wireshark-ui-qt-2.4.15-56.1<>,B] >?d  Ax| !'.(@ L X p     > \ |  . X.5.(|8_9_:"_>M@UF]GpHIXY\<]T^bcd1e6f;l=uPvhwxy=zCwireshark-ui-qt2.4.1556.1A Network Traffic Analyser - Qt UIThis package contains the Qt based UI for Wireshark.] Robert Frohl Robert Frohl Robert Frohl astieger@suse.comastieger@suse.comastieger@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.comlszhu@suse.commmarek@suse.czlszhu@suse.comlszhu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comcyliu@suse.comandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deopensuse@sukimashita.comandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.demvyskocil@suse.comdimstar@opensuse.organdreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.decfarrell@suse.comandreas.stieger@gmx.deandreas.stieger@gmx.deandreas.stieger@gmx.deopensuse@sukimashita.comandreas.stieger@gmx.dereddwarf@opensuse.orgzaitor@opensuse.orgasn@cryptomilk.orgcyliu@suse.comtabraham@novell.comcyliu@novell.comcyliu@novell.comcyliu@novell.comdimstar@opensuse.orgcyliu@novell.comcyliu@novell.comprusnak@opensuse.orgprusnak@opensuse.orgprusnak@opensuse.orgdimstar@opensuse.orgprusnak@opensuse.orgprusnak@opensuse.orgtserong@novell.comprusnak@suse.czsharms@ubuntu.comprusnak@suse.czprusnak@suse.czprusnak@suse.czprusnak@suse.czprusnak@suse.czprusnak@suse.czprusnak@suse.czprusnak@suse.czprusnak@suse.czprusnak@suse.czcmorve69@yahoo.esprusnak@suse.czcseader@novell.comcseader@novell.com- Wireshark 2.4.15 (bsc#1136021): * Wireshark dissection engine crash. - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.15.html- Wireshark 2.4.14 (bsc#1131945): * CVE-2019-10895: NetScaler file parser crash. * CVE-2019-10899: SRVLOC dissector crash. * CVE-2019-10894: GSS-API dissector crash. * CVE-2019-10896: DOF dissector crash. * CVE-2019-10901: LDSS dissector crash. * CVE-2019-10903: DCERPC SPOOLSS dissector crash. - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.14.html- Wireshark 2.4.13: * CVE-2019-9214: RPCAP dissector could crash (bsc#1127367) * CVE-2019-9209: ASN.1 BER and related dissectors could crash (bsc#1127369) * CVE-2019-9208: TCAP dissector could crash (bsc#1127370) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.13.html- Wireshark 2.4.12: * CVE-2019-5717: The P_MUL dissector could crash (bsc#1121232) * CVE-2019-5718: The RTSE dissector and other dissectors could crash (bsc#1121233) * CVE-2019-5719: The ISAKMP dissector could crash (bsc#1121234) * CVE-2019-5721: The ENIP dissector could crash (bsc#1121235) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.12.html- Wireshark 2.4.11 (bsc#1117740): * CVE-2018-19625: The Wireshark dissection engine could crash (wnpa-sec-2018-51) * CVE-2018-19626: The DCOM dissector could crash (wnpa-sec-2018-52) * CVE-2018-19623: The LBMPDM dissector could crash (wnpa-sec-2018-53) * CVE-2018-19622: The MMSE dissector could go into an infinite loop (wnpa-sec-2018-54) * CVE-2018-19627: The IxVeriWave file parser could crash (wnpa-sec-2018-55) * CVE-2018-19624: The PVFS dissector could crash (wnpa-sec-2018-56) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.11.html- Wireshark 2.4.10 (bsc#1111647): * CVE-2018-18227: MS-WSP dissector crash (wnpa-sec-2018-47) * CVE-2018-12086: OpcUA dissector crash (wnpa-sec-2018-50) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.10.html- Update to 2.4.9 (bsc#1106514): * CVE-2018-16058: Bluetooth AVDTP dissector crash (wnpa-sec-2018-44) * CVE-2018-16056: Bluetooth Attribute Protocol dissector crash (wnpa-sec-2018-45) * CVE-2018-16057: Radiotap dissector crash (wnpa-sec-2018-46) - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.9.html - packaging change: temporarily disable upstream tarball signature verification, use hashes from signed release announcement e-mail- Update to wireshark 2.4.8, fix such issues: * bsc#1101804 - VUL-1: CVE-2018-14340: wireshark: dissectors that support zlib decompression could crash * bsc#1101802 - VUL-1: CVE-2018-14370: wireshark: IEEE 802.11 protocol dissector could crash * bsc#1101788 - VUL-1: CVE-2018-14344: wireshark: ISMP dissector could crash * bsc#1101777 - VUL-1: CVE-2018-14342: wireshark: BGP protocol dissector could go into a large loop * bsc#1101810 - VUL-1: CVE-2018-14339: wireshark: MMSE dissector could go into an infinite loop * bsc#1101800 - VUL-1: CVE-2018-14369: wireshark: HTTP2 dissector could crash * bsc#1101794 - VUL-1: CVE-2018-14368: wireshark: Bazaar protocol dissector could go into an infinite loop * bsc#1101791 - VUL-1: CVE-2018-14367: wireshark: CoAP protocol dissector could crash * bsc#1101786 - VUL-1: CVE-2018-14343: wireshark: ASN.1 BER dissector could crash * bsc#1101776 - VUL-1: CVE-2018-14341: wireshark: DICOM dissector could go into a large or infinite loop * bsc#1094301 - VUL-0: wireshark: multiple vulnerabilities fixed in 2.6.1, 2.4.7, 2.2.15 * CVE-2018-11359: wnpa-sec-2018-33: Multiple dissectors could crash * CVE-2018-11361: wnpa-sec-2018-32: IEEE 802.11 dissector crash * CVE-2018-11358: wnpa-sec-2018-31: Q.931 dissector crash * CVE-2018-11360: wnpa-sec-2018-30: GSM A DTAP dissector crash * CVE-2018-11356: wnpa-sec-2018-29: DNS dissector crash * CVE-2018-11357: wnpa-sec-2018-28: Multiple dissectors could consume excessive memory * CVE-2018-11355: wnpa-sec-2018-27: RTCP dissector crash * CVE-2018-11354: wnpa-sec-2018-26: IEEE 1905.1a dissector crash * CVE-2018-11362: wnpa-sec-2018-25: LDSS dissector crash- Update to wireshark 2.2.14, fix such issues: * bsc#1088200 VUL-0: wireshark: multiple vulnerabilities fixed in 2.2.14, 2.4.6 * CVE-2018-9256: LWAPP dissector crash * CVE-2018-9260: IEEE 802.15.4 dissector crash * CVE-2018-9261: NBAP dissector crash * CVE-2018-9262: VLAN dissector crash * CVE-2018-9263: Kerberos dissector crash * CVE-2018-9264: ADB dissector crash * CVE-2018-9265: tn3270 dissector has a memory leak * CVE-2018-9266: ISUP dissector memory leak * CVE-2018-9267: LAPD dissector memory leak * CVE-2018-9268: SMB2 dissector memory leak * CVE-2018-9269: GIOP dissector memory leak * CVE-2018-9270: OIDS dissector memory leak * CVE-2018-9271: multipart dissector memory leak * CVE-2018-9272: h223 dissector memory leak * CVE-2018-9273: pcp dissector memory leak * CVE-2018-9274: failure message memory leak * CVE-2018-9259: MP4 dissector crash- Updata to wireshark 2.2.13, fix such issues: * bsc#1082692 - VUL-0: wireshark: mutiple vulnerabilities fixed in 2.2.13, 2.4.5 * CVE-2018-7335: The IEEE 802.11 dissector could crash (wnpa-sec-2018-05) * CVE-2018-7321, CVE-2018-7322, CVE-2018-7323, CVE-2018-7324, * CVE-2018-7325, CVE-2018-7326, CVE-2018-7327, CVE-2018-7328, * CVE-2018-7329, CVE-2018-7330, CVE-2018-7331, CVE-2018-7332, * CVE-2018-7333, CVE-2018-7421: Multiple dissectors could go into large infinite loops (wnpa-sec-2018-06) * CVE-2018-7334: The UMTS MAC dissector could crash (wnpa-sec-2018-07) * CVE-2018-7337: The DOCSIS dissector could crash (wnpa-sec-2018-08) * CVE-2018-7336: The FCP dissector could crash (wnpa-sec-2018-09) * CVE-2018-7320: The SIGCOMP dissector could crash (wnpa-sec-2018-10) * CVE-2018-7420: The pcapng file parser could crash (wnpa-sec-2018-11) * CVE-2018-7417: The IPMI dissector could crash (wnpa-sec-2018-12) * CVE-2018-7418: The SIGCOMP dissector could crash (wnpa-sec-2018-13) * CVE-2018-7419: The NBAP disssector could crash (wnpa-sec-2018-14) * bsc#1077080 - (CVE-2017-17997) VUL-0: CVE-2017-17997: wireshark: Misuse of NULL pointer in MRDISC dissector- Update to wireshark 2.2.12, fix such issues: * bsc#1075748 - VUL-1: wireshark: activation of the kernel BPF JIT compiler makes system more vulnerable to Spectre variant 1 (CVE-2017-5753) * bsc#1075739 - (CVE-2018-5336) VUL-0: CVE-2018-5336: wireshark: Multiple dissectors could crash * bsc#1075738 - (CVE-2018-5335) VUL-0: CVE-2018-5335: wireshark: WCP dissector crash * bsc#1075737 - (CVE-2018-5334) VUL-0: CVE-2018-5334: wireshark: IxVeriWave file parser crash * bsc#1074171 - (CVE-2017-17935) VUL-0: CVE-2017-17935: wireshark: File_read_line function bad '\n' handling could lead to denial of service- Update to wireshark 2.2.11, fix such issues: bsc#1070727 - wireshark: Version 2.2.11 fixes three crashes * CVE-2017-17084: IWARP_MPA dissector crash (wnpa-sec-2017-47) * CVE-2017-17083: NetBIOS dissector crash (wnpa-sec-2017-48) * CVE-2017-17085: CIP Safety dissector crash (wnpa-sec-2017-49)- Update to wireshark 2.2.10, fix such issues: bsc#1062645 - VUL-0: wireshark: release 2.2.10 and 2.4.2 * wnpa-sec-2017-42: BT ATT dissector crash (CVE-2017-15192) * wnpa-sec-2017-43: MBIM dissector crash (CVE-2017-15193) * wnpa-sec-2017-44: DMP dissector crash (CVE-2017-15191)- Update to wireshark 2.2.9, fix such issues: * bsc#1056248: VUL-1: CVE-2017-13767: wireshark: MSDP dissector infinite loop * bsc#1056249: VUL-1: CVE-2017-13766: wireshark: Profinet I/O buffer overrun * bsc#1056251: VUL-1: CVE-2017-13765: wireshark: IrCOMM dissector buffer overrun * bsc#1045341: VUL-1: CVE-2017-9766: wireshark: PROFINET IO data with a high recursion depth allows to cause a denial of service in thedissect_IODWriteReq * bsc#1044417: VUL-0: CVE-2017-9617: wireshark: in version 2.2.7 deeply nested DAAP data may cause stack exhaustion- Update to wireshark 2.2.8, such issues fixed: * bsc#1049621: CVE-2017-11411: wireshark: The openSAFETY dissector could crash or exhaust system memory because of missing length validation * bsc#1049255: CVE-2017-11410: The WBXML dissector could go into an infinite loop. * bsc#1049255: CVE-2017-11408: The AMQP dissector could crash. * bsc#1049255: CVE-2017-11407: The MQ dissector could crash. * bsc#1049255: CVE-2017-11406: The DOCSIS dissector could go into an infinite loop.- Update to wireshark 2.2.7, such issues fixed: * bsc#1042304: CVE-2017-9352: Bazaar dissector infinite loop (wnpa-sec-2017-22) * bsc#1042303: CVE-2017-9348: DOF dissector read overflow (wnpa-sec-2017-23) * bsc#1042302: CVE-2017-9351: DHCP dissector read overflow (wnpa-sec-2017-24) * bsc#1042301: CVE-2017-9346: SoulSeek dissector infinite loop (wnpa-sec-2017-25) * bsc#1042300: CVE-2017-9345: DNS dissector infinite loop (wnpa-sec-2017-26) * bsc#1042305: CVE-2017-9349: DICOM dissector infinite loop (wnpa-sec-2017-27) * bsc#1042299: CVE-2017-9350: openSAFETY dissector memory exh.. (wnpa-sec-2017-28) * bsc#1042298: CVE-2017-9344: BT L2CAP dissector divide by zero (wnpa-sec-2017-29) * bsc#1042309: CVE-2017-9343: MSNIP dissector crash (wnpa-sec-2017-30) * bsc#1042308: CVE-2017-9347: ROS dissector crash (wnpa-sec-2017-31) * bsc#1042307: CVE-2017-9354: RGMP dissector crash (wnpa-sec-2017-32) * bsc#1042306: CVE-2017-9353: wireshark: IPv6 dissector crash (wnpa-sec-2017-33)- Update to wireshark 2.2.6, such issues fixed: * bsc#1033936: CVE-2017-7700: NetScaler file parser could go into an infinite loop (wnpa-sec-2017-14) * bsc#1033937: CVE-2017-7701: BGP dissector could go into an infinite loop (wnpa-sec-2017-16) * bsc#1033938: CVE-2017-7702: WBXML dissector could go into an infinite loop (wnpa-sec-2017-13) * bsc#1033939: CVE-2017-7703: IMAP dissector could crash (wnpa-sec-2017-12) * bsc#1033940: CVE-2017-7704: DOF dissector could go into an infinite loop (wnpa-sec-2017-17) * bsc#1033941: CVE-2017-7705: RPC over RDMA dissector could go into an infinite loop (wnpa-sec-2017-15) * bsc#1033942: CVE-2017-7745: SIGCOMP dissector could go into an infinite loop (wnpa-sec-2017-20) * bsc#1033943: CVE-2017-7746: SLSK dissector could go into an infinite loop (wnpa-sec-2017-19) * bsc#1033944: CVE-2017-7747: PacketBB dissector could crash (wnpa-sec-2017-18) * bsc#1033945: CVE-2017-7748: WSP dissector could go into an infinite loop (wnpa-sec-2017-21)- Update to wireshark 2.2.5 (fate#321770) * CVE-2016-7179: Catapult DCT2000 dissector crash (bsc#998963) * CVE-2016-9376: OpenFlow dissector crash (bsc#1010735) * CVE-2016-9375: DTN dissector could go into an infinite loop (bsc#1010740) * CVE-2016-9374: The AllJoyn dissector could crash (bsc#1010752) * CVE-2016-9373: The DCERPC dissector could crash (bsc#1010754) * CVE-2016-7175: QNX6 QNET dissector crash (bsc#998761) * CVE-2016-7176: H.225 dissector crash (bsc#998762) * CVE-2016-7177: Catapult DCT2000 dissector crash (bsc#998763) * CVE-2016-7180: IPMI Trace dissector crash (bsc#998800) * CVE-2016-7178: UMTS FP dissector crash (bsc#998964) * CVE-2017-6014: Crafted or malformed STANAG 4607 capture file will cause an infinite loop (bsc#1025913) * CVE-2017-5596, CVE-2017-5597: Two dissector infinite/large loops fixed in 2.2.4, 2.0.10 (bsc#1021739) * Multiple dissector crashes and infinite loops fixed.- Force rebuild of flex scanners to fix a buffer overflow (bsc#990856, CVE-2016-6354).- Wireshark 1.12.13 (bnc#991012, bnc#991013, bnc#991015, bnc#991016, bnc#991017, bnc#991018, bnc#991019,bnc991020) In this release, the following CVEs have been fixed: * CVE-2016-6504: wireshark: NDS dissector crash * CVE-2016-6505: wireshark: PacketBB dissector could divide by zero * CVE-2016-6506: wireshark: WSP infinite loop * CVE-2016-6507: wireshark: MMSE infinite loop * CVE-2016-6508: wireshark: RLC long loop * CVE-2016-6509: wireshark: LDSS dissector crash * CVE-2016-6510: wireshark: RLC dissector crash * CVE-2016-6511: wireshark: OpenFlow long loop https://www.wireshark.org/docs/relnotes/wireshark-1.12.13.html- Wireshark 1.12.12 (bnc#983671) In this release, the following CVEs have been fixed: * CVE-2016-5350: SPOOLS infinite loop * CVE-2016-5351: IEEE 802.11 dissector crash * CVE-2016-5352: IEEE 802.11 dissector crash, different from wpna-sec-2016-30 * CVE-2016-5353: UMTS FP crash * CVE-2016-5354: USB dissector crash * CVE-2016-5355: Toshiba file parser cras * CVE-2016-5356: CoSine file parser crash * CVE-2016-5357: NetScreen file parser crash * CVE-2016-5358: Ethernet dissector crash * CVE-2016-5359: WBXML infinite loop https://www.wireshark.org/docs/relnotes/wireshark-1.12.12.html- Wireshark 1.12.11 (bnc#976944) This release fixes a number issues in protocol dissectors that could have allowed a remote attacker to crash Wireshark or cause excessive CPU usage through specially crafted packages inserted into the network or a capture file. * The PKTC dissector could crash (wnpa-sec-2016-22) * The PKTC dissector could crash (wnpa-sec-2016-23) * The IAX2 dissector could go into an infinite loop (wnpa-sec-2016-24) * Wireshark and TShark could exhaust the stack (wnpa-sec-2016-25) * The GSM CBCH dissector could crash (wnpa-sec-2016-26) * The NCP dissector could crash (wnpa-sec-2016-28) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.11.html- Wireshark 1.12.10 [bnc#968565] The following vulnerabilities have been fixed: * CVE-2016-2523: DNP dissector infinite loop (wnpa-sec-2016-03) * CVE-2016-2530: RSL dissector crash (wnpa-sec-2016-10) * CVE-2016-2531: RSL dissector crash (wnpa-sec-2016-10) * CVE-2016-2532: LLRP dissector crash (wnpa-sec-2016-11) * GSM A-bis OML dissector crash (wnpa-sec-2016-14) * ASN.1 BER dissector crash (wnpa-sec-2016-15) * ASN.1 BER dissector crash (wnpa-sec-2016-18) * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.10.html- Wireshark 1.12.9 [bnc#960382] The following vulnerabilities have been fixed: * NBAP dissector crashes. wnpa-sec-2015-31 CVE-2015-8711 * UMTS FP dissector crashes. wnpa-sec-2015-32 CVE-2015-8712 CVE-2015-8713 * DCOM dissector crash. wnpa-sec-2015-33 CVE-2015-8714 * AllJoyn dissector infinite loop. wnpa-sec-2015-34 CVE-2015-8715 * T.38 dissector crash. wnpa-sec-2015-35 CVE-2015-8716 * SDP dissector crash. wnpa-sec-2015-36 CVE-2015-8717 * NLM dissector crash. wnpa-sec-2015-37 CVE-2015-8718 * DNS dissector crash. wnpa-sec-2015-38 CVE-2015-8719 * BER dissector crash. wnpa-sec-2015-39 CVE-2015-8720 * Zlib decompression crash. wnpa-sec-2015-40 CVE-2015-8721 * SCTP dissector crash. wnpa-sec-2015-41 CVE-2015-8722 * 802.11 