exim-4.97.1-bp155.5.12.1<>,fI%z M>8߂ttAs£/ _=!&Yi{ČePEiK~ղjo k%#dF(X>Nq\=i:ʐj,T ,uh"a\@M \7ۿA#;Cs4v >Åư.vZ"-q#O(4XgX DD4Fվj4e֣a?CE}[No`_|ju'_ڤч $386VPJ&Nv%.SU%ºο i. KEȾ7n_{?aahm ;?hk('u\jboqB޶$]EuW1{wD|nUV7!AMsr-q s*%lRצBXYa0?`)(ÂgZ|-X`P:m:n*a,aJ3)Sίvn>P,?d  T $04MVg D]] r] ,] ] )=] *4]+]-y]/J/l]01 E2 E8E8x88(878887997:>7=\>d?l@tC|FńGŘ]H ]IȀ]XY\0]]ʤ]^bЙc?deflu]vtwx]x]y`[zCexim4.97.1bp155.5.12.1The Exim Mail Transfer Agent, a Replacement for sendmailExim is a mail transport agent (MTA) developed at the University of Cambridge for use on Unix systems connected to the Internet. It is freely available under the terms of the GNU General Public Licence. In style, it is similar to Smail 3, but its facilities are more extensive. In particular, it has options for verifying incoming sender and recipient addresses, for refusing mail from specified hosts, networks, or senders, and for controlling mail relaying.fi03-ch1a9SUSE Linux Enterprise 15openSUSEGPL-2.0-or-laterhttp://bugs.opensuse.orgProductivity/Networking/Email/Servershttp://www.exim.org/linuxx86_64 if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in exim.service ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fi if [ -x /usr/bin/chkstat ]; then /usr/bin/chkstat -n --set --system /usr/sbin/exim fi if ! test -s etc/exim/exim.conf; then if test -s etc/exim.conf; then mv etc/exim.conf etc/exim/ echo moving exim.conf to /etc/exim/ else cp -p usr/share/doc/packages/exim/configure.default etc/exim/exim.conf echo copying default config file to /etc/exim/exim.conf fi fi PNAME=exim SUBPNAME= SYSC_TEMPLATE=/usr/share/fillup-templates/sysconfig.$PNAME$SUBPNAME # If template not in new /usr/share/fillup-templates, fallback to old TEMPLATE_DIR if [ ! -f $SYSC_TEMPLATE ] ; then TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME fi SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME ..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in exim.service ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi exit 0 test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable exim.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop exim.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in exim.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart exim.service ) || : fi fiP  ,e*6En TFhP Uk%lFX&?G!@)0wkr.< J0  51 Dpq%[ 2)+e 6 G Di  A큤AA큤A큤A큤A큤A큤Afffffffffffffffffffffffffffffffe,e,e,e,e,e,ffffe,e,e,e,e,e,e,e,e,e,e,fe,e,e,e,e,e,e,e,e,e,e,ee,ee,e,e,e,e,e,e,e,e,e,e,e,e,D1ffffffffffff4e5bf0b036ce23f99478aa20e92929a8b5e59e38773e2ca266c85764fa8adf13595d927f607f3c9a5a1a5d188adb8627be8f91472e7d9d2992c9c2ffcc472943562d5841f96f952b1d7ad7bfdb6cc0d5dbbc853eea786f97216f44d19b99bc8240efb52289ae40b33678a54f22eac6e213463578bf749229ea82de8bddef7e4a020aae20eab86f760f4cef701d8055957a1f13bbdad2443f82f99a4269e4ae870f6bc2eb70a2754b281c1d5750d93f050c96e1d4b0567ccfef9f961a1a8402b197241de9fb700fe31efd4eef1fafa5698ca655ba965e2a7f7f0bc29e5402ab22ba6ae21d288fbfbfac4f9db4bdfb4069265f3a5ea46bf080173920f806666b5ab26ba7956c52eab9f56f5928b0251385122d20fcd41a0004687fbba3266b0be0ccdc062323537c1243174c77b427bc3d615e582cf963d3b674211c4b90ee18ff4faf466a72b5f5d4e0f235b0f0eeee8817d6fa678df4413011d3abf8b6d88d362e37e76d3640b1278b8bf011979d281ba09eb9d05826e155db7487a33150a7b43f9719525d354f751ba155e2b4e2e09ccd07ec2f8cd947a084c3ddc5374863b33686802a9af82cd8d697f58654ba4743e51cbc5de9658d34c15e451bfe327e915ae5f675d1ce73c2a61db58a09720b283ddef55f4a14ffe0b9253c1605b40f00da9a2c076690a0979923df27f5028d8c8ddae6e794ed25197abd6f2dced482fdef22132df499e41749d5e9b21e32aede43e4755dbca6aefaccc36a7522ad746b88e3ecb42f708fd066ba022007c34310090e325b057cce7a7a608e6a6dafe2623abbb3ad5baf17790269d9d31b241fafdb243c77a7e46e67e74b5abef84b7a991b45e2694180664a70d215cdc7e11a599cb4f22d38bf0c562a0d069e30fac9b881214f2c4ac8f6f4016d997d91584c49dde2a097833cdf60347e01409e18b4b4e1a1f2d494f26d2e09bbc6451a46eff0cfeeacc381e14ab0b8105d6c01bbb9fd49240db527b7e55b312a46fc59794fde5dd006422e422257f4f057bfd27b3c8fbe97f628924f0b40d0057791c134c2bba6b5060bde17e6159bea8529ae409f8886667a2cbbcc8657cb065468491e1adcf788c1b52cef00e4335e0067d41f1d4ad85a4cd80eafc18f182199bfe61f67f44a7a65bee4e8c424467ae13d40b633368a69ef905860cab82c70337ab2a7c027943d1240ec8c413395d58920a18d0ecda1ae376a1a9b97e7116cbbc752e6ad00913aecef56e3c684f7b88337fcad31ede309c2a39365a42e888cd85b00b12f4a4287c933a493cfb066b267afae927ff3e2112677cb237552414b988119259b5d2179e72c497e1b1bdc8e8a7edf8253e32d885b1930d2582649fb587750faa74e6d4c1c8e6092722007b9d9cd07cdaec8ab98e1ebe329d8159ca9f14842dcaaf785c6dc51b0c420457d1c4edc0189ba4d3520b617bff01fff563e79091f987ff196e039f14553dfcf4046397643d9a79f842e22b5d0efff5624e1ecefadb44334f7434b66b15a0fea4c0a6162dc0f73138d826caa69aa1b16d121e0bf1946bce0f6f8b525b82188eeeee9da219273a4cd2867f9ba5febd37bc4bc36a345a838fd1767385a88479f3852a051a4df364b1cc46e23ec48041b88770d022817aa85865f950754e3d6073688deb8946b5cae70ff8d2a3e6737067fd3e9c6e6b1e88ec797fc6863ac6a0d49a10a07af4f114aa9f1dee4762a9d31f2fc813edbba4a34b9c9a56600d7b9e12bb64cae6af9ea18fdaadc32970f32d2f968eba37601c7e8f085b50d907e14cbe7844d8a983ec3633109df4dced66b74f2b40bf6aafbcdd69c114dbcfdadae075709fd901a2cf2cfc95bc348619699e8bb3bce1b8c97d023640b909c05279322a32ead034e4e9facb4a268db5b2082077bfa31f09bf9e86ca99768763e5810e6d5cfa9d4f26725786dd6622df45f453860c3066628610783410d73ca4e9c11bea45cb920d57de2d86d35c51e8cbad532bb21e9aa3986ffd8576e70562c160c118b7851fbb4bc6a45851fe532fed6e21071cd4678172cc17ca6596d98493ad5871636e80d92e50e0a10f91f294a7e9be6c3465e3ccb82267dbeb259ba0bbb029402bcb2659379ce28ec20cb9ac220e42e54000c11197b74663a6c8401c77b6d6566782af818b6e4f10cfb2f5b519579ae7f8f79e740930fea51a86212b0deb8c145c8f94884615842b07faaf6e31804e855b0bafdd11876ee85be788dbc3cc3925ddc06a37c85610939c9287d93179f70f5046fee6e2b6c9c43bd0b90b2a8275279861aa1c4b12b5f62898b054725b9431bd93555cf49c4c8bd561e0d457d32cacc3e857c758e9e93c9bd1e8ce037264d688f58d40fef6d7ecdc07cf832db36d6a0d2ef3d25cf34ab756f82bffe5852be0bdc4a967a175a1b227027e7d4b3c0c1089cfc9f8a8544c59d2592d073af0fc6a196f9671a378876f6329d321e6e07c708c1c5f6ebff562fea3f163096baf800bb973a492fa30909e4973bf5b9b13f29bfc86b619b77e8db93f76d4c809ee99d2af02cea2abf521eae41429b3e67d789920d77945280b49a0ad0c7f87cd0f02bfd99aee798eab44b12a4237540555b1b1d35d5511bd842228298bba6a956a1c146982a9140d0178885cf198a556dd87faad1857975bd6874317b68bc4cfcc8277402157ee0784877c2d15297279b89016454ad2a492c09de0c07119bd929b4455f050841439c960c9c70bc362d9db773c6ba49201ce7fda4e6200364a2519be992f6d51004e74b8df9d967270c5807d3c64c3250324563dd23abe7f6e34af542acd6204fceaf1603a13fe927d3de61979a146fd1505a6a3f630c1b692986cd38c42508d8bef1915bac308e360aa6c1c3a6dd5ba33b07f045a9fb6804232fce7b693f71407a42d2f1747d2325d5bb6fb4a6b56dc33d89ca8ea7eeae37e026b32384997baa185db985bcade15ea61f740050c6ede77f674f8daafacf49a0a23125acbd9b41076097050dd35b36fca7b56ed3b79f51a4997573ec24e6de97da5e346849c0c158711670bd4d0cc3d25b43db09d42da354964705bdd01f8e6fc3f632e955c328a816f95afac6ea64b44418439b7d16815220f59c8f../sbin/exim../sbin/exim../sbin/exim../sbin/exim../sbin/eximserviceeximexim_db.8.gzexim_db.8.gzexim_db.8.gzexim.8.gzexim.8.gzexim.8.gzexim.8.gzexim.8.gzBrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootmailrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootmailexim-4.97.1-bp155.5.12.1.src.rpmconfig(exim)eximexim(x86-64)smtp_daemon !