apache2-mod_php7-7.0.7-61.1<>,.݉\ "/=„q)S#4!+nODdr4v+N\]lq' lERӍ>"ZX[rj~PӲ_|rC!}}'y(ۑ]gK8T+Q pL:ݒ i~c)/8핹!U>q΁ d-\f-`X?dx}-r 9}<\?l>ZPd5v?$D56]RN.v9t\![ۊ>A@?0d  9 (1 JnF    h l| $$ $( 8 9:">>?F#G8HHIXX\ YӐ \]^becdՕe՚f՟lաuմvwhxxyֈz),Capache2-mod_php77.0.761.1PHP7 Module for Apache 2.0PHP is a server-side, cross-platform HTML embedded scripting language. If you are completely new to PHP and want to get some idea of how it works, have a look at the Introductory tutorial. Once you get beyond that, have a look at the example archive sites and some of the other resources available in the links section. Please refer to /usr/share/doc/packages/php7/README.SUSE for information on how to load the module into the Apache webserver.\ "cloud123FopenSUSE Leap 42.3openSUSEPHP-3.01http://bugs.opensuse.orgProductivity/Networking/Web/Servershttp://www.php.netlinuxx86_64#some distro versions does not have this tool. if [ -x /usr/sbin/a2enmod ]; then if a2enmod -q php5 && ! a2enmod -q php7; then a2dismod php5 a2enmod php7 fi fiif [ "$1" = "0" ]; then if [ -x /usr/sbin/a2enmod ]; then if a2enmod -q php7; then a2dismod php7 fi fi fib qE︁A큤\ \ \ \ 0052141f594b97a38c9f68435d8b2f365d72ab2b82b62cf065bc2d83c728efae6006ad274d01ae0e62232b3e76c805dcrootrootrootrootrootrootrootrootphp7-7.0.7-61.1.src.rpmapache2-mod_php7apache2-mod_php7(x86-64)config(apache2-mod_php7)libphp7.so()(64bit)mod_php_anyphp-datephp-filterphp-pcrephp-reflectionphp-sessionphp-simplexmlphp-splphp-xml @@@@@@@@@@@@@@@@@@@@@@@@@@   /bin/sh/bin/shapache2apache2-preforkapache_mmn_20120211config(apache2-mod_php7)libc.so.6()(64bit)libc.so.6(GLIBC_2.11)(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libcrypt.so.1()(64bit)libcrypt.so.1(GLIBC_2.2.5)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.2.5)(64bit)libpcre.so.1()(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.5.2)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.11)(64bit)libxml2.so.2(LIBXML2_2.6.5)(64bit)libxml2.so.2(LIBXML2_2.9.0)(64bit)php7rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)7.0.7-61.17.0.73.0.4-14.0-14.4.6-14.11.2\\@\@\+@\\M\~d\R@\[[:@[9@[9@[e@[2*Z@ZZ@Tk@Tk@SSSvS׌SǺSS-S-SSg@Sj @S`S`S_@SE6@S>S&RRR@R1@R@RSRRG@RG@RG@RG@RG@RG@RG@RG@R@RpRZ@RB@R(r@RZ@QMQ@Q@QKQ@Q@Qzl@Qzl@Qu&@QnQkQkQ^QJ@QJ@Q+R@Q@P@P}L@PvP;a@P;a@PO@Ot@OX@OLO-O*zO#@O@ObO yO@N@NxN2NN@N@Nu@NdNbNZ-NS@NENA!@N>~@N;@N98@N6@N5CN/N*N@NNN@NpN@M@MM@M@M@MM5@M5@MWMnM@M@M@M@MMx@MM@MwkMgMc@MS@M.@M*M*M)@M%M PM\@M\@M L@L@L@LLY@LXLEL@KQ@K@K@KKK@KRKKK0KVJ1@JG@J#JJ/@J@J@JJQJ@J_@J;}JB@I@pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comPetr Gajdos Petr Gajdos Petr Gajdos Petr Gajdos pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjcejka@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.comjcejka@suse.depgajdos@suse.comjweberhofer@weberhofer.atpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comschwab@linux-m68k.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjimmy@boombatower.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comjimmy@boombatower.compgajdos@suse.comjimmy@boombatower.comjimmy@boombatower.compgajdos@suse.compgajdos@suse.comaj@ajaissle.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.commrueckert@suse.depgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comschwab@linux-m68k.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comadaugherity@tamu.edupgajdos@suse.compgajdos@suse.comhrvoje.senjan@gmail.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comRalf Lang pgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.comjengelh@inai.depgajdos@suse.compgajdos@suse.comadaugherity@tamu.eduadaugherity@tamu.edupgajdos@suse.comslavb18@gmail.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgpgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgpgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comcoolo@suse.compgajdos@suse.compgajdos@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.organdrea.turrini@gmail.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orglang@b1-systems.decrrodriguez@opensuse.orgsbutler1@illinois.educrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgchris@computersalat.depgajdos@suse.czchris@computersalat.depgajdos@suse.czcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgro@suse.decristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdimstar@opensuse.orgvuntz@opensuse.orgaj@suse.dejengelh@medozas.decoolo@novell.comcrrodriguez@opensuse.orgcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decrrodriguez@novell.comcrrodriguez@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.decoolo@novell.comcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.de- security update - added patches CVE-2019-11036 [bsc#1134322] + php-CVE-2019-11036.patch- security update - added patches CVE-2019-11034 [bsc#1132838] + php-CVE-2019-11034.patch CVE-2019-11035 [bsc#1132837] + php-CVE-2019-11035.patch- security update - added patches CVE-2019-9637 [bsc#1128892] + php-CVE-2019-9637.patch CVE-2019-9675 [bsc#1128886] + php-CVE-2019-9675.patch CVE-2019-9638 [bsc#1128889], CVE-2019-9639 [bsc#1128887] + php-CVE-2019-9638,9639.patch CVE-2019-9640 [bsc#1128883] + php-CVE-2019-9640.patch- upstream bug #41631 is already fixed [bsc#1129032] - deleted sources - README.default_socket_timeout (not needed)- security update * CVE-2019-9024 [bsc#1126821] + php-CVE-2019-9024.patch * CVE-2019-9020 [bsc#1126711] + php-CVE-2019-9020.patch * CVE-2018-20783 [bsc#1127122] + php-CVE-2018-20783.patch * CVE-2019-9021 [bsc#1126713] + php-CVE-2019-9021.patch * CVE-2019-9023 [bsc#1126823] + php-CVE-2019-9023.patch * CVE-2019-9641 [bsc#1128722] + php-CVE-2019-9641.patch- asan_build: build ASAN included - debug_build: build more suitable for debugging- security update * CVE-2019-6978 [bsc#1123522] + php-CVE-2019-6978.patch * CVE-2019-6977 [bsc#1123354] + php-CVE-2019-6977.patch- security update * CVE-2018-19935 [bsc#1118832] + php-CVE-2018-19935.patch- security update * imap_open script injection flaw, CVE-2018-19518 [bsc#1117107] + php-imap_open-script-injection.patch- security update * CVE-2018-17082 [bsc#1108753] + php-CVE-2018-17082.patch- fix segfault in pcre extension, CVE-2017-9118 [bsc#1105466] + php-pcre-replace-impl-CWE-680.patch- align patch names: * php7-CVE-2017-9120.patch -> php-CVE-2017-9120.patch * php7-CVE-2018-14851.patch -> php-CVE-2018-14851.patch- security update * CVE-2018-14851 [bsc#1103659] + php-CVE-2018-14851.patch * CVE-2017-9120 [bsc#1103661] + php-CVE-2017-9120.patch- security update * CVE-2018-12882 [bsc#1099098] + php-CVE-2018-12882.patch- security update * CVE-2018-10545 [bsc#1091367] + php-CVE-2018-10545.patch * CVE-2018-10547 [bsc#1091362] + php-CVE-2018-10547.patch * CVE-2018-10546 [bsc#1091363] + php-CVE-2018-10546.patch * CVE-2018-10548 [bsc#1091355] + php-CVE-2018-10548.patch- SplFileObject::getCsvControl() returns