decryption crash. wnpa-sec-2015-42 CVE-2015-8723 CVE-2015-8724 * DIAMETER dissector crash. wnpa-sec-2015-43 CVE-2015-8725 * VeriWave file parser crashes. wnpa-sec-2015-44 CVE-2015-8726 * RSVP dissector crash. wnpa-sec-2015-45 CVE-2015-8727 * ANSI A & GSM A dissector crashes. wnpa-sec-2015-46 CVE-2015-8728 * Ascend file parser crash. wnpa-sec-2015-47 CVE-2015-8729 * NBAP dissector crash. npa-sec-2015-48 CVE-2015-8730 * RSL dissector crash. wnpa-sec-2015-49 CVE-2015-8731 * ZigBee ZCL dissector crash. wnpa-sec-2015-50 CVE-2015-8732 * Sniffer file parser crash wnpa-sec-2015-51 CVE-2015-8733 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.9.html- Wireshark 1.12.8 [bnc#950437] The following vulnerabilities have been fixed: * pcapng file parser could crash while copying an interface filter. wnpa-sec-2015-30 CVE-2015-7830 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.8.html- Wireshark 1.12.7 [bnc#941500] The following vulnerabilities have been fixed: * Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 * Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 * Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 * The ZigBee dissector could crash. wnpa-sec-2015-24 * The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 * The WaveAgent dissector could crash. wnpa-sec-2015-26 * The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 * Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 * The WCCP dissector could crash. wnpa-sec-2015-29 * Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html - Delete some backported patches which is already included in 1.12.7 - wireshark-CVE-2015-3813.patch - wireshark-1.12-gsm-dtap.patch - wireshark-1.10.12-fix-wmem-headers.patch- Backport fix from 1.12.6 [bnc#935158] wireshark-1.12-gsm-dtap.patch- Backport some security fixes from 1.12.5 [bnc#930689] * CVE-2015-3813 wireshark-CVE-2015-3813.patch- Wireshark 1.10.14 [bnc#930691] - The following vulnerabilities have been fixed: * The WCP dissector could crash while decompressing data. CVE-2015-3811 wnpa-sec-2015-14 * The X11 dissector could leak memory. CVE-2015-3812 wnpa-sec-2015-15 * The IEEE 802.11 dissector could go into an infinite loop. CVE-2015-3814 wnpa-sec-2015-17 - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.14.html- Backport upstream patch to support pkgconfig, fix libvirt upstream build failure Add-pkg-config-file.patch- Wireshark 1.10.13 - The following security issues were fixed: * The WCP dissector could crash. wnpa-sec-2015-07 CVE-2015-2188 [bnc#920696] * The pcapng file parser could crash. wnpa-sec-2015-08 CVE-2015-2189 [bnc#920697] * The TNEF dissector could go into an infinite loop. wnpa-sec-2015-10 CVE-2015-2191 [bnc#920699] - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.13.html- Wireshark 1.10.12 - The following vulnerabilities allowed Wireshark to be crashed by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. + The WCCP dissector could crash wnpa-sec-2015-01 CVE-2015-0559 CVE-2015-0560 [boo#912365] + The LPP dissector could crash. wnpa-sec-2015-02 CVE-2015-0561 [boo#912368] + The DEC DNA Routing Protocol dissector could crash. wnpa-sec-2015-03 CVE-2015-0562 [boo#912369] + The SMTP dissector could crash. wnpa-sec-2015-04 CVE-2015-0563 [boo#912370] + Wireshark could crash while decypting TLS/SSL sessions. wnpa-sec-2015-05 CVE-2015-0564 [boo#912372] - wireshark-1.10.12-fix-wmem-headers.patch - Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.12.html- Wireshark 1.10.9 [bnc#889854] fixes several crashes triggered by malformed protocol packages - vulnerabilities fixed: * The Catapult DCT2000 and IrDA dissectors could underrun a buffer wnpa-sec-2014-08 CVE-2014-5161 CVE-2014-5162 * The GSM Management dissector could crash wnpa-sec-2014-09 CVE-2014-5163 * The RLC dissector could crash wnpa-sec-2014-10 CVE-2014-5164 * The ASN.1 BER dissector could crash wnpa-sec-2014-11 CVE-2014-5165 - Further bug fixes as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.9.html- update to 1.10.8 [bnc#882602] + vulnerabilities fixed: * The frame metadissector could crash. wnpa-sec-2014-07 CVE-2014-4020 + bug fixed: * VoIP flow graph crash upon opening. * Tshark with "-F pcap" still generates a pcapng file. * IPv6 Next Header 0x3d recognized as SHIM6. * Failed to export pdml on large pcap. * TCAP: set a fence on info column after calling sub dissector * Dissector bug in JSON protocol. * GSM RLC MAC: do not skip too many lines of the CSN_DESCR when the field is missing * Wireshark PEEKREMOTE incorrectly decoding QoS data packets from Cisco Sniffer APs. * IEEE 802.11: fix dissection of HT Capabilities + Further updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.8.html- update to 1.10.7 [bnc#874760] + vulnerabilities fixed: * The RTP dissector could crash wnpa-sec-2014-06 CVE-2014-2907 + Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.7.html- update to 1.10.6 [bnc#867485] + vulnerabilities fixed: * The NFS dissector could crash wnpa-sec-2014-01 CVE-2014-2281 * The M3UA dissector could crash wnpa-sec-2014-02 CVE-2014-2282 * The RLC dissector could crash wnpa-sec-2014-03 CVE-2014-2283 * The MPEG file parser could overflow a buffer wnpa-sec-2014-04 CVE-2014-2299 + Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.6.html- update to 1.10.5 + bugs fixed: * Wireshark stops showing new packets but dumpcap keeps writing them to the temp file. * Wireshark 1.10.4 shuts down when promiscuous mode is unchecked. * Homeplug dissector bug: STATUS_ACCESS_VIOLATION: dissector accessed an invalid memory address.- update to 1.10.4 [bnc#855980] + vulnerabilities fixed: * The SIP dissector could go into an infinite loop. wnpa-sec-2013-66 CVE-2013-7112 * The BSSGP dissector could crash. wnpa-sec-2013-67 CVE-2013-7113 * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam. wnpa-sec-2013-68 CVE-2013-7114 + Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.4.html- update to 1.10.3 [bnc#848738] + vulnerabilities fixed: * The IEEE 802.15.4 dissector could crash wnpa-sec-2013-61 CVE-2013-6336 * The NBAP dissector could crash wnpa-sec-2013-62 CVE-2013-6337 * The SIP dissector could crash wnpa-sec-2013-63 CVE-2013-6338 * The OpenWire dissector could go into a large loop wnpa-sec-2013-64 CVE-2013-6339 * The TCP dissector could crash wnpa-sec-2013-65 CVE-2013-6340 + Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.3.html - drop wireshark-1.10.x-fix-packet-gluster-duplicate_enums.patch merged upstream- fix duplicate enum definition to fix build in 13.1 and Factory, adding wireshark-1.10.x-fix-packet-gluster-duplicate_enums.patch from upstream commits [bnc#843304]- add missing ws_symbol_export.h and frame_data_sequence.h includes to -devel package to allow building of external plugins again- update to 1.10.2 [bnc#839607] + vulnerabilities fixed: * The Bluetooth HCI ACL dissector could crash. wnpa-sec-2013-54 CVE-2013-5717 * The NBAP dissector could crash. wnpa-sec-2013-55 CVE-2013-5718 * The ASSA R3 dissector could go into an infinite loop. wnpa-sec-2013-56 CVE-2013-5719 * The RTPS dissector could overflow a buffer. wnpa-sec-2013-57 CVE-2013-5720 * The MQ dissector could crash. wnpa-sec-2013-58 CVE-2013-5721 * The LDAP dissector could crash. wnpa-sec-2013-59 CVE-2013-5722 * The Netmon file parser could crash. wnpa-sec-2013-60 + Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.2.html - drop wireshark-1.10.x-reordercap-r49436.patch, merged upstream- gtk3 version in openSUSE Factory (13.1) deprecates elements used in wireshark 1.10.1. Revert back to gtk2 UI.- update to 1.10.1 [bnc#831718] + vulnerabilities fixed: The DCP ETSI dissector could crash CVE-2013-4083 wnpa-sec-2013-41 + The P1 dissector could crash CVE-2013-4920 wnpa-sec-2013-42 + The Radiotap dissector could crash CVE-2013-4921 wnpa-sec-2013-43 + The DCOM ISystemActivator dissector could crash CVE-2013-4922 CVE-2013-4923 CVE-2013-4924 CVE-2013-4925 CVE-2013-4926 wnpa-sec-2013-44 + The Bluetooth SDP dissector could go into a large loop CVE-2013-4927 wnpa-sec-2013-45 + The Bluetooth OBEX dissector could go into an infinite loop CVE-2013-4928 wnpa-sec-2013-46 + The DIS dissector could go into a large loop CVE-2013-4929 wnpa-sec-2013-47 + The DVB-CI dissector could crash CVE-2013-4930 wnpa-sec-2013-48 + The GSM RR dissector (and possibly others) could go into a large loop CVE-2013-4931 wnpa-sec-2013-49 + The GSM A Common dissector could crash CVE-2013-4932 wnpa-sec-2013-50 + The Netmon file parser could crash CVE-2013-4933 CVE-2013-4934 wnpa-sec-2013-51 + The ASN.1 PER dissector could crash CVE-2013-4935 wnpa-sec-2013-52 + The PROFINET Real-Time dissector could crash CVE-2013-4936 wnpa-sec-2013-53 This is still configurable via the GTK settings (add + Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html - drop wireshark-1.10.0-pod-characters.patch, fixed upstream - add wireshark-1.10.x-reordercap-r49436.patch from trunk to fix factory build- fix factory builds, prevent build failures with pod2man: wireshark-1.10.0-authors-pod2man.patch wireshark-1.10.0-pod-characters.patch- 1.10.0 - new or significantly updated features since version 1.8: * You can now display a list of resolved host names in "hosts" format within Wireshark. * The wireless toolbar has been updated. * Wireshark on Linux does a better job of detecting interface addition and removal. * It is now possible to compare two fields in a display filter (for example: udp.srcport != udp.dstport). The two fields must be of the same type for this to work. * USB type and product name support has been improved. * All Bluetooth profiles and protocols are now supported. * Wireshark now calculates HTTP response times and presents the result in a new field in the HTTP response. Links from the request’s frame to the response’s frame and vice-versa are also added. * The main welcome screen and status bar now display file sizes using strict SI prefixes instead of old-style binary prefixes. * Capinfos now prints human-readable statistics with SI suffixes by default. * It is now possible to open a referenced packet (such as the matched request or response packet) in a new window. * Tshark can now display only the hex/ascii packet data without requiring that the packet summary and/or packet details are also displayed. If you want the old behavior, use -Px instead of just -x. * Wireshark can be compiled using GTK+ 3. * The Wireshark application icon, capture toolbar icons, and other icons have been updated. * Tshark’s filtering and multi-pass analysis have been reworked for consistency and in order to support dependent frame calculations during reassembly. See the man page descriptions for -2, -R, and -Y. * Tshark’s -G fields2 and -G fields3 options have been eliminated. The -G fields option now includes the 2 extra fields that - G fields3 previously provided, and the blurb information has been relegated to the last column since in many cases it is blank anyway. * Wireshark dropped the left-handed settings from the preferences. This is still configurable via the GTK settings (add "gtk-scrolled-window-placement = top-right" in the config file, which might be called /.gtkrc-2.0 or /.config/gtk-3.0/settings.ini). * Wireshark now ships with two global configuration files: Bluetooth, which contains coloring rules for Bluetooth and Classic, which contains the old-style coloring rules. * The LOAD() metric in the IO-graph now shows the load in IO units instead of thousands of IO units. - packaging changes * drop wireshark-suidflags.patch - fPIE and -pie now set on SUID binaries by upstream no longer require or call call autoreconf * wireshark-1.2.4-enable_lua.patch refreshed with upstream changes to wireshark-1.10.0-enable_lua.patch * drop include.filelist, instead find files for -devel package during build- update to 1.8.7 [bnc#820566] + vulnerabilities fixed: * The RELOAD dissector could go into an infinite loop. wnpa-sec-2013-23 CVE-2013-2486 CVE-2013-2487 * The GTPv2 dissector could crash. wnpa-sec-2013-24 CVE-2013-3555 * The ASN.1 BER dissector could crash. wnpa-sec-2013-25 CVE-2013-3556 CVE-2013-3557 * The PPP CCP dissector could crash. wnpa-sec-2013-26 CVE-2013-3558 * The DCP ETSI dissector could crash. wnpa-sec-2013-27 CVE-2013-3559 * The MPEG DSM-CC dissector could crash. wnpa-sec-2013-28 CVE-2013-3560 * The Websocket dissector could crash. wnpa-sec-2013-29 CVE-2013-3561 CVE-2013-3562 * The MySQL dissector could go into an infinite loop. wnpa-sec-2013-30 CVE-2013-3561 * The ETCH dissector could go into a large loop. wnpa-sec-2013-31 CVE-2013-3561 + Further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.8.7.html- add verfication of source signatures- update to 1.8.6 [bnc#807942] + vulnerabilities fixed: * The TCP dissector could crash. wnpa-sec-2013-10 CVE-2013-2475 * The HART/IP dissectory could go into an infinite loop. wnpa-sec-2013-11 CVE-2013-2476 * The CSN.1 dissector could crash. wnpa-sec-2013-12 CVE-2013-2477 * The MS-MMS dissector could crash. wnpa-sec-2013-13 CVE-2013-2478 * The MPLS Echo dissector could go into an infinite loop. wnpa-sec-2013-14 CVE-2013-2479 * The RTPS and RTPS2 dissectors could crash. wnpa-sec-2013-15 CVE-2013-2480 * The Mount dissector could crash. wnpa-sec-2013-16 CVE-2013-2481 * The AMPQ dissector could go into an infinite loop. wnpa-sec-2013-17 CVE-2013-2482 * The ACN dissector could attempt to divide by zero. wnpa-sec-2013-18 CVE-2013-2483 * The CIMD dissector could crash. wnpa-sec-2013-19 CVE-2013-2484 * The FCSP dissector could go into an infinite loop. wnpa-sec-2013-20 CVE-2013-2485 * The RELOAD dissector could go into an infinite loop. wnpa-sec-2013-21 CVE-2013-2486 CVE-2013-2487 * The DTLS dissector could crash. wnpa-sec-2013-22 CVE-2013-2488 + Further bug fixes and updated protocol support as listed in: http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html- update to 1.8.5 [bnc#801131] + vulnerabilities fixed: * Infinite and large loops in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors wnpa-sec-2013-01 CVE-2013-1572 CVE-2013-1573 CVE-2013-1574 CVE-2013-1575 CVE-2013-1576 CVE-2013-1577 CVE-2013-1578 CVE-2013-1579 CVE-2013-1580 CVE-2013-1581 * The CLNP dissector could crash wnpa-sec-2013-02 CVE-2013-1582 * The DTN dissector could crash wnpa-sec-2013-03 CVE-2013-1583 CVE-2013-1584 * The MS-MMC dissector (and possibly others) could crash wnpa-sec-2013-04 CVE-2013-1585 * The DTLS dissector could crash wnpa-sec-2013-05 CVE-2013-1586 * The ROHC dissector could crash wnpa-sec-2013-06 CVE-2013-1587 * The DCP-ETSI dissector could corrupt memory wnpa-sec-2013-07 CVE-2013-1588 * The Wireshark dissection engine could crash wnpa-sec-2013-08 CVE-2013-1589 * The NTLMSSP dissector could overflow a buffer wnpa-sec-2013-09 CVE-2013-1590 + Further bug fixes and updated protocol support as listed in: http://www.wireshark.org/docs/relnotes/wireshark-1.8.5.html- build with gtk3 on 11.4+ - disable zlib makes a sense for 1.2.5 only - turn some features on (python, gcrypt, gnutls, plugins dir)- Add wireshark-suidflags.patch: Allow to pass SUID_{C,LD}FLAGS to introduce -fPIE -pie as needed for suid binaries - Add libtool BuildRequires and call to autoreconf, as above patch touches the build system. - Export SUID_{C,LD}FLAGS with appropriate flags.