tcpdump-4.9.2-lp151.4.9.1<>,X_Y/=„QHa7w?-ő;X#j/[W}DŽI9.|Y]^Tq”198/+Y'XǦHM$󒷅 j;fDHe^ JހPd.#4G΍S3dۦ'\GtBOɳ3@Li9ˋ @!F*ݜ/Ԃ@F;UY7ެHn9B5x(H (X bnj/_1|Ґ oh6ך4llDK/>>H?Hd   - )AGP         y     Fh   ; (e8l9: FBGB HC ICL XC\YCd\C ]C ^D9bDcEndFeF fF lFuF$ vFXwG xH yH4zHTHdHhHnHCtcpdump4.9.2lp151.4.9.1A Packet SnifferThis program can "read" all or only certain packets going over the ethernet. It can be used to debug specific network problems._Yobs-arm-2openSUSE Leap 15.1openSUSEBSD-3-Clausehttp://bugs.opensuse.orgProductivity/Networking/Diagnostichttp://www.tcpdump.org/linuxaarch64Bx :H $%>7iSTA큤A큤_9_UYzYzYsYsYsYsYsYs_UYs_840a1c6fa7ab0e322afa5b6878787ca2d1fb9ebee028298b747b630eaed519dab713513375c9494ca6e03afe6807a9326e06296ff24e5dc404dc434beb6247f7054705384243d08f7e4c45bdc22ff88ef3d0f0674945c708eefbe5168f6d4150bee13899f8a82b16abb9e8bd76cf926fa4a01b3fd9c7d18f4b3d97c9ab7e12ba0a33ab42c11f537f09907dcb34042026fbe8ac7402a7bad6bb3e53b4522771444cdd963b3f338aae863c0b312628ba24ac7fdfe1e16dafe21d5f349102cc84a2f2d3b465f8c9d11fa3fc19ea5c4ed81c4bfef5bf6a6eeae1ad3ba71e41108dc4207393d19e53d82e5d3014b7fe97b9728e49c2f85ab11608b2b2233e02d4694d09b03d5d13e66d6de02a4bb2d0dd1cb9f41808d045962cdcc42350d5291b141a1d56e58d0ad21ee74df24b79994b5a17cdce61b984884dfcd3d98627d28d93d8cREADME.mdrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootroottcpdump-4.9.2-lp151.4.9.1.src.rpmtcpdumptcpdump(aarch-64)@@@@@@ @@    ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libpcaplibpcap.so.1()(64bit)libsmi.so.2()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.8.13.0.4-14.6.0-14.0-15.2-14.14.1_@]z@]6]6\ @Y@Y@Yn@Yx@Yx@X@W@VU<@U0U@TԬPedro Monreal Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez pmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comro@suse.debg@suse.comastieger@suse.comastieger@suse.comvcizek@suse.comvcizek@suse.com- Security fix: [bsc#1178466, CVE-2020-8037] * PPP decapsulator: Allocate the right buffer size - Add tcpdump-CVE-2020-8037.patch- Security update: [bsc#1153098, bsc#1153332] * Buffer overflow/overread vulnerabilities - CVE-2017-16808 (AoE) - CVE-2018-14468 (FrameRelay) - CVE-2018-14469 (IKEv1) - CVE-2018-14470 (BABEL) - CVE-2018-14466 (AFS/RX) - CVE-2018-14461 (LDP) - CVE-2018-14462 (ICMP) - CVE-2018-14465 (RSVP) - CVE-2018-14464 (LMP) - CVE-2019-15166 (LMP) - CVE-2018-14880 (OSPF6) - CVE-2018-14882 (RPL) - CVE-2018-16227 (802.11) - CVE-2018-16229 (DCCP) - CVE-2018-14467 (BGP) - CVE-2018-14881 (BGP) - CVE-2018-16230 (BGP) - CVE-2018-16300 (BGP) - CVE-2018-14463 (VRRP) - CVE-2019-15167 (VRRP) - CVE-2018-14879 (tcpdump -V) - CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220 - CVE-2018-16301 (fixed in libpcap) - CVE-2018-16451 (SMB) - CVE-2018-16452 (SMB) - CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled) - CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled) - Add patches: * tcpdump-CVE-2018-14468.patch tcpdump-CVE-2018-14469.patch tcpdump-CVE-2018-14470.patch tcpdump-CVE-2018-14466.patch tcpdump-CVE-2018-14461.patch tcpdump-CVE-2018-14462.patch tcpdump-CVE-2018-14465.patch tcpdump-CVE-2018-14881.patch tcpdump-CVE-2018-14464.patch tcpdump-CVE-2018-14463.patch tcpdump-CVE-2018-14467.patch tcpdump-CVE-2018-10103.patch tcpdump-CVE-2018-14880.patch tcpdump-CVE-2018-16451.patch tcpdump-CVE-2018-14882.patch tcpdump-CVE-2018-16227.patch tcpdump-CVE-2018-16229.patch tcpdump-CVE-2018-16230.patch tcpdump-CVE-2018-16452.patch tcpdump-CVE-2018-16300.patch tcpdump-CVE-2019-15166.patch tcpdump-CVE-2019-15167.patch tcpdump-CVE-2018-14879.patch tcpdump-disable-smb-related-tests.patch- Security fix [bsc#1142439, CVE-2019-1010220] * Buffer Over-read in print_prefix which may expose data * Added tcpdump-CVE-2019-1010220.patch- Security fix [bsc#1068716, CVE-2017-16808] * Heap-based buffer over-read related to aoe_print and lookup_emem * Added tcpdump-CVE-2017-16808.patch- Security fix [bsc#1117267, CVE-2018-19519] * Buffer overread in print-hncp.c:print_prefix. * Added patch tcpdump-CVE-2018-19519.patch- Disabled ikev2pI2 test that fails on some architectures * Added patch tcpdump-ikev2pI2.patch- Update to version 4.9.2 [bsc#1057247] * Security fixes: - CVE-2017-11108 segfault in STP decoder - Segfault in ESP decoder with OpenSSL 1.1 - CVE-2017-11543 buffer overflow in SLIP decoder - CVE-2017-13011 buffer overflow in bittok2str_internal() - CVE-2017-12989 infinite loop in the RESP parser - CVE-2017-12990 infinite loop in the ISAKMP parser - CVE-2017-12995 infinite loop in the DNS parser - CVE-2017-12997 infinite loop in the LLDP parser - CVE-2017-11541 buffer over-read in safeputs() - CVE-2017-11542 buffer over-read in PIMv1 decoder - CVE-2017-12893 buffer over-read in the SMB/CIFS parser - CVE-2017-12894 buffer over-read in several protocol parsers - CVE-2017-12895 buffer over-read in the ICMP parser - CVE-2017-12896 buffer over-read in the ISAKMP parser - CVE-2017-12897 buffer over-read in the ISO CLNS parser - CVE-2017-12898 buffer over-read in the NFS parser - CVE-2017-12899 buffer over-read in the DECnet parser - CVE-2017-12900 buffer over-read in the in several protocol parsers - CVE-2017-12901 buffer over-read in the EIGRP parser - CVE-2017-12902 buffer over-read in the Zephyr parser - CVE-2017-12985 buffer over-read in the IPv6 parser - CVE-2017-12986 buffer over-read in the IPv6 routing header parser - CVE-2017-12987 buffer over-read in the 802.11 parser - CVE-2017-12988 buffer over-read in the telnet parser - CVE-2017-12991 buffer over-read in the BGP parser - CVE-2017-12992 buffer over-read in the RIPng parser - CVE-2017-12993 buffer over-read in the Juniper protocols parser - CVE-2017-12994 buffer over-read in the BGP parser - CVE-2017-12996 buffer over-read in the PIMv2 parser - CVE-2017-12998 buffer over-read in the IS-IS parser - CVE-2017-12999 buffer over-read in the IS-IS parser - CVE-2017-13000 buffer over-read in the IEEE 802.15.4 parser - CVE-2017-13001 buffer over-read in the NFS parser - CVE-2017-13002 buffer over-read in the AODV parser - CVE-2017-13003 buffer over-read in the LMP parser - CVE-2017-13004 buffer over-read in the Juniper protocols parser - CVE-2017-13005 buffer over-read in the NFS parser - CVE-2017-13006 buffer over-read in the L2TP parser - CVE-2017-13007 buffer over-read in the Apple PKTAP parser - CVE-2017-13008 buffer over-read in the IEEE 802.11 parser - CVE-2017-13009 buffer over-read in the IPv6 mobility parser - CVE-2017-13010 buffer over-read in the BEEP parser - CVE-2017-13012 buffer over-read in the ICMP parser - CVE-2017-13013 buffer over-read in the ARP parser - CVE-2017-13014 buffer over-read in the White Board protocol parser - CVE-2017-13015 buffer over-read in the EAP parser - CVE-2017-13016 buffer over-read in the ISO ES-IS parser - CVE-2017-13017 buffer over-read in the DHCPv6 parser - CVE-2017-13018 buffer over-read in the PGM parser - CVE-2017-13019 buffer over-read in the PGM parser - CVE-2017-13020 buffer over-read in the VTP parser - CVE-2017-13021 buffer over-read in the ICMPv6 parser - CVE-2017-13022 buffer over-read in the IP parser - CVE-2017-13023 buffer over-read in the IPv6 mobility parser - CVE-2017-13024 buffer over-read in the IPv6 mobility parser - CVE-2017-13025 buffer over-read in the IPv6 mobility parser - CVE-2017-13026 buffer over-read in the ISO IS-IS parser - CVE-2017-13027 buffer over-read in the LLDP parser - CVE-2017-13028 buffer over-read in the BOOTP parser - CVE-2017-13029 buffer over-read in the PPP parser - CVE-2017-13030 buffer over-read in the PIM parser - CVE-2017-13031 buffer over-read in the IPv6 fragmentation header parser - CVE-2017-13032 buffer over-read in the RADIUS parser - CVE-2017-13033 buffer over-read in the VTP parser - CVE-2017-13034 buffer over-read in the PGM parser - CVE-2017-13035 buffer over-read in the ISO IS-IS parser - CVE-2017-13036 buffer over-read in the OSPFv3 parser - CVE-2017-13037 buffer over-read in the IP parser - CVE-2017-13038 buffer over-read in the PPP parser - CVE-2017-13039 buffer over-read in the ISAKMP parser - CVE-2017-13040 buffer over-read in the MPTCP parser - CVE-2017-13041 buffer over-read in the ICMPv6 parser - CVE-2017-13042 buffer over-read in the HNCP parser - CVE-2017-13043 buffer over-read in the BGP parser - CVE-2017-13044 buffer over-read in the HNCP parser - CVE-2017-13045 buffer over-read