escape character [bsc#1090133] + php7-splfileobject-escape-character.patch- security update: * CVE-2018-7584 [bsc#1083639] + php-CVE-2018-7584.patch- fixed memory leak in pgsql extension, php function pg_escape_bytea [bsc#1076970] + php7-pgsql-memory-leak.patch- security update: * CVE-2018-5712 [bsc#1076220] + php-CVE-2018-5712.patch * CVE-2018-5711 [bsc#1076391] + php-CVE-2018-5711.patch- security update: * CVE-2017-9228 [bsc#1069606] + php-CVE-2017-9228.patch * CVE-2017-9229 [bsc#1069631] + php-CVE-2017-9229.patch- security update: * CVE-2017-16642 [bsc#1067441] + php-CVE-2017-16642.patch- Fix Wrong reference when serialize/unserialize an object [bsc#1063815] + php7-fix-wrong-reference-serialize.patch- Fix namespace encapsulation of imported classes/functions/constants (bsc#1057845) + php7-Fix-bug-66773-66862.patch- php7-devel requires php7-pear [bsc#1057104]- security update: * CVE-2017-12933 [bsc#1054430] + php-CVE-2017-12933.patch- security update: * CVE-2017-12932 [bsc#1054432] + php-CVE-2017-12932.patch * CVE-2017-12934 [bsc#1054408] + php-CVE-2017-12934.patch- Soap Request with References (bsc#1053645) + php7-insert-more-derefs.patch- security update: * CVE-2017-11628 [bsc#1050726] + php-CVE-2017-11628.patch * CVE-2017-7890 [bsc#1050241] + php-CVE-2017-7890.patch * complete fix for CVE-2016-5766 [bsc#986386c#23] . amended php-CVE-2016-5766.patch . refreshed php-CVE-2016-10168.patch- php7-pear should explicitly require php7-pear-Archive_Tar otherwise this dependency must be declared in every php7-pear-* package explicitly. [bnc#1052389]- security update: * CVE-2017-11142 [bsc#1048100] + php-CVE-2017-11142.patch * CVE-2017-11145 [bsc#1048112] + php-CVE-2017-11145.patch * CVE-2017-11146 [bsc#1048111] + php-CVE-2017-11146.patch * CVE-2016-10397 [bsc#1047454] + php-CVE-2016-10397.patch * CVE-2017-11147 [bsc#1048094] + php-CVE-2017-11147.patch * CVE-2017-11144 [bsc#1048096] + php-CVE-2017-11144.patch * regenerate parse_date.c from parse_date.re + php7-date-regenerate-lexers.patch- fix for CVE-2017-7272 was reverted [bsc#1044976]- security update: * CVE-2017-9227 [bsc#1040883] + php-CVE-2017-9227.patch * CVE-2017-9226 [bsc#1040889] + php-CVE-2017-9226.patch * CVE-2017-9224 [bsc#1040891] + php-CVE-2017-9224.patch- security update: * CVE-2016-6294 [bsc#1035111] + php-CVE-2016-6294.patch- security update: * CVE-2017-6441 [bsc#1032155] + php-CVE-2017-6441.patch- security update: * CVE-2017-7272 [bsc#1031246] + php-CVE-2017-7272.patch- security update: * CVE-2015-8994 [bsc#1027210] + php-CVE-2015-8994.patch- security update: * CVE-2016-10161 [bsc#1022260] + php-CVE-2016-10161.patch * CVE-2016-10162 [bsc#1022262] + php-CVE-2016-10162.patch * CVE-2016-10158 [bsc#1022219] + php-CVE-2016-10158.patch * CVE-2016-10167 [bsc#1022264] + php-CVE-2016-10167.patch * CVE-2016-10168 [bsc#1022265] + php-CVE-2016-10168.patch * CVE-2016-10166 [bsc#1022263] + php-CVE-2016-10166.patch * CVE-2016-10159 [bsc#1022255] + php-CVE-2016-10159.patch * CVE-2016-10160 [bsc#1022257] + php-CVE-2016-10160.patch- security update: * CVE-2016-7480 [bsc#1019568] + php-CVE-2016-7480.patch * CVE-2017-5340 [bsc#1019570] + php-CVE-2017-5340.patch * CVE-2016-7478 [bsc#1019550] + php-CVE-2016-7478.patch * CVE-2016-7479 [bsc#1019547], CVE-2016-9138 [bsc#1008026] + php-CVE-2016-7479.patch- security update: * CVE-2016-9933 [bsc#1015187] + php-CVE-2016-9933.patch * CVE-2016-9934 [bsc#1015188] + php-CVE-2016-9934.patch * CVE-2016-9935 [bsc#1015189] + php-CVE-2016-9935.patch * CVE-2016-9936 [bsc#1015191] + php-CVE-2016-9936.patch- security update: * CVE-2016-9137 [bsc#1008029] + php-CVE-2016-9137.patch- security update: * CVE-2016-5385 [bsc#988486] + php-CVE-2016-5385.patch- security update: * CVE-2016-8670 [bsc#1004924] + php-CVE-2016-8670.patch * CVE-2016-6911 [bsc#1005274] + php-CVE-2016-6911.patch- security update: * CVE-2016-7568 [bsc#1001900] + php-CVE-2016-7568.patch- Conflicts instead of Obsoletes [bsc#1001950], [bsc#999313]- security update: * CVE-2016-7412 [bsc#999680] + php-CVE-2016-7412.patch * CVE-2016-7417 [bsc#999684] + php-CVE-2016-7417.patch * CVE-2016-7413 [bsc#999679] + php-CVE-2016-7413.patch * CVE-2016-7418 [bsc#999819] + php-CVE-2016-7418.patch * CVE-2016-7414 [bsc#999820] + php-CVE-2016-7414.patch * CVE-2016-7416 [bsc#999685] + php-CVE-2016-7416.patch- security update: * CVE-2016-7132 [bsc#997230], CVE-2016-7131 [bsc#997225] + php-CVE-2016-7131,7132.patch * CVE-2016-7129 [bsc#997220] + php-CVE-2016-7129.patch * CVE-2016-7133 [bsc#997247] + php-CVE-2016-7133.patch * CVE-2016-7130 [bsc#997257] + php-CVE-2016-7130.patch * CVE-2016-7134 [bsc#997248] + php-CVE-2016-7134.patch * CVE-2016-4473 [bsc#995512] + php-CVE-2016-4473.patch * CVE-2016-7128 [bsc#997211] + php-CVE-2016-7128.patch * CVE-2016-7127 [bsc#997210] + php-CVE-2016-7127.patch * CVE-2016-7126 [bsc#997208] + php-CVE-2016-7126.patch * CVE-2016-7125 [bsc#997207] + php-CVE-2016-7125.patch * CVE-2016-7124 [bsc#997206] + php-CVE-2016-7124.patch- security update: * CVE-2016-6128 [bsc#987580] + php-CVE-2016-6128.patch * CVE-2016-6161 [bsc#988032] + php-CVE-2016-6161.patch * CVE-2016-6292 [bsc#991422] + php-CVE-2016-6292.patch * CVE-2016-6295 [bsc#991424] + php-CVE-2016-6295.patch * CVE-2016-6297 [bsc#991426] + php-CVE-2016-6297.patch * CVE-2016-6291 [bsc#991427] + php-CVE-2016-6291.patch * CVE-2016-6289 [bsc#991428] + php-CVE-2016-6289.patch * CVE-2016-6290 [bsc#991429] + php-CVE-2016-6290.patch * CVE-2016-5399 [bsc#991430] + php-CVE-2016-5399.patch * CVE-2016-6296 [bsc#991437] + php-CVE-2016-6296.patch * CVE-2016-6207 [bsc#991434] + php-CVE-2016-6207.patch- security update: * CVE-2016-5772 [bsc#986244] + php-CVE-2016-5772.patch * CVE-2016-5770 [bsc#986392] + php-CVE-2016-5770.patch * CVE-2016-5769 [bsc#986388] + php-CVE-2016-5769.patch * CVE-2016-5766 [bsc#986386] + php-CVE-2016-5766.patch * CVE-2016-5773 [bsc#986247] + php-CVE-2016-5773.patch- updated to 7.0.7: This is a security release. Several security bugs were fixed in this release. - our bugzilla e. g. [bsc#982010], [bsc#982009]- added to sles12, [fate#320127]- updated to 7.0.6: This is a security release. Several security bugs were fixed in this release. * removed upstreamed php7-no-reentrant-crypt.patch- aarch64-mult.patch: fix asm constraints in aarch64 multiply macro- build for sle12- correct public key- updated to 7.0.5- firebird builds now- update to 7.0.4- updated to 7.0.3- require postgresql-devel < 9.4 for sle12 to fix build- more versioned provides- update to 7.0.2: 31 reported bugs has been fixed, including 6 security related issues.- update to 7.0.1- php5-pear-Archive_Tar provides 1.4.0 - install .depdb and .depdblock files along metadata * php5-depdb-path.patch - versioned provides in subpackages- Provide obsoletes for sub-packages to improve upgrade process.