- update to 1.8.4 [bnc#792005] + vulnerabilities fixed: * Wireshark could leak potentially sensitive host name resolution information when working with multiple pcap-ng files. wnpa-sec-2012-30 CVE-2012-5592 * The USB dissector could go into an infinite loop. wnpa-sec-2012-31 CVE-2012-5593 * The sFlow dissector could go into an infinite loop. wnpa-sec-2012-32 CVE-2012-5594 * The SCTP dissector could go into an infinite loop. wnpa-sec-2012-33 CVE-2012-5595 * The EIGRP dissector could go into an infinite loop. wnpa-sec-2012-34 CVE-2012-5596 * The ISAKMP dissector could crash. wnpa-sec-2012-35 CVE-2012-5597 * The iSCSI dissector could go into an infinite loop. wnpa-sec-2012-36 CVE-2012-5598 * The WTP dissector could go into an infinite loop. wnpa-sec-2012-37 CVE-2012-5599 * The RTCP dissector could go into an infinite loop. wnpa-sec-2012-38 CVE-2012-5600 * The 3GPP2 A11 dissector could go into an infinite loop. wnpa-sec-2012-39 CVE-2012-5601 * The ICMPv6 dissector could go into an infinite loop. wnpa-sec-2012-40 CVE-2012-5602 + Further bug fixes and updated protocol support as listed in: http://www.wireshark.org/docs/relnotes/wireshark-1.8.4.html- for openSUSE 12.2 and later, build against lua51-devel instead of lua-devel for Lua support (bnc#780669)- update to upstream 1.8.3 (bnc#783275) + vulnerabilities fixed: * The HSRP dissector could go into an infinite loop. (wnpa-sec-2012-26 CVE-2012-5237) * The PPP dissector could abort. (wnpa-sec-2012-27 CVE-2012-5238) * Martin Wilck discovered an infinite loop in the DRDA dissector. (wnpa-sec-2012-28 CVE-2012-5239 CVE-2012-3548 bnc#778000) * Laurent Butti discovered a buffer overflow in the LDP dissector. (wnpa-sec-2012-29 CVE-2012-5240) + Further bug fixes and updated protocol support as listed in: http://www.wireshark.org/docs/relnotes/wireshark-1.8.3.html- license update: GPL-2.0+ and GPL-3.0+ According to the COPYING file the PIDL utility (standalone tool) is GPL-3.0+ licensed- update to upstream 1.8.2 (bnc#776083) + vulnerabilities fixed: * The DCP ETSI dissector could trigger a zero division. (wnpa-sec-2012-13 CVE-2012-4285) * The MongoDB dissector could go into a large loop. (wnpa-sec-2012-14 CVE-2012-4287) * The XTP dissector could go into an infinite loop. (wnpa-sec-2012-15 CVE-2012-4288) * The ERF dissector could overflow a buffer. (wnpa-sec-2012-16 CVE-2012-4294 CVE-2012-4295) * The AFP dissector could go into a large loop. (wnpa-sec-2012-17 CVE-2012-4289) * The RTPS2 dissector could overflow a buffer. (wnpa-sec-2012-18 CVE-2012-4296) * The GSM RLC MAC dissector could overflow a buffer. (wnpa-sec-2012-19 CVE-2012-4297) * The CIP dissector could exhaust system memory. (wnpa-sec-2012-20 CVE-2012-4291) * The STUN dissector could crash. (wnpa-sec-2012-21 CVE-2012-4292) * The EtherCAT Mailbox dissector could abort. (wnpa-sec-2012-22 CVE-2012-4293) * The CTDB dissector could go into a large loop. (wnpa-sec-2012-23 CVE-2012-4290) * The pcap-ng file parser could trigger a zero division. (wnpa-sec-2012-24 CVE-2012-4286) * The Ixia IxVeriWave file parser could overflow a buffer. (wnpa-sec-2012-25 CVE-2012-4298) + Further bug fixes and updated protocol support as listed in: http://www.wireshark.org/docs/relnotes/wireshark-1.8.2.html - adjust wireshark-1.2.0-disable-warning-dialog.patch for moved lines- update to upstream 1.8.1 (bnc#772738) + vulnerabilities fixed: * The PPP dissector could crash (wnpa-sec-2012-11 CVE-2012-4048) * The NFS dissector could use excessive amounts of CPU (wnpa-sec-2012-12 CVE-2012-4049) + bug fixes: * Wireshark crashes on bootp filter * Wireshark > 1.4 does not correctly read Association ID for PS Poll packets * Radius-EAP broken since 1.8.0 release * SNMP incorrectly marks SNMPv3 "discovery" packet as malformed * Widgets are not properly expanded in GTK3 * Find Next Mark duplicated on Edit Menu * DVB-CI/CI+: fix offset error in operator_info apdu * Unable to correctly identify IEC 61850 MMS packets * WinPcap doesn't install if vcredist_x64 requires reboot - remove wireshark-1.8.0-gmodule.patch, fixed upstream- update to upstream 1.8.0: * supports capturing from multiple interfaces at once. * add, edit, and save packet and capture file annotations. * pcap-ng file format is default * Decryption key management for IEEE 802.11, IPsec, and ISAKMP is easier. * GeoIP IPv6 databases are now supported. * large number of protocol dissectors added and updated * support for many capture file formats added and updated For a full list refer to the release notes: https://www.wireshark.org/docs/relnotes/wireshark-1.8.0.html - drop wireshark-corosync-packet-dissector.patch, no longer compiles even after updating - drop wireshark-1.6.5-netlogon-aes.patch, applied upstream - drop idl2wrs command from -devel package - update header files in include.filelist - refresh wireshark-1.2.0-disable-warning-dialog.patch - refresh wireshark-1.2.0-geoip.patch - add wireshark-1.8.0-gmodule.patch to fix linking in factory- Add all known headers to devel package in order to make it actually useable and allow building dissectors externally- adjust wireshark-corosync-packet-dissector.patch for source changes - update to upstream 1.6.8 + security fixes * wnpa-sec-2012-08 / CVE-2012-2392 Infinite and large loops in the ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 dissectors have been fixed. Discovered by Laurent Butti. (Bugs 6805, 7118, 7119, 7120, 7121, 7122, 7124, 7125) * wnpa-sec-2012-09 / CVE-2012-2393 The DIAMETER dissector could try to allocate memory improperly and crash. (Bug 7138) * wnpa-sec-2012-10 / CVE-2012-2394 Wireshark could crash on SPARC processors due to misaligned memory. Discovered by Klaus Heckelmann. (Bug 7221) + bug fixes * User-Password - PAP decoding passwords longer than 16 bytes. (Bug 6779) * The MSISDN is not seen correctly in GTP packet. (Bug 7042) * Wireshark doesn't calculate the right IPv4 destination using source routing options when bad options precede them. (Bug 7043) * BOOTP dissector issue with DHCP option 82 - suboption 9. (Bug 7047) * MPLS dissector in 1.6.7 and 1.7.1 misdecodes some MPLS CW packets. (Bug 7089) * ANSI MAP infinite loop. (Bug 7119) * HCIEVT infinite loop. (Bug 7122) * Wireshark doesn't decode NFSv4.1 operations. (Bug 7127) * LTP infinite loop. (Bug 7124) * Wrong values in DNS CERT RR. (Bug 7130) * Megaco parser problem with LF in header. (Bug 7198) * OPC UA bytestring node id decoding is wrong. (Bug 7226) + Updated Protocol Support ANSI MAP, ASF, BACapp, Bluetooth HCI, DHCP, DIAMETER, DNS, GTP, IEEE 802.11, IEEE 802.3, IPv4, LTP, Megaco, MPLS, NFS, OPC UA, RADIUS + New and Updated Capture File Support 5View, CSIDS, pcap, pcap-ng- Update to version 1.6.7: + Bugs fixed: - Malformed Packets H263-1996 (RFC2190). (Bug 6996) - Wireshark could crash while trying to open an rpcap: URL. (Bug 6922) + Updated H.263 Protocol Support- Update to version 1.6.6: + wnpa-sec-2012-04: The ANSI A dissector could dereference a NULL pointer and crash. (Bug 6823) + wnpa-sec-2012-05: The IEEE 802.11 dissector could go into an infinite loop. (Bug 6809) + wnpa-sec-2012-06: The pcap and pcap-ng file parsers could crash trying to read ERF data. (Bug 6804) + wnpa-sec-2012-07: The MP2T dissector could try to allocate too much memory and crash. (Bug 6804) + The Windows installers now include GnuTLS 1.12.18, which fixes several vulnerabilities. + Bugs fixed: - ISO SSAP: ActivityStart: Invalid decoding the activity parameter as a BER Integer. (Bug 2873) - Forward slashes in URI need to be converted to backslashes if WIN32. (Bug 5237) - Character echo pauses in Capture Filter field in Capture Options. (Bug 5356) - Some PGM options are not parsed correctly. (Bug 5687) - dumpcap crashes when capturing from pipe to a pcap-ng file (e.g., when passing data from CACE Pilot to Wireshark). (Bug 5939) - Unable to rearrange columns in preferences on Windows. (Bug 6077) (Note: this bug still affects the 64-bit package) - No error for UDP/IPv6 packet with zero checksum. (Bug 6232) - Wireshark installer doesn't add access_bpf in 10.5.8. (Bug 6526) - Corrupted Diameter dictionary file that crashes Wireshark. (Bug 6664) - packetBB dissector bug: More than 1000000 items in the tree possible infinite loop. (Bug 6687) - ZEP dissector: Timestamp not always displayed correctly. Fractional seconds never displayed. (Bug 6703) - GOOSE Messages don't use the length field to perform the dissection. (Bug 6734) - Ethernet traces in K12 text format sometimes give bogus "malformed frame" errors and other problems. (Bug 6735) - max_ul_ext isn't printed/decoded to the packet details log in GTP protocol packet. (Bug 6761) - non-IPP packets to or from port 631 are dissected as IPP. (Bug 6765) - lua proto registration fails for uppercase proto / g_ascii_strdown problem. (Bug 6766) - no menu item Fle->Export->SSL Session Keys in GTK. (Bug 6813) - IAX2 dissector reads past end of packet for unknown IEs. (Bug 6815) - TShark 1.6.5 immediately crashes on SSL decryption (every time). (Bug 6817) - USB: unknown GET DESCRIPTOR response triggers assert failure. (Bug 6826) - IEEE1588 PTPv2 over IPv6. (Bug 6836) - Patch to fix DTLS decryption. (Bug 6847) - Expression... dialog crash. (Bug 6891) - display filter "gtp.msisdn" not working. (Bug 6947) - Multiprotocol Label Switching Echo - Return Code: Reserved(5) (Bug 6951) - ISAKMP : VendorID CheckPoint : Malformed Packet. (Bug 6972) - Adding a Custom HTTP Header Field with a trailing colon causes wireshark to immediately crash (and crash upon restart). (Bug 6982) - Radiotap dissector lists a bogus "DBM TX Attenuation" bit. (Bug 7000) - MySQL dissector assertion. (Ask 8649) - Radiotap header format data rate alignment issues. (Ask 8649)- Add known bit for Netlogon ServerAutheticate2 flags.- update to 1.6.5 - Security fixes: - wnpa-sec-2012-01 Laurent Butti discovered that Wireshark failed to properly check record sizes for many packet capture file formats. (Bug 6663, bug 6666, bug 6667, bug 6668, bug 6669, bug 6670) - wnpa-sec-2012-02 Wireshark could dereference a NULL pointer and crash. (Bug 6634) - wnpa-sec-2012-03 The RLC dissector could overflow a buffer. (Bug 6391) - Bug fixes: - "Closing File!" Dialog Hangs. (Bug 3046) - Sub-fields of data field should appear in exported PDML as children of the data field instead of as siblings to it. (Bug 3809) - Incorrect time differences displayed with time reference set. (Bug 5580) - Wrong packet type association of SNMP trap after TFTP transfer. (Bug 5727) - SSL/TLS decryption needs wireshark to be rebooted. (Bug 6032) - Export HTTP Objects -> save all crashes Wireshark. (Bug 6250) - Wireshark Netflow dissector complains there is no template found though the template is exported. (Bug 6325) - DCERPC EPM tower UUID must be interpreted always as little endian. (Bug 6368) - Crash if no recent files. (Bug 6549) - IPv6 frame containing routing header with 0 segments left calculates wrong UDP checksum. (Bug 6560) - IPv4 UDP/TCP Checksum incorrect if routing header present. (Bug 6561) - Incorrect Parsing of SCPS Capabilities Option introduced in response to bug 6194. (Bug 6562) - Various crashes after loading NetMon2.x capture file. (Bug 6578) - Fixed compilation of dumpcap on some systems (when MUST_DO_SELECT is defined). (Bug 6614) - SIGSEGV in SVN 40046. (Bug 6634) - Wireshark dissects TCP option 25 as an "April 1" option. (Bug 6643) - ZigBee ZCL Dissector reports invalid status. (Bug 6649) - ICMPv6 DNSSL option malformed on padding. (Bug 6660) - Wrong tvb_get_bits function call in packet-csn1.c. (Bug 6708) - [UDP] - Length Field of Pseudo Header while computing CheckSum is not correct. (Bug 6711) - pcapio.c: bug in libpcap_write_interface_description_block. (Bug 6719) - Memory leaks in various dissectors. - Bytes highlighted in wrong Byte pane when field selected in Details pane. - Updated Protocol Support - BGP, BMC CSN1, DCERPC EPM, DCP(ETSI) DMP DTLS GSM Management, H245 HPTEAM, ICMPv6, IEEE 802.15.4 IPSEC IPv4, IPv6, ISAKMP KERBEROS LDSS NFS RLC, RPC-NETLOGON RRC RTMPT SIGCOMP SSL SYSLOG TCP, UDP, XML ZigBee ZCL - New and Updated Capture File Support - Accellent 5Views, AIX iptrace, HP-UX nettl, I4B, Microsoft Network Monitor, Novell LANalyzer, PacketLogger, Pcap-ng, Sniffer, Tektronix K12, WildPackets {Airo,Ether}Peek. - update to 1.6.4 - Bug fixes: - Patch to fix memory leaks/errors in Lua plugin. (Bug 5575) - Wireshark crashes if a field of type BASE_CUSTOM is applied as a column. (Bug 6503) - Filter Expression dialog can only be opened once. (Bug 6537) - Wireshark crashes if compiled without GLib thread support. (Bug 6540) - 80211 QoS Control: Add Raw TID. (Bug 6548) - SNMP length check error. (Bug 6564) - UCP dissector bug of operation 61. (Bug 6570) - fix bnc#741187, #741188, #741190- update to 1.6.3 - Security fixes: - wnpa-sec-2011-17 The CSN.1 dissector could crash. (Bug 6351) - Bug fixes: - Wireshark window takes very long time to show up if invalid network file path is at recent file list (Bug 3810) - ISUP party number dissection. (Bug 5221) - Ethernet packets with both VLAN tag and LLC header no longer displayed correctly. (Bug 5645) - SLL encapsuled 802.1Q VLAN is not dissected. (Bug 5680) - Dissection fails for frames with Gigamon Header and VLAN. (Bug 6305) - RTP Stream Analysis does not work for TURN-encapsulated RTP. (Bug 6322) - packet-csn1.c doesn't process CSN_CHOICE entries properly. (Bug 6328) - GUI crash on invalid IEEE 802.11 GAS frame. (Bug 6345) - ICMPv6 router advertisement Prefix Information Flag R "Router Address" missing. (Bug 6350) - Inner tag of 802.1ad frames not parsed properly. (Bug 6366) - Added cursor type decoding to MySQL dissector. (Bug 6396) - WPA IE pairwise cipher suite dissector uses incorrect value_string list. (Bug 6420) - text_import_scanner.l missing. (Bug 6531) - Updated protocol support: - AJP13, ASN.1 PER, BACnet, CSN.1, DTN, Ethernet, ICMPv6, IEEE 802.11, IEEE 802.1q, Infiniband, IPsec, MySQL, PCEP, PN-RT, RTP, S1AP, SSL - New and Updated capture file suppport: - Endace ERF. - update to 1.6.2 - Security fixes: - wnpa-sec-2011-12 A large loop in the OpenSafety dissector could cause a crash. (Bug 6138) - wnpa-sec-2011-16 The CSN.1 dissector could crash. (Bug 6139) - Bug fixes: - configure ignores (partially) LDFLAGS. (Bug 5607) - Build fails when it tries to #include , not present in Solaris 9. (Bug 5608) - Unable to configure zero length SNMP Engine ID. (Bug 5731) - BACnet who-is request device range values are not decoded correctly in the packet details window. (Bug 5769) - Wireshark crashes if sercosiii module isn't installed. (Bug 6006) - Editcap could create invalid pcap files when converting from JPEG. (Bug 6010) - Timestamp is incorrectly decoded for ICMP Timestamp Response packets from MS Windows. (Bug 6114) - Wrong display of CSN_BIT in CSN.1. (Bug 6151) - Fix CSN_RECURSIVE_TARRAY last bit error in packet-csn1.c. (Bug 6166) - Wireshark cannot display Reachable time & Retrans timer in IPv6 RA messages. (Bug 6168) - ReadPropertyMultiple-ACK not correctly dissected. (Bug 6178) - GTPv2 dissectors should treat gtpv2_ccrsi as optional. (Bug 6183) - tshark run with -Tpdml makes a seg fault. (Bug 6245) - TShark/dumpcap skips capture duration flag occasionally. (Bug 6280) - Wireshark improperly parsing 802.11 Beacon Country Information tag. (Bug 6264) - Wrong display of CSN_BIT under CSN_UNION. (Bug 6287) - Updated protocol support: - BACapp, Bluetooth L2CAP, CSN.1, DCERPC, GSM A RR, GTPv2, ICMP, ICMPv6, IKE, MEGACO, MSISDN, NDMP, OpenSafety, RTPS2, sFlow, SNMP, TCP - New and Updated capture file suppport: - CommView, pcap-ng, JPEG. - update to 1.6.1 - Security fixes: - Bug fixes: - TCP dissector doesn't decode TCP segments of length 1. (Bug 4716) - wireshark 1.4.0rc1 and python - spurious message. (Bug 4878) - Missing LUA function. (Bug 5006) - Lua API description about creating a new Tvb from a bytearray is not correct in wireshark's user guide. (Bug 5199) - Character echo pauses in Capture Filter field in Capture Options. (Bug 5356) - White space in protocol field abbreviation causes runtime failure while registering Lua dissector. (Bug 5569) - "File not found" box uses wrong filename encoding. (Bug 5715) - capinfos: #ifdef