in the VQP parser - CVE-2017-13046 buffer over-read in the BGP parser - CVE-2017-13047 buffer over-read in the ISO ES-IS parser - CVE-2017-13048 buffer over-read in the RSVP parser - CVE-2017-13049 buffer over-read in the Rx protocol parser - CVE-2017-13050 buffer over-read in the RPKI-Router parser - CVE-2017-13051 buffer over-read in the RSVP parser - CVE-2017-13052 buffer over-read in the CFM parser - CVE-2017-13053 buffer over-read in the BGP parser - CVE-2017-13054 buffer over-read in the LLDP parser - CVE-2017-13055 buffer over-read in the ISO IS-IS parser - CVE-2017-13687 buffer over-read in the Cisco HDLC parser - CVE-2017-13688 buffer over-read in the OLSR parser - CVE-2017-13689 buffer over-read in the IKEv1 parser - CVE-2017-13690 buffer over-read in the IKEv2 parser - CVE-2017-13725 buffer over-read in the IPv6 routing header parser * Dropped patch tcpdump-reverted-test-scripts-fix.patch- Reverted upstream commit that makes some tests to fail when compiling with openssl-1.1.0 * Upstream commit 68cc39dd64688829be2632d9cd24f7efa3da79bb * Added patch tcpdump-reverted-test-scripts-fix.patch * Removed patch tcpdump-ikev2pI2-test-fails-ppc.patch- Disable ikev2pI2 test that fails on ppc, ppc64 and ppc64le * Added patch tcpdump-ikev2pI2-test-fails-ppc.patch- Update to version 4.9.1 [bsc#1047873] * CVE-2017-11108/Fix bounds checking for STP. * Make assorted documentation updates and fix a few typos in output. * Fixup -C for file size >2GB * Show AddressSanitizer presence in version output. * Fix a bug in test scripts. * Fix a use-after-free when the requested interface does not exist.- version update to 4.9.0 bsc#1020940 * CVE-2016-7922 The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print(). * CVE-2016-7923 The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print(). * CVE-2016-7924 The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print(). * CVE-2016-7925 The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print(). * CVE-2016-7926 The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print(). * CVE-2016-7927 The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print(). * CVE-2016-7928 The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print(). * CVE-2016-7929 The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header(). * CVE-2016-7930 The LLC parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print(). * CVE-2016-7931 The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print(). * CVE-2016-7932 The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum(). * CVE-2016-7933 The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print(). * CVE-2016-7934 The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print(). * CVE-2016-7935 