@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@     /bin/sh/bin/sh/bin/sh/bin/sh/bin/sh/bin/sh/usr/bin/perlconfig(exim)coreutilsdiffutilsfileutilsfillupgrepgroup(mail)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.16)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.28)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.6)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.8)(64bit)libc.so.6(GLIBC_2.9)(64bit)libcrypt.so.1()(64bit)libcrypt.so.1(XCRYPT_2.0)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_0h)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libdb-4.8.so()(64bit)liblber-2.4.so.2()(64bit)libldap_r-2.4.so.2()(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.29)(64bit)libmariadb.so.3()(64bit)libmariadb.so.3(libmysqlclient_18)(64bit)libnsl.so.2()(64bit)libnsl.so.2(LIBNSL_1.0)(64bit)libpam.so.0()(64bit)libpam.so.0(LIBPAM_1.0)(64bit)libpcre2-8.so.0()(64bit)libpq.so.5()(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.2.5)(64bit)libsasl2.so.3()(64bit)libspf2.so.2()(64bit)libsqlite3.so.0()(64bit)libssl.so.1.1()(64bit)libssl.so.1.1(OPENSSL_1_1_0)(64bit)libssl.so.1.1(OPENSSL_1_1_1)(64bit)logrotateperl-File-FcntlLockpermissionsrpmlib(BuiltinLuaScripts)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)systemdsystemdsystemdsystemdtextutilsuser(mail)4.97.1-bp155.5.12.14.2.2-13.0.4-14.6.0-14.0-15.2-1postfixsendmailsendmail-tls4.14.3 /usr/bin/chkstat -n --warn --system -e /usr/sbin/exim 1>&2f@e@e-%ed>@cN@baTU@`7@`N@_C^(@^?@^@^^@^[^r^ @]7@]@]s]9\\ZԐ@Z`@Z@ZZ@Z@Z@Z@YdY[@YGXWW@VV2VVjVqUJ@U0U@TÉ@TÉ@TÉ@TÉ@T@T@T@TuTuDirk Müller Dirk Müller Peter Wullinger Peter Wullinger Max Lin Peter Wullinger Peter Wullinger Peter Wullinger wullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.dewullinger@rz.uni-kiel.depoeml@cmdline.netpoeml@cmdline.netalex wullinger@rz.uni-kiel.deseanlew@opensuse.orgwullinger@rz.uni-kiel.decrrodriguez@opensuse.orgkbabioch@suse.comwullinger@rz.uni-kiel.dedmueller@suse.comkstreitova@suse.commeissner@suse.comrbrown@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.comwullinger@rz.uni-kiel.dee.istomin@edss.eelmuelle@suse.comlmuelle@suse.comopensuse@cboltz.delmuelle@suse.commichal.hrusecky@opensuse.orglmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.comlmuelle@suse.commichal.hrusecky@opensuse.orgmichal.hrusecky@opensuse.orglmuelle@suse.comlmuelle@suse.comlmuelle@suse.com- add 001-Fix-MIME-parsing-of.filenames.patch 002-Fix-MIME-parsing-of.filenames.patch (bsc#1227423, CVE-2024-39929)- update to 4.97.1 (bsc#1218387, CVE-2023-51766): * Fixes for the smtp protocol smuggling (CVE-2023-51766) - patch-cve-2022-3559, patch-CVE-2023-42115-CVE-2023-42116-CVE-2023-42114.patch, patch-CVE-2023-42117.patch,patch-CVE-2023-42119.patch: upstream- add patch-CVE-2023-42117.patch (fixes CVE-2023-42117, bsc#1215787) - add patch-CVE-2023-42119.patch (fixes CVE-2023-42119, bsc#1215789)- add patch (patch-CVE-2023-42115-CVE-2023-42116-CVE-2023-42114.patch) for * CVE-2023-42114 (bsc#1215784) * CVE-2023-42115 (bsc#1215785) * CVE-2023-42116 (bsc#1215786)- Port eximstats-html-update.py to python3- add patch-cve-2022-3559 (fixes CVE-2022-3559, bsc#1204427, Bug 2915)- update to exim 4.96 * Move from using the pcre library to pcre2. * Constification work in the filters module required a major version bump for the local-scan API. Specifically, the "headers_charset" global which is visible via the API is now const and may therefore not be modified by local-scan code. * Bug 2819: speed up command-line messages being read in. Previously a time check was being done for every character; replace that with one per buffer. * Bug 2815: Fix ALPN sent by server under OpenSSL. Previously the string sent was prefixed with a length byte. * Change the SMTP feature name for pipelining connect to be compliant with RFC 5321. Previously Dovecot (at least) would log errors during submission. * Fix macro-definition during "-be" expansion testing. The move to write-protected store for macros had not accounted for these runtime additions; fix by removing this protection for "-be" mode. * Convert all uses of select() to poll(). * Fix use of $sender_host_name in daemon process. When used in certain main-section options or in a connect ACL, the value from the first ever connection was never replaced for subsequent connections. * Bug 2838: Fix for i32lp64 hard-align platforms * Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value with underbars is given. * Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters. * Debugging initiated by an ACL control now continues through into routing and transport processes. * The "expand" debug selector now gives more detail, specifically on the result of expansion operators and items. * Bug 2751: Fix include_directory in redirect routers. Previously a bad comparison between the option value and the name of the file to be included was done, and a mismatch was wrongly identified. * Support for Berkeley DB versions 1 and 2 is withdrawn. * When built with NDBM for hints DB's check for nonexistence of a name supplied as the db file-pair basename. * Remove the "allow_insecure_tainted_data" main config option and the "taint" log_selector. * Fix static address-list lookups to properly return the matched item. Previously only the domain part was returned. * The ${run} expansion item now expands its command string elements after splitting. Previously it was before; the new ordering makes handling zero-length arguments simpler. * Taint-check exec arguments for transport-initiated external processes. Previously, tainted values could be used. This affects "pipe", "lmtp" and "queryprogram" transport, transport-filter, and ETRN commands. The ${run} expansion is also affected: in "preexpand" mode no part of the command line may be tainted, in default mode the executable name may not be tainted. * Fix CHUNKING on a continued-transport. Previously the usabilility of the facility was not passed across execs, and only the first message passed over a connection could use BDAT; any further ones using DATA. * Support the PIPECONNECT facility in the smtp transport when the helo_data uses $sending_ip_address and an interface is specified. * OpenSSL: fix transport-required OCSP stapling verification under session resumption. * TLS resumption: the key for session lookup in the client now includes more info that a server could potentially use in configuring a TLS session, avoiding oferring mismatching sessions to such a server. * Fix string_copyn() for limit greater than actual string length. * Bug 2886: GnuTLS: Do not free the cached creds on transport connection close; it may be needed for a subsequent connection. * Fix CHUNKING for a second message on a connection when the first was rejected. * Fix ${srs_encode ...} to handle an empty sender address, now returning an empty address. * Bug 2855: Handle a v4mapped sender address given us by a frontending proxy.- update to exim 4.95 * includes taintwarn (taintwarn.patch) * fast-ramp queue run * native SRS * TLS resumption * LMDB lookups with single key * smtp transport option "message_linelength_limit" * optionally ignore lookup caches * quota checking for appendfile transport during message reception * sqlite lookups allow a "file=" option * lsearch lookups allow a "ret=full" option * command line option for the notifier socket * faster TLS startup * new main config option "proxy_protocol_timeout" * expand "smtp_accept_max_per_connection" * log selector "queue_size_exclusive" * main config option "smtp_backlog_monitor" * main config option "hosts_require_helo" * main config option "allow_insecure_tainted_data"- update to exim-4.94.2 security update (bsc#1185631) * CVE-2020-28007: Link attack in Exim's log directory * CVE-2020-28008: Assorted attacks in Exim's spool directory * CVE-2020-28014: Arbitrary PID file creation * CVE-2020-28011: Heap buffer overflow in queue_run() * CVE-2020-28010: Heap out-of-bounds write in main() * CVE-2020-28013: Heap buffer overflow in parse_fix_phrase() * CVE-2020-28016: Heap out-of-bounds write in parse_fix_phrase() * CVE-2020-28015: New-line injection into spool header file (local) * CVE-2020-28012: Missing close-on-exec flag for privileged pipe * CVE-2020-28009: Integer overflow in get_stdinput() * CVE-2020-28017: Integer overflow in receive_add_recipient() * CVE-2020-28020: Integer overflow in receive_msg() * CVE-2020-28023: Out-of-bounds read in smtp_setup_msg() * CVE-2020-28021: New-line injection into spool header