer over-read in the IP parser - CVE-2017-13023 buffer over-read in the IPv6 mobility parser - CVE-2017-13024 buffer over-read in the IPv6 mobility parser - CVE-2017-13025 buffer over-read in the IPv6 mobility parser - CVE-2017-13026 buffer over-read in the ISO IS-IS parser - CVE-2017-13027 buffer over-read in the LLDP parser - CVE-2017-13028 buffer over-read in the BOOTP parser - CVE-2017-13029 buffer over-read in the PPP parser - CVE-2017-13030 buffer over-read in the PIM parser - CVE-2017-13031 buffer over-read in the IPv6 fragmentation header parser - CVE-2017-13032 buffer over-read in the RADIUS parser - CVE-2017-13033 buffer over-read in the VTP parser - CVE-2017-13034 buffer over-read in the PGM parser - CVE-2017-13035 buffer over-read in the ISO IS-IS parser - CVE-2017-13036 buffer over-read in the OSPFv3 parser - CVE-2017-13037 buffer over-read in the IP parser - CVE-2017-13038 buffer over-read in the PPP parser - CVE-2017-13039 buffer over-read in the ISAKMP parser - CVE-2017-13040 buffer over-read in the MPTCP parser - CVE-2017-13041 buffer over-read in the ICMPv6 parser - CVE-2017-13042 buffer over-read in the HNCP parser - CVE-2017-13043 buffer over-read in the BGP parser - CVE-2017-13044 buffer over-read in the HNCP parser - CVE-2017-13045 buffer over-read in the VQP parser - CVE-2017-13046 buffer over-read in the BGP parser - CVE-2017-13047 buffer over-read in the ISO ES-IS parser - CVE-2017-13048 buffer over-read in the RSVP parser - CVE-2017-13049 buffer over-read in the Rx protocol parser - CVE-2017-13050 buffer over-read in the RPKI-Router parser - CVE-2017-13051 buffer over-read in the RSVP parser - CVE-2017-13052 buffer over-read in the CFM parser - CVE-2017-13053 buffer over-read in the BGP parser - CVE-2017-13054 buffer over-read in the LLDP parser - CVE-2017-13055 buffer over-read in the ISO IS-IS parser - CVE-2017-13687 buffer over-read in the Cisco HDLC parser - CVE-2017-13688 buffer over-read in the OLSR parser - CVE-2017-13689 buffer over-read in the IKEv1 parser - CVE-2017-13690 buffer over-read in the IKEv2 parser - CVE-2017-13725 buffer over-read in the IPv6 routing header parser * Dropped patch tcpdump-reverted-test-scripts-fix.patch- Reverted upstream commit that makes some tests to fail when compiling with openssl-1.1.0 * Upstream commit 