seamonkey-venkman-2.0.11-0.1.1<>,MG/=„+$h 5n` Ɉ̊>]qjeda# +g*wX"~yEWtKgH V3egB4G~2{IBnGԋ5qXc$z=꘩KV`: b;fdw__*{JR| J.R׵z\a+mB`QEşC6f;%ϔyOk4]~+U{ɿ$W&2bJ `gxmk>6H?Hd ! C1 Jf    w  4H(8;9;:Q;FEGEHEIEXEYE\F]F$^FbGcH&dHeHfHkHlHzHCseamonkey-venkman2.0.110.1.1The SeaMonkey JavaScript DebuggerA javascript debugger for the SeaMonkey web browser. Authors: -------- SeaMonkey Council Mcclayton openSUSE 11.1openSUSEGPL v2 or later; LGPL v2.1 or later; MOZILLA PUBLIC LICENSE (MPL/NPL)http://bugs.opensuse.orgDevelopment/Tools/Debuggershttp://www.mozilla.org/projects/seamonkeylinuxi586P bXR XAA큤A큤MblMblMblMblMblMblMbl0801fb64cc98b29c0d96a23c4fcff25e182bd8cf3bf490830804b67882f93ad2a344402dc95273aeca445faf7033f70df46d0a5569657ff888dcb8aacf68df20rootrootrootrootrootrootrootrootrootrootrootrootrootrootseamonkey-2.0.11-0.1.1.src.rpmseamonkey-venkmanJHJJJrpmlib(VersionedDependencies)seamonkeyrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-12.0.114.0-13.0.4-14.4.2-14.4.2.3LOL@L@L@LvW@L@IKK@KK{@KTM@KC)K JTJ@J0@J:Jn@JeJUJ8I@I3IHIFFI!\IsH@H@H@H-w@GGu@GG8GC@G9G@F&@FF@FFFFzh@FyFw@Fg@F8}@E%E\RE[@EK/@E: E@DDDMDȪwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgvuntz@opensuse.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orghfiguiere@suse.dewr@rosenauer.orgmaw@suse.dewr@rosenauer.orgmaw@suse.dewr@rosenauer.orgmauro@suse.deschwab@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.decthiel@suse.demaw@suse.demaw@suse.demaw@suse.deaj@suse.demaw@suse.deadrian@suse.demaw@suse.demaw@suse.desbrabec@suse.czstbinner@suse.demkoenig@suse.demkoenig@suse.desbrabec@suse.czsbrabec@suse.czaj@suse.destark@suse.destark@suse.deaj@suse.destark@suse.destark@suse.de- security update to version 2.0.11 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to version 2.0.10 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to version 2.0.9 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753, bnc#642502) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange * removed upstreamed mozilla-helper-app.patch - require mozilla-nss >= 3.12.8- update to 2.0.8 * fixing startup topcrash (bmo#594699) * add "face" to the list of white-listed attributes (bmo#592601) - added Cairo LCD filter patch to enable subpixel hinting where supported (bnc#638186) (mozilla-cairo-lcd.patch)- security upate to 2.0.7 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-60/CVE-2010-2763 (bmo#585284) XSS using SJOW scripted function * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - always use internal cairo (bnc#622375, bnc#626042)- security update to 2.0.6 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- security update to 2.0.5 (bnc#603356) * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.1.10) * MFSA 2010-27/CVE-2010-0183 (bmo#557174) Use-after-free error in nsCycleCollector::MarkRoots() * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- security update to 2.0.4 (bnc#586567) * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-17/CVE-2010-0175 (bmo#540100,375928) Remote code execution with use-after-free in nsTreeSelection * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy- added translation subpackages- security update to 2.0.3 (bnc#576969) * MFSA-2010-01/CVE-2010-0159 Crashes with evidence of memory corruption * MFSA-2010-02/CVE-2010-0160 Web Worker Array Handling Heap Corruption Vulnerability * MFSA-2010-03/CVE-2009-1571 (bmo#526500) Use-after-free crash in HTML parser * MFSA-2010-04/CVE-2009-3988 (bmo#504862) XSS due to window.dialogArguments being readable cross-domain * MFSA-2010-05/CVE-2010-0162 (bmo#455472) XSS hazard using SVG document and binary Content-Type- Remove unneeded orbit-devel BuildRequires.