file (remote) * CVE-2020-28022: Heap out-of-bounds read and write in extract_option() * CVE-2020-28026: Line truncation and injection in spool_read_header() * CVE-2020-28019: Failure to reset function pointer after BDAT error * CVE-2020-28024: Heap buffer underflow in smtp_ungetc() * CVE-2020-28018: Use-after-free in tls-openssl.c * CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash()- update to exim-4.94.1 * Fix security issue in BDAT state confusion. Ensure we reset known-good where we know we need to not be reading BDAT data, as a general case fix, and move the places where we switch to BDAT mode until after various protocol state checks. Fixes CVE-2020-BDATA reported by Qualys. * Fix security issue in SMTP verb option parsing (CVE-2020-EXOPT) * Fix security issue with too many recipients on a message (to remove a known security problem if someone does set recipients_max to unlimited, or if local additions add to the recipient list). Fixes CVE-2020-RCPTL reported by Qualys. * Fix CVE-2020-28016 (PFPZA): Heap out-of-bounds write in parse_fix_phrase() * Fix security issue CVE-2020-PFPSN and guard against cmdline invoker providing a particularly obnoxious sender full name. * Fix Linux security issue CVE-2020-SLCWD and guard against PATH_MAX better.- bring back missing exim_db.8 manual page (fixes bsc#1173693)- bring in changes from current +fixes (lots of taint check fixes) * Bug 1329: Fix format of Maildir-format filenames to match other mail- related applications. Previously an "H" was used where available info says that "M" should be, so change to match. * Bug 2587: Fix pam expansion condition. Tainted values are commonly used as arguments, so an implementation trying to copy these into a local buffer was taking a taint-enforcement trap. Fix by using dynamically created buffers. * Bug 2586: Fix listcount expansion operator. Using tainted arguments is reasonable, eg. to count headers. Fix by using dynamically created buffers rather than a local. Do similar fixes for ACL actions "dcc", "log_reject_target", "malware" and "spam"; the arguments are expanded so could be handling tainted values. * Bug 2590: Fix -bi (newaliases). A previous code rearrangement had broken the (no-op) support for this sendmail command. Restore it to doing nothing, silently, and returning good status.- update to exim 4.94 * some transports now refuse to use tainted data in constructing their delivery location this WILL BREAK configurations which are not updated accordingly. In particular: any Transport use of $local_user which has been relying upon check_local_user far away in the Router to make it safe, should be updated to replace $local_user with $local_part_data. * Attempting to remove, in router or transport, a header name that ends with an asterisk (which is a standards-legal name) will now result in all headers named starting with the string before the asterisk being removed.- switch pretrans to use lua (fixes bsc#1171877)- bring changes from current in +fixes branch (patch-exim-fixes-ee83de04d3087efaf808d1f2235a988275c2ee94) * fixes CVE-2020-12783 (bsc#1171490) * Regard command-line recipients as tainted. * Bug 2489: Fix crash in the "pam" expansion condition. * Use tainted buffers for the transport smtp context. * Bug 2493: Harden ARC verify against Outlook, which has been seen to mix the ordering of its ARC headers. This caused a crash. * Bug 2492: Use tainted memory for retry record when needed. Previously when a new record was being constructed with information from the peer, a trap was taken. * Bug 2494: Unset the default for dmarc_tld_file. * Fix an uninitialised flag in early-pipelining. Previously connections could, depending on the platform, hang at the STARTTLS response. * Bug 2498: Reset a counter used for ARC verify before handling another message on a connection. Previously if one message had ARC headers and the following one did not, a crash could result when adding an Authentication-Results: header. * Bug 2500: Rewind some of the common-coding in string handling between the Exim main code and Exim-related utities. * Fix the variables set by the gsasl authenticator. * Bug 2507: Modules: on handling a dynamic-module (lookups) open failure, only retrieve the errormessage once. * Bug 2501: Fix init call in the heimdal authenticator. Previously it adjusted the size of a major service buffer; this failed because the buffer was in use at the time. Change to a compile-time increase in the buffer size, when this authenticator is compiled into exim.- don't create logfiles during install * fixes CVE-2020-8015 (bsc#1154183)- add a spec-file workaround for bsc#1160726- update to exim 4.93.0.4 (+fixes release) * Avoid costly startup code when not strictly needed. This reduces time for some exim process initialisations. It does mean that the logging of TLS configuration problems is only done for the daemon startup. * Early-pipelining support code is now included unless disabled in Makefile. * DKIM verification defaults no long accept sha1 hashes, to conform to RFC 8301. They can still be enabled, using the dkim_verify_hashes main option. * Support CHUNKING from an smtp transport using a transport_filter, when DKIM signing is being done. Previously a transport_filter would always disable CHUNKING, falling back to traditional DATA. * Regard command-line receipients as tainted. * Bug 340: Remove the daemon pid file on exit, whe due to SIGTERM. * Bug 2489: Fix crash in the "pam" expansion condition. It seems that the PAM library frees one of the arguments given to it, despite the documentation. Therefore a plain malloc must be used. * Bug 2491: Use tainted buffers for the transport smtp context. Previously on-stack buffers were used, resulting in a taint trap when DSN information copied from a received message was written into the buffer. * Bug 2493: Harden ARC verify against Outlook, whick has been seen to mix the ordering of its ARC headers. This caused a crash. * Bug 2492: Use tainted memory for retry record when needed. Previously when a new record was being constructed with information from the peer, a trap was taken. * Bug 2494: Unset the default for dmarc_tld_file. Previously a naiive installation would get error messages from DMARC verify, when it hit the nonexistent file indicated by the default. Distros wanting DMARC enabled should both provide the file and set the option. Also enforce no DMARC verification for command-line sourced messages. * Fix an uninitialised flag in early-pipelining. Previously connections could, depending on the platform, hang at the STARTTLS response. * Bug 2498: Reset a counter used for ARC verify before handling another message on a connection. Previously if one message had ARC headers and the following one did not, a crash could result when adding an Authentication-Results: header. * Bug 2500: Rewind some of the common-coding in string handling between the Exim main code and Exim-related utities. The introduction of taint tracking also did many adjustments to string handling. Since then, eximon frequently terminated with an assert failure. * When PIPELINING, synch after every hundred or so RCPT commands sent and check for 452 responses. This slightly helps the inefficieny of doing a large alias-expansion into a recipient-limited target. The max_rcpt transport option still applies (and at the current default, will override the new feature). The check is done for either cause of synch, and forces a fast-retry of all 452'd recipients using a new MAIL FROM on the same connection. The new facility is not tunable at this time. * Fix the variables set by the gsasl authenticator. Previously a pointer to library live data was being used, so the results became garbage. Make copies while it is still usable. * Logging: when the deliver_time selector ise set, include the DT= field on delivery deferred (==) and failed (**) lines (if a delivery was attemtped). Previously it was only on completion (=>) lines. * Authentication: the gsasl driver not provides the $authN variables in time for the expansion of the server_scram_iter and server_scram_salt options.spec file cleanup to make update work - add docdir to spec- update to exim 4.93 * SUPPORT_DMARC replaces EXPERIMENTAL_DMARC * DISABLE_TLS replaces SUPPORT_TLS * Bump the version for the local_scan API. * smtp transport option hosts_try_fastopen defaults to "*". * DNSSec is requested (not required) for all queries. (This seemes to ask for trouble if your resolver is a systemd-resolved.) * Generic router option retry_use_local_part defaults to "true" under specific pre-conditions. * Introduce a tainting mechanism for values read from untrusted sources. * Use longer file names for temporary spool files (this avoids name conflicts with spool on a shared file system). * Use dsn_from main config option (was ignored previously).