68cc39dd64688829be2632d9cd24f7efa3da79bb * Added patch tcpdump-reverted-test-scripts-fix.patch * Removed patch tcpdump-ikev2pI2-test-fails-ppc.patch- Disable ikev2pI2 test that fails on ppc, ppc64 and ppc64le * Added patch tcpdump-ikev2pI2-test-fails-ppc.patch- Update to version 4.9.1 [bsc#1047873] * CVE-2017-11108/Fix bounds checking for STP. * Make assorted documentation updates and fix a few typos in output. * Fixup -C for file size >2GB * Show AddressSanitizer presence in version output. * Fix a bug in test scripts. * Fix a use-after-free when the requested interface does not exist.- version update to 4.9.0 bsc#1020940 * CVE-2016-7922 The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print(). * CVE-2016-7923 The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print(). * CVE-2016-7924 The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print(). * CVE-2016-7925 The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print(). * CVE-2016-7926 The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print(). * CVE-2016-7927 The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print(). * CVE-2016-7928 The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print(). * CVE-2016-7929 The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header(). * CVE-2016-7930 The LLC parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print(). * CVE-2016-7931 The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print(). * CVE-2016-7932 The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum(). * CVE-2016-7933 The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print(). * CVE-2016-7934 The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print(). * CVE-2016-7935 The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print(). * CVE-2016-7936 The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print(). * CVE-2016-7937 The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print(). * CVE-2016-7938 The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame(). * CVE-2016-7939 The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions. * CVE-2016-7940 The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions. * CVE-2016-7973 The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions. * CVE-2016-7974 The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions. * CVE-2016-7975 