- Obsolete php5 since php7 conflicts and should replace.- marcello at ceschia.de: fix path php-fpm.conf- set pear's metadata dir to %{peardir}- Spec cleanup * Split Archive_Tar from -pear sub packge to allow updating this part via rpm * Added "Provides: php-firebird" to -firebird sub package * Added "Provides: mod_php_any" to server api module packages - fastcgi and -fpm- test mod_php with %apache_test_module_curl - restart apache during mod_php upgrade- add php5-fix_net-snmp_disable_MD5.patch [bnc#944302]- fixed segfault in odbc extension when result set is containing NULL (php bugs #52554, #53007) [bnc#935074] (internal) + php7-odbc-cmp-int-cast.patch- updated to 7.0.0 * see NEWS for changes * see UPGRADING for 5.6.x -> 7.0.x transition - removed unneded or not upstreamed patches for long time: * php5-cloexec.patch * php5-missing-extdeps.patch * php5-format-string-issues.patch * php5-per-mod-log.patch * php5-apache24-updates.patch * php5-crypto-checks.patch * php5-systzdata-r12.patch (new: php7-systzdata-v13.patch)- updated to 5.6.11: Five security-related issues in PHP were fixed in this release, including CVE-2015-3152.- php5-systemd-unit.patch: set Killmode=mixed in order to ensure fpm and children forked by script can terminate cleanly.- mod_php5.so executable- use apache-rpm-macros- updated to 5.6.10: Several bugs have been fixed as well as several security issues into some bundled libraries (CVE-2015-3414, CVE-2015-3415, CVE-2015-3416, CVE-2015-2325 and CVE-2015-2326).- enable apparmor support: new BR libapparmor-devel- update to 5.6.9: Several bugs have been fixed. - systzdata patch updated to r12 - php5-systzdata-r10.patch + php5-systzdata-r12.patch- update to 5.6.8: Several bugs have been fixed some of them beeing security related, like CVE-2015-1351 and CVE-2015-1352. - refreshed php5-crypto-checks.patch- configure php-fpm with --localstatedir=/var [bnc#927147]- systzdata patch updated to r10 - php5-systzdata-v7.patch + php5-systzdata-r10.patch- build against system gd and libzip only for 13.2 and above- update to 5.6.7: Several bugs have been fixed as well as CVE-2015-0231, CVE-2015-2305 and CVE-2015-2331.- build against system gd [bnc#923946]- build against system libzip [bnc#922894]- update to 5.6.6: fixes several bugs and addresses CVE-2015-0235 and CVE-2015-0273.- added README.default_socket_timeout [bnc#907519]- fix sle_11_sp3 build- update to 5.6.5: This release fixes several bugs as well as CVE-2015-0231, CVE-2014-9427 and CVE-2015-0232. - removed patches: * php-CVE-2014-9426.patch * php-CVE-2014-9427.patch * php-CVE-2015-0231.patch- added php-CVE-2015-0231.patch [bnc#910659]- added php-CVE-2014-9426.patch [bnc#911663] - added php-CVE-2014-9427.patch [bnc#911664]- update to 5.6.4: This release fixes several bugs and one CVE related to unserialization.- update to 5.6.3: This release fixes several bugs and one CVE in the fileinfo extension.- update to 5.6.2: Four security-related bugs were fixed in this release, including fixes for CVE-2014-3668, CVE-2014-3669 and CVE-2014-3670.- upgraded to 5.6.1: * Several bugs were fixed in this release (including CVE-2014-3622).- php5-crypto-checks.patch: Fix broken libcrypto checks DSA_get_default_method is in -lcrypto not -lssl - DO not use xorg-x11-devel, just pkgconfig(xpm) and xft - Support WEBP in the gd extension by buildrequiring libvpx-devel- fix CVE-2014-5459 [bnc#893849]- actually, there's no point to install pear from other source than from php tarball * remove source install-pear-nozlib.phar- updated PEAR to 1.9.5, bugfix release see http://pear.php.net/package/PEAR/download for details- updated to 5.6.0: * Most improvements in PHP 5.6.x have no impact on existing code. There are a few incompatibilities and new features that should be considered: http://php.net/manual/en/migration56.php - removed patches: * php5-big-file-upload.patch (upstreamed) * php5-suhosin-php55.patch (upstreamed) - modified patches: * php5-openssl.patch (refreshed)- This release fixes several bugs against PHP 5.5.15 and resolves CVE-2014-3538, CVE-2014-3587, CVE-2014-2497, CVE-2014-5120 and CVE-2014-3597. - removed patches: * php-CVE-2014-2497.patch- updated to 5.5.15: This release fixes several bugs against PHP 5.5.14. The list of changes is recorded in the ChangeLog or http://php.net/ChangeLog-5.php#5.5.15. - removed patches: * php-CVE-2014-4670.patch (upstreamed) * php-CVE-2014-4698.patch (upstreamed)- security update: * php-CVE-2014-4670.patch [bnc#886059] * php-CVE-2014-4698.patch [bnc#886060] - php-5.5.10-CVE-2014-2497.patch renamed to php-CVE-2014-2497.patch- updated to 5.5.14: This release fixes several bugs against PHP 5.5.13. Also, this release fixes a total of 8 CVEs, half of them concerning the FileInfo extension. - removed php-5.5.13-CVE-2014-4049.patch (upstreamed)- security update * php-5.5.13-CVE-2014-4049.patch [bnc#882992]- php5-5.5.10-CVE-2014-2497.patch renamed to php-5.5.10-CVE-2014-2497.patch to be consistent with other product php patches names- do not package latest_test_results.txt; instead, run build-test.sh twice: before and after source changes- updated to 5.5.13: This release fixes several bugs in PHP 5.5.12, and addresses two CVEs in Fileinfo (CVE-2014-0238 and CVE-2014-0237).- updated to 5.5.12: Fixed several bugs against PHP 5.5.11, as well as CVE-2014-0185 regarding PHP-FPM. - improved build-test.sh- build-test.sh: use relevant api for build; propagate build parameters to osc- php5-gcc_builtins.patch: remove unused patch- add build-test.sh and latest_test_results.txt for testing regressions in tests before and after update. Run sh build-test.sh after changes. php will get built and test results will be compared with latest_test_results.txt and differences reported. mv latest_test_results.txt.new latest_test_results.txt if differences are acceptable.- updated to 5.5.11: * Several bugs were fixed in this release, some bundled libraries updated and a security issue has been fixed : CVE-2013-7345.- fixed CVE-2014-2497 [bnc#868624]- updated to 5.5.10: * Several bugs were fixed in this release, including security issues related to CVEs. CVE-2014-1943, CVE-2014-2270 and CVE-2013-7327 have been addressed in this release.