The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print(). * CVE-2016-7936 The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print(). * CVE-2016-7937 The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print(). * CVE-2016-7938 The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame(). * CVE-2016-7939 The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions. * CVE-2016-7940 The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions. * CVE-2016-7973 The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions. * CVE-2016-7974 The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions. * CVE-2016-7975 The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print(). * CVE-2016-7983 The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print(). * CVE-2016-7984 The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print(). * CVE-2016-7985 The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print(). * CVE-2016-7986 The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions. * CVE-2016-7992 The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print(). * CVE-2016-7993 A bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). * CVE-2016-8574 The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print(). * CVE-2016-8575 The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(). * CVE-2017-5202 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print(). * CVE-2017-5203 The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print(). * CVE-2017-5204 The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print(). * CVE-2017-5205 The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print(). * CVE-2017-5341 The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print(). * CVE-2017-5342 In tcpdump before 4.9.0 a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print(). * CVE-2017-5482 The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(). * CVE-2017-5483 The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse(). * CVE-2017-5484 The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print(). * CVE-2017-5485 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap(). * CVE-2017-5486 The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().- fix filelist to fix build on s390/s390x- correctly reference SOURCE1 during installation for s390x- tcpdump 4.7.4: * PPKI to Router Protocol: Fix Segmentation Faults and other problems * RPKI to Router Protocol: print strings with fn_printn() * wb: fix some bounds checks (previously patched in, removed CVE-2015-3138.patch)- fix a DoS vulnerability in print-wb.c CVE-2015-3138 [boo#927637] adding CVE-2015-3138.patch- update to 4.7.3 - fixes four security bugs: * CVE-2015-0261 - IPv6 mobility printer (bnc#922220) * CVE-2015-2153 - tcp printer (bnc#922221) * CVE-2015-2154 - ethernet printer (bnc#922222) * CVE-2015-2155 - force printer (bnc#922223) - drop patches with security fixes (upstream): * tcpdump-CVE-2014-8767.patch * tcpdump-CVE-2014-8768.patch * tcpdump-CVE-2014-8769.patch * 0001-Clean-up-error-message-printing.patch- fix CVE-2014-8767 (bnc#905870) * denial of service in verbose mode using malformed OLSR payload * added tcpdump-CVE-2014-8767.patch - fix CVE-2014-8768 (bnc#905871) * denial of service in verbose mode using malformed Geonet payload * added tcpdump-CVE-2014-8768.patch - fix CVE-2014-8769 (bnc#905872) * unreliable output using malformed AOVD payload * added tcpdump-CVE-2014-8769.patch * added 0001-Clean-up-error-message-printing.patchobs-arm-2 1605626201 4.9.2-lp151.4.9.14.9.2-lp151.4.9.1tcpdumptcpdumpCHANGESCREDITSREADMEREADME.mdatime.awkpacketdat.awksend-ack.awkstime.awktcpdumpLICENSEtcpdump.1.gz/usr/sbin//usr/share/doc/packages//usr/share/doc/packages/tcpdump//usr/share/licenses//usr/share/licenses/tcpdump//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15019/openSUSE_Leap_15.1_Update_ports/2b39050acb885020e77924c9fa444825-tcpdump.openSUSE_Leap_15.1_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=792646f1dd9d197db6096722fa5f2f65edbee27e, for GNU/Linux 3.7.0, strippeddirectoryUTF-8 Unicode textASCII textawk or perl script, ASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRRRRRRE`pЅ5J9yNutf-8c27b149bcb8052f8fc5740a86840fc3b10ea531778857270baefd38e4e0124a9? 7zXZ !t/fK]"k%r񤨾`x`נIZ݆^ Ӕv8 Ko&&?iQ{sj1AUA`M]I f C%q8[[],^K$EwD*jf&+)K܎S"]ɫ>Bg9Rbm =#^P3]EoXq2 ݰ&45jb )eDn];B4X[X̣"0q BcG C%6H6W3 ':7='c2v-XYȜHH Cyb&sR:mvp@h ]@rpi].[ sЄ"݃iSȝbWOfkg-l{2'0+ӂ6_ # L[^Zaǒ>eDQ[T 5oZ|:׶V7!Y(?8a abTh=E|.&04 ->&r{Y!Vd||MS&9 Ӳ\]ڷ9/8eF#UH n`aOb9ۻlKLq1N$-#YY6m܂!ͷʇZpQ'}Ͷ $G,X}s/]!{wdQ<п4;בp/.]F2|ï9jS"mhnq=K O3.I=Vg<@S D$T$EۂPͱt .?R[6 }]2Cl:`UpU# zf%oJ&E|ڣ2uTrʴTL/t8uoh'd_\U]vjk@. ҔEp{f= XgB`U 'KjH5_!k0@0#jt}r]R%}zHƨ0x|DS^KlF7u n)ϗF'+!ޢ{c#@hx٫קnդZWG]+#h_e_LuqBßOade!z}i%LVyz XIA{LX U!Fl5'rp{iT0/9QIk#u3oen~)B\z>6bjCv$kV^ƒ)- TOW#DCeRL f=7m'[A49PhW;Vş[wN?ow,-@#bBJع`t\Slm/g˓X  "Oi_R@|z`KuM7;o S/65&5S糨 +i83w@+Y-Z>+85as..y?O9Ε_89g(rMmrP@CI~VZ* yzɠ>J5}u" r ñR(N=/q]_O6՗/+V^efU?Bj]RZ9X*񂶇 ̔kx5`w YX*esNV̀( RIRd&t뷛՟ea٨ ' ^:@<ޤ(T"g5:<'wT1 #˭=mUN1}` -2n+З(oAF&Y'¾el>If(B+skDW7s[zp~A66w-_d;䶺: 3y&;U9ç8[ѿ*d?wXejh]/պ.=0rv5-mN\~%FWlSgc g-;"D'TLƧ'񀹲}t[?BFSQ: vTS M&qm{+s)[s!1Vp }w> pU3E?Ig@dڧv@9&,_ q%vA8|"&ډHdO wYGue~4 P n|Gk-5 ZL0B//RQul֮/'_Ooon4.)S;N>ħȘJ JjUxP+rX}W1i-o#|"&8dߝ>q)/%%e.ے嚦lHs`quCS7ُƽTb0Zsµay\v VErMO&siQ34zfNo[d8G7W :>'PC̹%X@Xdf~KK bKW?Νڢ^KvʐFT?BTW SFhWU]3`Pv$2.,ξ,W1Y 9SO0O<<-uZ Uiݽ&p54{—mbDP}&u:0ɖ(Dk{ p4qA n6uGnF_hnJ?bTBSPLvtfS;d?ZC"MArt:I$uL[ M[2ۉ2#cCa3>Jڸh)jg(h4u KYv 73`h|.zzaʹbDI?veA_cvo1ћԽv8&wg_pҏ-ƴq/?1uٮ DPJܥXKZ!qQ;MD>Mq6]t4w ~o&8~PkV3-/k+C)d?:4#`NO Kݦ:8uJ@TZ8s͚eSs8W [ٖGBgoq^pmLs*+HԱ>] 0 2ߦO}2 j ֬O٥䌚{䤡JlK<rtZxFmQ4ԸM 2CO^SҢJ<{kûKjt{{[Tƒ8M+lUoZJ[)^H /VSoQnEɥ&X:HRm_\bRzgm',f&XF}G񟯣?