The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print(). * CVE-2016-7983 The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print(). * CVE-2016-7984 The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print(). * CVE-2016-7985 The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print(). * CVE-2016-7986 The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions. * CVE-2016-7992 The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print(). * CVE-2016-7993 A bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). * CVE-2016-8574 The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print(). * CVE-2016-8575 The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(). * CVE-2017-5202 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print(). * CVE-2017-5203 The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print(). * CVE-2017-5204 The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print(). * CVE-2017-5205 The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print(). * CVE-2017-5341 The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print(). * CVE-2017-5342 In tcpdump before 4.9.0 a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print(). * CVE-2017-5482 The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(). * CVE-2017-5483 The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse(). * CVE-2017-5484 The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print(). * CVE-2017-5485 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap(). * CVE-2017-5486 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().- fix filelist to fix build on s390/s390x- correctly reference SOURCE1 during installation for s390x- tcpdump 4.7.4: * PPKI to Router Protocol: Fix Segmentation Faults and other problems * RPKI to Router Protocol: print strings with fn_printn() * wb: fix some bounds checks (previously patched in, removed CVE-2015-3138.patch)- fix a DoS vulnerability in print-wb.c CVE-2015-3138 [boo#927637] adding CVE-2015-3138.patch- update to 4.7.3 - fixes four security bugs: * CVE-2015-0261 - IPv6 mobility printer (bnc#922220) * CVE-2015-2153 - tcp printer (bnc#922221) * CVE-2015-2154 - ethernet printer (bnc#922222) * CVE-2015-2155 - force printer (bnc#922223) - drop patches with security fixes (upstream): * tcpdump-CVE-2014-8767.patch * tcpdump-CVE-2014-8768.patch * tcpdump-CVE-2014-8769.patch * 0001-Clean-up-error-message-printing.patch- fix CVE-2014-8767 (bnc#905870) * denial of service in verbose mode using malformed OLSR payload * added tcpdump-CVE-2014-8767.patch - fix CVE-2014-8768 (bnc#905871) * denial of service in verbose mode using malformed Geonet payload * added tcpdump-CVE-2014-8768.patch - fix CVE-2014-8769 (bnc#905872) * unreliable output using malformed AOVD payload * added tcpdump-CVE-2014-8769.patch * added 0001-Clean-up-error-message-printing.patcharmbuild19 1605626287 4.9.2-lp151.4.9.14.9.2-lp151.4.9.1tcpdumptcpdumpCHANGESCREDITSREADMEREADME.mdatime.awkpacketdat.awksend-ack.awkstime.awktcpdumpLICENSEtcpdump.1.gz/usr/sbin//usr/share/doc/packages//usr/share/doc/packages/tcpdump//usr/share/licenses//usr/share/licenses/tcpdump//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15019/openSUSE_Leap_15.1_Update_ports/2b39050acb885020e77924c9fa444825-tcpdump.openSUSE_Leap_15.1_Updatedrpmxz5armv7hl-suse-linuxELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, BuildID[sha1]=04ca9a66e01bf81362a699a882440e12f607a3b8, for GNU/Linux 3.2.0, strippeddirectoryUTF-8 Unicode textASCII textawk or perl script, ASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) RRRRRRR R RRR";P9Lc>ky.Butf-88b814b3568844e5bced482942e6347c880573bb29a16403898a9e25ffa50a212? 7zXZ !t/yZ]"k%r񤨾`x`נIZ݆^ Ӕ%2m}kQe"_5T7n 0Z]3a|x g2ug#0nFo)O$[d-U+3DNI.Y=t*e\ ٸ|U;8F0,P)M͜ ^:.N 0Ыzx1u]+(7tcF:yRg#'6T0 gT)tX u2gT틯|f;`*#q~=926L`NtG:>RԥrbY S6Ly厓f^"oNJ^gOߣbt0F92CW_ڌ4e"`}VR;~2C+0s>֙ - $ǜso0z%fD_[b3t!,=]CKݸ.vœ\z[a ^L4M e{=ڴ"uw)?F]ϏzkY%':2[&}b1De*X$Z?4j-WQ(-GhKi\a\7rW&,:" ^u6SQlDcV|WS̎mT"9½B]jr}CX'L7s}xHeMv8+L)+=Nm!iG0 T-F3 3t")@77VM8SyҸsK#)hz y2iob]ӊ8n@-¦}aHxm(x+2 m:}C&f ?vc \i7o2yW-2+8ŕ9ǽN.EhS#=#fwg]UsR6o9'xW)uVl7Z ٛTREӹ}vW>Q1L_ؔ^1K;ɲK\ݙ"掽ǚzw' =j 9[_5Az ;x/~Sש"};79r^~ٍ()` Nk5Pf .Xm“h2*^ף-<~i+<(.F{|S/hy4 g'Ga{ԇd.@٢W&Vao%&|| fJDxAbٳ4HJl7%N\ޓ"sP9ZuFIb|)/t&["#lQ]T|IV0fej7.˪t/[9o^tNa"/]cHɉζ1_([ (BTKeV>b;㪚ش, mcH9gÞ&&'%uTRGy\ p<9h=S]'c}=kXu)@~9{b6qn =L&˔ W|Qe,HF&jwƃ9< V{REMƢ-, (xMBpoS^x+񖓋F)-[Zrw˷ti~vYL^j `1lQ7۽RTS?4inqqʯ h0%W~ h\L56򭒜!@~^-|u# 1첵h@`D/>MaOeGɞs1XQJWn@KV 8SsJot3 M"4+&1}CdΏ :n,v'"~p|ݺbH(絛ҔUa|[S4hkk):˥mHF a,vr. vLۘ-5-Y6d,hbK7 L*!?1W'cW0=߽4⟐Fİk.&Zp&:e1Lau^'sX"aUi.H2Jn5|j *NY)2YmcO3 KSN{dJ;&BSفKKx+CwH cW8}¯?