- update to exim 4.92.3 * CVE-2019-16928: fix against Heap-based buffer overflow in string_vformat, remote code execution seems to be possible- update to exim 4.92.2 * CVE-2019-15846: fix against remote attackers executing arbitrary code as root via a trailing backslash- update to exim 4.92.1 * CVE-2019-13917: Fixed an issue with ${sort} expansion which could allow remote attackers to execute other programs with root privileges (boo#1142207)- spec file cleanup * fix DANE inclusion guard condition * re-enable i18n and remove misleading comment * EXPERIMENTAL_SPF is now SUPPORT_SPF * DANE is now SUPPORT_DANE- update to exim 4.92 * ${l_header:} expansion * ${readsocket} now supports TLS * "utf8_downconvert" option (if built with SUPPORT_I18N) * "pipelining" log_selector * JSON variants for ${extract } expansion * "noutf8" debug option * TCP Fast Open support on MacOS * CVE-2019-10149: Fixed a Remote Command Execution (bsc#1136587) - add workaround patch for compile time error on missing printf format annotation (gnu_printf.patch)- update to 4.91 * DEFER rather than ERROR on redis cluster MOVED response. * Catch and remove uninitialized value warning in exiqsumm * Disallow '/' characters in queue names specified for the "queue=" ACL modifier. This matches the restriction on the commandline. * Fix pgsql lookup for multiple result-tuples with a single column. Previously only the last row was returned. * Bug 2217: Tighten up the parsing of DKIM signature headers. * Bug 2215: Fix crash associated with dnsdb lookup done from DKIM ACL. * Fix issue with continued-connections when the DNS shifts unreliably. * Bug 2214: Fix SMTP responses resulting from non-accept result of MIME ACL. * The "support for" informational output now, which built with Content Scanning support, has a line for the malware scanner interfaces compiled in. Interface can be individually included or not at build time. * The "aveserver", "kavdaemon" and "mksd" interfaces are now not included by the template makefile "src/EDITME". The "STREAM" support for an older ClamAV interface method is removed. * Bug 2223: Fix mysql lookup returns for the no-data case (when the number of rows affected is given instead). * The runtime Berkeley DB library version is now additionally output by "exim -d -bV". Previously only the compile-time version was shown. * Bug 2230: Fix cutthrough routing for nonfirst messages in an initiating SMTP connection. * Bug 2229: Fix cutthrough routing for nonstandard port numbers defined by routers. * Bug 2174: A timeout on connect for a callout was also erroneously seen as a timeout on read on a GnuTLS initiating connection, resulting in the initiating connection being dropped. * Relax results from ACL control request to enable cutthrough, in unsupported situations, from error to silently (except under debug) ignoring. * Fix Buffer overflow in base64d() (CVE-2018-6789) * Fix bug in DKIM verify: a buffer overflow could corrupt the malloc metadata, resulting in a crash in free(). * Fix broken Heimdal GSSAPI authenticator integration. * Bug 2113: Fix conversation closedown with the Avast malware scanner. * Bug 2239: Enforce non-usability of control=utf8_downconvert in the mail ACL. * Speed up macro lookups during configuration file read, by skipping non- macro text after a replacement (previously it was only once per line) and by skipping builtin macros when searching for an uppercase lead character. * DANE support moved from Experimental to mainline. The Makefile control for the build is renamed. * Fix memory leak during multi-message connections using STARTTLS. * Bug 2236: When a DKIM verification result is overridden by ACL, DMARC reported the original. Fix to report (as far as possible) the ACL result replacing the original. * Fix memory leak during multi-message connections using STARTTLS under OpenSSL * Bug 2242: Fix exim_dbmbuild to permit directoryless filenames. * Fix utf8_downconvert propagation through a redirect router. * Bug 2253: For logging delivery lines under PRDR, append the overall DATA response info to the (existing) per-recipient response info for the "C=" log element. * Bug 2251: Fix ldap lookups that return a single attribute having zero- length value. * Support Avast multiline protocol, this allows passing flags to newer versions of the scanner. * Ensure that variables possibly set during message acceptance are marked dead before release of memory in the daemon loop. * Bug 2250: Fix a longstanding bug in heavily-pipelined SMTP input (such as a multi-recipient message from a mailinglist manager). * The (EXPERIMENTAL_DMARC) variable $dmarc_ar_header is withdrawn, being replaced by the ${authresults } expansion. * Bug 2257: Fix pipe transport to not use a socket-only syscall. * Set a handler for SIGTERM and call exit(3) if running as PID 1. This allows proper process termination in container environments. * Bug 2258: Fix spool_wireformat in combination with LMTP transport. Previously the "final dot" had a newline after it; ensure it is CR,LF. * SPF: remove support for the "spf" ACL condition outcome values "err_temp" and "err_perm", deprecated since 4.83 when the RFC-defined words " temperror" and "permerror" were introduced. * Re-introduce enforcement of no cutthrough delivery on transports having transport-filters or DKIM-signing. * Cutthrough: for a final-dot response timeout (and nonunderstood responses) in defer=pass mode supply a 450 to the initiator. Previously the message would be spooled. * DANE: add dane_require_tls_ciphers SMTP Transport option; if unset, tls_require_ciphers is used as before. * Malware Avast: Better match the Avast multiline protocol. * Fix reinitialisation of DKIM logging variable between messages. * Bug 2255: Revert the disable of the OpenSSL session caching. * Add util/renew-opendmarc-tlds.sh script for safe renewal of public suffix list. * DKIM: accept Ed25519 pubkeys in SubjectPublicKeyInfo-wrapped form, since the IETF WG has not yet settled on that versus the original "bare" representation. * Fix syslog logging for syslog_timestamp=no and log_selector +millisec. Previously the millisecond value corrupted the output. Fix also for syslog_pid=no and log_selector +pid, for which the pid corrupted the output.- Replace xorg-x11-devel by individual pkgconfig() buildrequires.