HAVE_LIBGCRYPT block includes a line too many . (Bug 5803) - Wireshark crashes if Lua contains "Pref.range()" with missing arguments. (Bug 5895) - The "range" field in Lua's "Pref.range()" serves as default while the "default" field does nothing . (Bug 5896) - Wireshark crashes when calling TreeItem:set_len() on TreeItem without tvb. (Bug 5941) - TvbRange_string(lua_State* L) call a wrong function. (Bug 5960) - VoIP call flow graph displays BICC APM as a BICC ANM. (Bug 5966) - Cannot Live-capture VirtualBox network packets with Wireshark; pipe problem. (Bug 6002) - Interface list in Capture Options isn't cleared when selecting other host. (Bug 6008) - H323 rate multiplier wrong. (Bug 6009) - Inclusion of config.h is too late in lex-files resulting in wrong definition of _FILE_OFFSET_BITS. (Bug 6012) - tshark crashes when loading Lua script that contains GUI function. (Bug 6018) - 802.11 Disassociation Packet's "Reason Code" field is imprecisely decoded/described. (Bug 6022) - Wireshark crashes when setting custom column's field name with conditional. (Bug 6028) - Crash after applying "expert.severity" field as column. (Bug 6035) - GTS Descriptor count limited to 3 instead of 7. (Bug 6055) - The SSL dissector can not resemble correctly the frames after TCP zero window probe packet. (Bug 6059) - Packet parser takes too long for this trace. (Bug 6073) - Wireshark crashes after repeating "File -> Import -> Cancel". (Bug 6080) - Decoding of MQ ASCII and EBCDIC Traffic Flow - ASCII shows fine, EBCDIC does not. (Bug 6084) - 802.11 Association Response Packet's "Status Code" field is imprecisely decoded/described. (Bug 6093) - Abis interface not correctly handled in gsmtap dissector. (Bug 6097) - Wrong decoding of RLC/MAC EGPRS Packet Downlink Ack/Nack (3GPP TS 44.060). (Bug 6098) - CSN Ack/Nack Description wrongly handled in gsm_rlcmac_dl dissector (3GPP TS 44.060). (Bug 6101) - wireshark 1.6.0 and python support: installer fails to create the wspy_dissectors subdirectory and . (Bug 6110) - Wireshark crash during RTP stream analysis. (Bug 6120) - Tshark custom columns: Why don't I get an error message? (Bug 6131) - New and Updated capture file suppport: - Network Monitor. - update to 1.6.0 - Security fixes: - Bug fixes: - Wireshark is unresponsive when capturing from named pipes on Windows. (Bug 1759) - Crash when sorting column while capturing. (Bug 4273) - Ring buffers are no longer turned on by default when using multiple capture files. - New and updated features: - Large file (greater than 2 GB) support has been improved. - Wireshark and TShark can import text dumps, similar to text2pcap - You can now view Wireshark's dissector tables (for example the TCP port to dissector mappings) from the main window. - Wireshark can export SSL session keys via File->Export->SSL Session Keys... - You can hide columns in the packet list. - Wireshark can now export SMB objects. - dftest and randpkt now have manual pages. - TShark can now display iSCSI, ICMP and ICMPv6 service response times. - Dumpcap can now save files with a user-specified group id. - Syntax checking is done for capture filters. - You can display the compiled BPF code for capture filters in the Capture Options dialog. - You can now navigate backwards and forwards through TCP and UDP sessions using Ctrl+, and Ctrl+. . - Packet length is (finally) a default column. - TCP window size is now avaiable both scaled and unscaled. A TCP window scaling graph is available in the GUI. - 802.1q VLAN tags are now shown in the Ethernet II protocol tree instead of a separate tree - Various dissectors now display some UTF-16 strings as proper Unicode including the DCE/RPC and SMB dissectors. - The RTP player now has an option to show the time of day in the graph in addition to the seconds since beginning of capture. - The RTP player now shows why media interruptions occur. - Graphs now save as PNG images by default. - TShark can read and write host name information from and to pcapng formatted files. Wireshark can read it. TShark can dump host name information via [-z hosts] - TShark's -z option now uses the [-z ,srt] syntax instead of [-z ,rtt] for all protocols that support service response time statistics. This matches Wireshark's syntax for this option. - Wireshark and TShark can now read compressed Windows Sniffer files. - New protocol support: - ADwin, ADwin-Config, Apache Etch, Aruba PAPI, Babel Routing Protocol, Broadcast/Multicast Control, Constrained Application Protocol (COAP), Digium TDMoE, Erlang Distribution Protocol, Ether-S-I/O, FastCGI, Fibre Channel over InfiniBand (FCoIB), Gopher, Gigamon GMHDR, IDMP, Infiniband Socket Direct Protocol (SDP), JSON, LISP Control, LISP Data, LISP, MikroTik MAC-Telnet, MRP Multiple Mac Registration Protocol (MMRP) Mongo Wire Protocol, MUX27010, Network Monitor 802.11 radio header, OPC UA ExtensionObjects, openSAFETY, PPI-GEOLOCATION-GPS, ReLOAD, ReLOAD Framing, RObust Header Compression (ROHC), RSIP, SAMETIME, SCoP, SGSAP, Tektronix Teklink, USB/AT Commands, uTorrent Transport Protocol, WAI authentication, Wi-Fi P2P (Wi-Fi Direct) - New and Updated capture file suppport: - Apple PacketLogger, Catapult DCT2000, Daintree SNA, Endace ERF, HP OpenVMS TCPTrace, IPFIX (the file format, not the protocol), Lucent/Ascend debug, Microsoft Network Monitor, Network Instruments, TamoSoft CommView - update to 1.5.1 - Security fixes: - Bug fixes: - Wireshark is unresponsive when capturing from named pipes on Windows. (Bug 1759) - Ring buffers are no longer turned on by default when using multiple capture files. - New and updated features: - Wireshark and TShark can import text dumps, similar to text2pcap - You can now view Wireshark's dissector tables (for example the TCP port to dissector mappings) from the main window. - TShark can show a specific occurrence of a field when using '-T fields'. - Custom columns can show a specific occurrence of a field. - You can hide columns in the packet list. - Wireshark can now export SMB objects. - dftest and randpkt now have manual pages. - TShark can now display iSCSI service response times. - Dumpcap can now save files with a user-specified group id. - Syntax checking is done for capture filters - You can display the compiled BPF code for capture filters in the Capture Options dialog. - You can now navigate backwards and forwards through TCP and UDP sessions using Ctrl+, and Ctrl+. . - Packet length is (finally) a default column. - TCP window size is now avaiable both scaled and unscaled. A TCP window scaling graph is available in the GUI. - 802.1q VLAN tags are now shown in the Ethernet II protocol tree - Various dissectors now display some UTF-16 strings as proper Unicode including the DCE/RPC and SMB dissectors - The RTP player now has an option to show the time of day in the graph in addition to the seconds since beginning of capture. - The RTP player now shows why media interruptions occur. - Graphs now save as PNG images by default - TShark can read and write host name information from and to pcapng formatted files. Wireshark can read it. TShark can dump host name information via [-z hosts] - TShark's -z option now uses the [-z ,srt] syntax instead of [-z ,rtt] for all protocols that support service response time statistics. This matches Wireshark's syntax for this option. - New protocol support: - ADwin, ADwin-Config, Apache Etch, Aruba PAPI, Babel Routing Protocol, Constrained Application Protocol (COAP), Digium TDMoE, Erlang Distribution Protocol, Ether-S-I/O, FastCGI, Fibre Channel over InfiniBand (FCoIB), Gopher, Gigamon GMHDR, IDMP, Infiniband Socket Direct Protocol (SDP), JSON, LISP Data, MikroTik MAC-Telnet, Mongo Wire Protocol, Network Monitor 802.11 radio header, OPC UA ExtensionObjects, PPI-GEOLOCATION-GPS, ReLOAD, ReLOAD Framing, RSIP, SAMETIME, SCoP, SGSAP, Tektronix Teklink, WAI authentication, Wi-Fi P2P (Wi-Fi Direct) - New and Updated capture file suppport: - Apple PacketLogger, Catapult DCT2000, Daintree SNA, Endace ERF, HP OpenVMS TCPTrace, IPFIX (the file format, not the protocol), Lucent/Ascend debug, Microsoft Network Monitor, Network Instruments, TamoSoft CommView - update to 1.4.10 - Security fixes: - wnpa-sec-2011-18 Huzaifa Sidhpurwala of Red Hat Security Response Team discovered that the Infiniband dissector could dereference a NULL pointer. (Bug 6476) - wnpa-sec-2011-19 Huzaifa Sidhpurwala of Red Hat Security Response Team discovered a buffer overflow in the ERF file reader. (Bug 6479) - Bug fixes: - Assertion failed when doing File->Quit->Save during live capture. (Bug 1710) - Wrong PCEP XRO sub-object decoding. (Bug 3778) - Decoding [Status Records] Timestamp Sequence Field in Bundle Protocol fails if over 32 bits. (Bug 4109) - wireshark-1.4.2 crashes when testing the example python dissector because of a dissector count assertion. (Bug 5431) - Wireshark crashes when attempting to open a file via drag & drop when there's already a file open. (Bug 5987) - Add the ability to save filters from the Filter Toolbar into buttons on the Filter Toolbar. (Bug 6207) - Adding and removing custom HTTP headers requires a restart. (Bug 6241) - Can't read full 64-bit SNMP values. (Bug 6295) - BACnet property time-synchronization-interval (204) name shown incorrectly as time-synchronization-recipients. (Bug 6336) - [ASN.1 PER] Incorrect decoding of BIT STRING type. (Bug 6347) - Export->Object->HTTP-> save all: Error on saving files. (Bug 6362) - Incorrect identification of UDP-encapsulated NAT-keepalive packets. (Bug 6414) - S1AP protocol can't decode IPv6 transportLayerAddress. (Bug 6435) - RTPS2 dissector doesn't handle 0 in the octestToNextHeader field. (Bug 6449) - packet-ajp13 fix, cleanup, and enhancement. (Bug 6452) - Network Instruments Observer file format bugs. (Bug 6453) - Wireshark crashes when using "Open Recent" 2 times in a row. (Bug 6457) - Wireshark packet_gsm-sms, display bug: Filler bits in TP-User Data Header. (Bug 6469) - wireshark unable to decode NetFlow options which have system scope size != 4 bytes. (Bug 6471) - Display filter Expression Dialog Box Error. (Bug 6472) - Updated protocol support: - AJP13, ASN.1 PER, BACapp, DTN, GSM SMS, Infiniband, IPsec, NetFlow, PCEP, RTPS2 - update to 1.4.9 - Security fixes: - wnpa-sec-2011-13 A malformed IKE packet could consume excessive resources. - wnpa-sec-2011-14 A malformed capture file could result in an invalid root tvbuff and cause a crash. (Bug 6135) CVE-2011-3266 - wnpa-sec-2011-15 Wireshark could run arbitrary Lua scripts. (Bug 6136) - Bug fixes: - Unable to configure zero length SNMP Engine ID. (Bug 5731) - H.323 RAS packets missing from packet counts in "Telephony->VoIP Calls" and the "Flow Graph" for the call. (Bug 5848) - Malformed Packet in decode for BGP-AD update. (Bug 6122) - BGP : AS_PATH attribute was decode wrong. (Bug 6188) - Fixes for SCPS TCP option. (Bug 6194) - Offset calculated incorrectly for sFlow extended data. (Bug 6219) - [Enter] key behavior varies when manually typing display filters. (Bug 6228) - Contents of pcapng EnhancedPacketBlocks with comments aren't displayed. (Bug 6229) - Misdecoding 3G Neighbour Cell Information Element in SI2quater message due to a coding typo. (Bug 6237) - Mis-spelled word "unknown" in assorted files. (Bug 6244) - btl2cap extended window shows wrong bit. (Bug 6257) - NDMP dissector incorrectly represents "ndmp.bytes_left_to_read" as signed. (Bug 6262) - ERF records with extension headers not written out correctly to pcap or pcap-ng files. (Bug 6265) - RTPS2: MAX_BITMAP_SIZE is defined incorrectly. (Bug 6276) - Copying from RTP stream analysis copies 1st line many times. (Bug 6279) - File types with no snaplen written out with a zero snaplen in pcap-ng files. (Bug 6289) - MEGACO context tracking fix - context id reuse. (Bug 6311) - Updated protocol support: - BGP, Bluetooth L2CAP, GSM A RR, H.225, IKE, MEGACO, NDMP, RTPS2, SCPS, sFlow, SNMP - New and Updated capture file suppport: - CommView, pcap-ng. - update to 1.4.8 - Security fixes: - CVE-2011-2597 The Lucent/Ascend file parser was susceptible to an infinite loop. - The ANSI MAP dissector was susceptible to an infinite loop. (Bug 6044) - Bug fixes: - TCP dissector doesn't decode TCP segments of length 1. (Bug 4716) - Wireshark 1.4.0rc1 and python - spurious message. (Bug 4878) - Missing LUA function. (Bug 5006) - Lua API description about creating a new Tvb from a bytearray is not correct in wireshark's user guide. (Bug 5199) - sflow decode error for some extended formats. (Bug 5379) - White space in protocol field abbreviation causes runtime failure while registering Lua dissector. (Bug 5569) - "File not found" box uses wrong filename encoding. (Bug 5715) - capinfos: #ifdef HAVE_LIBGCRYPT block includes a line too many. (Bug 5803) - Wireshark crashes if Lua contains "Pref.range()" with missing arguments. (Bug 5895) - The "range" field in Lua's "Pref.range()" serves as default while the "default" field does nothing. (Bug 5896) - Wireshark crashes when calling TreeItem:set_len() on TreeItem without tvb. (Bug 5941) - TvbRange_string(lua_State* L) call a wrong function. (Bug 5960) - VoIP call flow graph displays BICC APM as a BICC ANM. (Bug 5966) - H323 rate multiplier wrong. (Bug 6009) - tshark crashes when loading Lua script that contains GUI function. (Bug 6018) - 802.11 Disassociation Packet's "Reason Code" field is imprecisely decoded/described. (Bug 6022) - Wireshark crashes when setting custom column's field name with conditional. (Bug 6028) - GTS Descriptor count limited to 3 instead of 7. (Bug 6055) - The SSL dissector can not resemble correctly the frames after TCP zero window probe packet. (Bug 6059) - Packet parser takes too long for this trace. (Bug 6073) - 802.11 Association Response Packet's "Status Code" field is imprecisely decoded/described. (Bug 6093) - Wireshark 1.6.0 and Python support: installer fails to create the wspy_dissectors subdirectory and . (Bug 6110) - Wireshark crash during RTP stream analysis. (Bug 6120) - Tshark custom columns: Why don't I get an error message? (Bug 6131) - Updated protocol support: - ANSI MAP, GIOP, H.323, IEEE 802.11, MSRP, RPCAP, sFlow, TCP - New and Updated capture file suppport: - Lucent/Ascend - update to 1.4.7 - Security fixes: - Large/infinite loop in the DICOM dissector. (Bug 5876) - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted Diameter dictionary file could crash Wireshark. - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted snoop file could crash Wireshark. (Bug 5912) - David Maciejak of Fortinet's FortiGuard Labs discovered that malformed compressed capture data could crash Wireshark. (Bug 5908) - Huzaifa Sidhpurwala of the Red Hat Security Response Team discovered that a corrupted Visual Networks file could crash Wireshark. (Bug 5934) - Bug fixes: - AIM dissector has some endian issues. (Bug 5464) - Telephony->MTP3->MSUS doesn't display window. (Bug 5605) - Support for MS NetMon 3.x traces containing raw IPv6 ("Type 7") packets. (Bug 5817) - Service Indicator in M3UA protocol data. (Bug 5834) - IEC60870-5-104 protocol, incorrect decoding of timestamp type CP56Time2a. (Bug 5889) - DNP3 dissector incorrect constants AL_OBJ_FCTR_16NF _FDCTR_32NF _FDCTR_16NF. (Bug 5920) - 3GPP QoS: Traffic class is not decoded properly. (Bug 5928) - Wireshark crashes when creating ProtoField.framenum in Lua. (Bug 5930) - Fix a wrong mask to extract FMID from DECT packets dissector. (Bug 5947) - Incorrect DHCPv6 remote identifier option parsing. (Bug 5962) - Updated protocol support: - DICOM, IEC104, M3UA, TCP - New and Updated capture file suppport: - Network Monitor - Drop patches (fixed upstream): + wireshark-1.6.2-CVE-2011-3483.patch + wireshark-1.6.2-CVE-2011-3360.patch + wireshark-1.6.2-CVE-2011-3266.patch + wireshark-1.4.8-CVE-2011-2698.patch + wireshark-1.4.8-CVE-2011-2597.patch + wireshark-1.2.17-CVE-2011-2175.patch + wireshark-1.2.17-CVE-2011-2174.patch + wireshark-1.2.17-CVE-2011-1959.patch + wireshark-1.2.17-CVE-2011-1958.patch + wireshark-1.2.17-CVE-2011-1957.patch + wireshark-nfsv4-opts.patch - changed spec to resolve rpmlint warning regarding devel package in non-devel group - changed spec to resolve rpmlint warnings regarding macro-in-comment- security fixes (#bnc 718032) * CVE-2011-3266: Wireshark IKE dissector vulnerability * CVE-2011-3360: Wireshark Lua script execution vulnerability * CVE-2011-3483: Wireshark buffer exception handling vulnerability- security fixes (#bnc 706728) * CVE-2011-2597: Lucent/Ascend file parser susceptible to infinite loop * CVE-2011-2698: ANSI MAP dissector susceptible to infinite loop- security fixes [#bnc 697516] * CVE-2011-1957: Large/infinite loop in the DICOM dissector * CVE-2011-1959: A corrupted snoop file could crash Wireshark * CVE-2011-2174: Malformed compressed capture data could crash Wireshark * CVE-2011-2175: A corrupted Visual Networks file could crash Wireshark * CVE-2011-1958: dereferene a NULL pointer if we had a corrupted Diameter dictionary- Update to version 1.4.6: + Wireshark and TShark can crash while analyzing TCP packets. + Updated protocol support: TCP - Changes from version 1.4.5: + Security Fixes: - The NFS dissector could crash on Windows. - The X.509if dissector could crash + bugs fixed: - Cygwin make fails after updating to bash v 4.1.9.2 - Export HTTP > All - System Appears Hung (but isn't). - Some HTTP responses don't decode with TCP reassembly on. - Wireshark crashes when cancelling a large sort operation. - Wireshark crashes if SSL preferences RSA key is actually a DSA key. - tshark incorrectly calculates TCP stream for some syn packets - Wireshark not able to decode the PPP frame in a sflow (RFC3176) flow sample packet because Wireshark incorrectly read the protocol in PPP frame header. (Bug 5746) - Mysql protocol dissector: all fields should be little endian. - Error when opening snoop from Juniper SSG-140. - svnversion: command not found. - Value of TCP segment data cannot be copied. - proto_field_is_referenced() is not exported in libwireshark.dll - Wireshark ver. 1.4.4 not displayed "Granted QoS" field in a A11 packet. + Updated protocol support: HTTP, LDAP, MySQL, NFS, sFlow, SSL, TCP - Drop patches (fixed upstream): + wireshark-1.4.4-CVE-2011-1590.patch + wireshark-1.4.4-CVE-2011-1591.patch + wireshark-1.4.4-CVE-2011-1592.patch- security fixes [#bnc 688109] * CVE-2011-1590: Use of un-initialised variables * CVE-2011-1592: Crash in NFS dissector on Windows * CVE-2011-1591: Buffer overflow in DECT dissector- updated to 1.4.4 * security fixes o The DOCSIS dissector could crash (CVE-2010-1455, bnc#603251) o Crash when receiving a malformed SNMP packet (CVE-2010-3445, bnc#643078) o Multiple buffer overflow and dereference vulnerabilities (bnc#655121) o LDSS dissector overflow (CVE-2010-4300, bnc#655448) o ZCL dissector infinite loop (CVE-2010-4301, bnc#655448) o Buffer overflows in ENTTEC DMX Data RLE and others (CVE-2010-4538, bnc#662029) o Freeing uninitialized pointer (CVE-2011-0538, bnc#669908) o dct3trace buffer overflow (CVE-2011-0713, bnc#672916) o Off-by-one in dissect_6lowpan_iphc (CVE-2011-1138, bnc#678567) o Crash via corrupted pcap file (CVE-2011-1139, bnc#678568) o Crash via SMB or CLDAP packet (CVE-2011-1140, bnc#678569) o Crash in NTLMSSP via crafted pcap file (CVE-2011-1143, bnc#678571) o Wireshark pcap buffer overflow (CVE-2011-0024, bnc#683335) * Updated Protocol Support ANSI MAP, BitTorrent, DCM, DHCPv6, DTAP, DTPT, E.212, GSM Management, GTP, HIP, IEEE 802.15.4, IPP, LDAP, LLDP, Netflow, NTLMSSP, P_Mul, Quake, Skinny, SMB, SNMP, ULP * New and Updated Capture File Support LANalyzer, Nokia DCT3, Pcap-ng- updated to 1.4.3 - security fixes: o MAC-LTE dissector could overflow a buffer o ENTTEC dissector could overflow a buffer o ASN.1 BER dissector could assert and make Wireshark exit prematurely - bug fixes: o AMQP failed assertion o Reassemble.c leaks memory for GLIB > 2.8 o Fuzz testing reports possible dissector bug: TCP o Wrong length calculation in new_octet_aligned_subset_bits() o Function dissect_per_bit_string_display might read more bytes than available o Wireshark crashes with Copy -> Description on date/time fields o DHCPv6 OPTION_CLIENT_FQDN parse error o Information element Error for supported channels o Assert when using ASN.1 dissector with loading a 'type table' o Bug with RWH parsing in Infiniband dissector o Help->About Wireshark mis-reports OS o Delegated-IPv6-Prefix(123) is shown incorrect as X-Ascend-Call-Attempt-Limit(123) o "tshark -r file -T fields" is truncating exported data o gsm_a_dtap: incorrect "Extraneous Data" when decoding Packet Flow Identifier o Improper decode of TLS 1.2 packet containing both CertificateRequest and ServerHelloDone messages o LTE-PDCP UL and DL problem o CIGI 3.2/3.3 support broken o Prepare Filter in RTP Streams dialog does not work correctly. o Wrong decode at ethernet OAM Y.1731 ETH-CC o WPS: RF bands decryption o Incorrect LTP SDNV value handling o LTP bug found by randpkt o Buffer overflow in SNMP EngineID preferences - updated protocol support: AMQP, ASN.1 BER, ASN.1 PER, CFM, CIGI, DHCPv6, Diameter, ENTTEC, GSM A GM, IEEE 802.11, InfiniBand, LTE-PDCP, LTP, MAC-LTE, MP2T, RADIUS, SAMR, SCCP, SIP, SNMP, TCP, TLS, TN3270, UNISTIM, WPS - new and updated capture file support: Endace ERF, Microsoft Network Monitor, VMS TCPtrace- updated to 1.4.2 - security fixes: * Nephi Johnson of BreakingPoint discovered that the LDSS dissector could overflow a buffer. (Bug 5318) * The ZigBee ZCL dissector could go into an infinite loop. (Bug 5303) - bug fixes: * File-Open Display Filter is overwritten by Save-As Filename. (Bug 3894) * Wireshark crashes with "Gtk-ERROR **: Byte index 6 is off the end of the line" if click on last PDU. (Bug 5285) * GTK-ERROR can occur in packets when there are multiple Netbios/SMB headers in a single frame. (Bug 5289) * "Tshark -G values" crashes on Windows. (Bug 5296) * PROFINET I&M0FilterData packet not fully decoded. (Bug 5299) * PROFINET MRP linkup/linkdown decoding incorrect. (Bug 5300) * [lua] Dumper:close() will cause a segfault due later GC of the Dumper. (Bug 5320) * Network Instruments' trace files sometimes cannot be read with an error message of "Observer: bad record: Invalid magic number". (Bug 5330) * IO Graph Time of Day times incorrect for filtered data. (Bug 5340) * Wireshark tools do not detect and read some ERF files correctly. (Bug 5344) * "editcap -h" sends some lines to stderr and others to stdout. (Bug 5353) * IP Timestamp Option: "flag=3" variant (prespecified) not displayed correctly. (Bug 5357) * AgentX PDU Header 'hex field highlighting' incorrectly spans extra bytes. (Bug 5364) * AgentX dissector cannot handle null OID in Open-PDU. (Bug 5368) * Crash with "Gtk-ERROR **: Byte index 6 is off the end of the line". (Bug 5374) * ANCP Portmanagment TLV wrong decoded. (Bug 5388) * Crash during startup because of Python SyntaxError in wspy_libws.py. (Bug 5389) - Updated Protocol Support * AgentX, ANCP, DIAMETER, HTTP, IP, LDSS, MIME, NBNS, PROFINET, SIP, TCP, Telnet, ZigBee - New and Updated Capture File Support * Endace ERF, Network Instruments Observer - fix lua error at startup (enable_lua.patch) [bnc#650434] - apply nfsv4 patch from Fedora (nfsv4-opts.patch)- updated to 1.4.1 * security fixes: o stack overflow in ASN.1 BER dissector * bug fixes: o Incorrect behavior using sorting in the packet list o Cooked-capture dissector should omit the source address field if empty o MySQL dissector doesn't dissect MySQL stream o Wireshark crashes if active display filter macro is renamed o Incorrect dissection of MAP V2 PRN_ACK o TCP bytes_in_flight becomes inflated with lost packets o GTP header is exported in PDML with an incorrect size o Packet list hidden columns will not be parsed correctly from preferences file o Wireshark does not display the t.38 graph o Wireshark don't show mgcp calls in "Telephony → VoIP calls" o Wireshark 1.4.0 & VoIP calls "Prepare Filter" problem o GTPv2: IMSI is decoded improperly o EPS Quality of Service IE decoding is wrong o Wireshark mistakenly writes "not all data available" for IPv4 checksum o GSM: Cell Channel Description, range 1024 format o Wrong SDP interpretation on VoIP call flow chart o The CLDAP attribute value on a CLDAP reply is no longer being decoded o [NAS EPS] Traffic Flow Template IE dissection bugs o [NAS EPS] Use Request Type IE defined in 3GPP 24.008 o NTLMSSP_AUTH domain and username truncated to first letter with IE8/Windows7 o IPv6 RH0: dest addr is to be used i.s.o. last RH address when 0 segments remain o EIGRP dissection error in Flags field in external route TLVs. o MRP packet is not correctly parsed in PROFINET multiple write record request o MySQL Enhancement: support of Show Fields and bug fix o [NAS EPS] Fix TFT decoding when having several Packet Filters defined o Crash if using ssl.debug.file with no password for ssl.keys_list * updated protocol support ASN.1 BER, ASN.1 PER, EIGRP, GSM A RR, GSM Management, GSM MAP, GTP, GTPv2, ICMPv6, Interlink, IPv4, IPv6, IPX, LDAP, LLC, MySQL, NAS EPS, NTLMSSP, PN-IO, PPP, RPC, SDP, SLL, SSL, TCP- Update to version 1.4.0: + The packet list internals have been rewritten and are now more efficient. + Columns are easier to use. You can add a protocol field as a column by right-clicking on its packet detail item, and you can adjust some column preferences by right-clicking the column header. + Preliminary Python scripting support has been added. + Many memory leaks have been fixed. + Packets can now be ignored (excluded from dissection), similar to the way they can be marked. + Manual IP address resolution is now supported. + Columns with seconds can now be displayed as hours, minutes and seconds. + You can now set the capture buffer size on UNIX and Linux if you have libpcap 1.0.0 or greater. + TShark no longer needs elevated privileges on UNIX or Linux to list interfaces. Only dumpcap requires privileges now. + Wireshark and TShark can enable 802.11 monitor mode directly if you have libpcap 1.0.0 or greater. + You can play RTP streams directly from the RTP Analysis window. + Capinfos and editcap now respectively support time order checking and forcing. + Wireshark now has a "jump to timestamp" command-line option. + You can open JPEG files directly in Wireshark. + Many new and updated protocols. + See NEWS for a full list of changes. - Drop wireshark-1.2.0-asneeded.patch, fixed upstream. - Rebase wireshark-corosync-packet-dissector.patch.- updated to 1.2.10 [bnc#630599] * Security fixes: o The SigComp Universal Decompressor Virtual Machine could overrun a buffer. (Bug 4867) o The GSM A RR dissector could crash. (Bug 4897) o Due to a regression the ASN.1 BER dissector could overrun the stack. o The IPMI dissector could go into an infinite loop. o CVE-2010-2993 * Bug fixes: o Wireshark crashes after configuring new Information column. (Bug 4854) o Crash triggered when changing display filter from right-mouse pop-up menu via packet-list. (Bug 4860) o Wireshark crash selecting Inter-Asterisk exchange v2 packet data. (Bug 4868) o zlib-1.2.5 cause tshark to stop live capture. (Bug 4916) o Crash when adding SNMP users. (Bug 4926) o Wireshark via ssh -X on ipv6 link-local address fails to allow capture. (Bug 4945) o OMAPI dissector fails to parse combined initialization messages. (Bug 4982) o QUERY_FS_INFO for Macintosh level 0x301 - MacSupportFlags decodes wrong. (Bug 4993) o SCSI dissector misidentifies ATA PASSTHROUGH command as ACCESS CONTROL IN. (Bug 5037) o Wrong decoding of GTP Prime (GTP') packets. (Bug 5055) * Updated Protocol Support ASN.1 BER, GSM A RR, GTP, IAX2, IPMI, OMAPI, PRES, SCSI, SMB, UNISTIM- updated to 1.2.9 [bnc#613487] * Security fixes: o The SMB dissector could dereference a NULL pointer. (Bug 4734) o J. Oquendo discovered that the ASN.1 BER dissector could overrun the stack. o The SMB PIPE dissector could dereference a NULL pointer on some platforms. o The SigComp Universal Decompressor Virtual Machine could go into an infinite loop. (Bug 4826) o The SigComp Universal Decompressor Virtual Machine could overrun a buffer. (Bug 4837) * Bug fixes: o Cannot open file with File -> Open. (Bug 1791) o Application crash when changing real-time option. (Bug 4035) o Crash in filter autocompletion. (Bug 4306) o The XML dissector doesn't allow dots (".") in tags. (Bug 4405) o Live capture stops when using zlib 1.2.5. (Bug 4708) o Want to be able to apply decode as to Data Portion of Lan Trace. (Bug 4721) o SABP short pdu (packet_per.c). (Bug 4743) o Kerberos pre-auth type constants - MS extensions are wrong. (Bug 4752) o Check HTTP Content-Length parsing for overflow. (Bug 4758) o Wrong variable used for proto_tree_add_text() in ptp dissector. (Bug 4773) o Crash when close window frame of gtk file chooser. (Bug 4778) o text2pcap expects \n delimited text (instead of \r\n) on win32. (Bug 4780) o Wrong decoding for BGP ORF. (Bug 4782) o Crash when Ctrl-Backspacing the display filter. (Bug 4797) o Acker AFI field incorrect size in PGM dissector. (Bug 4798) o Fedora 13: wireshark fails to build (linking problem). (Bug 4815) o The NFS FH hash (nfs.fh.hash) incorrectly matches multiple filehandles. (Bug 4839) o AES-CTR decoding not working, (dissectors/packet_ipsec.c using gcrypt). (Bug 4838) * Updated Protocol Support ASN.1 BER, BGP, HTTP, IGMP, IPsec, Kerberos, NFS, PGM, PTP, SABP, SigComp, SMB, TCAP, XML, * Updated Capture File Support ERF, PacketLogger.- Added corosync packet dissector (patch 4724 from https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3232, minus "private key" setting, which doesn't work with nice random binary keys in /etc/corosync/authkey)- updated to 1.2.8 * Security Fixes: o The DOCSIS dissector could crash. (Bug 4644), (bug 4646) * Bug Fixes: o HTTP parser limits with Content-Length. (Bug 1958) o MATE dissector bug with GOGs. (Bug 3010) o Changing fonts and deleting system time from preferences, results in wireshark crash. (Bug 3387) o ERF file starting with record with timestamp=0,1 or 2 not recognized as ERF file. (Bug 4503) o The SSL dissector can not correctly resemple SSL records when the record header is spit between packets. (Bug 4535) o TCP reassembly can call subdissector with incorrect TCP sequence number. (Bug 4624) o PTP dissector displays big correction field values wrong. (Bug 4635) o MSF is at Anthorn, not Rugby. (Bug 4678) o ProtoField __tostring() description is missing in Wireshark's Lua API Reference Manual. (Bug 4695) o EVRC packet bundling not handled correctly. (Bug 4718) o Completely unresponsive when run very first time by root user. (Bug 4308) * Updated Protocol Support DOCSIS, HTTP, SSL * Updated Capture File Support ERF, PacketLogger.