^s7˜>lc:_5"ݻ=o6NZ{ lS )/cyCuGNϱÆ?d":c:,i(mEDBGSOh^ mVO W?QmsY3 I&ɗIU;w70DVQw6eYrU$쩺j뾕8\Tm+NzN\ |bA6 =RzG\J%QY!#mrJ߆p>4`<Ռa`;󪆼JJ|8A}\L-]>xtÀa y$_zsN=:Gy쥄MO\`QU26tZ=Vo&"]xY:N=;)6*ro\v20L3ad' 8_O7Ns˹/PUc04\fĜTQ`,"dg@`iO`6D6Ӓ'ݼi-EJqB#W+Dt(a說zȷpf"*S+ctP"ϩ߉XfR:u@T s Dm!}5bFzTRIu? Rj,z;k[b.Qmz1 ^n1'4r3fV4A,'cRl5FrCNL<H4k1a 8l`HNCZ:2d&+iKʟM:+`¼gT3<8ꃣ3<Ýp6=.ęT:gMisӴ'4wcZճײ2*MԦiͦ O٪8&in:D5֡ªWE(6sYnt] bŊcrlX NB~{U˭u<-btH|F<ϛ0M"p>V/K8 yH}]*]]Ls/^Œr#?N%#r{w9{e^ѷ>l<ݹHgnW[>42YV#=2ŋʸ7U J{D3ʋZ-y4K~D•%p18s^gМfyh S,\$ L#!yfN(<71)q)UBL@wL̘Tm&iyJL*o,mz3}QVlm`T l2ξ-+Rg!}\]՟lM6wpx伆#O~]vYgT8.fZhSc3]7 :jJSQ?o db<66H8?L:w֏{&>47;Htm%0ƒ0>kg^B~EB2@rh(6~O|o} -(:2W8wY%)lfGոmƪ9:DXe tdM1f8#,MLV Ld3P{f:ANd>#4/Mge#i܄ vr,Hk(+VuA1g+1gE y$}t_~^'87^vʠc(z%śfL"Z=r rUؠ)%d$uIfgrX'r',p0(vX'?mגbO[KH!Q4\y5a/.)1{W2zzϊ5k ,\`\Sn$ߨ}Xkm Q)13aG?3`m+,ڔ 6?(1ſO/ UXܔOTCa 5I4!{|9?9aw_Atp! bJ;JϒHT< %ֺaEGyVMJP#!EN&X8:ч,Pjf[6_8I(rP4O8OA#mBWx(;ITV7ؑL%w7vC0y Qcƻ-Ѳz x}z IX Z'kL# 8H}x-T0(axQ"|! hVucUr :fNu4m{i@T }[Ex1mRoLdsvE%b\cBfsQB .U%pUG?$R72}Z!baO .~f霟T9ga eS֩h/2=)sQ8xEukMjb֣er0~55j8q*㠧0F5=@Og  RE@! F {R<T[q&Wh$*$᳅ 25^+Ѭ9B(I#o d?JK,e(6M[ a//TU;c%S >mLg\TܭF%:?AUPBzI8^ZVMdy_#@mݔkXRS cH6uH{µI6%Ní+@d8J&8NI+eϦvgL^Zo"q~V 1䈤/x vbJρ,\O6mOr9;qAyA&M|?,LfDXT/*]N(:}r' Nb I"'BWuh"4UL{uq)~>Y\*lrɜ| QJsj,lU͒RCJAI@؁=+wWYTM՟XlnNjuW Z}GstF:/ڛ&dFaTD^YSa1b4ʮ͔lsNmƕr&W\梌'97vIc!@xbel1-$h7V:w5C[x>4_$7Hzg8reE.a6lX#E*ǗT!7[hMU,1_f,B"L|`m"tǂ1F82½mSV >QP/3.:Q߃y}w D N?6Cx!?nwI+jX$IHvT[x;w"ukAu5/Xk,~w ? H^i7 Y 2y^Aw[Qh2ƪz1jO+,U( ~x?鲙 c^hݬ)ՐT,^Ndw3J%/~Sٸ)YcSdrٱ=1i it@V&(] 4ǽWrc5A4\z;es7b( C6;Y5~u;xG# &,nΓ~ hސd( ۉ0}xhKԽ8(.e3w1R9|f^VO<ѣT }!f;opHaeRSt2nD/-z`Y& !J,Ԋ]O%+6OUʟ>{ff3{< PKԢVx!}4mpF+",J)j8Qa=@ ; s UC' A:_I*[7MF5O]@ݜOH:}TsZyXl+qCyF>6OGBg, B> ޶);jҭQア:edjO檛] !o+oXUГس\(8eG%K;%݃_6Ui_P]ns33c޶Nz ENfMHDL4$ rhj$omN'[)I 0t/Z u@?IS|,L;;PN;v0&Qx:t0i$x\@MCǦ U^`uHwJ7(Oy_ TcV}0(LQJ~2Rw!Mj ǯL(`({B!>+5-u7`2pڨGpu>|`7xtѥhy]b,&۫sr ٝ.3ؒ譝өZX狇-$d98uU0c>NT+3O9̈`3sdZ8e D(%j8AhJGP+xRщ|UO_ | [Va=UYKBf+_W0X w:$wM缀.6hWHcM ; 'g]HNusXrH$CO3 7@^*D} UĴ)xz na%ˏ 7Ѽ.EehGZW*Z?v5C9n|F2[f + M4 _JZ)ŬX uDB˸h᱘Ι(* yU%-Je@2G 0*AGH*W+&&/{UsQMffiK\/Slq[ظ2fy, A]=dX. 0fZ+!