- Fix build on non-systemd distros (esp. SLES 11)- updated to 5.5.9: * This release fixes several bugs against PHP 5.5.8. * see NEWS or http://www.php.net/ChangeLog-5.php#5.5.9 for details - modified patches: * php5-no-build-date.patch (refreshed using quilt)- updated to 5.5.8: * fixes CVE-2013-6712 and build against freetype2 * see http://www.php.net/ChangeLog-5.php#5.5.8 for more * removed CVE-2013-6712.patch * removed freetype2_include_dir.patch- Added php5-freetype2_include_dir.patch: Fixes check of freetype2 headers, as freetype2 2.5.1 changed the header location- updated to 5.5.7: * fixes some bugs against PHP 5.5.6 and it also includes a fix for CVE-2013-6420 in OpenSSL extension - > removed CVE-2013-6420.patch- security update [bnc#854880] * added CVE-2013-6420.patch- security update [bnc#853045] * added CVE-2013-6712.patch- updated to 5.5.6: * fixes some bugs against PHP 5.5.5, and adds some performance improvements. * see http://www.php.net/ChangeLog-5.php#5.5.6 for details- updated to 5.5.5: * This release fixes about twenty bugs against PHP 5.5.4, some of them regarding the build system. * added sys_temp_dir ini directive - removed custom-tmp-dir.patch (upstreamed)- updated to 5.5.4: * This release fixes several bugs against PHP 5.5.3. - crypt-tests.patch partially upstreamed - use zend_extension instead of extension directive in opcache.ini [bnc#840350]- updated to 5.5.3: These release fix a bug in the patch for CVE-2013-4248 in OpenSSL module and compile failure with ZTS enabled in PHP 5.4.- updated to 5.5.2: * About 20 bugs were fixed, including security issue in OpenSSL module (CVE-2013-4248) and session fixation problem (CVE-2011-4718).- updated to 5.5.1 * bugfixes incl. security fix in the XML parser- replace php5-64-bit-post-large-files.patch with php5-big-file-upload.patch patch that uses def_t instead of signed long as suggested by upstream- updated to 5.5.0: * Added generators and coroutines. * Added the finally keyword. * Added a simplified password hashing API. * Added support for constant array/string dereferencing. * Added scalar class name resolution via ::class. * Added support for using empty() on the result of function calls and other expressions. * Added support for non-scalar Iterator keys in foreach. * Added support for list() constructs in foreach statements. * Added the Zend OPcache extension for opcode caching. * A lot more improvements and fixes. * PHP logo GUIDs have been removed. * Case insensitivity is no longer locale specific. All case insensitive matching for function, class and constant names is now performed in a locale independent manner according to ASCII rules. - buildrequire cyrus-sasl-devel explicitely - suhosin-php54.patch renamed to suhosin-php55.patch- update to 5.4.22: * About 10 bugs were fixed. * see http://www.php.net/ChangeLog-5.php#5.4.22 for details- updatedto 5.4.21: * About 10 bugs were fixed. * added custom-tmp-dir.patch by Per Jessen- build with --with-fpm-systemd and install systemd unit - php5-systemd-unit.patch: tweak systemd unit for openSUSE requirements - php5-openssl.patch: only openSSL_config() is really needed. - Recommended for 13.1 and Factory- updated to 5.4.20: * About 30 bugs were fixed.- updated to 5.4.19: * These releases fix a bug in the patch for CVE-2013-4248 in OpenSSL module and compile failure with ZTS enabled in PHP 5.4.- updated to 5.4.18: * About 30 bugs were fixed, including security issues CVE-2013-4113 and CVE-2013-4248.- php5-per-mod-log.patch: It turns out that requesting per-module logging support in 2.4 will not do a thing if the expansion of APLOG_USE_MODULE is not visible to all files of the module so place it in the header instead.- php5-per-mod-log.patch Support apache 2.4 per module logging - php5-apache24-updates.patch Use proper API in apache 2.4 to determine when the module has to be loaded. I made this patches at least a year ago, but for some reason they went out of my radar and were not applied to upstream Will be submitted again soon.- updated to 5.4.17: Core: Fixed bug #64988 (Class loading order affects E_STRICT warning). Fixed bug #64966 (segfault in zend_do_fcall_common_helper_SPEC). Fixed bug #64960 (Segfault in gc_zval_possible_root). Fixed bug #64936 (doc comments picked up from previous scanner run). Fixed bug #64934 (Apache2 TS crash with get_browser()). Fixed bug #64166 (quoted-printable-encode stream filter incorrectly discarding whitespace). DateTime: Fixed bug #53437 (Crash when using unserialized DatePeriod instance). FPM: Fixed bug #64915 (error_log ignored when daemonize=0). Implemented FR #64764 (add support for FPM init.d script). PDO: Fixed bug #63176 (Segmentation fault when instantiate 2 persistent PDO to the same db server). PDO_DBlib: Fixed bug #63638 (Cannot connect to SQL Server 2008 with PDO dblib). Fixed bug #64338 (pdo_dblib can't connect to Azure SQL). Fixed bug #64808 (FreeTDS PDO getColumnMeta on a prepared but not executed statement crashes). PDO_firebird: Fixed bug #64037 (Firebird return wrong value for numeric field). Fixed bug #62024 (Cannot insert second row with null using parametrized query). PDO_mysql: Fixed bug #48724 (getColumnMeta() doesn't return native_type for BIT, TINYINT and YEAR). PDO_pgsql: Fixed bug #64949 (Buffer overflow in _pdo_pgsql_error). pgsql: Fixed bug #64609 (pg_convert enum type support). Readline: Implement FR #55694 (Expose additional readline variable to prevent default filename completion). SPL: Fixed bug #64997 (Segfault while using RecursiveIteratorIterator on 64-bits systems).- Explicitly specify cyrus-sasl build dependency- updated to 5.4.16 - Core: . Fixed bug #64879 (Heap based buffer overflow in quoted_printable_encode, CVE 2013-2110). (Stas) . Fixed bug #64853 (Use of no longer available ini directives causes crash on TS build). (Anatol) . Fixed bug #64729 (compilation failure on x32). (Gustavo) . Fixed bug #64720 (SegFault on zend_deactivate). (Dmitry) . Fixed bug #64660 (Segfault on memory exhaustion within function definition). (Stas, reported by Juha Kylmänen) - Calendar: . Fixed bug #64895 (Integer overflow in SndToJewish). (Remi) - Fileinfo: . Fixed bug #64830 (mimetype detection segfaults on mp3 file). (Anatol) - FPM: . Ignore QUERY_STRING when sent in SCRIPT_FILENAME. (Remi) . Fixed some possible memory or resource leaks and possible null dereference detected by code coverity scan. (Remi) . Log a warning when a syscall fails. (Remi) . Add --with-fpm-systemd option to report health to systemd, and systemd_interval option to configure this. The service can now use Type=notify in the systemd unit file. (Remi) - MySQLi . Fixed bug #64726 (Segfault when calling fetch_object on a use_result and DB pointer has closed). (Laruence) - Phar . Fixed bug #64214 (PHAR PHPTs intermittently crash when run on DFS, SMB or with non std tmp dir). (Pierre) - SNMP: . Fixed bug #64765 (Some IPv6 addresses get interpreted wrong). (Boris Lytochkin) . Fixed bug #64159 (Truncated snmpget). (Boris Lytochkin) - Streams: . Fixed bug #64770 (stream_select() fails with pipes returned by proc_open() on Windows x64). (Anatol) - Zend Engine: . Fixed bug #64821 (Custom Exceptions crash when internal properties overridden). (Anatol)- updated to 5.4.15: Core: Fixed bug #64578 (debug_backtrace in set_error_handler corrupts zend heap: segfault). Fixed bug #64458 (dns_get_record result with string of length -1). Fixed bug #64433 (follow_location parameter of context is ignored for most response codes). Fixed bug #47675 (fd leak on Solaris). Fixed bug #64577 (fd leak on Solaris). Fileinfo: Upgraded libmagic to 5.14. Streams: Fixed Windows x64 version of stream_socket_pair() and improved error handling. Zip: Fixed bug #64342 (ZipArchive::addFile() has to check for file existence).