- update to 4.90.1 * Allow PKG_CONFIG_PATH to be set in Local/Makefile and use it correctly during configuration. Wildcards are allowed and expanded. * Shorten the log line for daemon startup by collapsing adjacent sets of identical IP addresses on different listening ports. Will also affect "exiwhat" output. * Tighten up the checking in isip4 (et al): dotted-quad components larger than 255 are no longer allowed. * Default openssl_options to include +no_ticket, to reduce load on peers. Disable the session-cache too, which might reduce our load. Since we currrectly use a new context for every connection, both as server and client, there is no benefit for these. * Add $SOURCE_DATE_EPOCH support for reproducible builds, per spec at . * Fix smtp transport use of limited max_rcpt under mua_wrapper. Previously the check for any unsuccessful recipients did not notice the limit, and erroneously found still-pending ones. * Pipeline CHUNKING command and data together, on kernels that support MSG_MORE. Only in-clear (not on TLS connections). * Avoid using a temporary file during transport using dkim. Unless a transport-filter is involved we can buffer the headers in memory for creating the signature, and read the spool data file once for the signature and again for transmission. * Enable use of sendfile in Linux builds as default. It was disabled in 4.77 as the kernel support then wasn't solid, having issues in 64bit mode. Now, it's been long enough. Add support for FreeBSD also. * Add commandline_checks_require_admin option. * Do pipelining under TLS. * For the "sock" variant of the malware scanner interface, accept an empty cmdline element to get the documented default one. Previously it was inaccessible. * Prevent repeated use of -p/-oMr * DKIM: enforce the DNS pubkey record "h" permitted-hashes optional field, if present. * DKIM: when a message has multiple signatures matching an identity given in dkim_verify_signers, run the dkim acl once for each. * Support IDNA2008. * The path option on a pipe transport is now expanded before use * Have the EHLO response advertise VRFY, if there is a vrfy ACL defined. - Several bug fixes - Fix for buffer overflow in base64decode() (bsc#1079832 CVE-2018-6789) - removed patches (included upstream now): * exim-CVE-2017-1000369.patch * exim-CVE-2017-16943.patch * exim-CVE-2017-16944.patch * exim-4.86.2-mariadb_102_compile_fix.patch- add exim-CVE-2017-16944.patch: backport of commit 178ecb70987f024f0e775d87c2f8b2cf587dd542 fix for CVE-2017-16944 (#bsc1069859)- update to 4.88: drops fix-CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch, exim-4.86.2+fixes-867e8fe25dbfb1e31493488ad695bde55b890397.patch - remove exim4-manpages.tar.bz2: upstream does not exist anymore - update keyring- add exim-4.86.2-mariadb_102_compile_fix.patch to fix compilation with the mariadb 10.2 (in our case the build with libmariadb library from the mariadb-connector-c package) * upstream commits: a12400fd4493b676e71613ab429e731f777ebd1e and 31beb7972466a33a88770eacbce13490f2ddadc2- exim-CVE-2017-16943.patch: fixed possible code execution (CVE-2017-16943 bsc#1069857)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Explicitly buildrequire libnsl-devel on suse_version >= 1330: libnsl used to be an integrated part of glibc. Since the build system / makefiles explicitly reference libnsl, it is our own duty to ensure we have our deps in place.- specify users with ref:mail, to make them dynamic. bsc#1046971- exim-CVE-2017-1000369.patch: Fixed memory leaks that could be exploited to "stack crash" local privilege escalation (bsc#1044692) - Require user(mail) group(mail) to meet new users handling in TW. - Prerequire permissions (fixes rpmlint).- conditionally disable DANE on SuSE versions with OpenSSL < 1.0 - exim-4.86.2+fixes-867e8fe25dbfb1e31493488ad695bde55b890397.patch: import exim-4_86_2+fixes branch + fix CVE-2016-1531 when installed setuid root, allows local users to gain privileges via the perl_startup argument. + fix Bug 1805: store the initial working directory, expand $initial_cwd + fix Bug 1671: segfault after delivery (https://bugs.exim.org/show_bug.cgi?id=1671) + Don't issue env warning if env is empty - fix-CVE-2016-9963-31c02defdc5118834e801d4fe8f11c1d9b5ebadf.patch: DKIM information leakage- Makefile tuning: + add sqlite support + disable WITH_OLD_DEMIME + enable AUTH_CYRUS_SASL + enable AUTH_TLS + enable SYSLOG_LONG_LINES + enable SUPPORT_PAM + MAX_NAMED_LIST=64 + enable EXPERIMENTAL_DMARC + enable EXPERIMENTAL_EVENT + enable EXPERIMENTAL_PROXY + enable EXPERIMENTAL_CERTNAMES + enable EXPERIMENTAL_DSN + enable EXPERIMENTAL_DANE + enable EXPERIMENTAL_SOCKS + enable EXPERIMENTAL_INTERNATIONAL- Update to 4.86.2 + Fix minor portability issues for *BSD and OS/X.- Update to 4.86.1 + Add support for keep_environment and add_environment options; CVE-2016-1531; (boo#968844).- Move AppArmor profile to /usr/share/apparmor/extra-profiles/, which is the directory for inactive profiles since AppArmor 2.9- Update the Exim Maintainers Keyring file 'exim.keyring'. - Use URL for the source line of the main tar ball.- Update to 4.86 * Support for using the system standard CA bundle. * New expansion items $config_file, $config_dir, containing the file and directory name of the main configuration file. Also $exim_version. * New "malware=" support for Avast. * New "spam=" variant option for Rspamd. * Assorted options on malware= and spam= scanners. * A commandline option to write a comment into the logfile. * If built with EXPERIMENTAL_SOCKS feature enabled, the smtp transport can be configured to make connections via socks5 proxies. * If built with EXPERIMENTAL_INTERNATIONAL, support is included for the transmission of UTF-8 envelope addresses. * If built with EXPERIMENTAL_INTERNATIONAL, an expansion item for a commonly used encoding of Maildir folder names. * A logging option for slow DNS lookups. * New ${env {}} expansion. * A non-SMTP authenticator using information from TLS client certificates. * Main option "tls_eccurve" for selecting an Elliptic Curve for TLS. Patch originally by Wolfgang Breyha. * Main option "dns_trust_aa" for trusting your local nameserver at the same level as DNSSEC. - Dropped exim-enable_ecdh_openssl.patch as included in upstream- Fix the systemd service file by not passing EXIM_ARGS as one single argument by removing the curly brackets (shell syntax).- Install fitting eximstats.conf depending on SUSE version; (bsc#926861). - Add attribute dir to /etc/apache2 and /etc/apache2/conf.d in the file list.- Replace the fixed ExecStart arguments by ${EXIM_ARGS} as defined in /etc/sysconfig/exim; (bsc#922145).- Set CFLAGS_OPT_WERROR only on post-5 CentOS and RHEL systems.- Drop BuildRequires xorg-x11-server-sdk for non SUSE systems in particular to build on RHEL 6 again.- Let ld know the path to mysqlclient.- update to 4.85 + When running the test suite, the README says that variables such as no_msglog_check are global and can be placed anywhere in a specific test's script, however it was observed that placement needed to be near the beginning for it to behave that way. Changed the runtest perl script to read through the entire script once to detect and set these variables, reset to the beginning of the script, and then run through the script parsing/test process like normal. + Expand the EXPERIMENTAL_TPDA feature. Several different events now cause callback expansion. + Bugzilla 1518: Clarify "condition" processing in routers; that syntax errors in an expansion can be treated as a string instead of logging or causing an error, due to the internal use of bool_lax instead of bool when processing it. + Add EXPERIMENTAL_DANE, allowing for using the DNS as trust-anchor for server certificates when making smtp deliveries. + Support secondary-separator specifier for MX, SRV, TLSA lookups. + Add ${sort {list}{condition}{extractor}} expansion item. + Bugzilla 1216: Add -M (related messages) option to exigrep. + GitHub Issue 18: Adjust logic testing for true/false in redis lookups. Merged patch from Sebastian Wiedenroth. + Fix results-pipe from transport process. Several recipients, combined with certificate use, exposed issues where response data items split over buffer boundaries were not parsed properly. This eventually resulted in duplicates being sent. This issue only became common enough to notice due to the introduction of conection certificate information, the