- stability update to 2.0.2 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193)- security update to 2.0.1 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener- update to 2.0rc2 which might become the final 2.0 version * based on final Gecko 1.9.1.4 (build3)- update to 2.0rc1 * based on Gecko 1.9.1.4 * removed upstreamed patches * compatible with enigmail (bnc#544326, bnc#530811) - fixed startup notification (bnc#518603) (mozilla-startup-notification.patch)- update to 2.0b2 * removed obsolete mozilla-jemalloc_deepbind.patch and mozilla-app-launcher.patch - remove obsolete code for protocol handlers (bmo#389732) - allow alternative button order for Gtk filechooser (bnc#527418) - added mozilla-prefer_plugin_pref.patch to introduce a new set of prefs to support preferring certain plugins for mime-types - added mozilla-sysplugin-biarch.patch to use /usr/$LIB/mozilla/plugins as system plugin dir (bmo#496708)- added Provides and Obsoletes for package merge (bnc#532678) - allow alternative button order for Gtk filechooser (bnc#527418)- fixed %exclude usage- update to 2.0b1 - added create-tar.sh to source package - removed enigmail as it's provided as an own package built in Thunderbird now- update to 2.0a3-20090707 snapshot - define MOZ_APP_LAUNCHER for session management (bmo#453689) (mozilla-app-launcher.patch and mozilla.sh.in) - move intl.locale.matchOS to distribution specific prefs (removed locale.patch) - moved openSUSE specific prefs from greprefs to app prefs - added mozilla-jemalloc_deepbind.patch to fix various possible crashes (bnc#503151, bmo#493541) - added seamonkey-no-update.patch to hide the update menu item- major update to 2.0a3-20090617 * based on Gecko 1.9.1 * ported to Mozilla's toolkit- security update to 1.1.16 (bnc#488955,489411,492354) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift- update to security release 1.1.15 (bnc#478625) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazards - use nss-shared-helper from 11.1 on which allows migrating to and sharing with other applications using NSS (can be disabled completely exporting MOZ_SM_NO_NSSHELPER=1)- Review and approve changes.- update to security release 1.1.14 (bnc#455804) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html- Review and approve changes.- update to security release 1.1.13 (bnc#439841) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - fixed desktop file syntax and another rpmlint complaint- Review and approve changes.- update to security release 1.1.12 (bnc#429179) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - merged Factoy and mozilla versions (again)- Update to Seamonkey 1.1.11 [bnc#407573, bnc#416147] for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - update enigmail to 0.95.7- Remove unused includes.- Merge changes and fixes from the build service.