- Conflict with php53 packages so zypper doesn't suggest installing a mix of php53-* (from SLES 11) and php5-* (these 5.4 packages).- Fix build on SLES 11 (no firebird) and openSUSE <= 12.1 (no separate libfbclient2-devel pkg).- use current install-pear-nozlib.phar from http://pear.php.net/install-pear-nozlib.phar - php5-pear package provides/obsoletes php5-pear-Archive_Tar, see explanation in the spec- add php5-firebird providing php5-interbase and php5-pdo_firebird- updated to 5.4.14: Core: Fixed bug #64529 (Ran out of opcode space). Fixed bug #64515 (Memoryleak when using the same variablename two times in function declaration). Fixed bug #64432 (more empty delimiter warning in strX methods). Fixed bug #64417 (ArrayAccess::&offsetGet() in a trait causes fatal error). Fixed bug #64370 (microtime(true) less than $_SERVER['REQUEST_TIME_FLOAT']). Fixed bug #64239 (Debug backtrace changed behavior since 5.4.10 or 5.4.11). Fixed bug #63976 (Parent class incorrectly using child constant in class property). Fixed bug #63914 (zend_do_fcall_common_helper_SPEC does not handle exceptions properly). Fixed bug #62343 (Show class_alias In get_declared_classes()). PCRE: Merged PCRE 8.32. SNMP: Fixed bug #61981 (OO API, walk: $suffix_as_key is not working correctly). Zip: Fixed bug #64452 (Zip crash intermittently). (Anatol)- libc-client.so needs -lssl- fixed 'http limits uploads to 2GB' [bnc#812800], see https://bugs.php.net/bug.php?id=44522 * 64bit-post-large-files.patch- updated to 5.4.13: Core: Fixed bug #64235 (Insteadof not work for class method in 5.4.11). Implemented FR #64175 (Added HTTP codes as of RFC 6585). Fixed bug #64142 (dval to lval different behavior on ppc64). Fixed bug #64070 (Inheritance with Traits failed with error). CLI server: Fixed bug #64128 (buit-in web server is broken on ppc64). Mbstring: mb_split() can now handle empty matches like preg_split() does. OpenSSL: Fixed bug #61930 (openssl corrupts ssl key resource when using openssl_get_publickey()). PDO_mysql: Fixed bug #60840 (undefined symbol: mysqlnd_debug_std_no_trace_funcs). Phar: Fixed timestamp update on Phar contents modification. SOAP Added check that soap.wsdl_cache_dir conforms to open_basedir (CVE-2013-1635). Disabled external entities loading (CVE-2013-1643, CVE-2013-1824). SPL: Fixed bug #64264 (SPLFixedArray toArray problem). Fixed bug #64228 (RecursiveDirectoryIterator always assumes SKIP_DOTS). Fixed bug #64106 (Segfault on SplFixedArray[][x] = y when extended). Fixed bug #52861 (unset fails with ArrayObject and deep arrays). SNMP: Fixed bug #64124 (IPv6 malformed).- updated to 5.4.12: * dropped sqlite.so (no longer shipped with 5.4) * dropped t1lib support * dropped %{suse_version} 10.x support * see /usr/share/doc/packages/php5/UPGRADING or http://svn.php.net/viewvc/php/php-src/branches/PHP_5_4/UPGRADING for details * source changes: D php-5.2.9-BNC-457056.patch -- renamed to php5-BNC-457056.patch D php-5.3.0-bnc513080.patch -- there's no relevant code in exif.c D php-5.3.1-systzdata-v7.patch -- renamed to php5-systzdata-v7.patch D php-5.3.2-aconf26x.patch -- dropped, it is not needed yet D php-5.3.2-ini.patch -- renamed to php5-ini.patch D php-5.3.2-no-build-date.patch -- renamed to php5-no-build-date.patch D php-5.3.22.tar.bz2 -- old tarball D php-5.3.4-format-string-issues.patch -- renamed to php5-format-string-issues.patch D php-5.3.4-pts.patch -- renamed to php5-pts.patch D php-5.3.6-gcc_builtins.patch -- renamed to php5-gcc_builtins.patch D php-5.3.6-ini-date.timezone.patch -- part of php5-ini.patch D php-5.3.8-CVE-2011-4153.patch -- fixed in 5.4 branch D php-5.3.8-crypt-tests.patch -- renamed to php5-crypt-tests.patch D php-5.3.8-no-reentrant-crypt.patch -- renamed to php5-no-reentrant-crypt.patch A php-5.4.13.tar.bz2 -- new version tarball D php-cloexec.patch -- renamed to php5-cloexec.patch M php-suse-addons.tar.bz2 -- content of tar balls are actualy equal A php5-BNC-457056.patch -- renamed from php-5.2.9-BNC-457056.patch, not rebased A php5-cloexec.patch -- renamed from php-cloexec.patch, rebased A php5-sytzdata-v7.patch -- renamed from sytzdata-v7.pach, not rebased A php-format-string-issues.patch -- renamed from php5-5.3.4-format-string-issues.patch, not rebased A php5-crypt-tests.patch -- renamed from php-5.3.8-crypt-tests.patch, not rebased A php5-gcc_builtins.patch -- renamed from php-5.3.6-gcc_builtins.patch, not rebased A php5-ini.patch -- renamed from php-5.3.2-ini.patch, rebased A php5-mbstring-missing-return.patch -- new patch, missing return M php5-missing-extdeps.patch -- rebased A php5-no-build-date.patch -- renamed from php-5.3.2-no-build-date.patch, rebased A php5-no-reentrant-crypt.patch -- renamed from php-5.3.8-no-reentrant-crypt.patch, not rebased M php5-openssl.patch -- rebased M php5-phpize.patch -- rebased A php5-pts.patch -- renamed from php-5.3.4-pts.patch, not rebased A php5-suhosin-php54.patch -- patch on top of suhosin-0.9.33.tgz to work with php 5.4 M php5.changes -- this change log M php5.spec -- new version, etc D suhosin-patch-5.3.3-0.9.10.patch.gz -- dropped, seems not be used for some time- updated to 5.3.22: . Fixed bug #64099 (Wrong TSRM usage in zend_Register_class alias). (Johannes) . Fixed bug #63899 (Use after scope error in zend_compile). (Laruence) . Fixed bug #63943 (Bad warning text from strpos() on empty needle). (Laruence) . Fixed bug #55397 (comparsion of incomplete DateTime causes SIGSEGV). (Laruence, Derick) . Fixed bug #63999 (php with fpm fails to build on Solaris 10 or 11). (Adam) . Added check that soap.wsdl_cache_dir conforms to open_basedir (CVE-2013-1635). (Dmitry) . Disabled external entities loading (CVE-2013-1643). (Dmitry) . Fixed bug #64106 (Segfault on SplFixedArray[][x] = y when extended). (Nikita Popov)- updated to 5.3.21: * Fixed bug #63762 (Sigsegv when Exception::$trace is changed by user). * Fixed bug (segfault due to libcurl connection caching). * Fixed bug #63795 (CURL >= 7.28.0 no longer support value 1 for CURLOPT_SSL_VERIFYHOST). etc. see NEWS for details- fix CVE-2011-4153 CVE-2011-4153 [bnc#741859]- add explicit buildrequire on libbz2-devel (having to patch old .changes file to avoid "double entry")- updated to 5.3.17: * Fixed bug (segfault while build with zts and GOTO vm-kind) * Fixed bug #62844 (parse_url() does not recognize // * etc. see NEWS for details- use FilesMatch with 'SetHandler' rather than 'AddHandler' [bnc#775852]- updated to 5.3.16: * fixes over 20 bugs, see NEWS for more details- updated to 5.3.15: * fixes over 30 bugs and includes a fix for a security related overflow issue in the stream implementation (CVE-2012-2688) [bnc#772582] and open_basedir bypass, CVE-2012-3365 [bnc#772580]- updated to 5.3.14: * bug-fix release, see NEWS for details- updated to 5.3.13: various security fixes, CVE-2012-1823, CVE-2012-2311, CVE-2012-2335, CVE-2012-2336 * removed php-5.3.10-pcre_fullinfo.patch * refreshed php-5.3.2-aconf26x.patch- fix license to spdx.org format- fixed build with new pcre (php bug 60986)- Build with -fpie- PHP 5.3.10, fixes CVE-2012-0830.