- updated to new stable upstream version 1.2.7 * Bug Fixes: o SNMPv3 Engine ID registration. (Bug 2426) o Open file dialog always displayed when clicking anywhere on Wireshark. (Bug 2478) o tshark reports wrong number of bytes on big dumpfiles with -z io,stat. (Bug 3205) o Negative INTEGER number displayed as positive number in SNMP dissector. (Bug 3230) o Add support for FT_BOOLEAN fields to wslua FieldInfo. (Bug 4049) o Wireshark crashes w/ GLib error when trying to play RTP stream. (Bug 4119) o Windows 2000 support has been restored. (Bug 4176) o Wrong dissection on be_cell_id_list for bssmap. (Bug 4437) o I/O Graph dropdown boxes not working correctly. (Bug 4487) o Runtime Error when right-clicking field and selecting "Filter Field Reference". (Bug 4522) o In GSM SMS PDU TPVPF showing wrong. (Bug 4524) o Profinet: May be wrong defined byte meaning. (Bug 4525) o GLib-CRITICAL ** Message. (Bug 4547) o Certain EDP display filters trigger Wireshark/tshark runtime error. (Bug 4563) o Some NCP frames trigger "Dissector bug, protocol NCP". (Bug 4565) o The encapsulation abbreviation "bluetooth-h4" is ambiguous. (Bug 4613) * Updated Protocol Support: o BSSMAP, DMP, GSM SMS, LDSS, NCP, PN/IO, PPP, SIP, SNMP- update desktop file to use xdg-su [bnc#540627]- updated to 1.2.6 * Security Fixes: o Babi discovered several buffer overflows in the LWRES * Bug Fixes: o Wireshark could crash while decrypting Kerberos data. o Address display filters hang Wireshark. (Bug 658) o PSML - structure context node missing. (Bug 1564) o Wireshark doesn't dynamically update the packet list. (Bug 1605) o LUA: There's no tvb_get_stringz() equivalent. (Bug 2244) o tvb_new_real_data is prone to memory leak. (Bug 3917) o Malformed OPC UA traffic makes Wireshark "freeze". (Bug 3986) o Analyze->Expert... doesn't show IP "Bad Checksum" errors. (Bug 4177) o Wireshark can't decrypt WPA(2)-PSK when passphrase is 63 bytes. (Bug 4183) o RTP stream analysis: Wrong jitter values after clicking the refresh button. (Bug 4340) o Wireshark decodes bootp option 2 incorrectly. (Bug 4342) o Deleting SMI modules causes Wireshark to crash. (Bug 4354) o Wireshark decodes kerberos AS-REQ PADATA incorrect. (Bug 4363) o PDML output from TShark includes invalid characters. (Bug 4402) o Empty GPRS LLC S frames cause truncated data exception. (Bug 4417) * Updated Protocol Support BJNP, BOOTP/DHCP, DHCPv6, FIP, GPRS LLC, IEEE 802.11, IP, Kerberos, OPCUA, SCTP, SSL, ZRTP- updated to 1.2.5 * Security Fixes: o The Daintree SNA file parser could overflow a buffer. (Bug 4294) o The SMB and SMB2 dissectors could crash. (Bug 4301) * Bug Fixes: o Wireshark does not graph rtp streams. (Bug 3801) o Wireshark showing extraneous data in a TCP stream. (Bug 3955) o Wrong decoding of gtp.target identification. (Bug 3974) o TTE dissector bug. (Bug 4247) o Upper case in Lua pref symbol causes Wireshark to crash. (Bug 4255) o Incorrect display of stream data using "Follow tcp stream" option. (Bug 4288) o Custom RADIUS dictionary can cause a crash. (Bug 4316) * Updated Protocol Support DAP, eDonkey, GTP, IPMI, MIP, RADIUS, RANAP, SMB, SMB2, TCP, TTE, VNC, X.509sat * Updated Capture File Support Daintree SNA- updated to 1.2.4 * Bug Fixes - Can't save RTP stream in both directions. (Bug 4120) * Updated Protocol Support - DCERPC, IPFIX/Netflow, IPv4, NAS EPS, RTCP, TIPC- updated to 1.2.3 * Security fixes: - The Paltalk dissector could crash on alignment-sensitive processors. - The DCERPC/NT dissector could crash. - The SMB dissector could crash. * Bug fixes: - Wireshark memory leak with each file open and/or display filter change. - DHCP Dissector displays negative lease time. - Invalid advertised window line on tcptrace style graph. - SMB get_dfs_referral referral entry is not dissected correctly. - Error dissecting eMule sourceOBFU message. - Typos in Diameter XML files. - RSL dissector for MS Power IE is broken. - FIP dissector throws assertion. - TCAP problem with indefinite length 'components' SEQ OF. - GSM MAP: an-APDU not decoded. - Add "Drag and Drop entries..." message on Columns preferences page. - Editcap -t and -w option parses fractional digits incorrectly. * Updated Protocol Support - DCERPC NT, DHCP, Diameter, E.212, eDonkey, FIP, IPsec, MGCP, NCP, Paltalk, RADIUS, RSL, SBus, SMB, SNMP, SSL, TCP, Teamspeak2, WPS - updated to 1.2.2 * Security fixes: - The GSM A RR dissector could crash. (Bug 3893) - The OpcUa dissector could use excessive CPU and memory. (Bug 3986) - The TLS dissector could crash on some platforms. (Bug 4008) * Bug fixes: - The "Capture->Interfaces" window can't be closed. - tshark-1.0.2 (dumpcap) signal abort core saved. - Memory leak fixes. - Display filter autocompletion doesn't work for some RADIUS and WiMAX ASNCP fields. - Wireshark Portable includes wrong WinPcap installer. - Crash when loading a profile. - The proto,colinfo tap doesn't work if the INFO column isn't being printed. - Flow Graph adds too much unnecessary garbage. - The EAP Diameter dictionary file was missing in the distribution. - Graph analysis window is behind other window. - IKEv2 Cert Request payload dissection error. - DNS NAPTR RR (RFC 3403) replacement MUST be a fully qualified domain-name. - Malformed RTCP Packet error while sending Payload specific RTCP feedback packet (as per RFC 4585). - 802.11n Block Ack packet Bitmap field missing. - Wireshark doesn't decode WBXML/ActiveSync information correctly. - Malformed packet when IPv6 packet has Next Header == 59. - Wireshark could crash while reading an ERF file. - Minor errors in gsm rr dissectors. - WPA Decryption Issues. - GSM A RR sys info dissection problem. - GSM A RR inverts MEAS-VALID values. - PDML output leaks ~300 bytes / packet. - Incorrect station identifier parsing in Kingfisher dissector. - DHCPv6, Vendor-Specific Informantion, SubOption"Option Request" parser incorrect. - Wireshark could leak memory while analyzing SSL. - Wireshark could crash while updating menu items after reading a file in some cases. * Updated Protocol Support - DCERPC, DHCPv6, DNS, E.212, GSM A RR, GTPv2, H.248, IEEE 802.11, IPMI, ISAKMP/IKE, ISUP, Kingfisher, LDAP, OpcUA, RTCP, SCTP, SIP, SSL, TCP, WBXML, ZRTP * Updated Capture File Support - ERF - dropped obsoleted 3 CVE patches (see previous entry)- fix CVE-2009-3241 (CVE-2009-3241.patch) [bnc#541654] - fix CVE-2009-3242 (CVE-2009-3242.patch) [bnc#541659] - fix CVE-2009-3243 (CVE-2009-3243.patch) [bnc#541655]- updated to 1.2.1 * Bug Fixes - The IPMI dissector could overrun a buffer. - The AFS dissector could crash. - The Infiniband dissector could crash on some platforms. - The Bluetooth L2CAP dissector could crash. - The RADIUS dissector could crash. - The MIOP dissector could crash. - The sFlow dissector could use excessive CPU and memory. - Wireshark could crash while reading a pcap-ng file. - Wireshark could crash while reading a PacketLogger file. - CFLOW decoding is wrong for IPv6 fields (Bug 3328) - Buildbot crash output: fuzz-2009-04-24-2891.pcap (Bug 3438) - packet-dcm, corrupt DICOM export files (Bug 3493) - GeoIP map should use random temporary file name (Bug 3530) - Wireshark crashes when range_string is the data type (Bug 3536) - Pcap-ng breaks VoIP call data (Bug 3539) - ANSI MAP legInformation BER Error (Bug 3541) - Starting Wireshark Portable 1.2.0 gives error message. (Bug 3547) - The title in the TCP sequence graphs is too short. (Bug 3556) - USB Packets in pcap-ng Files Not Dissected Properly (Bug 3560) - 802.11 decryption is broken (Bug 3590) - SMB2 Error Response doesn't decode properly (Bug 3609) - configure.in uses deprecated autoconf test for gnutls detection (Bug 3627) - Radius Malformed Packet error message (Bug 3635) - Wireshark could crash when loading a profile. (Bug 3640) - Analyze->Decode as... menu item becomes unavailable (Bug 3642) - btsnoop: Incorrect error message for not supported datalink type (Bug 3645) - Decode error for network-id in BICC BCU-ID (Bug 3648) - IEC 60870-5-104 dissector decodes nothing (Bug 3650) - radius_register_avp_dissector() can stop RADIUS dissector from working correctly (Bug 3651) - ANSI ISUP Cause indicators with coding standard=ANSI fail to dissect. (Bug 3654) - Wrong field position in PacketCable Multimedia Extended Classifier (Bug 3656) - FF Protocol "FMS Initiate - Version OD Calling" field packet data not unpacked properly (Bug 3694) - hci_h4: Optimize column/field handling (Bug 3703) - BSSLAP Protocol Not Decoded In BSSMAP-LE Messages (Bug 3711) - Description of tshark -t dd missing from tshark.pod (Bug 3723) - Problem in packet-per.c for ASN.1 PER Encoding (Bug 3733) - [SNMP] Crash when dissecting packet (custom MIB) (Bug 3746) * Updated Protocol Support - AFS, ANSI ISUP, ANSI MAP, ASN.1 PER, Bluetooth HCI H4, Bluetooth L2CAP, BSS CFLOW, COPS, Diameter, DICOM, FF-HSE, ICMPv6, IEC-60870-5-104, IEEE 802.11, Infiniband, IPMI, MIOP, RADIUS, RSVP, sFlow, SNMP, SMB2, ZIOP * New Capture File Support - Btsnoop, DCT3, Packetlogger, pcap-ng- fix asneeded.patch (patch Makefile.in files also)- search in /var/lib/GeoIP if user hasn't set any GeoIP folders (geoip.patch)- updated to 1.2.0 Bug Fixes Too many bugs have been fixed since the 1.0 release to list here. Some notable fixes are: o Type-ahead search now works properly. o Several bugs that affected capture from pipes have been fixed. o Many Lua-related bugs have been fixed. o Several memory leaks have been found and fixed. o The "Follow TCP Stream" feature could show two streams at the same time The hex dump view has been narrowed. o WPA and SSL decryption bugs have been fixed. o Readability problems on 256-color displays on Windows have been fixed. New and Updated Features The following features are new (or have been significantly updated) since version 1.0: o Wireshark has a spiffy new start page. o Display filters now autocomplete. o A 64-bit Windows (x64) installer is now provided. o Support for the c-ares resolver library has been added. It has many advantages over ADNS. o Many new protocol dissectors and capture file formats have been added (see below for a complete list). o Macintosh OS X support has been improved. o GeoIP database lookups. o OpenStreetMap + GeoIP integration. o Improved Postscript(R) print output. o The preference handling code is now much smarter about changes. o Support for Pcap-ng, the next-generation capture file format. o Support for process information correlation via IPFIX. o Column widths are now saved. o The last used configuration profile is now saved. o Protocol preferences are changeable from the packet details context menu. o Support for IP packet comparison. o Capinfos now shows the average packet rate. o GTK1 is no longer supported. (Yes, this is a feature.) o Official Windows packages are now built using Microsoft Visual C++ 2008 SP1. New Protocol Support Anything in Anything Protocol, ATM PW, N-to-one Cell Mode, B.A.T.M.A.N. Layer 3 Protocol, BACnet MS/TP, BSS LCS Assistance Protocol, Canon BJNP, CESoPSN basic NxDS0 mode (no RTP support), Charging ASE, Cimetrics MS/TP, DECT Protocol, Digital Private Signalling System No 1 Link Layer, DOCSIS Mac Domain Description, DOCSIS Registration Request Multipart, DOCSIS Registration Response Multipart, DOCSIS Synchronisation Message, E100 Encapsulation, EHS, Enhanced Variable Rate Codec, Ethernet Global Data, Ethernet PW, Exchange 2003 Directory Request For Response, Far End Failure Detection, FCoE Initialization Protocol, GOOSE, GPEF, GPRS Tunneling Protocol V2, GSM A-I/F COMMON, GSM A-I/F GPRS Mobility and Session Management, GSM SACCH, GSM Um Interface, HDLC PW, FR port mode (no CW), HDLC-like framing for PPP, IEC 60870-5-104,Apci, IEC 60870-5-104,Asdu, IEEE 802.15.4 Low-Rate Wireless PAN non-ASK PHY, IEEE C37.118 Synchrophasor Protocol, Intelligent Platform Management Interface (Session Wrapper), Inter-Integrated Circuit, Internal TDM, IPSICTL, ISMACryp Protocol, iWARP Direct Data Placement and Remote Direct Memory Access Protocol, iWARP Marker Protocol data unit Aligned framing, Kontiki Delivery Protocol, LANforge Traffic Generator, Layer 1 Event Messages, Lb-I/F BSSMAP LE, LeCroy VICP, Link Access Procedure, Channel Dm (LAPDm), Local Download Sharing Service, LTE Radio Resource Control (RRC) protocol, MAC-LTE, Memcache Protocol, Mesh Header, MP4V-ES, Nasdaq TotalView-ITCH, Nasdaq-SoupTCP version 2.0, NAT Port Mapping Protocol, Netdump Protocol, Non-Access-Stratum (NAS)PDU, PacketLogger, Paltalk Messenger Protocol, PDCP-LTE, PW Associated Channel Header, PW Ethernet Control Word, PW Frame Relay DLCI Control Word, PW MPLS Control Word (generic/preferred), Real-Time Publish-Subscribe Wire Protocol 2.x, Remote Packet Capture, RLC-LTE, SAToP (no RTP support), SERCOS III V1.1, SIMULCRYPT Protocol, Subnetwork Dependent Convergence Protocol XID, Teamspeak2 Protocol, TTEthernet, TTEthernet Protocol Control Frame, Turbocell Aggregate Data, Turbocell Header, TURN Channel, Unreliable Multicast Inter-ORB Protocol, VCDU, Wave Short Message Protocol(IEEE P1609.3), Wireless Access Station Session Protocol, Wireshark Expert Info, World of Warcraft, Xpress Transport Protocol, ZigBee Application Framework, ZigBee Application Support Layer, ZigBee Device Profile, ZigBee Encapsulation Protocol, ZigBee Network Layer, Zipped Inter-ORB Protocol, ZRTP Updated Protocol Support There are too many updates to list here. New Capture File Support Apple Bluetooth PacketLogger, Daintree's Sensor Network Analyzer, dct3trace, Pcap-NG, TNEF (yes, those silly winmail.dat attachments) - removed obsoleted patches: * help.patch (not needed anymore) * sigpipe-block.patch (not needed anymore)- made it compile with --as-needed- updated to 1.0.8 * bug fixes o The PCNFSD dissector could crash. * the following bugs have been fixed: o Lua integration could crash (Bug 2453) o The SCCP dissector could crash when loading more than one file in a single session. (Bug 3409) o The NDMP dissector could crash if reassembly was enabled. (Bug 3470) * updated protocol support o All ASN.1 protocols, DICOM, NDMP, PCNFSD, RTCP, SCCP, SSL, STANAG 5066- removing --with-ssl and adding --with-gnutls * per Wireshark documentation "The SSL dissector is fully functional and even supports advanced features such as decryption of SSL if the encryption key can be provided and WireShark is compiled against Gnu-TLS (rather than openssl or bsafe)."- updated to 1.0.7 o security fixes * The PROFINET dissector was vulnerable to a format string overflow. (Bug 3382) Versions affected: 0.99.6 to 1.0.6 CVE-2009-1210 * The LDAP dissector could crash on Windows. (Bug 3262) Versions affected: 0.99.2 to 1.0.6 CVE-2009-1267 * The Check Point High-Availability Protocol (CPHAP) dissector could crash. (Bug 3269) Versions affected: 0.9.6 to 1.0.6 CVE-2009-1268 * Wireshark could crash while loading a Tektronix .rf5 file. (Bug 3366) Versions affected: 0.99.6 to 1.0.6 CVE-2009-1269 o bug fixes * Correct use of proto_tree_add_int_format() (Bug 3048) * RTP dynamic payload clock rates incorrectly determined (Bug 3067) * TShark fails to properly close capture files when opening new ones (Bug 3172) * ANSI MAP digits type decode and bitmask corrections (Bug 3233) * Two small patches for ipvs-syncd dissector (Bug 3236) * BGP capability dissection failure (Bug 3247) * ANSI MAP fix for missing MEID/MSC ID number in RegNot (Bug 3255) * BACnet PrivateTransferError shows malformed packet (Bug 3257) * Windows silent installer is not that silent (Bug 3260) * Crash in ASN.1 dissector when using 'type table' (Bug 3271) * 802.11n SM Power save mode value 0x3 label is incorrect (Bug 3276) * 802.11 WME ie displayed incorrectly (Bug 3284) * "Copy as filter" from the packet list has been fixed. o updated protocol support * ACN, ANSI MAP, ASN.1 BACnet, BGP, CPHAP, GSM MAP, IEEE 802.11, IPVS, LDAP, NetFlow/IPFIX, PROFINET, RTP, SNMP, WSP/bin/sh/bin/shbuild82 15611198042.4.152.4.15-56.12.4.15-56.1etherealwiresharkappdatawireshark.appdata.xmlwireshark.desktopwireshark.png/usr/bin//usr/share//usr/share/appdata//usr/share/applications//usr/share/pixmaps/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10485/openSUSE_Leap_42.3_Update/7bdbc19d19e720f91d2680db6c6e9277-wireshark.