- Security update to version 1.1.9 (bnc#370353): + MFSA 2008-19/CVE-2008-1241: XUL popup spoofing variant (cross-tab popups) + MFSA 2008-18/CVE-2008-1195 and CVE-2008-1240: Java socket connection to any local port via LiveConnect + MFSA 2008-17/CVE-2007-4879: Privacy issue with SSL Client Authentication + MFSA 2008-16/CVE-2008-1238: HTTP Referrer spoofing with malformed URLs + MFSA 2008-15/CVE-2008-1236 and CVE-2008-1237: Crashes with evidence of memory corruption (rv:1.8.1.13) + MFSA 2008-14/CVE-2008-1233, CVE-2008-1234, and CVE-2008-1235: JavaScript privilege escalation and arbitrary code execution - Respin abuild.patch.- Add mozilla-missing-decl.patch, which is necessary when building against new versions of mozilla-nss (bmo#399589).- Security update to version 1.1.8 (bnc#354469) (thanks, Wolfgang) + MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect + MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files + MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing + MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI + MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution + MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities + MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12) - Update enigmail to version 0.95.6.- Add mozilla-maxpathlen.patch (#354150 and bmo #412610).- Add seamonkey-gcc4.3-fixes.patch.- security update to version 1.1.5 (#332512) (thanks, Wolfgang) * MFSA 2007-29 Crashes with evidence of memory corruption * MFSA 2007-30 onUnload Tailgating * MFSA 2007-31 Digest authentication request splitting * MFSA 2007-32 File input focus stealing vulnerability * MFSA 2007-33 XUL pages can hide the window titlebar * MFSA 2007-34 Possible file stealing through sftp protocol * MFSA 2007-35 XPCNativeWraper pollution using Script object complete advisories on http://www.mozilla.org/projects/security/known-vulnerabilities.html- recommend gpg instead of requireing fixed paths- Added GPG/pinentry requirements (#309160) - Don't run %fdupes on directories where multiple partitions are liable to be mounted.- Correct releasedate.- Merge recent changes from the build service (thanks, Wolfgang): + Update to security release 1.1.4: * MFSA 2007-26 Privilege escalation through chrome-loaded about:blank windows * MFSA 2007-27 Unescaped URIs passed to external programs (only relevant on Windows) + Add gnome-vfs.patch to be able to use helper apps with parameters + Update enigmail to version 0.95.3 + Fixed unreadable GIF in the LEO searchplugin - Use %fdupes.- Use openSUSE instead of SUSE Linux as bookmark.- On x86_64, s390, and s390x, deactivate the hidden visibility support, thereby fixing the build.- fix changelog entry order- Don't hardcode /tmp anywhere; use %{_tmppath} instead.- Merge updates to version 1.1.2 and enigmail version 0.95.0 from the build service (thanks, Wolfgang) - Don't build as root - Add unzip as a build requirement.- Removed invalid desktop Category "Application" (#254654).- install .desktop files into /usr/share/applications- fix build- update to CVS version 20061107 from buildservice [#221676]- Fixed Requires/Provides correctly (#216100#c14).- Do not provide and require internal libraries (#216100). - Use safer place for build-temporary files.