- remove unapplied patches- buildrequire libjpeg-devel- remove apache module conflict with apache2-worker [bnc#728671] - amended README.SUSE instead- Update to version 5.3.9 * Drop already applied patches * This update only contain minor bug fixes, it is a stop over php 5.4.0 that should be out very soon.- security update: * CVE-2011-4885 [bnc#738221] -- added max_input_vars directive to prevent attacks based on hash collisions- add autoconf as buildrequire to avoid implicit dependency- apache module conflicts with apache2-worker [bnc#728671]- security update: * CVE-2011-4566 [bnc#733590] * CVE-2011-1466 [bnc#736169]- fix license - there is no 3.1 version of php license- build php against system's libcrypt, which drops extended DES support * crypt-tests.patch * no-reentrant-crypt.patch- security update: CVE-2011-3379 [bnc#728350]- Fix wrong PAGE_SIZE assumption, must use sysconf() instead - Fix integer overflow when attempting to use more than 2 Gb of memory.- call openssl_config too in order to load user-provided engine configuration.- Cleanup patches for upcoming release.- Fixed typos in php5.spec- Fix very publicized critical bug in crypt() implementation- Add mssql support with freetds - Update PHP snapshot.- Update snapshot, more static analyzer fixes.- Update snapshot, fix converity warnings- Update snapshot, several check if malloc() succeeded.- Fix build in Factory - Fix Segfault with allow_call_time_pass_reference = Off - Using class constants in array definition fails- Add sqlite3 session storage, this is no more than a forward port of already existent sqlite2 backend- Update snap, PHP 5.3.7-RC4- Update snapshot again.- Update snapshot.- is_a() function is throwing an annoying warning "Unknown class passed as parameter" which is noticeable when you use PEAR, fix it, if your code uses it you should be using the instanceof operator anyway. - Update bundled pear.- Crash in gc_remove_zval_from_buffer CVE-NO-NAME - Crash in zend_mm_check_ptr // Heap corruption- Fixed missing Expires and Cache-Control headers for ping and status pages - fix crypt() issue with overlong salt - Fixed bug #52935 (call exit in user_error_handler cause stream relate core).- Fix crash in error_log (strlen with NULL) - Fixed exit at FPM startup on fpm_resources_prepare - Added master rlimit_files and rlimit_core - Removed pid in debug logs written by chrildren processes - Replaced shm_slots with a real scoreboard- Enable mysqlnd compression protocol.- Update snapshot to 5.3.7 RC1- Allow bison 2.5 -File path injection vulnerability in RFC1867 File upload CVE-2011-2202.- Update 5.3 snap - Fix compiler failure that happended after compile error. - Stream not closed and error not returned when SSL CN_match fails.- Update 5.3 snap - Update bundled PEAR - Case discrepancy in timezone names cause Uncaught exception and fatal error. - SEEK_CUR with 0 value, returns a warning - Restore fix: do not accept paths with NULL in them- Update to version 5.3.6.201106031621 - Crash when calling call_user_func with unknown function name - Fixed double registering of browscap ini directive- Drop Update alternatives usage, there are no alternatives PHP4 is gone and PHP6 is not coming at any time soon. - Remove "mm" support from session module, virtually nothing uses it and it doesnt support proper locking, mount /var/lib/php5 in tmpfs instead.- Update to 5.3.6.201105291701 * Fixes random crash with apache2 SAPI and php_admin_value in virtualhost configuration.- Update 5.3 branch - Fix a few memory leaks - Check if tempfile can be created in phar extension - Fix problems with __halt_compiler and imported namespaces - Properly handle out of memory conditions in mysqlnd- Update 5.3 branch. - Fix user after free in xmlreader extension.- Update to current 5.3 svn version. - For practical reasons now the hash extension is built-in,hence deprecates package php5-hash, it is nowdays required by the session and phar extensions but must be statically built to work. - Drop php5-session patch, needed only to workaround compile failure when hash extension is built as loadable extension. - php.ini now clearly says that by "3" in session.hash_function we mean SHA256.- Update to a recent 5.3.x SVN version, mostly bug fixes * track_errors causes segfault * classes from dl()'ed extensions are not destroyed * Crash when assigning value to a dimension in a non-array * use-after-free in substr_replace()- fix crash on destruction. - allow openssl extension to be built w/o SSLv2- Add a default to date.timezone because php5 warns that this is a required setting and clutters up the output in zypper installations of pear packages and other places - Versions after 5.3.6 may make this fatal- Intl extension failed to load [bnc#659868] - Fix update-alternatives usage,will be dropped in the future.- Add tcpd-devel for building the SNMP extension on SLE_10 and apache_server_SLE_10.- Update to php 5.3.6 final * Enforce security in the fastcgi protocol parsing with fpm SAPI. * Fixed bug #54247 (format-string vulnerability on Phar). (CVE-2011-1153) * Fixed bug #54193 (Integer overflow in shmop_read()). (CVE-2011-1092) * Fixed bug #54055 (buffer overrun with high values for precision ini setting). * Fixed bug #54002 (crash on crafted tag in exif). (CVE-2011-0708) * Fixed bug #53885 (ZipArchive segfault with FL_UNCHANGED on empty archive). (CVE-2011-0421)- Upgrade to PHP 5.3.6.RC3 * Drop obsoleted patches * fix some rpmlint warnings * Hundreds of changes, see NEWS for details- Fix more date in binaries causing pointless republish of pkgs.- fix for macros.php o devel pkg must have Obsoletes/Provides: php-macros- security fixes * CVE-2011-0420 [bnc#672933] * CVE-2011-0708 [bnc#671710]- extend macros.php o __php, __phpize, __php_config, php_version o __pear, php_peardir, php_pearxmldir o php_pear_gen_filelist - add README.macros- security fix: * fopen_https_proxy_auth_fix.patch [bnc#656523]- export PHP_MYSQLND_ENABLED=yes to solve the mysqlnd problem when extensions are built shared. [bnc#661464]- Go back to libmysql as there is currently no way to build shared mysql extensions with mysqlnd. [bnc#661464]- Use mysqlnd driver, this is a newer PHP-native mysql extension, that does not require external libraries. Now you can use mysql, mariadb or drizzle without extra libs. fixes bnc #661464 and other old feature requests.