^#oaYÕ \SnDad1ʴ?3<ds?A,t ^6^3. oje^A4S:e/ء" Y3ML"ʹRg"R;ϠR1:%QUhpf JG=4yg+p8A&߭8 6 orjht>rb1S/Bٵn9N٨1[Ws@lo8Z*h4>$ KP"3>(Mֽ7bw-krRDBKLk|ӚakaKIXhyű?L;&DA릛J(O?G$TUk+mXp~.&K E)Hww\mdi`է; 1d()TQ[3yi1!{S vzj63p+3SžzĘh?y:oB[g'`7_޿uCP=8XKIVW)L>k\wڮ/. E%Dqt˷\7#]EzF,:|nAk@uńz&t /#^72V/TcINo,dc/NGoćd;W Vi-s-<:ƽGWm 6&sQX@G<*9I磦D0KyfezَOHqIcG'mQq{Zʀ˨%y κ047 ⤴$Q /1g%4eGyU|-LX4[Bز6Gxt?U4ie{h7 m5H~X3F|d+&[4|LBǀsRiM\˞L%UI*PMɤ.um"K F${z!*ŽVU`q@sHTeiﮤ>b_M ,_Y#a~?݇x05Hs(ӛhj =U8Ě*@zQ\ j _N *jS)WhRTQFhHel:1/mW:Gtx&0 VEAbQ)]=%ԮF^QphЪtEfFQc > }PIy8%Maω ZN@»ZzΣ! h4\7g7.&3{r 0fKn?hyw9g!Rҝu+"^ԁ2 3hTNE.|R1yc>ySngKF͋)-ht )J781>G*-g3r1NǷ Ih>>!$3'\q9xvXrfYtj҃'HXwdGIM `MԎqwb}ABjEW,^i3b Z2O 1r,L"6U0cl).N%?Cm}=nrA]ltpCS䦐gzSl4cھ 2H7<077Sjְ-艊Vѹmrk<:ϠCXM3 4({׀EoDڴ|5>9-u[<)0{.\Hht+v@5 ?gOL BQ*?1#?.eK=|QݼV*^+.9v;0z3qR(wv4J%)#r RZg0HL,5"ڪ\[r(ӌkɤm+􎧃PP=I;ez)5pU%m]ÜW.o:$VbKfGPM^kf=3'/bS(쮉:ؼa9)'PO&` ZQ)Uplo;qxZvi%TJ-͎v1ON,{a`pyG wTfaE_ƒ\6~۰aŗz iI~LFZUdO'-<_}OOz FMUoIt;BV\J ;hŋ]½tV[F>EA!QB1?G2}9 [y.E[$7&2N~Pu]O}dCs㜳e6J{Zs%;tԻ(!yqIm0| 4rX%BN a#9?B'Pk_oC]n0.e>Co= 5? g+e)x(ޑJ&;G5 {˘Т(cqb#Z9a0fni4 D[E'iNjfSo #rU8)wVHYh: CFa^QgJB7QTdQƎ}AK~xKK'>,֗`I&fTǀt8A.f=g:8mXCϷ/Jrx 0F~ӑ>1RCRO1)ny;BNE,^}iU;\2Y,">)܀v4f[h!$f7/·ĈQ;tT7iq{|/c(7։cb5Wl)Bp@$HjIJBN^qE=jO7/icM9Dr;#3”GQRPP=u5p|N ϓR {=k$xap<\`!Bm7cM`yo9QD>\P\ӏɩjݓ} O 6FWJ^Al~ݍ e"% f;ajF8NcʔV+W[ AyelCGR9ŞFjW7E"; .^*\Ufi`J3nz9lj`72d+I>ps 8®ܻd[pC3Q$Bw5gp2~޲gf.k&H gI7=@7a2dhϋ {ݴJ kzY aW1 }0*n Jj7R*xMi |D6koOP=/ٻ)=S`R%pD}[ fLݴ p )rYb+™wclѿD*d&B7z Þl<Δ3]`wy)-ݬbTʙQw! X$F?r(|*w;/Q${W˄afx7gbqUdx@fs:|Z8-+6fj7[佢TUI{2tH0LU71t Jl}m,VbY(5'cK1S~Auʅb7@c ]ɽs2lgWMH+(^k/֬Ɣu&y(KuPhm"o r=%D!6A>A0@ ҂>Y΅Ⴑ'w6 +]bn չjWx48yF]A.kz<":td0@7vG<)zqws\|e-V_MUP- Hfy\ۋпc0jh_W~` sbP &H>A?xðޒMJ\#@R+:Ɩiԋ'Sn6JD1IqSû=K*L=Vs e~Ghʁ %Ǯ<`m̌+)4ca+E5aBOj҄&N ,Sju ;1kynn/HqViMJ(CY)  [ȥu.ag@0f*|R#XV0 -|@9 fØtԐDq 'bRp<Å P#q˨i{|,ֳ@#Zf~--k%wЉ_0sJF%ɋ =h ;ء49wZ˯nqOQ Ƨq}ftcLo$PhtY^uovU5 2OǮke|:=E" 4@ҍh ˥#ԙ AlNB6ї6#!M~T2-00m<6_c 1z鎻ˮB7WRK-HYAm(9:+'щ}mL &~֦IUť0-kaz23{JtB`Jd4jPVCYP'Wq;?swZR8G>6|sMcH%dűaln}!=lIڬc}J8Q_xVeb;>H ,'TgQ) e4- /pg1+5SREpQᕯ GROY 4lIɞp8ZTN'Me)h) &л|P]";*("ZN 8c$b`X62/k_>&j~<6LEu+^ؕeZ+i3P-,-WH k곫ϺPWqT{@h3}F]ĚkKje DX;: *pvt%Yzj  z([n!VtKDX! a~Ǻ9~?BafP!zBGDfeB ZfN|zkj3Q`iPb%"\H5NZGYљ:o,@KoU-Q|w:pv%$LJ-z0{k*T{ҩqj _1 ݬ# |kMw H^ʥ?XUtH}UR?xR, R#A (~ (PLޅ1i&O 4~ ^.NIenNtt4 7&{K&OHK,^B`'xkL3)ݔP 2$ QlhUm # qjKk/=W Ek:G<ʦGAP7TKjم@,.]-ð^Εxbngfƒ\D: Oˠ D 6!B`' y+sNǾ!#Z_9شqG.7ޒ-Pٚ4 @f~fta* 4gDC$`*/ڻ9 IaXyҹIۇ'y\h*w#˫1*IJgߜ#%{_1UK m&$@{fS^tlMopZo ;[{^);F16/7ex htzkqZ4?CJ' jZptӳU 賈z 5XaAViȁ-⼪'!B `TfzgL:ɸtUQƍ`ؖ|UWrx)),8k`  .hj*[`' ?ЩL!-UphcD*Ͷ WciDnNLj[OyK*@A,uv)'h f0뻄U0A!1 ~'lbs;ov=`1cƇ$2CLRKT׾e(wȊPA4qe>].Mm:!{ [W\H{.P3Nxm_ "2FD0w69=i$5u[/VM~j;i#N{.bg]6#YyU\^L[+wM/ "E)1NnRtkq1 jW*9[1^$8".