item size being so much larger. Found and fixed by Wolfgang Breyha. + Bug 1533: Fix truncation of items in headers_remove lists. A fixed size buffer was used, resulting in syntax errors when an expansion exceeded it. + Add support for directories of certificates when compiled with a GnuTLS version 3.3.6 or later. + Rename the TPDA expermimental facility to Event Actions. The #ifdef is EXPERIMENTAL_EVENT, the main-configuration and transport options both become "event_action", the variables become $event_name, $event_data and $event_defer_errno. There is a new variable $verify_mode, usable in routers, transports and related events. The tls:cert event is now also raised for inbound connections, if the main configuration event_action option is defined. + In test suite, disable OCSP for old versions of openssl which contained early OCSP support, but no stapling (appears to be less than 1.0.0). + When compiled with OpenSSL and EXPERIMENTAL_CERTNAMES, the checks on server certificate names available under the smtp transport option "tls_verify_cert_hostname" now do not permit multi-component wildcard matches. + Time-related extraction expansions from certificates now use the main option "timezone" setting for output formatting, and are consistent between OpenSSL and GnuTLS compilations. Bug 1541. + Fix a crash in mime ACL when meeting a zero-length, quoted or RFC2047- encoded parameter in the incoming message. Bug 1558. + Bug 1527: Autogrow buffer used in reading spool files. Since they now include certificate info, eximon was claiming there were spoolfile syntax errors. + Bug 1521: Fix ldap lookup for single-attr request, multiple-attr return. + Log delivery-related information more consistently, using the sequence "H= []" wherever possible. + Bug 1547: Omit RFCs from release. Draft and RFCs have licenses which are problematic for Debian distribution, omit them from the release tarball. + Updates and fixes to the EXPERIMENTAL_DSN feature. + Fix string representation of time values on 64bit time_t anchitectures. Bug 1561. + Fix a null-indirection in certextract expansions when a nondefault output list separator was used.- Enable SPF- Fix service file; (boo#935601) - Using bcond for mysql, pgsql and ldap - mysql, pgsql and ldap enabled by default- Removed executable permission bits from exim.service file; (boo#935601).- Remove dependency on gpg-offline as signature checking is implemented in the source validator.- update to 4.84 + Re-add a 'return NULL' to silence complaints from static checkers that were complaining about end of non-void function with no return; (beo#1506); obsoletes silence-static-checkers.patch. + Fix parsing of quoted parameter values in MIME headers. This was a regression intruduced in 4.83 by another bugfix; (beo#1513). + Fix broken compilation when EXPERIMENTAL_DSN is enabled. + Fix exipick for enhanced spoolfile specification used when EXPERIMENTAL_DNS is enabled; (beo#1509)./bin/sh/bin/sh/bin/sh/bin/sh/bin/shi03-ch1a 1721891828  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]4.97.1-bp155.5.12.14.97.1-bp155.5.12.14.97.1-bp155.5.12.1 eximeximmailqnewaliasesrsmtprunqsendmailexim.serviceexicyclogexigrepeximexim_checkaccessexim_dbmbuildexim_dumpdbexim_fixdbexim_id_updateexim_lockexim_msgdateexim_tidydbeximstatsexinextexipickexiqgrepexiqsummexiwhatrceximsendmailapparmorextra-profilesusr.sbin.eximeximACKNOWLEDGMENTSCHANGESLICENCENOTICEREADMEREADME.UPDATINGconfigure.defaultconvert4r3convert4r4docChangeLogDANE-draft-notesExim3.upgradeExim4.upgradeGnuTLS-FAQ.txt.gzNewStuffOptionLists.txt.gzREADMEREADME.SIEVEcve-2016-9663cve-2019-13917cve-2019-13917.rpmmovedcve-2019-15846cve.txtmitre.mbxposting-0.txtposting-1.txtposting-2.txtqualys.mbxcve-2020-qualyscve-2023-51766dbm.discuss.txt.gzexperimental-spec.txt.gzfilter.txt.gzopenssl.txt.gzspec.txt.gzutil.gitignoreREADMEchunking_fixqueue_finalnewlines.plcramtest.plgen_pkcs3.clogargs.shmkcdb.plocsp_fetch.plproxy_protocol_client.plratelimit.plrenew-opendmarc-tlds.shunknownuser.shsysconfig.eximexim.8.gzexim_db.8.gzexim_dumpdb.8.gzexim_fixdb.8.gzexim_tidydb.8.gzeximstats.8.gzmailq.8.gznewaliases.8.gzrsmtp.8.gzrunq.8.gzsendmail.8.gzexim/etc//etc/logrotate.d//usr/bin//usr/lib//usr/lib/systemd/system//usr/sbin//usr/share//usr/share/apparmor//usr/share/apparmor/extra-profiles//usr/share/doc/packages//usr/share/doc/packages/exim//usr/share/doc/packages/exim/doc//usr/share/doc/packages/exim/doc/cve-2019-15846//usr/share/doc/packages/exim/util//usr/share/fillup-templates//usr/share/man/man8//var/log/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:18492/openSUSE_Backports_SLE-15-SP5_Update/7ed5b8604bd13b8f996beaf506a45d30-exim.openSUSE_Backports_SLE-15-SP5_Updatedrpmxz5x86_64-suse-linux      directoryASCII textPOSIX shell script, ASCII text executablePerl script text executablesetuid ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=957abdbf0a261569d933e2eb8847f592f3705007, for GNU/Linux 3.2.0, with debug_info, not strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=07b7e6c9a18cfd76334afb6c7c3a302fc8b6d054, for GNU/Linux 3.2.0, not strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=98a511c1bea455f64ec02d3bda819cf7b40d2589, for GNU/Linux 3.2.0, not strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=2f8bdda5d136ca86d7ec5b176b26be7a0f5f979a, for GNU/Linux 3.2.0, not strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8a7009af3791ebacce252022f9ee2b18b8feb537, for GNU/Linux 3.2.0, not strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=7c26d2dd0b642a11876d46d5c06e3aabe854d87f, for GNU/Linux 3.2.0, not strippedC source, ASCII textUTF-8 Unicode textASCII text (gzip compressed data, was "GnuTLS-FAQ.txt", last modified: Mon Dec 25 18:42:52 2023, max compression, from Unix)UTF-8 Unicode text (gzip compressed data, was "OptionLists.txt", last modified: Mon Dec 25 18:42:52 2023, max compression, from Unix)ASCII text, with very long linescannot open `/home/abuild/rpmbuild/BUILDROOT/exim-4.97.1-bp155.5.12.1.x86_64/usr/share/doc/packages/exim/doc/cve-2019-13917.rpmmoved' (No such file or directory)ASCII text (gzip compressed data, was "dbm.discuss.txt", last modified: Mon Dec 25 18:42:52 2023, max compression, from Unix)ASCII text (gzip compressed data, was "experimental-spec.txt", last modified: Mon Dec 25 18:42:52 2023, max compression, from Unix)ASCII text (gzip compressed data, was "filter.txt", last modified: Mon Dec 25 18:54:28 2023, max compression, from Unix)ASCII text (gzip compressed data, was "openssl.txt", last modified: Mon Dec 25 18:42:52 2023, max compression, from Unix)ASCII text (gzip compressed data, was "spec.txt", last modified: Mon Dec 25 18:54:28 2023, max compression, from Unix)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix))*09CDJKUVWXYZ'  RRR&RR0R*R,R(R6R5R RR!RRRRRRRRRRRR/RR%R+R"R#R)R$R'R.R3R2R1R4RR-RRRRRRR"RRRRRRRRR"RRRRRRRRRR"RRRRRRRRRRRRRRRRRR"RRRRRRRa )̅1#]7docdir = rpm.expand('/usr/share/doc/packages') pkgname = rpm.expand('exim') path = docdir .. '/' .. pkgname .. '/doc/cve-2019-13917' st = posix.stat(path) if st and st.type == "directory" then status = os.rename(path, path .. ".rpmmoved") if not status then suffix = 0 while not status do suffix = suffix + 1 status = os.rename(path .. ".rpmmoved", path .. ".rpmmoved." .. suffix) end os.rename(path, path .. ".rpmmoved") end endsystemd-sysvcompatutf-8b1234539dc8202cfd116c6257071e7ba623deeffacc7d350fcd9cc1c9b3b1b73?7zXZ !t/]"k%j[ͯ x*<=Qh[[` Sqz>1g`!*@˄+~"A ~]/FloMWĹ'丨lpέ0n'֠XMhpb/.u5"/re0;G??DOQ^v!1˾K,I؆LE:l& 9ⱐ}62[ĥiÇٚ;k+A Q"Ÿ%M:3r &m}W2,34+Ag 95b|Pp}(\ErȬhzn"O{MWb_6C/^0 $%F%Uޝ _0i<I :j3mt:p&[M7} ]g@v$>&( nTo,諷EpNg!θy'ˈ?򒠦43tMG^Va18wk_pMMQqBŻ`8fjB-dO3%<Ȓ yc,Oԃrah[rooI& ':|,;mX\>CQQx)ݢ,>]uU CGޕ*:Gn~&i|yB仦2E gb$3;ńނ[l@<-f<&cJԧy&ü}jȝoU R%|ܥܢ:ɱ7a:P[,\=`u׳6ոT2`P3 1 YC# +DTL$r$?q~,CBl)>E.o1v.Y Xضu>UP8i{{X,D +yu;ባRrw=0{,2ue fuA5UvcT^jNƢE*$/VUW(naUZ,>n#!s53aGO ZA>k>[g#g9E3ˊ'6 tݵ\qwS9>L` ChHqyJ}5{1ޣ2 ȰPopkKnֵi3FPU ËՒTX9(6I KoS0?Etڑ{75c}c} 8~L~uخ-UeMMځWp1ҥu;] [ZBVd >.j1[^|5 [0Rdv>;5bQ"tG{N{ƭ! q{(E|k?