- Update to version 5.3.5, Critical Update * Fixed bug #53632 (PHP hangs on numeric value 2.2250738585072011e-308). (CVE-2010-4645) Only 32 bit binaries affected, confirmed in factory i586.- revert unsuitable patch php-5.3.4-dlopen.patch- Add php-5.3.4-dlopen.patch from fedora,makes dlopen to use bind_now instead of lazy. - Compiler is now in C99 mode for both core and extensions.- fix format string bug in Phar extension I just found http://bugs.php.net/bug.php?id=53541 and the underlying issue, which is the lack of format attributes in several core prototypes.- Update to PHP 5.3.4 final * Fixed crash in zip extract method (possible CWE-170). * Paths with NULL in them (foo\0bar.txt) are now considered as invalid (CVE-2006-7243). * Fixed a possible double free in imap extension (Identified by Mateusz Kocielski). (CVE-2010-4150). * Fixed NULL pointer dereference in ZipArchive::getArchiveComment. (CVE-2010-3709). * Fixed possible flaw in open_basedir (CVE-2010-3436). * Fixed MOPS-2010-24, fix string validation. (CVE-2010-2950). * Fixed symbolic resolution support when the target is a DFS share. * Fixed bug #52929 (Segfault in filter_var with FILTER_VALIDATE_EMAIL with large amount of data) (CVE-2010-3710). * Key Bug Fixes in PHP 5.3.4 include: * Added stat support for zip stream. * Added follow_location (enabled by default) option for the http stream support. * Added a 3rd parameter to get_html_translation_table. It now takes a charset hint, like htmlentities et al. * Implemented FR #52348, added new constant ZEND_MULTIBYTE to detect zend multibyte at runtime. * Multiple improvements to the FPM SAPI. * Over 100 other bug fixes. - SUSE specific; * enable PTY support in proc_open (temporary)- xft-config is gone- Update to 5.3.3_svn201011020214 * Fix Performance issue, array_diff may take hours instead of seconds in some scenarios,regression appeared in version 5.2.5- Update to 5.3.3_svn20101027xx - Fix init script again.- update to 5.3.3_svn201010140300 - Fix php-fpm init script.- Update to an slightly newer PHP 5.3.3.x snap, fixes around 100 bugs including open_basedir problems. - add the fpm sapi to the package.- Clarify changelog this update fixed: * VUL-0: php5 new unserialize() flaw CVE-2010-2225 [bnc#616232] * VUL-0: php5: MOPS-2010-021: fnmatch() Stack Exhaustion Vulnerability [bnc#605097] * VUL-0: php5: MOPS-2010-017: preg_quote() Interruption Information Leak [bnc#605100] * VUL-0: php5: MOPS-2010-022 use after free [bnc#609763] * VUL-0: php5-phar: MOPS-2010-0{24,25,26,27,28} format string bugs [bnc#609766] * VUL-0: php5: MOPS-2010-0{32,33,34} use space interruption in iconv functions [bnc#609768] * VUL-0: php5: MOPS-2010-0{36,37,38,39,40} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-0{36..46} userspace interruptions [bnc#609769] * VUL-0: php5: MOPS-2010-047/048 information leak [bnc#612555] * VUL-0: php5: MOPS-2010-049/50/51/52/53/54/55 memory corruption and/or info leak [bnc#612556] * VUL-0: PHP5: Session Data Injection Vulnerability [bnc#619483] * VUL-0: PHP5: multiple heap based buffer overflows [bnc#619486] * bugzilla numbers 619487,619489,619469,609766..- Update to PHP 5.3.3 RC3 - Massive lot of security fixes see list here http://www.php-security.org/category/vulnerabilities/index.html- possible fix for [bnc#610633]- use FD_CLOEXEC flag to avoid annoying races.- remove obsolete buildRequires- remove build date from binaries so they dont get republished every time - fix invalid path- add missing patch, refresh patches with -p0- Update to PHP 5.3.2, see NEWS for details- Add php5-autoconf-2.65.patch to fix build with autoconf 2.65; it's a backported combination of svn commits 291283, 291284 and 291332. - Workaround old php bug http://bugs.php.net/bug.php?id=21153 by replacing -ledit with -ledit -lncurses in the resulting configure scripts. This became apparent problem due to libedit being built with as-needed now. - Add php5-bug51224.patch to fix buffer overflows happening in strcpy. It;s a combination of upstream svn revs 284097 and 284099- Remove unneeded gtk-devel BuildRequires.- Remove obsolete build requires of orbit-devel.- avoid alignment crash on alignment-sensitive CPUs (bugs.php.net#46074)- update patch to fix build- Fixed wrong harcoded mysql socket [bnc#544516] - Fixed wrong default include_path- make php5-pear noarch in Factory- remove obsolete patches - apply ini patch - enable mhash compatibility in the hash extension and obsolete php5-mhash - add macros.php to the source list- PHP read_exif_data() only returns the first letter of UTF-16 strings [bnc#518300]- fix missing return values of suhosin extension- fix build on CODE10 products- fix horrible broken open_basedir functionality- update suhosin extension to version 0.9.29 - mysql extensions now use mysqlnd instead of libmysqlclient. - enable sqlite3 extension, part of the php5-sqlite package - enable enchant extension - enable fileinfo extension - enable intl extension- add suhosin patch and newer suhosin extension for compatibility reasons- Upgrade to PHP 5.3, see http://www.php.net/ChangeLog-5.php for the huge list of changes - remove dbase and ncurses extension- disable as-needed to fix build- update to PHP 5.2.10 * Fixed bug #48378 (exif_read_data() segfaults on certain corrupted .jpeg files) * Added "ignore_errors" option to http fopen wrapper. (David Zulke, Sara) * Fixed memory corruptions while reading properties of zip files. (Ilia) * Fixed memory leak in ob_get_clean/ob_get_flush. (Christian) * Fixed segfault on invalid session.save_path. (Hannes) * Fixed leaks in imap when a mail_criteria is used. (Pierre) * Changed default value of array_unique()'s optional sorting type parameter back to SORT_STRING to fix backwards compatibility breakage introduced in PHP 5.2.9. (Moriyoshi) * Fixed bug #47940 (memory leaks in imap_body). (Pierre, Jake Levitt) * Fixed bug #47903 ("@" operator does not work with string offsets). (Felipe) * Fixed bug #47644 (Valid integers are truncated with json_decode()). (Scott) * Fixed bug #47564 (unpacking unsigned long 32bit big endian returns wrong result). (Ilia) * Fixed bug #47365 (ip2long() may allow some invalid values on certain 64bit systems). * Over 100 bug fixes.- add temporary backport of openssl prng function- Update to version 5.2.9, security and bugfix release * VUL-0: php5: memory disclosure by imagerotate() [bnc#480850] * VUL-0: php5: mbstring.func_overload set in .htaccess becomes global [bnc#471419] * Fixed a segfault when malformed string is passed to json_decode() * Fixed explode() behavior with empty string to respect negative limit./bin/sh/bin/shcloud123 15590392667.0.7-61.17.0.7-61.17.0.7-61.17.0.77.0.77.0.77.0.77.0.77.0.77.0.77.0.77.0.7php7.confapache2php.inimod_php7.so/etc/apache2/conf.d//etc/php7//etc/php7/apache2//usr/lib64/apache2/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10308/openSUSE_Leap_42.3_Update/7bec8294971f94fed7c7dfaf5ee1545f-php7.