#lMl2 &PmsIF$1~x].!1_V0<+Ʈi̠<–(J&@vxIA}'{().kYi&sg=|-~#YdJ io ~??w ݯ2C}Gcf6>g"[GdK^,NBIIӼL㺨]VzlF<^I8c-I^ k9#r$#JơX;QbG`m^AcuC`]4Ws+=gZe wP3duWU$Pl]Y*}f ((% 7?b$a҂*l KEdUa5H9x!fGJqPKTC]ZB'{*rBQ9RSCʇտ_CN`ٺL{ >4 =cC5R񲺞~b+x"cK` VǩM;/BZ^\u*˙dit~gIؚqi InHA%0&Qg==k˩!wH|UBPnjʒ|Qb*? hXѦ}\%eSEi L cr-ܟS"8Ki7j/cac7T_x]VE'y,K>[Mb& KNO–r=~Y8Źa] q|\0` YpiƼ gʘnyO0ɾYJ!k Xvty+Te\u&%{V̐u 5![Xu_[u%+|=uT8u"kN<6~:HhS;BRlh UBZŮr/7=ߵE%7JU?d lt d1wp9+Kxd ?S,Ɉ(3r+c tw% d}7Z~` gDS7-tvʲ2mi+5ͺxԫ`]NdcZrZg$u2L» ZuJˉ1<@>aS[3tJ̸CqWSg g!%p7X(<<ɠ ki4lX8^ϊajooQgJj5z3 W $^( 8+F08Dߑp?q: ? s: qB(9yf' o\R0ehEi ٨>~%cQJd}qQ(-9YQqTc`m'HWfH3q[ ̵=V3x-IA/ %J}id;0<2H)RјC'9螆w3|-}A޾ dYCEDi#Q"r-G&w/uMNm.jʯ3 jx;?Vq) YwwTUXf6qk:<HCZOg}7wN,rK9+ 3N"8 ?~ Z~x"Un ?R=", RuN4d]"_i&Fߋ!OŤ7z*̘DžnOxaFUB]uwߏLTgGG;<)rXLp UvƴtOYfK>[qI/ oĵn Ei%.j-YmAQɥr7GۨMBI=֙O 09/tެ  5 c!wn6s\ d;%~zyd }~AadIScHtyYF` Oύ8-7Q76*yŏHz#8i6:(,C.(!93Ա̼r^ Bw`(:l 3 4b)>s<"Y\ȤW%Ű/L0UnHz0G3}r]xޱxЮd;늾y,y*Cps$l^ P-XOɓ_)Kl8/]yٰEZ,Ν.[2VN-惋Xn$vd %:=!ԥz-q&^.d6lö;9%>= 7jAZQy(f(8!nϟHO \5{?R }eܔ7Қ;d=_5b7Au_)HWSq댫9Ez o'ӯNOg =3_yd Y00HՊvvK&/23Q"Ia#_ž2t")%!z/RQ$OEl{ 㥚aHle/{(r5)ft-э'0MICM14e8ѰU(P;~>(]hx;ak`?:#%> <&aDF@R.ơO5Ym'M=͢N~}|z(*2_e]^MM_oCIo >W"d+Nz5ջuwHܙ՟~γhJpR0h=y؝fkOp0wZE2ﶲ&`~l^ }^DὈ`=_f=,wPPDTkOeHoئki{7 a6FLڐ&W, !v}LCApzcR,lbӐBJ'*g_{X'1[c0&uPy5W7S7AG<^0J2'5t#_nM3ƨ~9uOt2 },r7ElRAt|Bqصlp$C/Z?LSfp^۔pX߇5x40Q+ X^W(+ |Q Pv i$@$9U~B´ӁU ԂmEI4|ׂ/&w2 SE!٠zu!R3h+w|2>6XjW5<Њ ٴ5d6 di(WpDŽ-861v`BmmL3F<h&6ޝtW2&W}_QD1h޶f,bVcƓe<J|J1s2IăL[Rcv@34.=Nv[Է 6~ Q'|#I52R__?^!/v$'ZXBqώ>/g7.X]ġJ:X=ǜ9v 7ZAe6 /y$yEtجYop#5{~U=MB7i;$Yd )Ȟ1Ngd5B`館>˦˟%1`>r->`N|8kMfZ0_#pBH'Y`H yFFn14NU ǁ}I;Q/h7Nx1V2\Q"yUhDSKִ `tt\+ǯ.}ؾp[qƮ^hy^4=7bW's:@Mv [b)uG#}jwRkBFyD1)@,vA?4*v ^ FUf^䦵R@ˠ l[\] .fQ)8 KSNҒ|i/: ].5匧 b~ ^A_q)2ؠ38D &&-y@~f7˃:Apq8FY<>\K ҏ yJcs-5lBX؆D )ti+IvL[j iP-?(#~GxLˍv= }"2 F-mcf# YJD3+ IaohoFH6X%vsHtPb"ꥦfnHK圑lAٶZ)#.(q_#D+e\]3WX5&Mû skcS8ٳ+*J}${d5 AAhC%UyT9~㪜 ]< Ů) gݢ7Պt|4vFAFNԜ2sv (L^b?i!9/@Y'ڹ _jܶ*`xc_<|zB!f4D9'E- P-" 6^QE.%i(t#;̂d7/eCƯL1Dj}MX:sڿR~5r\Ut&JP^vP޸+#d]}@i*.HZV Qmf@\r5=ʃ*8?^`{0oɼҜu{Ek*UJU;4Xم[jۣOu[0ёǣ5Vlž5 洖" 6~Z<쉨UPwUq 97~AO~_C#a;Il/@򼿚=C$D.I'k"F{Aa&z%S鷓V߮[du~?;ˈb\.HqAH%c<~w:@ɼ;Q3od|I=2y$E6q;**kc[ *wj+;6)p8n.*3QHSoqtA79j< V. gbU"?#AzOWҿ{oäIV9kwNk *J:vd\㋿8 Vc.*ݺ'N;89oa90 L?CgUc'4|4oL&h8 3<$rBIY :{KQ2؞ ڦ>n-}ra'JPYzO;³Ћ!WnU99fL/ZZeаU'7!|0b$s18m%'N !0C МN+#>$ˁLW[<(\%r " ;UkwާD[ؿtJE7lu]p+83U9RD .Y3qM`T eQHa<;\1{1~U@ӳ% f:h2ǘV䭫d ͍ATYn%r:-EGCq&he\΅0".T/,4i?;[qaҚ9Ͱs:?< Jd/8/s(đ H6ݾ62<&wdMuA1ԊB?