\եbɒW ~) uElEBߝ:g~#8G'$f'w:< Øܟvu@zT6baX,P e%(qfLOwZk_u"̨b<"i!$ӣ` ;xwԾaom ;蒓ZmkҭzTj\rb|Ey} Xߙ tMipD#U[]{mZ'v@G%, Fm{f$N_]2( V=W5g9!nUPۭv655u;;EIIԏVikk &u'o喺*YtYC*ز?gՔi)L@v3Qc(6:`I y>[5*E^r~D"XsZ˂z g,璚b?wItG-lJӺ.Mc202 Gї]B?A"gJ9Ͳdd~- ?ņ<ڞc'Pl5ꠕjLfLigY݃ W}nŒu-b$T? c&Zyw̃pϧs?(IU2fpRh7VT`އq4]- =q6}zG3FMQdG5q7-ʛ@xm|$$vD^ 5?J=Pۂ."erQ"0#M$t PA%,ޢ8veѱ)6Ǔ'.a+FGm m%]7[UĹIඒ.5d'y'CG@Sc0&QvV%PОRgrђ}=qL%s](f#?zև΋+&0IUe%H$%| ׭eaT(8| u/@hX: H?QOgxQ $tŒ$u[廯%в)<*jtHIpqiSeXG[aB' ĂWX9yT6+vϔ*[PDV-e9LW8uczY[ *\cqWTOs'52DLeD`B$߬R{`+!QN;~#g8UWXV3¡JqAh`'q7ò7d̙:!e$Zr 25GZMFޢPltT ׿pt$;iP-;HnejZ@L*<Ŭ*NQr($K=M!X}u62pRx}28`IJ89VЃ<%EeV#Fcjk1Q YK?u5ԧv=ܪ߬ɶκ9 BMJ[REO5/Mj1o82- veS)S Yb1U+;i K=>PId8Thkش*^)=ÐJ" pFOE%&ՖLϨI+}Sqt5K|jwp`Qd|}Li YGc  >hɇ:Y)TA_,3qZB+B4›{O!!* J lMl(F*$p&mo<̡k$\ԽNĮ%n#b&Rmg'-*ZmA4%S`)Է QicQ(tjL0X .^ g3r- h]D{N=Eڍ4ЁD?tLFJEs$' 83[ppqCERmt7G:d %W7٧)un*mfᔌYX+sE QGij4h3dݶ/#0mʭSr}^}#iν^N5Aө85+6P0pjo`P]_MRRW%?\ ?c)w~'*({bo53̠U`aNՊԨ *bX &EcZ uMly\; KQM}R90QBiyq)&Np5WrYGpn+zxn8R)&d>YA2v2c:;Ѕϴ+k͙#Aoqixt)M/AqKJ>7nxU"B)i6NV$o=]0w\=4It@+HȦc׭ɕs蠈Ɨ&2w*D[_%H#F7HX5>(lFHO_FL˺:iFׄ(Cw~ 2S =cx *S2I[4Ros JRGzqBHH- t$0"[WyQ Ѐ}IOJ -: &ϏpOYW>ES[L g!UV5緥 jqE6¦ x] Aj=*/Tq)Sv0>xJmX)|f1uK?'q} R%.7I2 ] <E;DEM΁1i[iF5}}*͡4(ڳ qI*+y29h}Jw>oPNk%ve ,~G'$ z4%*vbk5(M7=IcԬL fL23TZ"֤}>k$0\׏YH7ȟ]~X1Svm6D"R{Êv7%KPr,ΔƋ?3I&جapsMè=COqU :c*ųڑq=A'{i6bl!^#N-W~*FKZ#&RH@N:~n~>6dcI#) E㡇\6duE^OrPdsط+X<Ҋ;0O, 2ޜ⻦;i7y ǩc irM˭m_ Oȥ]/y u|̍|Az'd~-<]]nԃ?oT@AhD'm,^+ {Կs1N=qo2MC5$OBn届Wu_#sl?9Z#a*aM j=$\zG%[lqI#:`{+gNpKei#y<IqlE4{|u?ݾgp&a< /|EӤ3=aUS`h{@EZvwJ)N| ʾ'a^.ZPe'Ӧ׃nKMgY[L+!MxN̏rjwzlv'b6liNh[ˉ;⻠w8T\)r1o;m*W;:.MH!52f֍ s_7RC߆/ 3#4Y|&h|QyUBiy}.Em;̫3O2Z^u*ՆHG0jNô^8jniZ"[M Re2b0`l\;oJPciWercffW fɥ#s M'3)Cډ=A ۶ER6&y]ȝ'!B]"?qӓ`5x tci  eG]Kw.Ð) .nEkQX:yE̢ W=墄O$r v_f~m.ě_+%.w1`a`[〉2[Fz_;i5xWUlf=f'v*!scsP|J3ooE`/a.v[\"fW]/dlJc iEo`:r+z-A"zb y#V2X%Y*~U9ރ1~Ӄt6MޠjkUyCZ4OY:u]&|&HB_oa;$ˍDCG>rn$Dn)HE,Pf/<*ZtY6 F|@qJaʣA1]hbw^<Kֈ_ڙEiå>J3D|obt/FC0fY^ wnژV@@Tcߑ> 990hǞePFjrSg5 YmswIR !`0Ñ=CXB6}ePr4 L▆_Uҙ7h4wǶsklhJ i5 _h<Rsӏ/ kQ;RVui'i% xʏ?6,!5 ׿eEA=[l/eoDe*v_&Eh!1ܣyT|1I( : FN&cȸÈ39ث_Q 4E?d:0˛G`^c98pln>YSNX<*V'4S9i|?vlSY+|hP*wm>N\ ĸd 2;iT}Qe71.+. =8zQ< 'RFW^6^B Em^$%dl#qA d**Umr{aފ^9eՋ/ f\ +1vDpՎ恭μnnw&\IK'UKb*0 P"etfYQEH !FYZirtfKR0`UN\w qhП (EH:{/Z<O A612E4A3_ək.xAʐ>m"Qra.%LWktKsp%~1dEYg-7#* QhvY$qeOpn'&s|8SFބ ^+K^Im+\85;>$D cVtRFU]='A)!c?ffRo"zqN`q3RKNz?+O1ZfS׺Wԃ5Ӊ14;ǤvРȏg>~)-4%5y7ev"0A doJ-|[,Q7OR@(ގu]GwBWL4(/H\%>*&{C!4Mk`"y6h1`yM뿃_cF> A]+5\8@r(#A5_Fşh<C|<<*6Q$m檦)jWuARoP-c*mI 1]I$BjnH1tH|eW~WNKɠn4aqnu0O+X8-kJkj"xdv1:!l<y`= SM΃Rg +#P:O'6C,$lt㜂̍(wh}eHőڕ(O C"?ϱcڧm^\Gqm+2{r秆P kuҡ,|aɎZ(Q(6=#*%wIO_1|/^lq(ܗP +8|A=z&fr"3; Ylj=Q~$ۍ b/m:<sk7eY۸?*<$TDNsiGs)֦zU|zw t~'1bV1?TXׁ "+ge~dsAt!n +]߫Z*HZalTpvZn{jfRIv,ZHW`VwHrUDŚW+_)$!A0N<2Xpz R]LUNGAJ|/y059u:u׌UxI8@.93oOc~7ݘ_i2xOWyYdq1-kWS Z}UrE= `Ћ/o9ie'_=/K&'dݗ-p3iKOA[- Ю'g5.a2pM,dIY3c*N9nv*-_ "?(rڑ1.}l0m KC\$!MGl|?ʘחvlv6U&U~̥_ZB(0-?.+=fRןL2Mq/vI4>ުbIE+f hm@z{?CbJpJq +eWG#_mu0C&G~{`nJ]h.#$OVJ^*P R}2 Nhdձ1;H+e:Pv@5&L7Q|iqGX/DԭQ|NeU8н;))"'(UɜS%5ϫbAc3pgG]b41`/;~#v\^^ 4#h<;ֻ6p:nNluw">KBŌ$^ctʦ;s ̽52$TA$P_p"!b6ZZ-8l]HW~ϖɏq0s9&t{I̠Kb.i=oi 7 Z_[8Hg+ŪHs/[ $W&9:,p"-z>絀k"w2Im1Kkк,wlpúME!Ks i2 (c^.>jQwyڮ䜂 Œ+^ڞɻ-튆3果m}!$ W*ܳ!1s'yko4@< QgӀ6sdžnKi+?okd]#?ٸ7#Ehvf#^n@$VxrPp!kM&imW9'ma9N)qJytrIAexd5b,S1wbج^'`,}7N.:dl!E>".m2Q CsB21^6%TUz  9Fs~ 3,klnՊ0<(cPҞ.aZUKIX$6.weq{1qQHCػ8*DK2O=A9]N20N/RÔaQUʏ:* ?)ET`޷0-B=u /}\ug88Ҧp\rzC\Ku~MFf 8K I_f M뱘/K@L L7礃`m}fxޒm̝r5\U0hO79Rcʔ% %`xV kCFc8 ;P]}@$;ǂ[U\w1ɥxvU >}?L/1x3zqs+M,kwwFoBH0X/Wis2h Omkl9I3)[EL1fGl+\b('@zҗ%UwaAXKV$t.b.Tlw%2os4G| nW{ me~d-͑nz' F_E-vDu;K9ġ]U9.BD_qG9|о+Q_ە7 i{AЦń*vcFCi(vA0nEQsѕ)"BCMnɆ [7>ܯ ,f[I!9*S $>ì{!YDG'dDڻE[*|m|{^tueW/í$JZRQ.x=ľYoqmTH=|I׏ad?XX{ |+Mjsڀ%lS2vqZ?&ٓg[֎v'-imYt;H&,L40ESs!Lw7Xyd^1`PaQ 9Y)c$_ېWkifI׆ɉ !8u`CTi=ĸsEKLą0جhxBJ;$fЅ}Au1b铝U^t͓{26GRjO3"E>Wmvo=Fh!^ |Fm˛?覍WU+Β;ep^(mjF\Lͅ/&`=^$ה+8G> Ӛ N1o_p*)1_SrKȋ HczSgXŚ# Mc}Pc221kR~(?+ ! Cxt[lr3x`{w"^=mr:`lG/=xUG͆3mH0_{@C(#Z[\Bѥnt[f"z K 1n'g9r@ 啛O rdksj{2gߊ4Y;].Pԭw#[w1ڠ @wVYuV:hF>M(K5P *jKfEϗ’dG J&s|nrEݨfbM`$ PDØG ;mj1j'A0W8{'gJ%jӸR]ue;#+8f&&,AI5&!#'iYZ.V : +ƍWs&w/w˭ܾmr3FSb+4B{_$&14$ҠIh֗ <ybI<M5lIM?1IqY? 0cI%W'JP#KpRQ4&b){$Z![2?j$=5@'YIaeDDQPe}!WMϗJUxrջka/od> d ~Z#xYۋKeeA8KcW\%W` zOD㠡Ŭb4H\G;8/O+)%!3>uy`3wb޶:ו m%x^f-uC&/WpȏDRoD:ӋIJYØF#P8|(3֌|] }:hT 9DLxxRmIYDQv"Z rE/t!_="He(ifRoe6)U;i=U!Qy0 8 <[|1@< OfۚP˓dݞ* 1Etil"既[*oeU' !y Kr&r]/)~y:zCe0V3~3"èũZ1_%t3;))y/ƿHZYL$|>!KMR@0ݥҺpUub:-ԣSI`qk+tH Q?{:vhq4pO90+6(gRoZqҺC 8^nk@'@u+l XD,lR^Cis'.lS1G*v2Eֵb 1֡ok8ZA.?d?ƳQ)e.=YG&c,4$N=Tj\ k齋YGT,O8.e1t64H**YPJl_\.>9{#I 8L|ZMoKBT`.DqE0p꾕dTHnr!D)F gЬ}ʁZdjNM4Rp%U-k wڥki6s%jY&c5cSWKǣ L&%-VADӫrG1fTm+FC8ӕGBNӇroYm@ ay}~}ʓF\Q^q<ߜi =2AX N~kkxLѼVYjq5oUSv ^[Fƞpli]Ap恡 UX!3f(<ETks۞*Rt?4^-.xZI4;(5AoԶ&KQVFWNܠj*Ij?eȒ f~xܸav -!HRB V!hY7a~[hhi)WfbDH :ݽRa|l6Vޣmay X`RS{Smni};K~#"K *ohrE:I)iHN@-xxh􀦛ΆC KֺT'0WՓH%zxvß:sl(q*tYą\+j X~6`(߾b6,ax?V+h[K3ӷY)p!wFW "JlZ>,.u$ndزD6.TVʟ׶^aP! )ɐ s(9Da~ۓ` 4p>.|YJ";jVnb76$%{R\5:8GGǜ3ym6oO{,c 61ީm7WcmspВ֏ݟ`ĖJ!ZHV88$8 >k8͇S];jӀo03tUUWVmv,p az/]d:_*=(I z6zqĆim~' ƉvEz[엉:$϶쵼 NVNX*䋂!iKxH9Lbv-" K 桗'd^F ՈRוq1q _Q^6d+uV"IC=J~@rSmAeO=Cv)Iz俢5;-RDϻ՚ԅAԟhw% ֭ÚY;uBBܯyϰ_XU *nc0:wT2YeNR@sa~%N}H>\)aQ'X{ :s^o ~>0 Ejx4Bu[%dMa*L8}Ф M3L&GN=.|IY ]xL@؋%7hX"3X=$HYRP{׽`kL\,`=Zm<͈y-!t}\rPY(ѷo]ZH Suxg3J!k} t"T5$ _t~/_C~vQy`a'hDԜ@N$q;{ubh-+g\|9+U%vvuβyzS2\u ,Χ|ח<05eÊ&RN3׽l gBP X k jG63էbFf$)SeOƟf_-&-W L ;ݶzpS磰tgG jm68(/@Bd+ЦFɫw#&E%Ó 7ttr}dr-E>Jo<}>TVl!Rj崈ϦeRWXq뤙,-Pf0A@yTr]]L ?n#Oc烺}w06zw=d龈v9 SHКЫ27.EU:6`~cHZ97`EUnx^#[zm1gSUAC4P 8Yõ{arĽmZ,4 \ۦCs^|~NKjxpF:>Wj.먹̏6HB x~ɌΪ̱~hl""~Ov9CX"._V;^!0|p.W^ϊ8Kg'K7E]xPwBrxǍB+LK=;qNdR0gge:YB~4Ls|9)x]#~/`ћUfs!_]ohc$ i%SࡌZLkvY}'eZJG)Xtc8 Ix!2Y}`K`{$Dt^ ۪ Q-0‰ua<{hbE>^ݿ|<oj5y# ۙ5Yy>6ג4Z^muKA8ХUe IzAchT( $xX:߉T觉utS+FP|Iau-t-21[xߝcV@jm)W=?8 Bq>f~UOٕW! ;};T6)!^@tӝ@p0*8 Q<{{ThGY/"uz+z\#"0,X_– }Sܞi H} LzSuD gIL[vȘi0#Wßrx?Mz-j4z:/hN螽WS$}Y"+8ݖSdI6lkYh0/!̊ ljSF6(g0I MTݑ]+W5)(/ 7rL`Lɧ:ǏÀလ='aKXs #H9Z [2\Dʜ@d,+Jj8p GɷuX YXf!a_:p^fؗŷ[D`B.-vL դKٴRz?b?7e'L-ۥe|!l0ƲG{|DyW2I妋93}z`lBG2lhJdW9J3y0]i*1>/QAύ_e=/_^bz@,X8+Ls)ZR(`wW)nfKd]}yUBP6@Le,)Hb2^ duʘ]'B̴ Xj]T"~*JU˃=_R=_uϚ1*kuQSAG'>#pݸ$˨o.xM`npjyj@6kGh} F p!5TAcJ,Cl1]BRt tCoM8WN׌&H Y)tAfGwfq@>9%,Ev#hSc_I8n(($#[_tf*bsPԽaJhJo#JZB\T^1)ً&ҟ)a1&mӝ{ü2$ b`X`/1V00IEYmpqV(锤$,bV9N㞥SXȉ.ǎPkLΨ\(쎁€ZS(Lrbި$KnpN JȽ7:O@b}Ix;D* ҝsSg $1ؠrMQx.dJm`y[n?^/E$S_ bÎ萦 t)@NYB}VpjwGdOڠEɯuslӡ?Z(8Mg0:dnYPY#>F unwow~u 1 g(/&Ч$g#v%iHla\6P06;~p]r >Y=9nd&Cy1>9XlWPnkVdķ?;b]AZfuf2-RqYlv)Nnp-RMpͺ9rFDL V f'>CUjq\\կ2,l;N7kGƻyNU\I;D©b1Vc ?rV,S'6ӗ6 7^$N`e:iii!b.8(;8p'1qDߎg'VpY,I:#m;1U¡/?Cz5lB LJ+Ƹ$ٻ_o>}"}(*1uҶƋ *QZBC`IT-To q MId';nLT:h li\73 4d9qf\=W'{r9"7y>.ɐj>6'x$|cnc$Z:m?|/>\Q8wA1ײU/WBsx*R0!Je]i\i}q6qEPilvd} X;7urgRhlؗuVujtx^܊nwcJ )4;ȸb>!ߩtv7w%8an x]WٞӹJ7Oy5VOYũK_i6\5<bH_~B؈Z'0ưa {)3H217[MOIj+{*K౎pQmJs?B6oQTvĵ IJuVOD=Nz,T#FZ hO݀CJ)I/B a哸MU(DJp{Tʙ {+vJP{yV+ )JEڹУ1SA҆>[wYPCO-LQwlyu5EdNgR&{T̂4-~q {dP3ę< @]fnQ WDgIDE^\-op, i 0n됷hT3L(Zg\PٜkƇў^.XmENS Q ]ToN<꧋JcI鍶Ly"+Qj+x G+X7ݤ<AH>W}(ؽR\l0ٓLb+Q>d\Abih))%uwۀ<--f7wov8o i -,L%=jx<,*@:pXWvIlHv 7Fj Mb]<\e>:(QP,p^iUj: lA]2KYi SOz{_DşFj mE;+#m:׏As):ΐpuW15ubٶ!ruE5_/գA1u{V%rfު(b~.%6Or-q(p;E=20d._N`}:@cPʼg(a%ƿ cJ*lWB*yrPazܔJ/ſ˧)X &u둪kf(J@p`0 $\?W뺹@kZ Jd\¨ B7 Y1$j g}hq\s@HK}`6uDLE3%4j|Pa&'̒Dc6 ABn5wAs$Z)#~f m3fp op{0h$E".I Z/> 0k7Yo -%r7J,͂Ԍlߚӕ(lɛ aH 0 Nv.h N7:ks,?nv,8Z38koK86 X}'RIke0*;E8LC%^wu^*SG蒕!;w#qEݦk:(MngjҲ”96kўt̆XO@ݧWV,X2_C,Yu P*{EQڟt̀l hjQkȤ9qA@Ss\=U0LLxJm}3enߴ^F~U k3 BK}EG2Y)alal,4QP>0{x'pΙB9ޯ qيv$PGK[dkS1+on .rhtpT!2a:I8/aܡCLl.c>3AkMfƬ'P]'\3O>5qo(q/ 3}>8Ҕ Q>WߐdzOE脟v4[NNkf2ՋG)^+m!0 nu- jA> B6w"Z7Jٿj Iq!p# V՛ЃB/ KxEX klӼ(( H =%*VQȷ(I pp`Kύ%:KQYH'"*PhQEy+inBr?vX#- $\SDkx%R<2kTƺLXʨ5|(wYIC|uGG` H'q5vR}<n&!%mx:aWӂ876gJt*r8UeD evЕ?#˻A6T6`~A#>yZU˶oAm=ovne7`YRn2 V@`TN Q#9SfpK& ^;y\21+[ګ ԹTsy?bԧQ +3Őr:g'~gZJ:AKԿN!Ģ=0 x$ ,o, MůFZίe,cMԃ?[>dËm0>l2:+@) +o|gp̈{8؀)pD3>/6ZΥrz5'mPQil^A*.@G4ZN=fBL5=^MpA^P2U51ߤ(o3wi_UԴh#:,¹PQzf#op 9p@r/yRB;T>SIpG}Xe[=ce#BaPbߪ)'ͤOZ gg u?x—! yC7Z/}c?