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (GNU/Linux), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.0.0, BuildID[sha1]=a284a9295525e00afd9c58f3c3755b975c996415, strippeddirectoryXML document textUTF-8 Unicode text, with very long linesPNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced(*(R!RRRRRR RR$R#RRRRRRRRRR R'R&R%R(RRRRRR R RRRR)R"RRR R PPPPPPPP P PPP PPPPP PPPP X)B>9? ]"k%{mt[3;Џ xeס3@aA_٘M3}uS%"9\qnqcIe٧`(e%(&x&(Չٯ8D="%qk}+X5 .֤Ҹ$N8htaEg+C"'o|ar$9t3j,Hټ_Iﴻֶ[zayٖTRe]%2|Dmc$-DO}h62verO.Ch 9΢ ?о2R|t!5{qpQEl."b׃TUD!`3H*q&̫9h{al޲Q#U$ &<$0vkEIK]AU]E@Tvzi.az2б}~d:zȵ$xmiӫe?[̈ڥ_>ۻ} UilHQ%NH6`;|*ibYs6c-+n62xڋCVԂ!Ʊe[nһ; C w볥7"Wx=H_@*3<0*#ǔ%SdKXt,(<>,`rN~5ʐߗ  ?>0W*zOfVdOK]ԊXzu[!ݳ*B=?Lc|ym?I$N:=3 N7{c}S"mL54T'xLoXAK.W6!Ictˌ?q^*SOIȶ=o%$ $dj/^k ;7߇dAZxpFJ%A9a![MuwXW6no ={MKnWo`]k{/4Y=YyOA<m8HN dV!ڕ%`ԮJ:$H͐?B4=yV'N?"A(`0ܣZQ׬дOUu9uԦ#bcdj;ٸ7_8 wI?joN=0+1%ܥ<Ι ^K%{t$C4|jUVnK] XONIÈ\1'&#Dhie`txS[я!dy/k}"阤d~GR#gFG*~T Cʜ`D^3R][6PDs&|Sn@ $Aiǝd4O)Fr;0]IrNĿDys~/NOV4LZ v-30-$2:v@$[i ;Ԝ rG$a/,kݿ"Vݜ@?ze%/@X7ť՗>bTvFAIe顪&ƿ'WQE}~7̀zx@'g5wybvŔQ'"W]oqI{ 6Iָ0}"> huvG1ì,}ڥF]RHD˘hC͙~Sv~M%Xay ciD6w.`)'i@p 4@l51ܩr~&ŜUcҁ cyCk5eϊkLCSV/Q&?*=2*>k:ΗgZ?JtF.Ei.Mp̾hj^8l!I!6@ >+9>c{1h sWTGla펟 8t _9mS;8^ٴ{-g+8* :{}/ baI_Icx+eaDiw[4fRU2nBS2D?u q l5) oH @@ьUq/+Z{ `6[(WC6x5瘓uG) d*'NlR%(ҢCn!AzbZÁVxh"V>qċR\w]JSLSu+_.oåQOkz5'u}݀ -'">8TǕKFrc qC),nt̄KOpdb u$irJ,]&%8P/TؗJ= 1T3Z >_,&4Q g UbGl?6Sw0ri$wUkX6$b&{-RJ[8TN{=#e] Wb5*3^5ٌ\#lPLr' xm mGtq:>IТy.+9v}+BG1]-LOiy 107Ѳ:hp`|\<. VNS7gs1^LAԴʚZ &Vfiy.]O,psA? qK8㹙XxՈɾ_qaj޳D,7Y_D4b ڲɘ *$#=@>IEEu sw8K] lKKBe:8%7#pWVEL+>7r/,b&mz5ӯPHKMhany2wscLˑ+[SIvf[r'"-%|U%noWZF@G?yV0rD,I70h0aCREYuh\,qP_{ jc=iKNWEi|yό>b'mAf?!c҄%w[ƛ57,p6.5?O.ɞm ]jf?J5˸;NE,H1Q=zS sCm7j0OGtzZߛ%MR7 e}+O/>ۉ(_wp^IōYc(~ag5,Z 3'4ƚJ\p{;ROi2M8jL [pW*8 #@屄&] Ͱ]@śWƗF19RYP3Vk5 h԰VI . X/ؿjUPD %Mz XY¶;e1?ŮB%0y~Y&,WVe( EBcR ˷A-$t@z'-K*HAȧ@iȝ_^eiztdE?oU¼G 'HSɨm$F9/=N at B;>C|v6PWF<{r" ُFXl e $ɜKYdo=y楃D:hWd_d߄P潸 8Cx8%*)RFYW%mY -,nZL({~ecA0Ppg 4,<>ӇxϼL1obY?ѪjZJ쾩̅G|ⲉ:=KWI^#Hd.d5CE<)IFN"qX?f 27]c&Mt. w~YU^ŪӎyV  a St-,| \"Lykzp!(%<-Ĺ/O0`Ԧ:)QM8eUc`W+mΕWD#k|3dCr. :װV:2~CU;̏UK#ͻJ61`Ssme]%y>K.6@9bDx(1<]}D0'Y}Ce;niFNwb~?A}O S|$櫯ֱ b:'jo R[4qckoʊXYе u#0-7l {հdcAZPЖT9 n><.nx?\ BNrT;=6(?CWQ/)5L03j\z-Kr".G>x n YXObuH(i1uYZ,1㸟[~MP)>.]ul΀us}@[ء,Z*67mRL@OfFuKΊ !|H8 Ҭz@A{>u9NH^6 hx٥A&XsE,./qewb܊uڹ|TQ{ haQNHn'<|@CmivN^*k1d3eDFF*a( ꩪ3^I((@ h:|VɶŠPZTKAz`L_vt("x?:1L4}+cCž"J% k{*+<~|-w%g8ܪJG.Aw Pz5u?O_gOlvtJ%eDExgCH-fyX+omG|jK @@VJ1X4y]N}Y0')_n*uFYd9u(;84Ekg/TTkHrنz!kz:@Vc >b/dLX\6Z_7rn/qgY]`e{Õ6Nz=z-EP]@j<<Eȱ[q>_KchNLXޗuV&d{2NJteS Akrإ0Xe_r cZCU1 }7ϋ>6&TVUkd 0haG%J]A52FWdsiN "/[Yp%‘Ai4 C7k H&&ݒei44afy w/VM IM׉GphV3e}_Qԛ48\_J#J7{Q]f7X h~@{߳) $KE ^2~W7A"{k=[Kag.Ĺ1ΫVQ*g^L$>VZ ƴNQs[$8ԋd}eƛ}F$IO!0`V5)S~-`jA+]*]׋UƮf4Q1A:&6yƂaAy1Jt&m&3꺷ݹy3=&fcznX Ʈ tqBe6N'8~\E_DSEXkIWK xTJ6w=7%9b,B/h?TrkiI ]aCX-9jchU̪I91Ⱦ B!gj2Vl zo`.ה]@hޘ{1ܒI)Qu(>>'Vᥣ +_<̈1Hn[G%T dTMsw'Zf,p0+B(&be) m3MNRŝI&y,nQyYb\7<ּ\+>U ]Ÿ ߩ*)9XT Fּnҙ0b&휍d:1~ldқe>QO v8hއqGɁZܘTbڬ/T{$x5/:Q3Ģ$l@~_Ӂu#1_NNᕠVDU 9Ҥ"5$Spa)JZlg0a#QwoN`D5R*ϾS,tԯA_gQVQ/DQN -ҹ}M,ݠ,a{)*G8}}$tc\IEU_THզ.r(t/> zхk۪f94G2L՚QB ŷ7p~u-(i[PǖS>ë}צ:_Vi 4V, &vb› 6Ƌr>@1,'DS[ X%%5?G!BWjƒׯ8`N(MoZQZ}O?6/R3fƽ0^!Ik+j'{1\}8﫸Rd4LI>P/:P^!^5nTACLzA3-H} `_3_Mq>sDC'uA1 _*R~OQY/J|دRGӚpF٪&EW6c@d ؎'\K9ʋ|sT!} IӫGl-owNxTER[T&U÷oAKп*QG &|S 4`? >d-ƒ4* Z"y g~g\Dx(3Rq8H( ѧX7 .-ab6_+ԝPJlZ2~;/d2m wHKgm%C cGb 5X+C"_8YDyN͟)^"z ɧfL^T7uƸXP$ѮT`Wa: FnݮT(rBhէYI%]B:>QIԌ`R+e4DC 8šx%Yiw2ОOzȥw\U}gk],'94z?rQhiq٣SXڨ7W$tMDב zu,H\z^b` ZInp9³))I[B=Z#h%<69@}'Z;ʛ 8>>f~ܩE{" ~zM2kUJ`w1/{Bj&͝}cZljV{3d0j>乂%5(2Y;,zAYEF}}| 1JOHTQϊ4[MŎ.-jfkU Vž\yXC8J客XJ::g Uj(S 靪Y=QեYZ۟w- OAGhuYExJizdftыq +F|~"(SŬNeۂ2 ~XR@Z-^yz:[e+\v FƵ *%%;D;! 9EVi@vtIī0ZJ8GsSk<_wL֗80fxT[q^ijkXUnd& Rb–nnHg ;r6aBX"#K÷ҧ[أtWJ&Xbv>0"9R I2rh;N81ծE@, \lH]IKuI̱@xjlk Tj-!j L`R2pn3sv@V=Q0l͑R~S TN@Hc6_xj(lI Z`M|L}|EͭyEH%DOm[~f_.qƾ"F@dP߳6S{D~K]6p{Р3)+^Wf#ΗhO +&ȸqQ'FvEB&0ѱ&d;cCмh,= zh|kSAP3}CELPECE{T((;x61k} k_q>7" c)~79gS+Q+nx) EVJ╯J׽'1rq<]0na2f}M`q]Q)P~}ٚTbqKa#Z›B|eY^Kdؤ+?+P}q!w:L5-g)HIpΗ)ĪscRD BLQ|{VZk@!zߡߙ黀xO{G5_Fc٥Z ܆t^y^W6uLލGt` N@RaQ_X)B1FǦ*p] w6*'Sၽ5|"mZQb*}.?}pfOQE+Y`s< ۺzZ q:JNߤra_y@$͢7BIu<=;/4q(O+ NP/p5UTkC63=l7?=bw\ EihZBtO hcEy `QD7{+Jd:#Jrmڎ;s%e'ON" g6 V9#F5 8]oS*d.Di-4}?fŵqAk;Ȕ-c]!AO8=T¡gՈ=yaQ쟥UQef\xn(a`WМgm`ȪpK+ڪK^R 9NGNa yL[w౞VJR4ct!h%C͸vxh =-}[&V~`jRjWޚ}[{CyPQ ~;5"8mseag[dbI^,x hzn8JkdoEev^gÙfNu1 goۄ) նr￘65?ܮQD,3izSx_;ML娣poL'9,3TX{)@fne״DǘIg݊mK{z{B}[86[ze NmqL_B4){ؘ`XU Sj;'ݝa{Et/'݄G%y]H6vS̾4pc[Z=ȉ].kY{ګ c ~}V F&\ Pon^^"!-1°MOsE{_ ܜ}kp P .`5$Du _aCƎ^&=z28Ր'0Zˏku g+@Z<>F3, G, Wx:xf8'3 3ДmX: 8LcwQ;`>d`+TL G#OSD@˜}Nsh*@-+^0Vvu|sdg¬. Y&Kk}u7L^hXQ/Nhц= ~$R'f!g86\_,0yh,Gxy`7._TStf%)ze|жV`&7|HdW>I2_A8([@k}¢wRrZ)eZnrwWOb|Ҋo<3%Ύ( !j fMwcR%>ڗ h͌}(1(;A%Ld0'jHH 'D̈́i㗨S+@`ڃ%AK1UVtCփ:*l ;|%UfGX r-@i`)_0 .+AJ 11K'+*Z\; t_N~8$2Gײ蠖Gnxae; lkVx7ӛzTCo"wv {|z]l G3Q,̮ Yl*V'tR.4c5 Bpizj,&tl^d [m=45OHq8vU`.mU\gvpljM|TOJ4סom™d6z/Wm^Sl5xGʆ3~&X(uK\ޙ2m3s]THjkn_NlŁmٯĚa0ˡ-7KDe|Ռb_~Q4"-nTPC!*J)8(^S6Zj7Q3LX1;]cԈ~:Wc'"Z羠I" ;|Hj3ťC bW[KF!db9sچѣ,ա'[p.=،zzTWݱMVDWHm:f4/ V;BPREjSv&+\&hvF%)p(glsVLԘ,Iһ{ jFfYݍj[?)>IO,3m&fTyIkੳ\F EF3Z=}[c)QOí}=Ps >wOvɶF$ n<~ |OZl٤!T)mm4GKx>eIjkVSmg|R='PhPLF.uEP˪8 ܏@xsY!27c^]^-R -c;?,a_}.Xn 1Oo[C*ed%f<ҫ܆'LOMP=]`e*$9l>$∶|$WAmu,ppT5|B>sN&Dgu)ʾTP(HɘlacU"Cc۲yzrFCL/^P`_w'dk;r BNnl4CzJ}r bZ@_Oq1AUg'EUEe|Nr%oe3s8_h?2``#VȆjJZ KR?KƂ *{g'n&0bü<" [T-{\/] +!ɷwh%z2EE~6{4G}Orĉ' *x?ޜ~Ή駣mY il' &+ekߥox/bO?,o>m3ܣ5 luf$=V$?LgqӃ_a9#{R`[Ccl0#]l')!ۦ;PYD# eH3U3޻?2'Egc Z )&LnAe^-' qʝ]$;2ƕZTp^`8J5 \cCfiRBR܏PV Q'R^@ZlP<,I?0(Iۇ D+T-l%lfkziFM+g!)u7cWHXh: Rm}J_D0x۴Oȯ8{ YOhs}WqP: *VFn?;㧸oL[ᱽ%6$-r,;qZ,u%Jx BnGոd7Uh @/o7)/ц"PuX$;}KF$P5l(O{E,ǶizGsF7sLDȌy;Ŏ|`qE-h]TS0. OL,CaU6 Fa~}Q*Th҉B]v?ϻg̚Pݲw-E}=3ӌ4){p4GwЅ@$<oGt xƼ'9ffӞ@Q"J.~O%|αG Xń3rf~5{_hkт mokoda b' Hy800Y?2M(?bb5_ ̟5ꃓ*v̲Y4EO~}c)CXu}\ >R2y[/dZB Y[EMtHރz$^_aQN[@wcdTfȘZXu櫃w$3/Y6=̿w%L?BSpC+T%BST! y/5 t/l0B$nа!KM'3)zFtj+6踋*rR^쀧zNQ7ѵ=UюI/K4?uˤ$_bpf6T4fOx>[JX mgv0.<:H"P0xwTtƦrSm[gT(;s9xuU֭FA@q,0ixAziR_p˻ @˩KXg.Ә#h!0|>il([ Cż"AqeH( @̐iؚޥo[ j q vHO'4Յ" ~|%01Лw:]_U/vxUˣ ~3DR;Ǝ)=Jݩډԇ w_L8/V4~.i*_mNx!oE~ c z/})Zg3[:#v9Ld=« 3ޥ@ʜZ|):rM=3C7t!!7͋a#qB&[Bמ"nā2;w5 CW0+pw'nPgQ|p(ݞ!b[eĪ~dw1rf'Q ju+T3Vn[c1pMpM,̘퉌;alGt;ge6+v'mq</Ust~YIwZ$-G)i_4)hvuo:$-#'p&-X %S}fG1gXGPu/a̩RHtȯzjrp>T [d0ZK<@\ϓFD.pW ͷ/JscBfcsZV1AAE7_DibW']n?x`/ki]3ZTfkCss63^7J{\NnsWgLhZ[IuNpDbv}@!IB7.8^G>qY^Б:z_L< RAU"~Iph?v!Ze tʗF EG*3*T btjB(EW:r=̓B/3%(dvpLC2Z+y͏+ظ}ESI^/xb|T=G 7B(L`sI4RY}칞j{" ĈݍY5<>U4 W4`drjR&W&8Wv\x185MP-L]rϞ_79_MUvEkQbXc@5B#q1z_@lh˭-Ǜ@fYk&}'(7kNROzisT:F^haY*{~Kd&ngs[ ,8 &TLM[+i>hh锥Y:%ڕ;kƹs[f_NAc=Gd8;f]wDˊ. < 9QZ/Dm!n\T&|iɋgs?xL/{k 4A_#Crt9ԏLZ" ƒvHw-]}1;CgW2A{H-' zʸwhC~O)X)^f&\JbRbj6S8^A(2uqT$Dc:ht6 ^59La08|^)*Թ?oN:Oƥ'χC8pS} CM~YigBlylyॖl&fy<Æ$>4TAzC"Fp(1+`>ynLQ+^eM'^q4t ?OhK*GC,*/[P'I?G糧W݅ sF@ؐhVZ+C#Y /j,t\(6{ #0>aؓish-|taX)`f6Mr 7I ;[7^8-F,`EKn7s, ƅ󃗟Inu]=b*!|?yEz?+;ϻꐾ|+Ypv3Кt4Ӽ05jttkp}j>>.zt(qc)9e/Hl/vyPMiuQ\D4~fv ȸ%tA0,"%*U}T^f%xdˡ+烻>LСv+n)p*fȔS`upx"Iw%c)჊q1yPtV-L>_Ԓ u+Mh˜GѢ#%x~Y'|2(,1?}hI6e^>vZ|hu$o-f܏3A(`ρ3V1VWE`,&/!ϡZ&GV{ 1 Yhx U z5LZ~-ِ(m(Ep J< vM c@3!Yy z MeO\*bUkJElyH'3fYSi.M>5%^+j_%c6o?MWw*g'LSzX訛RAj+oɶfse1].RjZkpE(,>\0'N%"SOs+AP1Klvabz}(&WpF>3wR/gn^wqJ` M Y8]Ǔ7@]NI⺀Bq!!%AH0/DHf̣<"UDֳ\/2tϾNBq-) ں]qaAB+8{Ju!iR)6]X$SEJh0% 5 Z$0TsϕcJJ:LiN S\2c޳Y(hZrzS/.&ps8}u)D[ Q߆0ԄЩ399͸4$g8֐^hɿry!aWurefC&WQzq$f#s>`~M}_%:yt xV7ރ B2O9%S9yQ!o|{ Z-OȔos?)ҸR댂iVh)"ڰM9^݃tMPzσ`sFUaXq|RRJ [Gdeǫ1C*`6` b)^Vb$p-$Y0H"JɡD:P4AZ·cʚ5.ϞGO}CMwES\z$>j:Dvf=TMRF-Dܻ9t kw= jalKҒ+xX,&B+g]Z?K3&y#w:-tb;z5x@ĉƴ]Urĵ+&v҉9*gf~j-qreS.uH#rtIH잛0 Mdꇔ <?Zٚtgۓ:Vy st Gm$r@G9p<05F71_=X\:3ʼ\3`{dïtW/7K 1uS}({RBK:VbBMXI0*ʮR++p G /gmʤ/o6ܟ0>WǷGd~Sc姄G]P- :^=KJǫ;:\T(vk=,&h='maCojcRPQݻ\S u b64<]Nlb).XD.e cO!"fWX HDAr,:/ k|Э6vRvFE|AH `ռ٢Tx)QO-EqK+syx2%'ܻ\ǭ4uI8tG9r=.mu+t^DX0EL0@ЗW pN2۫,%YoZLǙ.܊c[žZKA-:>oX?'5%c-;xЙۉX>e5lLK,(\]L] huoA`Jq[`C RfyvJdl_莄>`{>uL6ԄlG|uځ{4 Yx.ҵ^( c$ Ou3 %! v,BjcbScTqxRFYKgE /E 8YeEGpP|Ď.0JY] M,rti?dm輸T u &VG"U4 zg1հ׺4(yGJ}^aiIWG5RU+oK͢c .0iuvS3T1I u !{cNl`Χv9-g V1`xHhe}3v5DwW" C2q O鑁Jݱ Y7Kx<+ʡp>%!Jt7NO!m K "|J+Ł/kp%W -'u&WG 3"nSт^YS*[KPq>Pԑ+DMDj!3*՞6 ;NfFQ Hry BMî7uZzWs_G~e۾՚%gM'imPHOt9w@,g̖??ŵ|úh;G!@`W.5vzYƎ k+lPM^k8D.@[:'t" ,)xgʼsߚ)YS]@lgp kN$W@ l-j&Җ1k}J9L\'OcO2}wlCe+0qA{iSvЎ;eקR:IK(Ġ )1N{Ą"U:MPDl+A|`̐ NlJh4)sL (AG Zx*!y(ڹ_la 9rHo쨄S"qCXNXI!VlWߧkG8sf[C=5$fٔU_TC%9޲BDa>#8@2vR#Ph0\PGn6+sZ|Fd'eQ[Um"=)rP_61"Rrb~'qaoqX0OScyoGD$jw~+qtۦ*wyZaZ`b/ ؈P@`FsY)-չe "Z5V^3<};^Ӵ*C 6;mh1RRL!;y/+\ImUЛܞa#hٺl4غ]pZۥ(aSFp7>NsLg=ۋ1[`?3 ;hhmDck.) j"uvuqlܩ+@T0pAfo;ˑe_O) u]Yd{W UHXO>yblTju6׊GC7$aV`Xtulv}yhbʑexp0)Y E-f;'%F301G9M4BOrk4'_ 98;Yk-D4EJ'Ĕ3:Eխ轉J·rG ڃz/G+$ l3Ay(M; pa GDFGB 9P'wCJ;jl$Mg'˄U;=T[b89]t>upU&< VۧI6σb4hP'LPzun Ӽ1_yf>E&Qiz0 ,x֙>rm^88ʺ؉ޤ— Ww 9!=P> -GVAT lpb .!]x ͇3oF xzB;S<V$5A\1Cֈ7Z#RwS=_7$>m\:dEEpܱY?Pyџ!s#aM_V0e$ZGaT!熦VwJ&3|gB~!.'L KiY-1sCM-޿AZAgI~rqǻLT ُu|`Ce8b^E9Nд)\C$>0+ dߣMOl7SY0Z1@;~{D 9g86aSx kbP|,3 \6 eEvBH_[0/YԺ@:f?./ 7 biAOi^h>@Ҥ8fkn 0Ƒ.*v"WVg-6[4 ۲:_` ^VlWqe"kk=IYbE8FxEPWL:_WmA×U,Q֯'r?>讕x@k&z!~X?bZMvRTwdHR5 C_,F"[P.@ GȈɯX\'S7ꬳ kmiFaTǛ5~͹[jaXp(-@ ̽iu_w8DXCK~5 d/ѱ1l;Y.D/ B4 w3;.׫xW^WHA:J};2^J6k_X-H4&B?K%hP5N$=أ.;PX(Td܍" ;aCF2LZJh[!UJCD 6+l ?ì^KlRm_JDe~~R8vt/ZMeXGlaQáb -7>h-=OG F*(mL P j;jP1^@o}+۰$~^OSz~u{so`%Zt;7Ʌ oWœ&֧7L2?pfmV/N@N_{rm֘#mjH}1\n]߿ .^xU< `X* I<jgsHnƨaʭjʹ$oc Y鲂5f+s% 肃˥V$Ծr){64|OP׶LUfn ryMBn2A{ZU,v#+p&0f oV)/=tWr&* F t@ްYtt54)Tcݪ5:!vжY>A' ϳo$D(6S q`}(T8PWhI2ȿG~@9_FV6&(BTw_R"bo%5m4嘦'D = L3U(32S}L~þ*n5C >{f u}DtpXF5OZϘBҺ:1T#~w^ZKV!#Bv^}2`L-{wgg#ai#?$?u:.kC|ali32xQ[0Ȁ{Aaۯ[G^VUP4FC!bؐ5~gE I<iU؅l̂\AGtE\k4;}vTyǯ_{9KBK$ \r.+rmMukȏO]apWؘn9/<3yVv/\6&$cOQXOhv2i~}6iR31j15o ͡ !z/3Voæ>~e(ZIӌ!@"^.?%6 \C>#id")b[4hWxO:5e{XNiصnzNX3\A69Ky5\lէ\l=˕NɟЧv[| 2Z8"Tx,'BlǢO#{;Gv=֮x;#K_Jȝ5= 2qB?.wEcȒk[UM[$?2nI퉩;)qAa13#s(;D9"Q7u״;Yc;&FD^DQu6Qrkr#X8_X$<zmʥ zRP>qgNW?EI[>4wB:Fr-QX:RSsT# ;"-4Td.V]?~Tm1(Gjk? Y֯XTΩɤ I tf{=O!TJŹx!oylb8X_Ubæ%%wpwXZ%͍Ӟ.v0.RK2S{/Iԓt<TPx *m1z\ɏS_uqc68l! cMOҀЍu:["Lm|3_$Lm"rPErd7w vnħm~^kU;?(ɚ-iXnykEIMVSD\P;M7AmfbVL0{\yK"G)*:I;IX #"m\ע0zAِΰf|MOc"2R9u5N2C^Bo6 &L?SQ=@’kgHcbgj fk>+xڟ[/ۏq\FP_^ H*)V+wYd) @J_JM(ى4=/Ƚsܚx}&!8\YC2hbn}C\ [Qxa=Ĺ bE&E+Ptf%YJ'_TFBu{ĉeQqL8'!oPk_iڗ" ?Gu/j צIqYҏP ʫd!] G]D)Poƌ8]ۈ@' *Q@0F\jƱڂʽHךӡ^h aEpSjM!Ef# (jeͬ` ;Y9uۥm79ɩH͸iZ!վcHڼٖx\W:Rۛ(oS25!)D[rZ;Wd踏/rqY2e^b?1̌/aR=fjW:êiQ1E;QńnR;JGi|6pc Gшt?Y&FBMK@*śM52h< &!^)霑 Q^CYwuM #rq"hhanY{z5 bjp3~tL}D-ǓDOѭbm_ytW1iUV$0-#dtTy}m^+ڕ=LMn|@&.#R'@ go!<Ȭd-jh7}hKC; ܺB yμixkv\+PmTf{mE`O۝s.7- Ô9,K#p4[bϤ/XG ~Mݶ)]dĚ ;#)C!] ÚT]ώ? qY;Z{܌3ZOt<&7h֧]pm:DC!2?Q.jP?ep8*w{[rB]0)擵1cf)!ytCO`X!xy#5 2-[;<ݟEqocF@i){\ Jn+u,/j܄HcycJ+ajU[V5ʒC.3,6*ِJ)s8_g;VIOwV0u;(d:P.r蓬%酮Do2oώηo*tУxI, r=2R۷ @!,Oȝj&v )U`zY8úa&.&dDhl.|!w0.OEw,{yTde3 '?/q`D@ x4Ȑ]98 W`(F;rkU,MMb4Nw;N< b3KSڑ`I21݉mK~Z t!הLRp-\`QG7RDvChk'`Kx.NM2JBƨdɽ Gj9KǮ{}ɴdy5ݷOp<(#,{b\CW,VEZYy̯>p)9t#{H56@|r.* *so*DHv^Ox.mbgJCkzeXĄ%G z(`*)(Y1YP"# (8V MNkԜc$'Fߦ=hcAՠێZ;04P@~A=TeB~*nBީu*+?Zip(rUs8&t¤c''?c$*Wv!"=?l"#NXb.ØK@؜JˠO<.-uWZ:MSjr0!{Ǧ 巄cg9`iP>A#'@Є58(OYs/8XџFm7~6`U^ŇOg4Za(X⹲?s%+22/w0RԎGbćKǞY^a߁pTĄa8Tc+™XlISQcyq4_|öt{聘 Ծr됤{āUd>{һ^2fn0HOeH&tBy_6ق~o^Fss\;nE[@<`ktZ5:Zez}qE@]&XNW' $qC?owbV8A+l$yI Tp$1ecZ357D煖-$Ji9Ek`N[׌u./iOQcN_y9\ I'ٓK ֊l+lBi ]JTO d!`s?o&nLlG9-+Œ}JGP* <*g'hfInSc`)&?)Ni4F(C8p6TjB+LEe B1BvW- ;DqT;~f])5Ak^ܪ8&uZ{ʍ<ձlcjaV_5d%C )cP$*+vvF BLEJg=^^k91r'*[HU z܊6=DI\wрX!I6m)~L󙚣3Bt-GE"CRtj}O]}/@r,7-$EK=݋\5xB;P|SZę~ *sDfO9%ϥeN5Xrs -,*聃G-k&Z^atO*GOccDqIYv,~sItFK|!Rzc|w@I] r|HSr `㣃;hq6hQjbyWd\EXAOJ7,L_`D=/8l?dơ_Gm^,woq;:U}s'b-/5L3Z  7piq0VEöxIl_xjX;=C` Rŷ$u04y>S~}+ϐ E_kwI杉/Z,[& -YQzk+-P]~>Ny;K$O`⹥ ;p}ɈSe%:ecRu J7m<~K:Z<Q勆+j(MN_2mH_QkVdy]uJ{I_h""S<.$_Xg_-fKZΡ_il4?bHlѳF(Ht϶.ANC";Kq‚EQCe0G;k8=squocm .5qO+:L܁T?.֮AFQN?DxfyQ%ǧ*LLhtBꅢ {6({N0z:r0 l&^7Pt0өab+ԩbWQ[bΔL 9Kz37@x-+3:Ez$d5vSUZ1cc bryv3$߇[7P|cšdyʜ1X5EȐɯ0sS&|e\s}M_ΠwzW)%d}VzbB0)j}#~e%1% 8QxHN|q{'Ҙ?_7n`͏R-V a.G m41}$!y'uY^?`)`=\x#V%.P=wEG_?[Tڠ9??gyՒ NTQpD$I[}ݖf\Λ_ rFhd,}$pAG|k#|$J2=O 0RwK+!QY;UOZR]Z}'_NOFB흡:*14@ZިW$?=:𸂏4*Ab|a}=x'fy@ ԭiaP5DK+0ӄ"l,mɸ\z59Vi[Jheƙr{z%B z{QUL`D!+he ŕ.{uh?vm ^rw/4aOrR{šsX%fU~Wap˒r¹vjBՁA&?}k#D=~_(= .\FBT)Mploe6~V2 $_EZ+B9:ȫ9}X-`#kEazO23BSzp3'ޱeR(v7h¶?9ěhwJI͑"xNEAR9&fZTƠG:q+ھL,o.Qf0M+) ƅВ)|^!)̮H.ߗ% :>|\ïkpVmV ȝ$[ci1;z#+wɁ +I0jPs|0cAdФ.pbLN穋΋B\;JZG%M/9Y{o!-?G oHʠvy]#ӿ5DtDT%^l %DB@XzBg:.kBvl} Þ.YdAu/|BґƊV=%t${QǦn [#0Q֧z hɉdl˽fAXӳ!W\ G5񦼠R jY}r3@A2j4a=2N~ho6ar)h11!E8՚x\]!:m2of\8zqxC.Rv?^^&e++e({oemO޻ ۍRfxtzTut,8FzsI*Ȳ!#IW\sP $Y@QjZe5o6-w#J!hAXW/ _i% aqdMIٓ`0CyV)*בBLyq Jn8_M*`bM3c΋)\M{r$ N ԵKqGc+Z:ʟ!UNѿ˱R]+@yMB*DJMZ6Z4Zۍ!lGE &9<7k֭H1[n ZtXxbȖ6!x &<97{~8; <<}A;U5jBa\ygw?Y8؅a lGL5t5 i[r2 )Sx1́|κhB7VkN6W|cF9̝ID@Ԅ*,n'-Q(~7#WaKմ=P?۸+Z=2M'|z2 HPfkz(~[h xmr GKu7Z1r]~%w h'aRo]zp/tƯCk| Q{ۮR baO9yF}yh<^**Ydar7!:k6LcMȩ(- Dp~oAH.d='^5xb[kge*)J*oX`߽(1>Iiu LeūFӝt|fuXP+^ ǼS4;xAz){9r4gXT*7/Ӌf"xwJj:Pl C }a̓o+(n-7GLM(`LJes8ލ4%[:p N(٩O'zL1XSct2d鵣of.^.;e:EHK; PX%ayTW~J~X.\d'B4Vt:8?]RdD?i}6~K1NЃ| "nbXބolD+&v*W+j.wX E4|̀%?/V\,%٩@whJ_@ZlwO%0%y)9g'mmfo 1ݶ|Dx(CASaGw5IVj&ֻ/9YC9T5˟wXoAQΑEj"r5&1KحoOٝHOF9Ǵ(ZV\&'ϏjR.;c"rn575'@ܫƮk^C"/7z%q:l!K\45n,MXf05;*rdDc1~OU7FBV C {'ܪ}t[6yVh]% lH9lER&ܟFʔ!LPLysN,elʢ:fE.i jh6 ssyL.3mvZ[5cv y(tаvBnI\x9Z_(؀Mi$`9z'{`ɔCUR~se]ZtIa .jВX&c YMT:іe"d4-X$U$|۩nbaQ$Ms=}@ ^rMk -ʜ}, V;giy0#[>nɃ0IWGQzW Ji5*s!%nLN:)Ci1[b4fy#*RufĞ׺~F&s0 70cv$%E4Q: 3-CեKbsnH%˶ +&[bL+*ktSi:֧zh [nF wj j8*Hxm@~wZ f;7{(g[@m 9 3ےw J>tjG,w9G5R߮^z@2`9OnQEg|eUIE=8jϫK,!->0l^Dma!:4 /1J%mHH@(2~82y1s;g>)[ˡ`}Β=|5FI`+2"Uwq.]go07*DְnMY9 X63sӈדJzݱzt2PX;kA)Du<5 喋72ikOxT;HiDa gӆK\k)4"˓@496dܸ# :qp mFe=~tZ1R j?\Lwͷ-:.Su2&T R )}LT$EWjWhɯ?72/Ηi[|p4a6>gwDi50 %pyQ9`LX2йX1_P8JXen]Suzt* (*#._2TDr{>WRKCxw{P D>1{0 BQzQ2~%nU3%CΉf.׸kX5jObQ[$w e%@G{7mop zsլwȬxX7?ϭ(M[ޞ P,-~ˤB seO~W ،`t|؞3i~i~:d gK-.(hW- Mm] |:vM/EI'`s+`Z 0K -fSd=h:>k[6&2?Ɛ-y> ދWJ.-ișEptY^ 8ҁp?P:%ts/KeOt#v.7hSMij&OG*pu"UmYWh/a&s&s[ S_6}^bGeX9Nkڑ)!pAN0\>Y6 өBD2JLfE+EÑ[*=zk+R\nSy<`G^ Տc _6jdk.{F|(zr/*[$)-Qd t ~IV3g2$O\tlp г̨r (%ŸuFFZ=% ?W#-zԸq$01D5tMc3 ^?T8\ߟc'2.ZlkfyX9>29TM4̦uQ0>qzxZg\VanK@rKd1A,gNMS3^mtttɁV^"Յ 0 zSD8Q8shH R K쥚b3'T-֊"())z؃7 Lo3=_ _*/{w&'zGTA]i@׎Q٠^_!QђY*Ռ*~BIw\@I.ͥM&-£AG%ӯ'E>„1,CĚV#IYA҈o|'n40Pj܆V󠡐 |I0`8Ȇݑ~o9lj/K#* ^Ҟԣ|-*gxxe?n#tA[щ։`W%|,E8[GL9o(6)Xt+W{bX&UЀ;|̱̃24=r1vlH *Q#Qi+79m\Lb[*KtX(d h@n=~ lt~ꪶ?a8oܴD* 0SM/er'PS̔PX EȢmK9:lV\ @r&=/%tݳ6r]hdQOiZf_+%\\f`~Yd=;ɫ6& dw`C'Ž} 8C'G! Zyj2V1m7OcRX 7G7 S9A%JGrf [nwխV-\c"{_myAZnA&fWV=Ds8k*',ě~RS2Q?ɹ򦑣8j൓m;DW8G%;*$(C锾ԁ{BML7o8Gr`dހ 89X@;Ϸ _o'μ4r ZUoX^S_9?a57&W uUTImp&@J1XҘȦ5*=s^^:%:F.RC7bti_YU ȶj)~$}IH@%Ч6+nx1Yfc ۙy>E'L(C!3_/C*f>D E/Ϡx|8UP\3Cf#8tDNRأ0O?=~ ==1%kR:$ì29@lԿ#.խ#3|P>Zx]g8N b5F~:R=l|nV>:^TI!f&H__iחQ=(4<\ ^X͜ųl(nKHC鱴 4cm]O"`بьR6pj>𷌖`%h=dQml?;Zs)zY%]*ϵB>):TI*9VkqW GN`L$XA?1$zq5/Efw9iZMq9r̛<$XֆjpsjDž:S)T 놢rDьdWgр$UU< n'{>rA 粏YpQ>7?D!WJ'<\q|j Ixxe?Cф Xei֜ K%˃)%e4Bz*}@/0.fmLh!Y-~+=x^>5~`;oSturWd}ʢN@hཻBa irbctfLGX3vW%0IElB;,6b+z $) %3 ;q*i# tS "6)ƥ3h%y? i; Э-l֧#ߜX.4ϔE2=i_{z3xTd̕QVPMe4d1N#]u{$C\8_3'XΚDV0'6TK MdN^|o}uGe{މmFǐAju6c}JZ,@aSOX:lgяױ_dixf'tIwL|$[b{ >ߪ&*rsKt H% Gh)4SRB\a@v=|#%a4E`5&U@ܭ]JzTMrg V)\f{ ȕ`VD;& ZdnoDžmhEǕtdԒfYFjB esD$Jm' &ˣNTݵвH %L]i<훍$%=sB3R>^6dazq*[fT9a캭MK #CLjb9 BC4L;aΞ)wH1H) K.lO0|BЏOTs`To^f'8x/YWwT_]>H=ɾ-ʾtݣ_ѭD=6|q:7HC7+܊"蚘nnمryy@9dER Cl:OOYn?O)! _E/_K&@{o ZF=䮔@ތxJ"} R3#o%+,t^]ϊ=J غ5#Nh@|*.'S#ie h_q,J*"~E=ÚqgE'xɤ DI׺}2q5t9Qd֋Y$kRΝeB,M@zgϲLq \H--bd?K; #xdk7B!D{ā8J ww]@PQW 4#֙'#cT(r8F-:Y|Ns#lmP@Bٚh>21Ms n^ʼ/P71/NpFx5uxPW!?Xfү"D Ǘij4Eh_XQRe f|8HCs!k7#Fz4#L&!'>m1:RgJ {{ƈy"Q= [)vJŧO` 0 *fbNtS\w:8>NT~A5X/疆5@)3yWr2VhDN^(' wJgH@:F,vb E>cZMgY;?s Zsk7qgW4 87mN~)9"swr|q j(AMh5(ղM񻷴c]}p߻?4kZ=Ai\Ela瞻 4kTj@HdХJRʛ]i*z>2Sa"*JQ. o7Ok8TH=8=9.at6틳Nl7T9#qtOpn]*O; %B17SEPl_:# YOD5$)%L.-H-CW#_G>iI= ۰Th,aɛs GlF(,-<붎cN+1m)V{}v+0J *\ކcˢX_.҈gF:v Z K 8zMMp${g AIɣUxu' :>K5A=>FTS ΣUVi?ycB08*Z%YW\5kFZ"?qLOs G ./8IϤndfL(ʪQ {h}E(k^M;FӚ:22-E%Nyȹ'oT)FpE=`[Of0'sm*w(ʵ<-6W*@"ȤH{^š:TDa>a{N ΣlA;^wK?(лEFt*`ce{mzIL;\ ]h"){;DGTDG7}5k=1(EK807[^)n\ٛOTݸL?3Ƌ_jSh$ h8*Zq&'!^1=* _#) 2P,V< %8*TBE VD59mۇih6_e01'oNX fq)Ad[>"YL*]x6 r&v;W.yݼ'=TZ+7-ְ.eJEbBL<iUQ3VeHo[mu)ӕVO>w;4Eov0<()0BI>jmh=?Y#*C/wZPdeX$`'"OtK̈́"[L& ugi {$%\0'wZ,5iɝWmbIIr5gZRʯfh?mJΓ碊yi3xyNGc5O=)B UILl@o/Yyr 3-rܶIڸZU56t_H+ge(+3 4%`W}[& GItohJ&xd\dNIpy\Nc(S'+@t&CZL=AI>P$L0N]Zŷt(I혌bڐwOG!j0_˒ξh}=VXsT.-ou$8f[2EoƙR]k$3@1]wmfEM1) Ŀ{y=(VFdzlBNnR{9vݭ[D"'.Xe=`55hfK64M k(ۀb_e߇>*Gի4Ї-"YcY4* #JB֙]A  S*379](mAQAz]̢&/LeR\uNA q :EcZY `b-y̙M\|r90V(^$@VG3459WZ`fIț%`.bj_3lhTv9?l#RIe5h&# e9r&ք0>,Qz?#1-a](XU`sTtGk R?n֑ kY!HYǎͬ䃓Z;S~?