/;J0ڬ(ЬwiciGF/vq.Xz]{u/wJZy%\i&MÏq"ϯM؃JIzv= aZeol%ٞ DvCb&a9QÊrV9V:XW>@Z ᨽSD W6vX6Wk+8 FiCBtÖZ(@4/)s|}Q]pS\uL˲p'|.6o6# ϋTaX)ZD01oչ'%+j m! aÀ+b[1NQyvƿގ \rhݦ~Ȅt"lQ+uQ<1+t%jGǯ4 Ö[@OYCoN,6u;b׻loh2N81DCH#P_3a7/䅟K {NfW;]Н0Eb3:`URlEM 2rbvCِ{Lt`z@fX1o-U Kxvڂ+++l +ԃRI.u k$StDHO(N?zh1VŠBAlxA ٱ&ޅFM_1H5HrdEm2oh$~ aat'\\ =E>Fl+@#w*Sc#EZ'δ:<9-o/0,4@}qZ{'#;wV qQOY\S6ey뾭>jjOyT=U1O42lP.PAuE ߛ&xx 8 i0VS7g Z '9yu,Th9H l VXà"dvdv`؞aFgl\{&Ms6uI2ޢ@͝틈Ȣs% (<P]|ة|U# Xu駲RkzF/TX(CQmnxދׄ2U*?O2OR>ԏ:[/&B(X­$4)&I cѶsF;p:xCK2.3BʰDukE:>mRkr_Xhs'O+rxAkjV &쿶.jna|~GJ)TN.}g=J>Ħ9f{T?5rm5G@:M!SH n\;k%<>-qo*;gϋX[cZ$csta"n@ $# uWf>_ΙKԼ5ҭRh^)$f/!aCf5^j馑"hGKC@ {LTkhoc vT@ڴ C:zti+LI(J3͚N)v v>,0_Tp+[ׄp}a/]m"+(!5_ң-Gd^C)^;,]lUI*zcF'^i`^ }u=Kk³WjLs|`#*Q?Y郇"&LCg?$wIY=2.i2r#OUtqrzQT X8 સVz; e.^DRF_*ǑXU.n$:TjZ(I&<ه]'w &Ś8T9`oم+OHmaȇ򭪀)CmjpuI΢Is$Iڮ>#(.y.xŽ;512~=afyaa_vAt0{moW(䃄)dKil*KM7]:ns] [d߾Ds/;{DBn;t+LJ|/#\-^&LʛCMؽA =D]ɥNm_;s1< e !Z!t2г<"6VpEs"nwм;L8nȎM=L'jN DXTp.]JHrB5eEyt;DKq}Ed!*O_pW=6JTUmV҂J(,dP\P7/FJX}b؛_u( D16rA^y=NZaw޷t iv8()jMxz3e /8 6)m{lګ2n)f55?1#D9p_H @KDj[TȅuN\p-_)ZiVuҫ?LgVRSvOxk }R [ TtRn۬ Fu0SC'#b~n|q`rOlO˃JmW])L)O*w]WV_3' }_&Q);4rjR[V=X}ld?]ch2k(':[eū`%͵<#Y|넁 Ѧ!66>MLSybقC.9# ϼ=}:|†ֶI.Ym iMgT: ?fe'w44|G&C/Cޏc6ifZXw]Ƽl u1nGG )@1M'j(`d#~ K*KfIP ĕq3T`(p 6nŵO쀩 BoѼQP0gը6$Xz`R |[0ُ?'jŧbۗw3_W' 1{8PE}yƻ&/q7>*7NL{)=]ΟTzշ:EIt gn..Ib|-'|:0S(0';M\u>].%]+pH" Fے舚d/fiU4/b9y ]F`X2h.ݏLd'u /$RCV>Ab Xb&mi1 Nu.Ap|/ѯ.5+4@a%UluLxNM >)a6EjZV^)VΒ I>ͽ/g >ih/P^& R3 ,R.~W_=F؏pnwQ !Ҍ\ٳ*zA]GwLVuZV Ma94T8+{$1H b*oK2.Kv&.(_$m'f+ ߂0~XK8p 7ʌ+bJL1H8X}hOJ+z=alK.5Ja YMkY~"l2Ĭ[CO{)=;& TR[QBNPM VIYyW?#E}ntldt~C3hT|X$`z_i6 <%6˅>ܟ9225!\P>"&p]r}@Cnx䴧[WH,ecAl>]D7`R B+7ɖ:.AxVҟ$zx >/{񜘁-3\HH, ?(#3=K4~0ÆpBZ76T]=#kQl5O]LXƋQ! (9z{JJ>,R{Eps L,=:MFb2iM4IήV{x^ z"'$O3YkNn2U:x>7 ~óɲc-Mnab(-4Q,w^|%@ ucBۣ3_`N cG]yx"rM^>7"tPh`t:ʳY06qZ_Xj^I0 7ɾ:UxOSyR8K!V,oL &,q RL]6=b842 P 744> '' 9M%w V"4%J 5.+G QPL[fIL2ٔՍ:^!:6m9<>-#Px=*V33%6y\V!I:)I!9p/or·{2},獉Zi˞,)Y$@!'Q. {^b= TT=h7E#h- ~>UKŵ:萵@'VksM](gEaHj0߾7Dqɢ2MÏ1{| [Tm2w XKZ ocg}NkdnacoRkqg[8&u< My 5@_PcYP,ۊA1M$|}Gv!ؙ}R֪R*Sh:&gгaz@܃ML"Ў#\!y^,mޒO6F2ѭEx)ɭi/<:肺sRV#5@O_psC-HI7sjP!p].[ڨ>%<[1#Y 'zxQhT?1X;4LZ6Nhz&F13`(չ%e'(*y@ħ ﳸHw+&)eZbA<[[M:c̰r[baPG%1O8klS,l!BdDx/m!PyۑCM9Wk]2Bf6?.oPiѥ]Y0|Ç2;MX3)lu+b'yCI&GKF _(3;b"Z^v ;u^J#)k"g&=~dGEFzӔo_: Yɑ5q޿o@}jAf~~jسgXw+߇A|q|+ I8{%߫>vK b|uk*{M1mUk}\Ps4ጏ2C P6Vh a]Fǧ>;,v@`i}ˠ!YI_mrL49٢l(`4 b]wobhNn>'"7}tv21{(_:#1zFN\o욋5\̽(WjR=NOSVwCX}"Kb z` D!ƙTL`#T`ڱMNR[m>gksLWGr<[p'Lo=ڭo!u*9s~5v"))$ҏBQMVkI7b؋OO @hb%(# YZ