|WЊmM[Y!H%*C[7@)Y껡/X[jM"^tA hqN=;4 Mb!tAu@ϟAQǚAN\gwձIUЋc2BVĺP2Y* RkΫnذ3pcL!?! Hjqu 㬦o{Co#fC=7Pyi=ӏOeJ͜)I ;EB`t͝5gra5xza vڧ*\ayV,Gcn IeRULO_􃿛3ږ8ŷΛ &.5:5Kx{O_#Ԛ)+Y{̵k=;V T' _ 9݂6#Ғ;D/c6uxKj^ =a Ioxgqs 5WPxP[:P_H8P}x16-*iyyܯXIdt ]˹#~BR*/z*ip)8d`YR'CJ48i3٦j,xq>@ؖ S1JϖRR/6K xJu6=2s 7)% ABUrQP{1[/xބX_MO Q\uvKXBZ{d1ˮ[vfHoB)7N]'go\F7_dmL=u0zRM HaKl3cfo#!VrېVlF_5j]ADW/+).bRMާ9wB vcW݋Pc%4L1 v>(Sgݔz%Bey.^47@2×F,.(0$ɦ܃o",A$VEY>. ?5D*_o~ds7~oC<1Z!3SHg'0G[%p Ү>k#kM3fS3;tmTcUAI= }xrL$qSn6Ex+9m!餬N3,)Uch钦*z8;N.o:FmeAH΀ah} Y hԞ][~n 7)y*bQ6(Hik]pU|TaHzDm>,]O̼ޤNy_(9LmzL`3} tLs(\o հFtY_8 { LIC1gB\ŢU7,S!nHD}gQ՞e}`z%'P卫\o^pNShgY#N >&;bJ=UZAiޡs`e9%2n.[ʹ:ĞMޮ<.eLϹG୪|W}˅~uq#' AŌQ}!hIQhaBϕ7t Kv]!ۦ-!r Uy- ̊QFX[M1Ewqa-cT{𰀂XRP:*EP6onl%ꚣ+vy.[ss֑mӱi`r׷7"#`dBТ/0n 6RηgTbn7J@)E\$q"@S9HȷzʄVpR/ɵJޫDҥ&{czyɧNΘz,z<E0k2նvDx\M@orޜ%Թ.atد@ͩ;H*^d̓%kՀ'G ^[FGfT|C(֯[:I_)]3Dly!9 Q"mZ bB{ǘݪt)C~u"Z_4`Lŏħqyz#Ӛ<=f6 ,xz#P0Sǻ_W8[ĸ2:wBFpy&W}t0\T72=Wsv4(6-{ SL;͓%םiSIS0}CXAuу@MK1Ʌesuk0A>*~ϵ2F7{Epr_ o_'햰řzoFYXXؕqiȜAK ^6"3T I(|҃wGPϲ#v-Qݾv7Yݕ.W!Bamn )(;(EH((#T8sAM ;k!7ZcBb"o7@t#2m̝U]A8v0iCm} e m?\z],x,J߼1QϸԦ{y[ö(m= cΗ er.eLhɇJZ~nҿ!me^ 5<ĞAgyVk?Lt.cWhcR]sc~o!0Y]}>uPҨ.v&\$N5!S= u!DH}N9H6 cicow\SU3hK.;qVb L<^8Tނ5˽Ug[%6+( gpބ^}s)X&k1KەXxU b]B|hjNXpf=5dz"!- {:MZ>K/R1<[oN#JMKOm8U $wW8J+kh]~7ePw1'k-Lx2%&bRvBq+[K5&)O9 ;ʍǚL}nV'DW!`~8@"%X+a ;VnUsEAN'v@*^5-eQ Ӷ*T/'W \j:?ּeTDJ6nqtnа.?‡=G4DSMkL%0Ώ:G'=HK2dZdtʰèNA zNRoR}0\sn, Ѓ:βy5"\#Y`' z[&yɅ7UƠik]U,P~Jr`9To膟\0b_OFEQTum]3À O8CY|/YmqPtz36pn ĦV &JO~K }sYھޠ)*\EÅ=/'i26W z`-/ӊ&Xzqoh7ndiNZLhD;3e2gʀYù9QL0$Y$ΐ+s=Edz 8 Y/-9ASҰdV BHXW8::3i,Cy@Ds M:a0mVkM#2r.zh*1.lljaJ`E&¼z:ڜQ/Qkpwq )#_];|4$Fdf ۥA &ٚ9YPvgDWtz6o߮YnZ`*]o r²SلsIO ʉ ,CƟ=*H),b*Tzj431{(HÊox(o')67xTPT%|"];Hx< e ӓ8eTTJxfs/nfXj@5euC\zLJ|q !q R=Cxܚ[M{%JSbpXZX`kP#~'k;e&@رK&5Abz|Rs@sf[Qi;la@u걹^)Y%F0,{{M dԴ /J%p+p&4 xLe%|fef thvGH3[Ib>W%?2ݙJ!+ 4f촁 Y>\miP!ݳL{R DjM0y5]?ъ ]Ԏj JD*G?UCV%&CvVwrI} rpV)tz|bBen*lh1F9VAX$ 7DJ]ur.\7ފ -BLjS.9^*c-ad3|Ү„VI"I߬mҰ[_cH24 vYNP?!Må5&zVuiS=d%߆nYN*3@$tk PWJd`gR9WQX`Bjn󵸻%BKm"8bAy7HH\'Sd9PME+3#k|XS<2:9/Y*.p͎pDr'$jAOKSI+qҕ5 ;)!9GbE~1~{CEZ1ϯbT#QzL5̱6Ƴ &AZkq">x45"%r%>8(/!>2= Bgݽ~VqP:6Z=a(Q,("\Ҥ"0rYC:~ГN6>/Py[wϴ gK7+) =ty ,Xi~ nzžA{>[V!I٢~;!k-}\qt׊ƲYP"HEO1ca Dfn`3Բ ? n_FG,6\ 2tՀbn0!1V;HS!}_;pU.&el<|4(Tjc׋>W>k`# JxJCvL{% EL7fM _OfH QڑnvL.PQyh2ɭR޲cRZU߫ڝZ5s^4G)Ь3x*&I:A2k굃wy7ucIצ%XQx%&M 'VA F={Ǘ8 U^ TK\>UPGLhAbO$)ncCj ?gVKh^ӍY{l_;wήQ̦->#U@[>'г9QBN#m FJDE a'@ ZRy^"J=Y؋ZC~QfA /)(nlWim@}2=#wܧF GSNdmcK/ujV##BUR\eeKB \ u}ѵZNUAo.'UP[qfk#M`WGМ|N=+֕{ѹҲTEܞԹ4 D,uqyS9ִԙ,OA@rKK5on} #Fs+/v[QT4\wEZ3-;SM+(hPkaC 2cA@ĽcG/*< dNİBqaiUPAC{Kގ[*d,Gz5c%6I.vS%; u,~?'^-/w`|ug><40x|"{x"6>N[[[+@L.۬@OףT\'꾫_ 5o"HYum[Bz\dJ ϛS1@dM/WqR>hXSPѬ7#[ߘ2F>:IcM{RaXM ,Ty{amwT @D_LJYUh_@_ ^X̓DžkЇvF1vEʗ@ۚV#y.ҹN PۃqM z*Z4¬0g67܅d*] lOͺ_`+DXZB=sYR0#G*8Vm4:0,Yb@~PK 9:>M/~B1`X"OY{8W,x>-qan mεg;muZFe{K `$m]{*#O&_jыm Os\xs5Z6unEڙն*B>=qI+Q[9"aP 2w]MFZSfcp5\Vj1ӂbUf%w,c }&BWf*?ڮYctpi* G4yX>݂./Y$Cꮦ..Miڃ얓,舂0tB?G|@9B ]Yg, 8 :ۈK~e,'?)-e1)J]q[7OYԖߔ5o߬};\Ke.?}f|X+aK5]l0cMߓokc՗<'E"C0%5}ڹ:]cj#:",!M=0>߽m;{1Iqlٵ/Xmm jٹе@0QJ1IԅfOc O[HT)鬙9aR oN G%ASFKE接v |Ji:7 S\;&LS3E1#/MA/v sYkNߖ>XiL@yѱ՝Yr6~%gOτu xg^7e}2s^"o;;#6r8/_24#TR%~U- 3pG7  yWE oGd1ΜV؝L;SzF ^Ej檽/8x!a &IKO!pErvJ(Muzَ_P(a|q+'f(|G "TW#ly*=hxGUgChj;0.WɋdtiE,\1,7̊BEǟNiJ:AP1z٨w 3NFt":eOkAb_p6A, ${͢1amw|,9M暱nQ 9;,<ܽH` 4C?K +S",Bw^й'?T1Or`1 {^Q2ڝ YF@$>&rIĴlCmP|S b[Qyf33d@0CkHe|2*-ѳfԦ̀yʹElJcY^=ia0ZWq5&oD01^㫋qhr^C@r~;ٖ[Wz|5eDvl}v z;P d87;rأT|󱂝38`AhҊFbzߌ2 >qcȀ\ɩ2*D/}Iи$TÌpSbiDU0 g v=ID9͋'[E:2ɥdvyq ˁ[Y |'J*4͑40۲)iڏmԊ&O}Txwf sو=-6ͥٿ,!w% Gr?w[`xU3nVSJ䶦ch=O0&D/q3#ipq1iѼ<H*,/uny0'OkVu7#[ِi. q|ײ{"-W#|nA̸KN$PrHC<.AaUtHC1`t,Q&mx|֤tve8喥lr# Չ\NJH#K[9[%E6Aܦ D?zS}NZUgƞG$̖p5$8hwم"{WuԹ36C2uNA]l/ i,όߵBtw$V@hO4eUk|-ҊxĔj5yQTUX0$w0JO,G~BmWj`03.u a_F,-sV1bn_%訖,`KQfR?][o#׀y9d_0IUA NW*#)^B NB>8LJ*. =0Th:pl>do[#eb__ٜlxi[>q[>. o{FȘaY4+ZY+'{dBӅGyKH`e,*ryޒaHeT!$lfp R~_;:MX์nQWE4W$zk6i~S_h?񬭇NNeY='!E>Z%u] >M&}&BW(t[$lӧRJRAwD>q)D`BqR XYX{XRU+$ E}OH~}nFBp O5H&7ыYK28ƒ$L[2OCI"1 {ܫ3i8 Ra. ]dÛr (=dg8 =}uU^f[D8sspޅWAzi`L6>ZC^ܤZRr F+sK`?߱䰖XeGŢj}9G `@DMXAvJ*|op ֎~7MkN8v6SVNBCȫ&~hndrDZk"5DE60)_;jIBtKӫtr"PC_mBm+G[,5@cJdTh]Ȱ3 _H ?pFQ6|8涠k՘(NEWu#,5!l_ܐ*P 5z/>V@ոs4/sKЩ}w])<8n10՟ȵ"[8TުTG~B4^M012\bD ^NJdLzlQ'iK`#hpq6wH D3#^=@ wkn񴠑s:/%7+Rf@_뉑1}ƯCݠZ L<DvHm$ _0m~|ZOLH$Ph!IRKfRg1N p@1}--L=[̟#|v׎~}[ޏ7}vT<fNwӆD07WiKh.Dj]^z?FwkA|!~jKб}aq3mZ41jxT 1.2UVs4Z!ZAJ% \0ۈ_ Ia -*_mSm'q>-Y77XTȶJYJ]p)6lqf[w5Kއ-ֱ(+">ߚefu X:/ѭ4-d6r$ 7q,vNuxyY&%KJ;S8hbH<Жl雉ڀۊL1Z:#OiWt5GK2L.x5i-)ǟ(kC|$j"EnxG c>ftȈupsGA_ 8!xzFU(;Q^pO.V0ϰɃ!P "S ~Q gpow)!i` Gnj{A,I ^PS0jhzQuٜ;{:jt֛ 3tG GLEôQFWhh9ي$m йٰٔ09mQmQ WrlqCN.%v+vB ^ELu0R5NurP+ayUi%ߠ.$Wzj];$$RO?..֕5mX041mH . nzOBEz{Bۛ`@ 07-{rC]ݙȞPP 1S-Q]IAk_HcFA `Zn Y1|_ ?)qŨUe`_u/íTՇrN4q1xp;~~9@AX%~U膭1m"¬w.fIN (2N6Ow&ڻU&eJnwX=qBjs̄GzB MVĩY)HgA~b!Λeq;xT`Xe?CIiFuR;pmkE 6msLyA8)x,J̯6f Aaf~CN v f=S@9BZvZt#Iy7F)]XNDH' X⦿96Os<&8*WH2ԞX٠y WpQ?i`j|Γ62NAeBI+zŬsoΪm,vD/r[aHGab`/L*"%pbht_ Ƀg+\O^8*4ĝ< `}3L`dth\goK -Zf{ pĶ К͚7MGsg[ʏFgTi [_:* .OyfO.iZHGQQW)yb*4G|ʃa{d5A= k%Mm{ęgO._K]7h6 hi#teu[wNE &ģg- qap;sܑ>00[0xC@=-^ hz˿$T,I?)}|Xꝣ,H%{Qgf.px\q#NQG)3a,ډU#ο,R;!A!s"% 462M1V}vFLq'$8%Pg/* ɡ7k78Ym$'Cՠ&_T܂r/L ^fXBŢ?YG>I:%FJ@D9AgZ:ַA?D#LgՓ*UAXV6eEi/^wBDG{IM HxHp–Pi!&S-enFk |)㼻˶ sJϣe&dIp#yw Ir 31КF,l(q[u&Kl ZW\OGϓvkD "f>tpo YJ-}=xgZlAM2HyR4妶 -}=E3[#XARu/']8}\@1k2iWbiW 25!1 LB<( zNQ-4$[_1NJY!Na[)k0I+f/;ÅXMV=e!~TG Ihc4j xqQFք_}Y^vtj %)VYڀo j#-N{(p 62)϶(R|ZA9+ֆ'=Ej&E΋x>!=ҩgsVaO&gRuYV{[xOgz;pi@Ea6~C\nr4C]{5٩T3Z$ weEB8awK$!E%ޖQI.ϣ #gb_O2&P~58mdx$IE,b0À q&:\+aJ٠'g)^˰g:"Oxܷ7!Cfka:;EBfr(D1h8>vv}L|&NG >~yiݧ^oi ނ ӄ!'*/lYON9c=c aI7߁[>m! QG3bLMx}~脕Ӎ+)Y= HkU sMgz#nex +nzlk;(-3x= ݑiSAGqBF4*)<(36H^ZO#E<y-3U e _Xe.w)fly~YPʫf5~;!* ThRâr௟ 50X#uPuINMakjz Iq|v>%zGQeQ? ̿6rsUhŽ&k)2*Z=" ly̍g"nG Ex(fz_jHx_xQᠩԜk.s8@c;D U8jnϡT3@`ϼ}x?` ٧k-m[djVO9h.1?r\#,e.ueDp>^QIIT!0-^g>1 y o&B8X<'BHa%`|秈IX(6媃P0b+_Y+7΋i/DdJ3d0V\~e*/O#Qr 7K閊ںdxܐ@J*QLv&1:g OCg~V9 2HkI4SOfHeﻼHnϠ um@&dŜyAɰȊ 1v]?-JMw,ɰ)z#8qm ة߸$k&W8L<,^EFA 1mqʪmRL)c^ zlUL3.6EujvŅܠtҬ>y>4|}NV`JJ SVovWD>>>NyB*icRm!ߍ͹K*` ATL}=cbpJR3{bkn >9~n)`C0$WVV99$tcuFſNܢ) y*N&4e6KK)V3/3RQ$Q]rϲ1 j Ngr2i7`-H'B#ͭLTb=sA L ?i^TMS7pMDm#񸱧ä_DAEu;B=ج69#$v60b` H.2ݧ|c-|}E]7b5 Rd9$9%!;@3SS6S[Tgֵ˿`D;3;u" =fHLo# 䓷hC9^7 wxkqvfQUOZ\rE:9D+6IMT=-z0^Z LݖXrVip*v3M}>\XaChcm;Wd) D}dۂNq97Jr:{`r 50O;O4psQw)'IfQN}{N\$]OK-(f&:y"hn/DG.(ܗ!`8 Ml7&S+xxI9r?Q7G@=ys?Ckh9_۱zz6~ =ۜ3QfnH,Ⱥ4Eib]ߟK5~HEоLtgiAmND [Z_3.tsj'}E+iE)_u&#ƜIp9?ރIepb{ZUzf`H $ l}.F~^&8W%7iSSا4`#&@{`/ihOYLZ1)Ů]'Hn}Dx=( 땷qi|4BI%43ecu|!wsI_ s]_{3K˸Է"vuxKU:#_ȴJ ϷjyʏK\LHxl.Xà+y&F|b2ͺMrEfBm=S\HS;Ef.C&QFB'Hff}{ź\K!Ɂצ:Sk Cq`BXrc_ ΃Ex) seƏs?[9 /62"q= +[{~ 2O~!suKE.R$Q0GTrqwU+Da\g&]t"歓{dR%vyˏ=+ `f_nGtKC9I9 tz@aARHMW_$'pQQ1ex'nֲI<]X]'axPw" |r^[ ]f)}9i>JW/Eat^ܲl/eWAI}q#Ci[Yx\ԠouUt&9RJ' l= Nˊ6{j,s[.' t:/p7PH%KMQeM1 r01Fsh5f,g={">#65P]]sM`ԸհXS0~}[#21[+# Q}U0Lxy̶f^d4CS?r.[40kPdKj}9$] &J( Yj6b>?I^uNǜ8nQ4qRC5ϽV*2,)s,dT_ows ^ʍ6m 1C!AovIjP&B(GF$ ,:'lSk? \ C0`s @cʠi<;®u徥 ="Ãޕ> 4qJo-Xlp0au5s-n> (ק.@)ԏդ1C $a t LJ%⡛Gs7\\ p:׬X%jG!jr*T6v*܉փ@%P<[Eiw%lF!!B·1GP"YpֻdZwggk5eZy9cun|%x0_4eu4))0/uEXD8GKWb>ETVAitAA# Q^{rGcsi* ~l4 b@Cש_qdfL>OX28; i=Ʉa6Pc~4kn 0(!/N.:v=nn:Єs=ޕTw̉baH/smX΍0|CRa/ISi+n»o 2_Em>x􈼤5}i!?D#W 9(۰ f wFP[k3{;=`'45C]H-C\ Ouن</9[i2ED zzw6~;&zdb-Ŏ/_{Ohm;0QbIE-֊!њE!.Tb7uhUˑDThpLaY:BJoj6:+:p]'>u#'cAf/Jf@J乢(}Cb--4g,iD&23^Y`+j4 b>p09ظ6˂pLë-ivY%Aj>pmu_k) 뼩BJ ٞ.d)k! dj4л(\4}T0pt Gzr_U5HžʏN.WWz&9lߔa̾ݹ+هքjC4&!PW#Sנ0ԂHg"JS!ޅoS+a4n./n"D:@QOeբ@+G 186Hxq)ez›9}p!v t{g[]rxFHRLgOA)`*B&CBii}w)KAp%9$r:p6(:;XyREYvJȴNeɴbH(Wa+'7+><2ŐS]~h/qJM{X`5-eun2OuSqXg<ZX w`PZ8O$B~Tic^36ԇ}h@и!{R?RIֻx25 ːdx0ȗ[VAJ#nF>]=Һ])jUfA񻮑\ylo NDe4z^B0Eϖ^c^a\Kr6]l/̌_P'/o*\ER FgwRpݣ B?xG}9=ߙ)f=aJ߆2GO"z|aG<TS^`Q}6d!m\cI}У)M*w;4ȁnXf@8]ֺ—h V7VqV&x~oD>޿uO>Zc]' ]A8LkX_+)ǶQ_*$ ?MҢ QhYUp~(,v>.ݭu|xSdƍU6' RXTMKi 460wkB$fFdP8/Bg?6<%d;åM5^ws-WJ(tz"y0P-Y)A Mg@?}t-ڤ4d =/8(z4P A$oIoЎ\dA5gA &,T2 ث"lƫ6 _}t`+[֍(MPaRw6Ə g=mwm0ŵyzu6x8-%Z:) lT~q MPuw_Uz "൬2Nn67'J|9Kntmyr3p!In^Id`XnXsGֻ[e_+ G,o*R1gx7BRCCx;e.uaTX>Fjs&ɋY,?Ӣ6T?z7:y.pQp ˺ho!lLs l[縔V&ei,h=Sq?VV„hVO'LJiQ)s뢊]b%EscoЗfJ%NP.Ύnn(G|dÏ~TO)d]6Ht[7_2G#d7{Sy+A 2B~Ѻ ,7kfkE^냔+̰{7߀JbdbZjCMǒ%"! .oQ.mac *F ߪxK muRt]a_偆ͫ0GЅb*?83M2_^:m/SXVT<OafyM$x@gpxK|67AyBٯr_ nuHC )]j'%3pryliZQ*CڶQڮN5OpX .Y~t>ETQ~c6;4~HPX3(M?$dWwiUN YZ