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxASCII textdirectoryELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=e04f4e4a971b8f7fb9fb9bae2ef8a05a6f7cf671, strippedPRRRRRRRRRR RRRR R R RR RRRRRRRRi6Q.H\packageand(apache_mmn_20120211:php7)?]"k%{=$+e'GqIY1u=?iZ|E$ǯ# 6.B*zvZmfl˳wp!PWB";a"*H uXhvt_q `KwbӐmV OoIP'(ڔ=Tjv? G%;䜸kp! 0ih/䚁-R %;og\~yV+FԏL +nyhmڳ!_A,!ox([4y1_.,]7l Klw)ʿ rYvWcA<(8*pV0"4m,2QS$F:k%:Z"z+{/0ɶqdATެS640U@xY) = ;KQ-DZػT)Url_nkVr +F9酸RjfXc>w"f.~9sQXLb4(n(eAт6M>&tXc`K*ZA([Lv`+w)#xT0-sIm\;Eaju9֘ьك50!'Jګj+84*—\+"-J{d",*5'w^9ԗ|%ڽP).!4="UV G~q <de?vUonƃxt5B¼QfN}OhMc"}A}-e;ڳ)cdkuɹʡ'bw<wn'Jd)o1ǂX_R(- [AcyFw`Dמs (TC~ROEm 8G:^$ª5w7O/`YA}e,sxTq }Kh@T:1lrkLN%c~؍|[2hW9`ㅈV. m$C&=A~xOX$٪EvP#AjF-@A9\Η vɊ|Ȳ}vULԦ6Gexd:FI6emm-Na(-Yqa _L؎WezgUP^tvfm7z]KVdߪng1|e;~VS垻`!'M&$@ 2׍Hr5S9i^!=Խ+>P1^${-gқ`@tޔ$fm˶/tܬcY͡ ursZ^}R.S7L=vرL45Xa8"qn4M;WBvxןxI$,д pGd,3b C;AŔVi@{QJ9AID>&i 4:O5.ybWwS`GEu= Og@^#24O]bi ‹Wi\';\7B#LԱ08k@D:J$,\E#KM^sμ_8LwToK+J:Y(.{G5[6RUGR!vxԆ$MLCܚ 9JFI6O9À -nl1?y k2Y>"d ]CN{ݝЬ<9a ?sK 0mdpVWd;-aYO72~dzPB4?d"Ȍ= ?ֆ۫S#\=bk(+;>]OX{"eF;bxkl/igg/L=ت4z{?[TM;j;nJ3o%µ#Wݯ2eoarMwUFj\҆ {C 8\Q8`[ZqW@YdD'FXDXlw͔+̡N{G[tύr;?9Pą˹jEV']?onW˜F-9%O.,8`PS2NþQAE0(^84OdҴSqfPh#/El[x bLfo ! )~K-m)31pбRmmD(z4ӲnT 6IfQI|y_Q LL! nB0„"5(I#}1z$}\t/Fn`D9vdb'.[S. i|ߧ4VhSB#YIo&hY^D ,0'Ҋ\dߴ)wnְop>|+PeT)~Ǵ2A^? sY.?X%ˮA)d0 |kwo* O֓Şko &jSjs:zOfl;O/i\8e*D fxZ;bmۜ¹<m]}`RW0n*;ɏ8gtoB/~O`/={d m5farKJ#u$ %6%c {1<*ɢxb(܉ȵX䕘$MX=Ee9qr@Bu4vB{SmEK՗uPglDsv{ŷB/ 8cj6yhj{LkcgipSt(L)k{],&&Zpf1 ?؞J9.ulҗkV VFY-YdiMџC(g)7* %dۑVsAʯCdLu7 ct1 ߓDr%> 3vFJtQa,ix/^t;A)瘳+mT&2@=ߟV޽| 8!⟟ ɰ6wNCZChCV6)]//3q"ӂvJl s:ldULjt{D3Ѹ5txmϲ`E]N+ҌIVo="Qe ,[:6~foh #B߲jҴ-i^lx>zC(SeFnc,s]R+|!5zwuY58Ƶr-kqc,⡹5bel=e` ,xwe,9 zRpd#6樁^G 6XvxAT\ n z|'k*U/lν\do::t-cj2;X#xW`Q%=4S +*KtiX7ϲmvvg0d/Yr4+}NuJ΀z&lB0Ty {ձ/ 42fT*oD ke9=c D{I,凜*?(04 C^ڐqN}q$ݝpj0s%/A6K7Zv`Dy2CP?"e`^;{Md 3LiGD V͏]8=oŠʢЏlyg4d-5swQrN~>#fo\#-lWc \{+bTpw_]e *oNz`hy0_,H$CZ3n*N)Ώd85OWgj}PpHc?%&l/Hmf* 9z(nIsv8: m7taԷϸ!fK\ݴ3!MJ:l%O4j-lϗo _RQqCgbc~5B >Ha/cmu 1NK]喏X\~ @<}%~8$zK?~|?ݺvW.qK938e~S}<ʙ齶JR["Ba}Z߭ۓ =r\\L4}lCr!owSga"JM=,'J}Stܫ6o4oX )&@ 8zQߌ& D@.UN(C{ܰ٤,_FPϵ۩kgf_Oc#-qR ch9"6CTԅthzlF_G͖v(|K=''[.8#G+/3^SRa~4o)琨PrR &;cE`A;MPc )*[GQ"M+xINᆷ511j^&eXH3QBgGxq-)x٥lO2 N>tvz/X#P3V/EW%ҾR> 24GKUQ3VJώ<^ ; #5,CR06DsW& KC5+cT.]4ˤ:$MOG!?}󯄼!G*Țr?WMgi3knAa0$Z:ᑥuV.@:MQtUF=LJ|0IVt).Y}}+IUu(r@n/`=m`ڰ+n8/@C+DԂU9ws36 `!j&RE1Cirϲ7'U~ur uT`;*Os[hnCk÷`7돳1zɲ36p;3O%xSTsgڤ=uV&ij{T?)(?iq|npZOWyhָ71\ Wz4]nf<5$U7q&&:O˗[PT5 l/Ci ZAIBgvI=fM Y ә *a}C=΅gEw Q.'ZITx;5snTwDLCL)'s~F (;:P.l337Ol1HD\B߳c@/kڊ)+GJOn9x`mpRRO߼7K /EYY77y/:Qt$kDZ Pnw&۔h*TeQ5'~lq]H%xXƖ/> %{`b#*;IPehs` ? fy$45pFJDG 'QR~^W"Wnt [um*55DJ*{}I#|m_N6cU1'YMCx7V%yx! ƨӝU !?ǔcK(sax=5k=oО؈:GHe"|q3݌7H؆'CV+@ͼzؠzfIoȵ&N}b[3+qK (b'#k:;d^o2O?ݬ0eKJeKy=6as{ @'P|D|yX H2_N%h\eg=Tjf z8 mvDȬt&H#!& Jh]PRr=y?S&8oR! |z]T쒺TP@xs@, {̊–N?]z(<w[ϏT4h~t[QxUǾ^ry+F׬0gt)kUN.829:@tH$?'ε lw6Ȱ`|iGB eDaQH;vLQV_,g9B:\$cOu}K/;1~36/6I̻EV I͝حW-C)_&2}Le4g[P2"|TNJ{;D s{a?ƺШ?t;W(?|x{ܩCʧ70׸g>9?x D(ue-sJ&^¼__PWD!UV:D&h W)_rVdEh?T /4>zm=hA2"u3x=<ҤL2CLj.ԥ7ϥ1UxH 9K(+E 1 H-eU~,O1bUX-)o`Cɥ!Շp prsi: v"L|9?/^a^0bW OSR8{ħ߯}1d!4C~E''@Tq!:ղe^nh\j˅+Ivᔠ6үx 1[`wdI9Ld/AנT\ P!~fϟDV?RR0ešw't3~1[&Zٌ.Тwi5bi̍}Rs˝m2`Y AKvߝݖϨw#ͅ){_Ŝc7=6m(:VOgkO.sI;a][:b ;2^-$ AcvkԃZPؕT$:ç’hӧF@Y6\ǬJ?%FBGr^PGuX)vXe+ĹSNjBLzV@ ouПx ./a0&̊n D= S@2b-ɬ`=v#cďmbQpNY;r)D-Jff·D숈 O-~D* #UIϧkv#p8*͎ :C]Dx c LX[rQ GU0_z{at#k|!CdMy~}A}0* Rᑙ]rmP"Eo}?1dvYc|{r[ Gy6|#juDd5BT]?<9&BF xaOW*$ʚ#ݪA:@Os^0um ;jaX !]H?<0UY?EI؍|>h-wOQhb/ 2pt(ZDDgaupFC*Ln_I@ +>c}he`I>gN5? ky eAAC0]b'iIE`2e=1W%d;Ȃ>Ly9>sdW&1+rwOk|$99on?i`2@ - t* *Mo%i0[Cm}sasZr *:U"k)-5w\@^~F#qz,Q|^\H 5{J>'/S]n"ǵ]k%&p"!`H/e\HKrus>rĚΏRdݕ:=,YPf'/iUk)]1Wp5ˬCh>{CQMA7#P]ZlFE3JOzrS/er83.8RSG'evaˎlA&2F14SZ M gFUԘw WW"86[4뿶DR[IRޠi418Mћhn͌' F &@&}_Z#^=VH~EE Vpau輶%)5ܠ0>MyevjGw/D t )KD6:i5ISD'=#n=iz靱 Dti&?YqG`t|l$~/;t!#)ZNV!cu=mk!:Q{d|eX&C-|BYD[m3qCޔy`#G|'D7; vPf"yS8ˎ.>0fa<G%1q_kT(<݉F}g:Ì RK=܊pc>9,ūC}@HfR^Hw,ZC&W'Fb?FG­̉*@B)h#e |L"2k9DBTb7wR-pxQ?RƆ4;UNc2EH&E % vVq9^۳=]?dB:cS9qr{ȥ#1+OhCFoeRi_]2l$ATY>|Iڔw֛n_um=Ani]vS%nP1K|♃{kذ#34. H'g5 oN{犧]Ʊh&6[~*k3ER+g!VJP23(fK-քIK_ElrX01Fsg/ER9ڴ ?cn;-૱83+9 ò߯ _CJXo*MjEa 5RҬu0j11.9S|elˆa";/ebww3UҌh8K-yWMHs WJq޵,6X>F#{-:@jvM3l??Zj&_u$ /DjYGo?])~~ZŒ 7qX^&\%fd(~4acRXB+D.qÿ}]x@Ht.Uۧe"D#U^ܼ?&2 Z*|7t6ŸlhwD񴀟( Z2 FT#s) R&58ս>t8r9xl1cA~$[$)R 5w-#JJ.l/! }:03%z``wTWJQE mGK\oͧz' a2*zuP&@7~%<%z#ӾF2'nCB~/h)(Ĉ(N|I仵(i욃XX SZT/qFv>?ue5F1q|㇫ÍnpMY |<9ՍMIˢ . ' L rN&^OߤП UϺD' Zoakq/ǚ+oȰ,8]NM,L8/e UѷMjCɒ"0J@Bó~0,K۲ ?i] wx'YۺEgUjAd[K!=V;A%A78`tNXAap;e"6XD0Bg$$p(7̀^ xZV b /R-M93*3QF2K{iytEK>XD6vBjs@oNr^݂ǶY7}Dd!!u/A#avGM^-?~75LA .> VѹpPD?QЛzj,Y@t6m5%3Ov +֙Vk]B0tZF}YBSB܏`FzQO_)1uԞc 9ўOp^xHҌqN줇,74[W{WB_V>Z/g4`Ŷo3cD8[) 0p&Ǖv*h=L$gM1`S:ZաD\:N=N#&ӱW}T%En ?"κooSo&$ u1ջkaL';pQݾ4:F7[wW4p5`lry%egp2Ĩ/ήjQ*xJ$76ף;MY!ewgKٌMدjt- U'9E-@̪[]ʚ8=\Kj 7#=oj94ϲ³MPXH rO{$;zz4 ;wÿ%'@tr{o!Θ1fӋh{xeRUf-hV(rv~2lQJ|2zI2ZhʆqĢ=@meLv㵨Fh_#"7Xuڻ|ȩ?pq}ormHL>V,>- BZ,oE;gCC[O3))aEjk t=~E}?+ ▬:E[ՊqН9۩_FmДRJ7Q+}B+݌Jb9֎@u8PŒS.ϗ˓H)~7ECi;ԲF1(ԗ<[JG ;;z{oqE[& cbGY-UieoB~2G0nb_Rl.T%ʴ ÈPFWC"u^1Gz8#aL~ 7@eG3sch cӚwQ<]G1|* ?^mkfdgKqfV߉i?K׈[?rߙݒ>W]{ON)FzQU uVIѱNQAcP@݈CjsWn!{1I  :f7%x_f(rw<^<(1>O^p5tGV21ŗrOcFAd36Y5{0<)@ l{fԺ)/" r pkQcJ3TKDP^HQ{DT:;zd]>e:Y 3юȳ=@@J@WYdKJ,|>Ѥȥŕe ܜFgKe46ɪq4uakZ+D[1l^҂ɹ]ڏ e݆p:滻hC5mh4aiSӥ\lH?n 1K(R'NVTJGsqcyz/7ksRQ"l3栏VSjƧ<6| 9EL 8`Dv  >y75b*K|{|Î?/RUɅf @[֥h+|\]romLSh~" %ʐQ0N{xhP~ߛFm$~" bXfwKQ?L5 Ug.afe j]@ 35edk'Pe^5r {l1( U1Ke[xOJ'<H3D_-d$/둭3#/P-fg@o?FB@N{sk6ƕjS5}%&Ջ-og6[{yWY$&,=t|@3;=JǁjgR;>?ǛJ:Hg` بh G{NbZk̶..n9 }M.#d)^d P܅*](cN-Hľ33̅mRr巁hz Fr6Q/kK u`-F?~{d!D~nݞkh.}$XqD˦PTƇF X S$٬XZ J[$+8>~:J߹nG-u0!eX+M/rQ޶%JA}E6, %0͖6w؅w@vVϧYwSL]֘@җ.]A=ހHM9xd$ȳ*{0\fbUM󍣝(tbC>(3gnXZ+A6mѡȺTJ >ܣѬqٖR")I$dO/^'ͭkBMzYjnG91 wm!%Nt`yzuϼpRk$}z[l=;ttz`}4!dTB&0/uM{4 Ω Z-Sp9"y8N ~RU`y^:SU56gmtWUOz&5u 錳+p ԾZ0@I/I3qay3Uq|`1`;3\M86P$p>Bi‚|M=+x%KtzC'l|AJ/޶D˔,a,8).ciR ,+ŠkjwbSqSTjkª RE9'kl(NU[>"肌~W=0 Et]] GUXܕ.FYyh?$L} PEx`0D~YKR52s lŨoQO8#o`VIQgHڟ lF~GE,L}U~Ž u c{f*W{V$Ӊ_$y_,i{$5c? 1!'|(Ti 0lxZ"jZŽJ#rܩک0D_K.]Ϡ|7G237ݫ[:CY#.pKaXіL)H0"8]"-exS: ?lwC obdFmHTSJU;:ᠠDto+K(jWԔ tN51ZST}W?]\G. e+cέ/*)h6ekFwus5J:ipgQI}>Zzt0m{mAuIhWӉq^vZ Ϗĵ& bg#;HB胐fhp~?EjI(Lv<IC* [5ƪ*K~.ϋ yЛr x p='o_= ($Juّ Q).ڐ8+y }XO A`F('NrK A%`')1L4.hJ a5 %*^YM#\4=3U XP[Xl.џϱo]nS*Zv2ɋڶg`%?QTDkf#<5!&`خ2.Sl uС |IPw}#+2 TW?AY Mo&@D\#NL+Cr (U^?: zM0If~ʋ!58im/]k%7 nyoB|kQ+_ #縝1}$]mrKc'avc+ˆfeh8|$~p!'?}l݋ІoOz!:GPċ4zz _G sI{ѯ/W5Fȡ$L?a1'wX5|ܡ'W4f$'Z%L:.WT 䨝/}xHLՆ+Azus*}RHqK?7_l. ;ٝKUǤdKn|ہVn~dQ|8˓N#=ME p-{`[O+ZDi6d/b 7a86;n(=Aj1}ʠDCQs2SJFTB(Z ŚBuً^}kjw).2A<:G[RZޏ=CXA44: P} :.-2m0|+4*%gbx$5W$@KK, Xp1?[55ru<.g6+pO{+ +Kߌnh,0U.S/dx#Ag:gq}J0x||`f1! MR`|U Y5` ¾&6Jt"*%j9h#!Z8 K5v/)GCo3qMerdb/ zAu|11(H=|aԒmfg}J?IOhͼ%v3E8aԍw3+lLHzg D P 44Sۙ