=I(55KJJcS&uu2XS"|o0qӡ='Ӕ*CF!@GQ{~O^"@fLjţe*:$.TiU>u(rT9Ēᨇ"b`KfTqHv WR9uupCР0#a.!Qj(p 20NT $(e,`Ot^U/*J*VE2H9Sq'Kܞr_?2V/HVUdwYEqq4Bۣ 1lZe4)JEJ 4!A]B_MJIWuZ⨛up0ᑯSc+]/釞F_$"jЩ)qq : ճgd`XuiqA%cr(X-ve/Dr NWv,y6*mJ%B - 76wWN%pe`X zO&HΉ}  ci뾒͏ +iaU>ƫtֶF(r4ONDЗR~p!k/s#Pm,n,D)2{>2Pf>Um{C2 P$i|8F2-{5ԾF2@G \ήVF PH!tME-(&i,zkTy1aΞ1(U ʤnڷo]@s0j.02i7(%lvb/z:o& Gre&&ȨSֻ>%`.<_f>{T? Tfn*9ipIȸv;~wKZœKn#A;mE)^!yyzNrT|g}h2;| j:yLkKY!KFΜwujn ):9^Fw`:v f'W2LB)n)#zn;+|\A| Gס1`-&f6)/ `+pTBԬC8v{.Xz(!XCһV#ߌlUG*~*+5l[B1aL(5-ENA4*Ƹk)Ŭu`k'l0vR͗BDrT< ɢ \@`;TP2Iƣ⏗v`cJ2+}=^I\0MaQ1x&,STd}V[XoLqmQuqeF?Y.&! Q☐{̗_,DV f}p@ ; ) ,,@  f&)sа9CcL*HG@c)Z NjQv7 ]}y8^eG.g+ڌr>^ P0-O9QRG}ewHlbCŋhv)Q}ߞ$wl<U(0WO]狆!?٨lpGZȺ:#YZh-]o(ZX^~`h6'Zҷ t},\Au y,JäӍ~CZy2Ő#/U-3EX`پC sRi:GHFb{ 2!Ԭ&D^|SӸ"Fͯn慲n+mx;uʭRسec,6Eeh˧I lSNFٱhk4KN=p)f\:y6VDFښI_`.%2)(_^8h+imf7  @ G:i!J95!|}P_:mY1pa4ZIC<5#9]{IADCbM5`Fƃ'y,V~7Hwa;VLҬNcCosb,1).TR<O*M,>\7E[E`yvk"-F6*2߁SVmMeStcjTcKR4Q_svtUf1̥3(U7Vů [yŮIѯV,E%HZTK}% \%'%55%scD~DL[wVi xGXzcYty7f\c z{ +Q*lr.бr3.@uD R_dg=}1xڲbM^m3Kr-B6k氨MɄchD* ՑRĀ6^<69ɣ U=xG]OAi\l @AR Pl3jSK:,͍IVs#NTiuAh.r&OrD*YRRRdDĶ ]2q"r%7k4 #7Bj~{! 6JC{Mj l"Q(2߂ Uwq'H3װU˗R4"dtĐP%ʝז.FMoh dcjǜVծK> Cn@iJN$/ I~:U\F\G8`)2ҙQ[3O( hMr2?%@MX\1 }A&`p~Ka+Ւ-N-{)Gd^ @e~f uYը_zLQ[=)pEVo4Z1z˷@ u%aqf-zc'+֜ZBhg=":.)"Fֹ9ByemWL%e֤9ͦ ޚ5mb\D 3*aڏ.4\@LRmI* }:_B 7mgln+=XZT~cB-D=i ^{:?~;$덩*W+g哃gP5K &8 5w4h#FqJvOU%h[R\<zݪVRgN"NT-'Uv?WRX Y0,1=os$N4̅_TK<-U{?" Z*;7a4` i^EO%ܬ*e&^@W KR&;;*Oօ%E׫:j]I#?sJU!U0تAߙ5]̂gr*@p@ UPWx6tz1 N=Lƃ8'&єy>8~ۭ0cu֦| }Bdi-Bm@ƾgꩢI;톾 *~nr3-HX=R":6 ^c@%~{jEɥ\Ucewq˜zH~/F v),~#O3ՕFi1Zh߆rG~)e3TT2. \BOۛ!d ntprݴ{ eDr`wvz0hq]qTQW.2SHtb#f-g"@f׉t0- XuVwUb q?JCJ,h]6 G ԃsǟXNP!_fYĊG#Hb.F9e Sr2N¿A ZE)GdɚX ݥb<3C9/]ڝ B|nIk|Ft/- qB"=: $Zxfل_A/W M%It`uűSSe>(?6UYczK 5nfN'^Rۺ ?~DK :AS5J j l)Qa^LMApzDk a˽ )JEsvtm Z: @AӳKo- fMagG~b "4ӄtKGZ.̗ÙQ2+/u|I\RY%hi⏺D0aJa}:tRg|S ΂I~ϙnck@P0rР<\> ={mưچـ_Bϰ pm!?d'b$F.QvGfYm8ȁI, @~kNŊ@*)*2ޕHMY껊 >9S 2"ӭNrTK,.:\] A*k`DaT<؊pi\_W "=!XQB4݈*+?ErGܣVW`G k$ك$ 3vΘuDLc /9B /MG.Rvu HqE(6 ahG;TYh*RR #ȇ4IF%Pv~B[3꙲"Sހ,qSǻ/jb֤$|jç&%tZ).bI&fџ1S!~.+2#giB ٧b@̍Yna~>U))ن{Zn+5<ɚ%%sfo:)6ӏLWw9"?=?:MY*_l llVlAIi+D*5ÞI~mӿK[ɇp#mO•) *bpr3d2u)5 |v 91[,< |O|qus.^Ul~ʔo߁R=8ǤiM 1`nD 4B'~]Ŏ`4U5Di;P>_1CFO@xǀ,EZ_ AL' [u)kMI~9tYSM/ܵB43ԘZwEܭ:8lFba g+^-cAv:50cGXV BDAZZ@Z8'h; >}/Mi0ր6LU%GoR"VV?!VcW$quhB?K61e]@e"ChP ĊȮpWg.GT4H헴T~zl3))J%/48ma*VM*x[k!(o= qYlkbr]cMJZ[7r$ېұB%O ҧ 2N O}Q( :n7Tv6 яmǨi?7s_oZ̷ ,.$onb/7bXXA%ܼ&gA/SCDfڇJ!E4[}HjMARJg乘H->g OP2=dO&ã <ڙs>zľ4JԡkT쯤jo(FO Nfs`XkonJ &۰oT[:w:c'Z )2O&apUyɫlUm12wf)BZ^3Bg^B62kх  ,A-9|&"\eG}%OT%gB=ٌAn^sQس !f{6~%bn  ғ 6ێzz0E?-=#ׂiީwⴉj!׸çN1e`Ƀ^ x $2MT9eT;i7/Du7 agΨ*@A7$Z5$>m/Y!ugZHBP|am\VKK#|([ u[FP-:ߟ55P9^23R_!CGVEoə'޾LKK R Jy8: g\pI?#oIM;'-֠idC㣛گu3Q&RZ=a Wasa(& +25iOBN+%:46N]YfѯV,Y*6I{2Wψ9XRN9Nwi.id+k*0 \1&G~.^L/G )Wx)9ք "aNBb x\P+ܾ$5*sSu57/Q(K qJ4(b YZ