&b-P` w QՇ\H<?M{˸L_ ='o_o =:lCX N̬r:p]a\FH [F(3b-yKlൟb9BZݽqm Qty;QR%- O [iԯ7/FS1:d}sLn \7('1QVpLd0ǭYZ:+4sf^"QITνc2H.- 2?w5.QoA}jLV⃊ FU=/Xx'e{FzmaԦ )|PV1%G1RhPӯ , O_w,k<&\~ґOp_h⌲SF2G&y}` Ϝe[0tDpn[X(6 :ݯQfz N ?x){{Ѥtev=eNr10ktDAc_"$[4."k5͇A%jĄ :_`>ۆf)PKe!I'(_!"><6u1Kt}qaE IcVǞc,jÈfwu (1wǩ26 JZ{xҿ|Rg `6?Ur.꺺(-+z펅;gd%e616ṵN<]yŸ)"Ps߽Xq㐢K&YCT=|$'A>"f!Fvw2NX cz .?ykA 27U_@HMzt3\ȁsbhv~̩]^rH5%%i׈(Պ3{DGʷaOh3s˘~$` n2O"*f_z^QQ 0Ϩd,Pa!@"njDi-5up#DwQJ $٘^k"K"V9oxNi)SyR}g\QqZh^~3E:i:d #L#= VJS?xx0JpBqѓ -Z!$*KLCrd+WSjPOrμ }56KiSxZfEB`{;'uE6,vx  `E/' .>=` ँ;=>~S+|~nf̟@",ޏV-A FʎżY Qg>ǡ1]D"]xm3_xYlŔ#-`{`Q+(HI? L71?ή6$˄^er{VU>ܮ.x^9FG$WSÊR&S\S o$2kn7':WWPYHC)oq50smG4=oW?>?0yzt]?+fkRzL *b/'Y-=3{RT&L:F_S K.>K vH!bd:*/qICì~}Ɲh!3+<r(ثS }`ّAMӐVF)ǒ,H׺>^,܍8]ï̟Ð\ t—_-T:ra汛L8{2aR10vծI=qβ2 fCQEuG ^A?srq77N@-?fI ڬy}; ;o(d>F" d-;t{n lXn/Ѷ`X'MgYvN ci9Fk92x(th:_'_I\,vFQ=TR&n>$qX_N"A\Kdž-g<67I6j&(U.MiցyЇbQ_{D7- Mw\.+unTR?9*4\+HѸfTwu85'N0/|mFag;gԺJhM\M5IVc=rAʏ dۂfrxz1D8af צ.GCݭm(5, nA$l:`\cKF:Nfo Eyv"Fj -ԒC'T($ %MVx:#Ywi "D>]K4)$Gm%tIl3ta`wԵd,?cP|)? v=\Uj32I+1x37b|':"R۱+LWL~ۊm۽*|Ј=a1S'W)7ŏմV");؂~5]tpNGmzT NOk>;BӪ "B2ݽoQT |Z]Lʽ%˂i@4@oEX& '/w>jckkU+H KɆ1`g;x#3:h1r0>{O8m -Rm53:ei+8RA .]]}8@yOxc+?*T}ǷF#>0˯_@r0TYẈdB MYu(o\l˘ $0YoN=jtW_ %[ȑ~֮o7g}/}(v4K^H蘋!xw/ZvirHG4t*&aL@ d,j.`Jiʮiu3_ݴ>⼶Lr An)_-adVm+x[Զ Zvkss Ts(%L016jaڐjb >4|s` L+ 8H]`)}E8WΥD{yQ۬ߔ i\44YO|B)yEjMF]Ud'GEfn~-QY̏M_{a YT(ʰt 8QsEcrzn4fu,6zĵԶAH$s?˝[bk1BV2 t Opu<"D^U*z ;XЙ.&A9/.E=:t`NJ61*aV |cq0\Ec^HA.j.M d.+lB  G 0G=Zv;@O:Tk}=~#;CuV>f-gճ#6 ι8əNtnV\ ֏13F  6f*wwΣunӺцp_Wf*Am#i A.hEX-L:wld+<=̕{xjS73"+{(Lʦ%F.o;WDJ/zI"kݗ$MH#W }ć9F' 4x<㉴?`xj^Q5TXX ^01@j ^C8/`>[zmG3_ME F!6*iʣ{+oAC+MM rQDK.PdN Fʿtu~A%RW~خ#E~Ov"sO$R渢#{r^hE ;dЅx W8Zd'l:ĿGD2' n]>x`.$Dfl,6P>Z͎رEi'9q qOt 6.J#vcCH zGa, ^#]95 c\~ZޱR8O'E6N8b"<.fh3T5`1Ze82c[f}7XrY\fV3wsBfSsj/jmȸC,zۋ:&*>T/nUj78t ^ְjޚبbb0ݫCTOTRF p9'0X~?\gT^k+).vsI6uMz##wFqRT46EQ)4æb׍𰢯/5Nr_3d,(_靬w˖H"E`dCFcՉ|ezʼS&7eIn+wQ s1w,yG(R#8 %H1IQs^b獖ΨuZM Mx%u‰to&8{;1\/7󫧴]n$8.ΖzI&uDZ }Mg3{bK룦-,`3@46BmΥ'ʐkP]-V+)w&Z_JrYa>JZm@ $ ~+&+.d ,wzj kz@ =Q٨[X1*'p κ?Xd-`Lmq~N {r儔r3XF@6xi功_pN/ Һ$/C,r0e4URD& XFftv4eO>$v-*TP՘\)w0`@jBcۅO6MPr\7IvKOInA"ywCO\{{ZD{X7`5j8L}$̳t`rBbʹťvTc5gU'e@_r v2*e:mP4K&ڙV^a d7Ce7š(e/_͇$z%YYBy$\l'` ܲyֳ֤vT-bHk v/t.t4$/ԄODUp˕p1zA5<(}=k:͖,v#!yml*lzdhv,tSx^+5eذA*O_BаCFl-=ۃ וA].rx6#T9ly6N1z q"1? ˖l&}0Ya:ؼM> 豱׌ЇzrŸQ52ofY4nytTRt|>6RL8>Jͺz]2Nor61VKL~QaK_OQw#dGPV3Rly4f:e0(_}onFTLt{#N5֖?^ -4I H J>M8~"W@Isdu0sF12Q}cA*uYBݏ/[ كG{Mvbndx^B*jT{,lynmA}1\Jh1(|R>%OMED_6|,tEN#jVX\-%ۻv<_iyCX=.'M!0}Cc]'A)%:N^zI杌=#&i558;&.cX 5n٣΄qBQhj6g5D/ŭ&o{5WsB!B 7`Z+)|6> P]0RbQI晼F!kKZ1w͘ONmu!0lg% oqad.`Uզy#R'쎏 DB©\Z $R@0Ǵn\ˮ*V=s#?<ϬIn,A:,sw:28S$saPJD.o]9pAjxfȘꖅ:>Yq1QNJh:L}`Wtԙ؂BJjsyV1#VCkNh0?ZWPX_6m'000My1Wf  صTsiw9;5*"hqfdJ!]0pFl/zYW%RK Bʁq 2o>naƷc.]DJX);"~ė) q lzsh)R[n [rf,-9@şichw;Sj=6ͽt;"x-zh 'O9|c 2ڏ",Qj$!  9AF6skeNT7~؅)x+0"w Zd E IEmrĐ1~ȨfY1 ,y&_@_+6)Yݿ^o-*>8DT4N c;l[BZE`ȷ<º# ʃ1|ߙQ~n "IN*gYұqXϗ{m}N,[j[nĮu 64 TzIBDbW۝@ 9W+½uhƢqq<s@ՠfdG[xeV<-5\X5_d.BPDΗJB\3eWUQrNxi=#. LdA;7\}ĶLuV}~=Dx 8 Շ# SZ -= d'rI|U1jO .dúګ\`eqA M,P'&dO1C{4>RH<މ_!n]f@)hY/ C,2 C6fAӒ>L"(?҄QMu!ȉPgUhv$:)c`nHr'( OpuSBzg#|[@sxvet!hT(zʯ`^Wߐ3qԎU1Ӻ}IF/.Ѿdj[zʬp%L7q#3_r2aY0r*hXյ|<+dԺ|| /#f Q!>ZUvuGN/y;ej[?d g OIt}/.9ø7[ .!ZPѺ*sEX3͐8.u3f܀Hhz -SkfH(PZc{LSrW4fR^17TXTt {'._;l;d_" `65Sr{E{Zx# z\y]SNi 5T-3qLr!^< l]'>q6RROp1VL{*ZucZR Wl1I*uZ.)eWx^\',c`ngzEG C5uԍАOEsTXxV5m<`(ηh H[?6=%iԘz (/pyd&qj>/Wmoysw)/3U=q D: n!\ua 䣇ZN8X3iR"Q'9QُwBc=TV_ӘkL|\I49Rlҙ ob*iQ QMm3["WlS7ɫ{0y hzmT2rh[8[}`%J,3 2}WHK TR 5Յ}Qj >dR߼ިĖT[AƎV7tߛUd5> b "YDXcD-*I/`eJ4܊#gRrf>CQSM-kr&mf(\׷${c{ŘV*@8 7_"l0L=s C#&s tU ڞzKkcb-攪1cͨj0'4&XɎrMKw>~vW- FX5C3奄/Tzőw1bRd""jZ-7ٙ_)241|F46@ﯲHnSN),Ib͎5b]< y?$,&j&hoI,Rb|"!}[r3r~峑_çfowv>~3S2 b@F2]H?VOceez=~ܗZ+kSLȘp=vC> LUr1RJjB5"{#{*Y? HgOov6 EblG<5?Qe:/Cr`uuCL' gЛ`M RWjX`<~[tf >-5qLh}9itþ 9a.Pum`D;nfO))/k/Atw Th1zց#v'5 lEP!6óugr5<:8ه]9VQN ,sT 'z9TzjmZ)@!njH{: yçW+싫/:=VY;M"g| bLrGʜ⌈/aRTg:ބMKR =r(7MpZc\}r+ bU\3,mtL ,]q-J4YP$_M! 1J>gF)T(qh4ߜԍzhzwk0Xvs+P9ؓȧ F溫Mv9 }@ӊkbal}i2e8yUyEDБj7̃K?G98J-E{)g?Hߴ2@_oz: +UߚmH3ʽQ=WTA^bDC':50b&[HokTS2&#()% ?̚xg24]IKs%'Nuamx"a cf?sL Rp n&{O1tx`˗z܀|S)+ pR1Nfyj<3MnAj;R7,[1n}9joLЂ`0Bsy8Eu"YKf$)c| ߚEٴ)21n};:~ >k$#n{I 9d|J(c]?8gW7<I iv>&rW+~&zN9f-Pwݢ.8G`zEvZ7&CǐGF O)$ N\du sP퀼5H5.lGt.657Qv5=h*(=ݛ> #aq@vXk6#h4CBr0JIK8gXσ(q矍Fܧ\; !&)^}~/7:gw7HHXlpt[^]w_ "7&ޓ9=/׻EK}.T{PnQPPi4, :qI:*z*o\o#&T~@ק FЪByڏOl8FXi2|7#% JR7ր+ H |!;?yPOg\lq.}ᐰw! <ٌ3[xM%3 0b-RTszTLp :~D)Zy32$8]x(w ..9v0ɞ<^!z4MKKk&ڢ迌3$liçLt3F&mD/ >;3R;Jurq'ptfJ4kdΟETb54?M$2x%[>{6cF/U2t>{ٸ^* a[J2W6Y$M\Ba&% c5}N6|a~{%t8$*0gSH4h%v@LͶK} T|щnv)[yA/\xNx1AJX.֔p}XTn2*~{f*Oa@ f"z88I&ceG qWCnE\-`̻:;.>9Oִš0wV'MƐ[0VKOwV+ 2\J<6c'&t,!7I_F%20MO(+>c1 }Δdb୭&MJnvZr3Ccxk{YctIK̇K5FWw|GCL9zR+Y%9ВȜ gr1aQiß8Qhw:> ӿKI *'$VMWuS(*; > r8^Qs8fDڴU\x6H,7[<#EWy X 3KFח4n*g4{"c-B<&ꗠ_ 7%\ )Ilה0QаkF~ m- Pf3E# %E&*p :$0%kmTZCQ+1f#=$x#s{;*k;|U}.! 5s#I6#Rےy&(X̫!0l)+0|-^Zyy7CJ#p$n0KӞ-ezȒYҲ}6?0y0gm#hOXW*ʋ+;*KwL+%mO6Z kCO4cU JڥdO\PChlzZ{>X+˗/W3]?)L˅@!WA@N+ tmyRDQc=y3x Poa';-˥uiRpIU%uɱC^BWu{ _-t\`9s)]"$R|Fv.oeoTJ%0Yk6"TK1\[h2ujV@ȇ4UMy'v"qXQ 1΅0J_ayͷ5e_Zr^!ǫ-^Q 63C9Wnm_܄t4,C #?{lL J@]yTB^$M˻nP>"i>W<8w1ak;I}}wg:h=Tmi ] F:AdAsQ2 e(gqYF#J N:^<^|y}S]Q'#:ɱvdU΄~(U,қhJ)GX?%/w0c> ǯi6Uv'aqzNSo.[ Wr6b2"s͸ Pʪ 㘨lz`IoG;zha; 5Ε 'G }+#t7PH'{)7YExS߄+RUY7#E3S`xɅ 5K^A&>$냿ErU_(( !.>gήYq~%r_x}I(9T5l."Lءѯgqǣ>H1!bxŞ6smա{6{ XMl3\?͹M{˛L{ѽcͻߵh!t,'{~ bՋ Zt :g19jrkqr'8MÖÆ)SXC9e_:O6ޓp}E@o&|֍ W@\! @obቢ_la/XE zLbRIV#f8)EBM˂ICLb% Wň EM<5D ,e #];Miba `&!e0g<,- r9*?&A?t D-Q] ,#b5sߒ.l0hqHA ,Jv> '' MbCzUW q%EhQЍyȮ]m8* E=9E)`pT0`.0|w Z0n71`Yr,FO?^`3?Qp[8H`ɗ܂t [dR%l %)Ag\4!ao{\f5W<4iaA %!̭ чe <Ś)HP0}i8bǒ2m:@<|ڽN3=_ c;t%k̡0-hmqZT[;x>)񚘋?~8aľ)4ȾSQ # siEI&Kx:K۳X3wubd^2Fs]< [9QjP0NG5ԮYS%8]{ f.CCv]=uTM|gWd^]yIҊoVLURg)OI+G#ȟc|O3!kVcȗ4nuɕan}FEH!,"gOY׹;,EtkVElr2!ZMOXĮ%AVLKœyj̯u.tyIte ^l;T~UEi?CY?m!KPt9j`)k^alaq-!Q&wD'/F1ɥr M}.C. ,* yW5~ػ`_~DfpD%3Mſ|1 *XcԘB}mNr;ZsE7e|PZFZ,T{:Sma AHU򶊙B+$̹<kN{FkcWmX>QRFIk<7=Wx۾n^1U:F^$ F[tBGUQY mrU˗;OdhpxfG6m4c -5XoE=a.j3m8ywcV_ ðQA_( Oxȫ l AcF]CatܨW {$Ind A.B&upbg)K/!4X0(Z=>IgƉov&qgzekYϝ +)æucG0WOČrs4Zw%\6Y`GϯgkV~`[GPo}%_.=q+үNB"@/h)w_ ׭zc42)Hj;z}d-nY,A<B-Ȃ2ʔzhSD I62zl* }\0n3n=@iGU3 ֮ۄem0˧d]QҀgU5 xS`i+ۉiǸv Ķ=Bf=Afgx BWbҩs9iSdY36훬)ӮS: 0^N y+2 j}I4+ 0$ј}öxORQ Q45;{_H~im R~܊E&8f)_6SK=ǜa"|Kt*WE }iPT+X僸M2g64hA>_V*FoS*Λeup4X6`!ǂSbe\Ik YS~zUj qVq|8ou+#hQ4JYwvkȸ5PZ *cXi!yꌐjo/TKRd!#XV'Z!0 =n0c*ݦS@ cj@pCnSՕ&JG73-`t&]lu[ HU2Z54O" Ff*utO枤M4+fP.^i?,GNVEy:e.axV)9f3<сIUlB*rlM7dr7t('M9}sc Ǧg͔p$D0 :KHP $ Cv&gnqb?m{8P>َZ3w4;GMhORSKvXkIHm(+&W5ivA?LDgi Z pˉ@&pG6t A!1@l}HFpЛ*FoѝxQհ` ڏE@ fj~|{YLK0o!juI Wgd:\C2$dt|Gdِ|R hHxwG<cP !NC4?pٜܩ#o@G5N/ pJ-f.*\?$c>0z2EseU(]^,1͓x&a.Bbmh4 8>}۽kfr̯Ϩ2@t.`R.kЏ~_j벜f /J+I6 !'Q8燤; ol>g."MqC4{܂|PHzy-zFͶ6-umCEwQT;2hoܷnpf["W6GjwS08y&\KXp^E}ݖǧ2Pi uAB-Ԁy!|*(,P+$3(< K5lȞxqMe+LV^(ٯ@);$ (@mn }&=)u9ū4ԎP1F l2;pV#ɱK~S=}+1(]d\aN-6#- 5"upF:*O夘3 D`iqE@,ukhV IMжJ \Y8,ӣL~ )<QR(\]c7&Y M0AJÞ'2{X2BTMG#OGQdbȺ=^eحi_Z'Ԇ < lGTRS.e"<=i)@k]InF#sHtl*%_ERD@{JjnLO%⡂ ?ÕX㡆r'(4K6n!St:=3 BqW/4jKZRѷW, ՀKrrtCq9Kn:xB:V.)'+/9wF (QcWKeoGܐw(zz,KH3<1$3m1$[e|Nዧ>!g TVg w8[7V~ ɰz+˒U?zbDۨF Sg[Jædx 6t{E2FʴU.f(^QfRg/Yc>[ =1PDd0k}knA116Y$.Sc\嗉a^x| m@)a)ʻZBwjD'ܕVޢz~JSYOU9۪5Fq1q;W7.5% XL@4nIu?)|,iq/4FF }0z&q)j蔓y{fS)Ҳ6EfnP=_~N3P j;UGWҊq@aNO}oiYHXd2K.F\VH_np*o pc9 &&?ormgW[7t:ߩϷZ"**j.'$'֪ K/I'F~_-B>}ݡՋvʀ'}Ov"A-q=Ah]`-b5a Xd2lqd8pUrtVڽod6LEB="׶Л<$k9ys]~` Zk˶ g,lB{|Qicj!feH24y%^ Qes V}Q"UID7GjIRZ@O!t6q!=CZ̏Y Ÿg2ʢ e\sJ?(j7/} _!Ψ@~(:c,w miJI5ˑ*'hM|+Fɮ_DzUabؕ5B46KG_2907RȟӉOFÀA>D=bdH][vẸLK6,"or}}JO^׷i$oHocIg2pO():NetV~{7DosU8Hys(aO3_EqºXr .[ƊF =aSP (6X Da'܎&?NnH΍+5L;ėx,W{t }g 'LpG>5p:$0 [UCW$ӛ% x##|3D(F=`e'\[G Ě~KV[̫0XSqZ%cYrVX[Y׬IӔamb2KC0Κ4a^#*befm|,wO m5 #b71{5Mt(γ[Q-ɟWY_=险(o[t̓ƓK",l# Ň_N>a}ej4 gɀX@yey$?牑x4E`J*6G*SVIGV鼯ieUq;dp8:nRZ<+Sw;LvJ%<$4 5bIJ|N 5_ |D5->PUf"ݭ"~HЎ0y{TaKaap.HZgO.*N-^9.C6g4ڇ(paύ2G-"8x0]P6[flmu0F. H|偗)>>85'S"hG`SοipU_+=-vO m_|Vo&Vgꛯh>F aċapn$!Sg4$/x@c-f'Wl^' jIcoG\DvѿZ-ŮЫva`.2嗢;տA~w\`y&)XDwp' ^IsyOCG,V,ęBD`;1O.@od90 V-3n&6fy,'+P*{ ^sbKiYZojPڙH6(@ rwuZ0&` WϮx|`bMH[D6l?[@oAm䙾@{y7A@y0|e _"p%$ҙ[ Mfk{z$6~|X`lZY%E nlޞo>$#V=m(˜ > :gH(iO/UTWYs]q6ӗs+|gkҼwjt[cI #tK\TBcO iBIU׿^ޙ,k V_3~W[Nk !5N "G4fj/*O%UҨk̅!6:údw%1x 3bTЍ{ /D}C{h 4fW3.qBAB@ZuOs_h㲢Y5AkY9`xB%W5$/50UqΏ`,L3BO&#sʷ$wn|-h%b7jz^H3d ,"MF5ܤ]B t %RDJ]oRNߵL;R(ُ:I9Q 1adN0<F1_@=ԑ, 4/{a,<5sUBMrr@r˝n}I!)稆.S^a+ruN><nLD5m#'&r !7He+aSYU}N<1ƽ J/2/A9g  ֩w|9 k5Nr`TSr3qɯ9պ R\]%D:۱8~Ƚ\>qA2@*` `1q [k4wk4dY!+#y۳8 exr[ts,]*:a$F󣈸_PD7qV!Jp4oHxׂeјIWSM9)G ':C xfGSw6b )_eC8Kys'@dC2)A*;%Ϳʛ=NVq:_u7M `(=[wڒJ;Y}#e@, CB_Pn?〹aP=&&k)"_s"+jW$bؗenO!ؽz$IXѬ+R:ܐ4 ʈNj'9Noۡ Yr֬ [r}-[!D<,-&׻-Esg x֠!yZ,'닌ؐ֐x788Q5ban+$jٶɋfR?w D#L::E*Vxض`ao0MU+zMM^G.HϏO-=n @A0F0YE3+c I$ E:ɀ &c6rPvBbє߬cM7t…Ϩxa}y2MpJ+PKSH/]}_c˜mg%1#M;Gڪ\Pʌ2A5\O~&2;+l&@Aq~aU@aR{DKb0sUB,$UD,7 v tC5 cӄ)kR ZT_}ٮLwZg0 !:iN/I̚=6xIu*{!ۂJ~q_ tQ>U1iIK_zܘfFNYPݮg5NKkWgf<&TmQ{X섍4UC@j !ǜW Rt+\ 1oث~xH֛DžNz^BJua$̗}$ߏMxJÎ9PWh:o.+zdהW{5^uSgDC<脦[p2Gj`R 22gȈ*C Y d }WmT. =0&|QQњf3?8`ѻuy*;C)[)]=J4Gi#G6-3ђ/XS38NDA+.K<7 ~Jl.qG6rzI0`{0!=vi~[f {yHsGI`R%Uy[,@pA߫_:\j^V5A!:KO.tSu LlhL! =|;AkIrH2n Hq䬬ǛOΘp%{|4Oǘ\^>꠬PyEzn`:hxkɍgxŢfHR13.-~TM/Ģf}k)I|p鎕lSYFxf}mVa.&+N4?ckvhıtMvd!VgX"/6T?0zcRMTT`Rjc1CfuE-wF_j9u? _b߽!PI3o`\/y;=mCD(; P cʑJ ;t+  =%a^u~{֨vLQ)M At0}-Tey?\^F)k($t|JlH,iIr[DY_K1jػjz iyJʸG S!iT2?{Zb]YV~K.vT|#<% ukU*a~X?q ꠙOV7v?GlT현[Xxrx42&l${Xf}fX@,Jt&`+0E:n6277blѾB/Ulv~w mp kw`37 067Vvj~4Ѩ@55dCuvBE2Eӽ$\ JeGG>PkG #>h*mWYjDʠCAŐuT(1.z5h:}K%Q Gw4aJhHguL=UF1Z;P ;!xtVNG ]>02C(_Ϩ xo΅`*ԪtOk{tE0Wi2K*>G9Z̭ C?cӉLNP++Jk _q*kA;^2!VF߿̻_qSqn=dsuȐ1߭I<雈~%xLsAZg`͠tߟ< u̪v`)[={{C}>RP-v7X2 v8=k}@:-SF%S ̇[>Щ7] u5P54  ]q+cm {(wP= 2E\Celsa0<+=a&P ua]!-tĒ'Tu.nZLbhZlݒYzS{L*l,_p9ȑmlóAHB}wgJn?S][V^sy"3(,|lW+k֖¯V%Ca$Ľ .НY+΁~(&z `|Yvu_)xy-^$ݪ̧Y#+/=z}0vÐ]^Rf#zLlCmj}"֤=Y*Z^;F'`M>.}3:UwE[pLfd0iHgWi=@,807/MKHh8xvE㎀d_Xkd17Hw|n}"P`l1y;}/kla'۽9A(RDƿQ?N`司ffj*@4Z =S'o{.f RoQlٲj%T7(,~NUL;N[Y g_ƚxټD.ũSTYJ'_PO˅(tAVV;P&]2QIK∰4sLն`5 ; ,-vQ`JoT&"Jd wW&Uo*M=(DޗNC60FaŰ]#1yMa*QowL9/xp:Fsr,oZv<#QaHJ/0b e]OGn>A鈓w'qH|3a!*3DnZ@"K T捋XD s/KVx:!!}E(ɺ#~VwPn#ku2*Fc@ X;9/ɦt&;ֶeyHZpIsa9D/ 9|:QNQ]"L q7'Ykh)|x٣xbm!`Z}1Pj2ߠ5]Qe o[9(%Z!̱:]b&{ }Do/ٕX){#Uœ u]:ƽ..}[`g UloPM:K,4&fOz42O9 .CWNKDߐ.<\1 G-%u,7`%q6E}kz30<.I(JG38~SFp>,iDWU`Cx̳VwN ')빾OjW7ڍ'_F퇐!CV&ו6C ZۧB难f$*@ⱶT+jOOP%kZ;khFiMy\L4uԠtǁ*+ +^HpjpM]6Ŋ|l3 7ḞtB}xkY/\23d^QS KMxK2L\YNiQS3*3aW9c&xUKimD m]r-YڍGF/LE_Ҥ+A>yI7dYJ^#‰K\7mſ{vu|iޣ1;!T3|Jc9Џ9"i\WQRH$b[IA-aH(|).m 0#T C Ƶ)D*~ʖ/1Gm-֏۱&T2f0ٰwәD}CJZr^.,ɗĴ ѪxC]Z̬;J*rnT0$4э xYDn.d 2/Ƿ3np%0v_ RVMَԞ€HE<՗]oINUJCr&,"e+U흊 If/E*C:t?pI5mEPy F ŅDk*m]rٴ5"KUu7w_cHkߐǨ.gp&"vAn. R#) M\J$X0)Zb3@E΁ڗRdF^',f+v8'A#B j7{/|Nb>_b&pp A6UR }^{o[3w.D8=% &`Mg80t9ȯVi*MhyZ]u^շLJcdο{|M 'WF >ahS50-W{a4ZPLri2BH1 h𖍷AOKU`VnӨ/QY̅ -"j#\Ok lZGYѳ-j" bP"E#akjv{>ľV+Yцk+]`AH,UYUq2z-IC]:G_ij/ba]W ;), sdc}tjF5̈́N[ҫo(a_o8_3˕Fr,2C-7/C}%FNޔ~&:uǻ!?Hetl%x3c 5WNN7J 5hk8W,؜gfhU;'a_HyÑwTj Z𖙁աT9p DT 6e6[8zEsCz;QNLkG;d>P "1kidKt{&F)&I6EUzB[\Z@Ӵ"܀4I]\srV78X*8x"񌟝(YĈRY"P)kc4 &U Z+hEpo%&T=L}`گ+TÜ>Ozd{|;JYYrό?&}ҮƱZy%sDr]4A)IՖ.Y'H<@ p= GenID~0etJ:h2&vjb):+3-TߜqHAA in˅B* p?uxmQH#M$+س`x{N7ू$=p\n4=ͫm>=7{ ѝrrj2ǀ0T)Dޙgga!0&n&IO J6r'H_ͤ@B 1+z֑K >>nBAWbc- ]QS7Xq( T.Cs\3k%O,n#u'()j2%}p…|}[;ɧg/VD<5=Jpvfz9um[C)W ƓVAӄIS,&y,<2QWLhHix͡G@-ɥaf^bhs=Ғ8?gS`5^o5{- ^TP09Qv Y6}+q!ɭi6>9E n][= $L)Funǫ?sO;\O4̹r_ihyw E ɟ {qQ~&[ *;J)k3Ct%e{-xT/ʑvєaO.L CdOK"ev:IG~gk o/ɨ4kSt&D7C/̫؉-S읝w'ב彫 6^: SCfNg2pv*=%#~3Y\\od蘚7g9T|Vm8gDi1/F |3>oMYG*uי'~ρ8en&Qغrh;ӢF{RhLGh(5|r,se~|)l?Ŧ=~Χȣ'fRlas=3Hņ40 e~ݳVc|J Tݗ C{5 2",<47u7ݧC\j}Qzח *CEC"{ 0, W~_ ʢ3)̯䶣E6 04ѦеvG Xfmz|[zZѢ @9["]{ (T&mvG4 Ct፾Rm{Xgx{2fRKd F@HCPNI +\VS=nԈˎ5FڻWD% %#&ԄrK'SVRos;1:-}#6InAsZNuGѣ]C'kvD& `O06I)vAܸ>^+dunf!̸\aF}8J &-rhk=-2ҼCId=Q-XQo#_@WmW4nc.:pvɼYR81lsY4* p8h AOw/wg^qIDu'l&"tTd _:cz~H< DTTe~HCỊ+"Y`@۶QPXqfϟN# QHV?#jJ+'7[DŽR;߳8H8 yޮc c Dq eϺՅdxa~[^68>=$Z. !2ae; h]ݯJaWpޢlY=y_%-srO_XOL|7;ܘ; ̪ uLq&!S¢v8I]v h(9 `~z ĕ ܵy-=Gpɉ(ʓg75ad(Ve޴ 品.y!uX! P@\f)'4p#I[QqC|lOx9C |QX mOڦ0Qê3-z{ j6iZ^>E^O䯆:eҕNIRezLy%9ۖ XM9eJ+T#H3ծW#hK*qh[ϖ|28YDŊDe>$!>/6e i|Z΢woM4nn(As[-:za=k  %zǛ(٪ >1ƙIp'n^[;@b  ߹0u̺tj,M*ٿ7hMKE@ x U3JgXz'MFu4N~w,՜$P$06Z~Qb9/ GQMGM\_?ϋG?|(#7;sf8_gI]r7ŗ`-7f ٙ9\A~xm4IWP JU1O)]dip<8U޿*v!'QZ٨Aﳐ3ir.&m &z@ (8 Y44JaQ9T?KoҐK_CC'X"0MԉCb!6%ȼ-M>!j[0R;ΪUa _p L2u)7z8+ld kkM_3}s48}q =FZXp8nb碕'!+kp:w;Nb#LFc>9NpNc᠇r .<+~8z 8u8Jv-W#6X GMP^ }t Z3Ddvhs㛹-fSLX/f}ѷhgYn ]+I  QWd]f60sh& E {uU-|~śGir!X%Ĥwލ3!G{]M. ǖpZcFD_c- O\{9CyavJa8Nۙmnv^(JHSfRr9E;6Mi(u G. x@^㲀w[F 5xY9ܙK`fм`S[y`Q d|JkJPb+ L c}Oǂ//SN̛caxC}9[+gS#jX:xYCKN#寮#Zk>T#PM8/}prn+F9C7f`w'ƀ6\ّzS _ žlISR 9onJZ2)i7Fm^%!̂+=MR=0WbϜ\ ߧ$ K°d&qnRB֌ WEe!$+CK;J֩oԝMNzui7&tlBq]5R#f'0rVhYuWte^>?s/ =^0HtR:VLqlƲʎLuanǏC/F^QjKsB' E$ -|j*r3P8Q[;N@rhf ʍ\-ebgc0\UE%`#ybQxozFsNtZ ^{亽I>fν yQX9Y%o[|ITSM@i/3k_\!p5O;h!@ ĒXhQ/9e/1~Nx;}b[.^UJ{Ff4o-R5.<~ύnXpo qiVW(MRd3N9_DsjPI+k-(Eϭi=qGd/躙P *Yo$?tSOa6?w`ݲ3TwGp0!.qSNҌCI:W yiU˖w^BRKJ31#N^ǾX+L,P.C(O9ݔnC RN^*;«2mS69 Q3{ b~9NɖuY$kM4E 5W< ol(Ź pEk Z~9ln>uJl_]d*9DY(y b7# @RDH=r޶<Lj|vYc0L*CyHT-GUGw,jC()s;|UB $ >d'+7)O{QcM2Aa5GL2'<)amMZVЌU+_H}QQXGW ;Z)lõ u:jI_/I]=G#BUT42k uI\_98)tSzqcF:_`=#sy!)wR9EN'Oq} ޙ:;P3-i<=vs 4kvyJ_^@+Ry8 )R] :6;@ʂ MIՑ…:y b-V+g6%\ E~'ՑqK:"*! y]yE>۩Ž[gF25l5WFziLʎďTG 1Z} VY03S&+:_d`2OX*NWO?*҆Wt>I':AvApbʐ+>:pP"XZ"cؕ] ۬"_ͧ8 q g1ԧ>(!4R5YP/}L@  S V66ـjjw+l}gh$4P%rV^`y>jh}rЬ5Dg )an"@(xB5f'L^dr^mQΉl M ȗƒ_MlAǶjS .C&xRT,hFgMѡ* B"?` šD% |Ԇ&qQa'w:.{&8G18LDݾQM/դ]$4DAF] n ,Jv8ÚtPSPŤޤ;||=UQ,soSwd|~U`Ӯߺn,yvΚ5>FL#f|qƊ:T//tD>cx /&:p3CK%0]t6J]- d.c$֗wTO~-Չ$%*8 uZ>u鴯+woLI)m=HF2Ue=ez-ȳn"h}fth0@X7 iPj0 d|c} ց $Lr_]NhQkʟ}x?6dw98@6 JL.)~ HQ,([޽(Bbp0.gk##w fg+Z*Rzr|t]"q}H6ǜb|unQ"/Kv7K.澍42s@dP /!1fL'na{-]I%Hd6SfU,Yq-ij^{G&fxс<ㅣVP քa0W "*qk yE) :B=h8ݚ?G$pOMqGDF87}=fDƍȂzl:N鏗x;~MB+oL'gQXcJun?) ҁHM\[pCut֧T&Զ]V1*2O9&ZoQ"&2'Clcwqr ǟ*$ q#?"֥,4>q$}*j6?CwDmdtpqΐ dw2gś cR;"hncdOv ^A6htPvU(8ڌ/!E~? u}2#^Asȍ >=6VMe2rTq -*9iŮg7mG A#/K򝫻m1ُޣc~@Ѷa|ѝ ^Ŗ[A;{ໄEPd" < ׇ g hI\vBkٓZ^)ԽDe&TtV@åokut|k[=_/Xѭa5JcDNQ/<cHw}V0כձyifdyY8n!0 D7!jdt-(0P? ZˋVNB$SG"k`<\=6h"gh[y/֣rϤOI`M)JtGUD(/`^j87*6cj·g.;GX9?-#9I!jRxm{}u4&M!AfkTWaGR⥛&2 [z6nGЈjRh^VGi 6#'QFhan nvS 9r%RxMV-\^m yErͽ"UMonbΣm c2Eܢ#V$yX') ,khnJcPF3XҌkمsh[*!}C< EZyUUr 'j !?WL(mwH<^v,wM崇@(TXt:N1I z;ĬBK )+zl=1ܧ/pU7+wM7:f`BQ,4b[S足nq#kF%S(qmK5(YcI4G8kT%xc(3u lkγc0lWjEќ+ibMM7&SQ|d*X00O%Z!@"# +VBLQVm%tU'#[VU؅Q(y̦<xb&ti9ӡZD!m(.U-bfKL0/x .(eQиyM)o{匐AD" zEuЙS^W.rmRr]~[!6ESCү*ZTn;+ղs.(xFĆș('g%ޮ):&J7Ӓ[gvYِG&߃,Zh9A_;ch2b74QLw]3[6jVjՕ҄E r.#\Гf$S򾀆\C((]v)b)Y,jY,^ճ ϟ(YiYcU@?<''l=n_NgbI8ț/)<^\ u'X{Gě9&28:+^glUl܉Tve9O7=SndSR}! x;%# An-fHFjі֯U_BhDȑc(IQ(tM̈́8VZ6^1G5YJ!-NI5Vqg)gl{~*P @A}=͜Sl= 7m0= #Y3sY1[apyP&,ܼ>]w'Cg^5-ӺA@NAO;C@r|)[Sp`1𷨠,~(\ӷsn 躳LK3HVա0]0V)0LddJ &y6t@p2Ԛ<>XuEpd@2%[̣Vd0 \: fJQ.)4oP0ղ5S\ZayGJ_6z+dP\HD^ȨOO cC#vUBoqItE$ٝ̋0Zn]!@%ihڅ8ɓ[)#: i߱y. M+Q hHIѭ(gi)xG6P?{)T5V>ZFj> i$ebO"]Ze bLAW' >n,ݘ~_3ȏAnR^8C,#ý:œˡ-x0!zC7>M^{N}[eyKh5Q {ߋK/S@p"-x fA\sۀ/r*F$_k* gP)5<W[oBϠpʢtxcu{Y_}=^KOf)) w5;{Mg\hFrz$)g ;Hc$T:ݹ(VW?`=2 Q9wO3} !Fbkҡ4m#u0t넿pHΏxoRk.1D> ĵ[ԯnn'{l@A^%|rrۛm;L~&2 vBtl m!'*wZyѧ,FZn-z]+Jd0cn6IC^{ˀcY1U Ё^=4_SY Jy&ejIvFR>(uNU^^cAQ͚xmHg1%~o'h!ᴼi Aϥ<RHb̔ۅ3C$2-.*x'h^\xn!Fjq*(l1-PN虅H׬eq`xHu]Ѭu',i9 &҇#,3DA劧֤ @hࡢS=󔓩BE_qA]B|eD$ġ|1U.S$yZ^+q;7\B~.bNUg3.FWQuGyR? GcUڙi|/z55FU+79{gx*gޝQ*L9HɧjByjQ%$𿺗QA}dۻXK јx˄@eُD5+W^XC1դ䦴=5"_^ k#[zs]$Qf(m" Ůr%0Q6댓p3 2B)mI?8h鴮3[_ ̜YLS2ȗH-X{e:о/5К2apgf?$}<}05N,,ҥ`l.a2.Û%JU\i!c2;EЙYP!ɂ~U6|&+ϦEg0_ 1?v~hqzNYؿNZ JMP0A\ Փ LfyV7GCʗ~?ÿc[!_Oo#zPYkFȪsO٩ 班tŸlCEss(,r.qȥqO^{Y>z zaܹE`oYdxr@<2V#A;2ݾ-_r]?D\)AҘ_B2Rn_ubsE>+_|XlcyX3(s(@Dt]PqYf p 5Lm:PBAX ܚ`Wui&nYKFb )ؗYry[(D .>sŠԃ+ӭ$*ݬϴ9A4IxCBKd~oFT_,[ϫ O%CbINkj"fGozC=%q&;[`f֝뾷nR*sJ\Yf2044>g˩>Ceֲؐ_~g79 "ԃ|87Js,8Յsq/WNީ.stl*KnXsF]t c>`x}G, uzaVyǗveH-ߤ\<RTNM]+\1vP9;-\J#x)|wRㅷsr$YO'$.7!zczo[crB+}!P,+](:'W8)W]4NC!5QDK i{*> 'n3v;vNc%~]b nhONF҈VH^psi2\fAWZI3ND9][$Y.1E}kPa!hV;E`FxBqvZ}'V^đ(Ƚ𨄻mXkP_F(n :Ʉ;I Oplꑯ% r`__ 6e ~:D> wYn}^pnTQ3j0Z4 ?WnuttNH*}wul([- JF. `r[2秦IlЧp&O.aK18#[lj쑟fBnd߽|%$zDk)$F [:6q@6>f:%H+5qJՁdaISI_* ֬&7ƮD7椭 =vn?+[ξqqMQ#1ߌc)XI׮l.+x7B+L!2GDܢMg( {/|bx e-o+dKPAq/L1=\9Prg*{má@J͡I6^9NIJÜ1L IFi9ʦȪ>똻4[!D c^OYVU g {B5S)>}-.AcHE/-A7I{l0mhοTSv8@gQ9s,q:9T =?C?,\o\M|&}uF!qۏzAwIŢ{D!'U ‹$ mrٌ)N Xml]A#nj.#-[ /:~/DO8W0 ϶9?s4$oC}od:VCS7 > Ӌ[g~ŽV ;},6u!X\ U:+nz_2dX7<56\yB.ĹH-+HncHlˇ¾r`X9J;(0|ݰ64zuW2J]yJgcvL;mh:(|ĂWvAQØxp72.r /,-u5C/UiLUm)u.x<3Be/I冗Sx,&6ⶫPMfmR=ƴNbTfE_Unlvwdst z脟($ӧ\R6XCk[8Uz)uLL0(7K5J=+߇̓$N^6$ t3߄YdOE Y[+N%hf"\Ǒgh}>"xrseRחP7>