- from openSUSE Buildservice (thanks Wolfgang Rosenauer): * update to SeaMonkey 1.1a-20060907 * update enigmail to 0.94.1: Added support for signing attachments with inline-PGP- update to security/stability release 1.0.5 - removed libaoss usage because it's too fragile- update enigmail to 0.94.1 * Added support for signing attachments with inline-PGP- Fix build (remove wrong extern "C").- update to 1.0.4 fixing a major regression in 1.0.3 (#195402)- update to security release 1.0.3 (#195043) - fix overwrite confirmation for GTK filesaver (#179531) - fixed printing crash if the last used printer is not available anymore (#187013)clayton 1292198670       +Lg+Ll+Lh+Lm+Lj+Lk+Li2.0.11-0.1.1{f13b157f-b174-47e7-a34d-4815ddfdfeb8}chromechrome.manifestvenkman.jarcomponentsvenkman-service.jsinstall.rdf/usr/lib/seamonkey/extensions//usr/lib/seamonkey/extensions/{f13b157f-b174-47e7-a34d-4815ddfdfeb8}//usr/lib/seamonkey/extensions/{f13b157f-b174-47e7-a34d-4815ddfdfeb8}/chrome//usr/lib/seamonkey/extensions/{f13b157f-b174-47e7-a34d-4815ddfdfeb8}/components/-march=i586 -mtune=i686 -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.suse.de/SUSE:openSUSE:11.1:Update:Test/standard/de1f345817b7f2402623a64dc61ef704-seamonkeycpiolzma2i586i586-suse-linuxA2؊"2vt?]"k%wE]ss=rs*ܭb&od$Q Dt5k-xU$ج6;yejс)vC~E;(X$sJǯVXᯖe6yqV爓OY?/ Xf 5C(!'ܧٟ"*cʫr>)kw}{+C\S0yFC4}>b0 &|2koFB#u%Lii⩌[A(Cy_z֫-oAGv^EL&U&' 6 +jMJN#ƚzeߦ L%Y#R"D4+"g!2 $ڤxvR+; Oݝ㺷I/҉;yC6;J_U-} G!אo- F%;Rr,<и1SHBC>LBJ%:уػkV=IA"O~2~Fm5,]L,? uQ{?ܦlcqĠJѻiM1u%`XMʌ%;&&:SQ#4]fˤ 6 / 1]QXc8M &m'8UfO=I*8HD(}J x)QΞLI+?$fP:;O-Taz^?1 ؒN"O4\!={ԁJw :&F۠GߕD$P?2Z̀ y4gʩ[VyrKT"h}XaZ Ty,9zU51vK_TGmCTyuY[ߎ$3@ 0 Qx@rt|9f k@@(@/D#c$f;NwHP-M%5!FyE /%OMp<\a:~Qӡ1{yp>J\ڸ(#pĆC&SmPRu׸*]ZmFiq؈^vڼ+(N~1Yg7f3Ws!ܟ8>VX=P8u|cǨZ{&ϢTx['ru 0 R[Gtp?* G0"Bo?_j ߩ4rNqEb>V*ak&}aǀ7$Ko7gs=F]9h̍,ؔl.x6U&X K2cV!re:naLȒUIڷa6-5}TN9qV͂M>Q}x6"`ݚvs?ReъVуKcLM pmU=QB_S$+{S/s]V`@6Zħl'y3ѷ7guDF3hڕ#^ Yo0da CϏ0[I),.F"HE0޾*Jx#K ̂0Fm84}`mH _?̸uJ]ARN֜4WĒ,0N+K/dfFne!ta~KrUj5@kWsuWv_4Vyjwrƈl;`r>{@M7ߣ3q5o`/nB i#=dxDM/`{r9m$ޅԺ!X6.IRﲪ}w|4 `h=b(zHwh}yqpWI?*d[_C9wOE$rBljfkZH-CQ@%bMt{AVQq\v5𠎏H+ȍ ;ԠqNP70NEJ*'Ն~eOU`$ D%~{(QWA=hoX'& _y43BK s9H$Tw=YawYEs5EmmtY۰c4dC>~kÇ᤻Ɩԣ .])˺a)Bt|\A 3$mqÁd RZ;F2/`&Boh[pMoi ^ ㅈ*O  f1mtVV0Jl? Gr'Az1u_pr]EhѮqg(}c8s4d΂Dby%!ĩ!37#TC}W6Ӟ^`{OȵJ$M+l+l&WX#f l9AY3Eh⴫lF&DR mwww|ֵCh:c/ UJPգnPM+(7~HK~taCD3MA3g"2wVp Tq恞 "U>#W;=[;61cp;·c$362vQ 7&:OlFPO;q{{>6O3d£eX>  XA`{2ø[-:FLd^ǯJli\Skk sİ ϳeLYUv*֋IJMBiF=UW*ע_;H{*eiFT3+Ҝzݥb~\}cp@\%=b9t!ӂg1~z9>%dF;7-4k'Vý?y]?@k)~T[8u#p!r6kv+!q!A UKk8eVGdVx5IȺ,4`w_=JndE*޴ec[×I[CLPD@bdOυN4r%ĤuSk% ;+nOHxr"&Q1W2$w ×n+2C 'mB/m QbK"J}x)(`(& q ǥ>4" ;is@ll8:z㕞֓*v@ʼnFsO &|g%q,:0JM>;KJ}Xۀn[}~t*6oPWB/:j(fA(llx8୉Z\v%2zRR]) qy\G} Wd lq aK_UvaVjEZipwz\vLbg'׼ 9bj͛&8o,\s[z>h5=*+ mo1."#(_C2CDfp?0.\2{/3UeP[:0!s!i+ lugq\\\N1^'Y'/QC]KF`?]ZHNMz1P)N(͝Ќ C㏕%"0g<3iX1ސ | M)A>Unc05 y0 #L7큚D[_ύy^ ~q'CĬz>Mg 5 [#:E1 ,qhi'n_$\ߘ+a+y {ĶZ b6)}/nDS|+Z ;WBw;V3PBd ou(+6&f'n1a%0q|7T], Qh(jEK@OlC3h7M=PQe燓6+U=%eH8f,eBw2Yv#OpK1RhW*.9}F~9wb5^ ~8alD.O@ JL7 -{v1v[{?L}aGj5m+1rbi2Kڇ93t1ls_&-/ZsA#ե&c&nq\k+{dLc y #FҏVby'20l%R+Q>&lw]py /Thū*g?ds† XVZvvm7Fmw8q1 1Yad(Bup+nXBQ٣vPRs5:E2 R(GP8ɠTi?~E<9A-m aJPZdӐ- xY2: K`7 G VH#CcǐE7a; Q[cIN{i*x$!}a,)/xy(~EbOtRXmI#$^BMU<9yr[ْ09Y5)ÙWbKGwbT0 -hA`7- _F9)yS94tRfñ:ZeBy:zhyj&dyrMnb?s؝r)b\:(mVlE(GhMZ^Ң X XÑoPRCgt[XʣMUh/WX32\U{\5u2/_39pV95Z} @[^-ᾁ2[dE-u" sN=Qvr.L4J.4-hA)mxT1piƞ*R~%Bfý K԰kFyhU{0ȫ 7pPgnv%2e( *'pѫӌbxX621A$ضuS2ɜ{ЛD˛1IW*1*(,R8 ֭WfsMW*'D&Z[{ _33C=B@ 7!AlԨvP㽝?u#+znisPiE5Ow_kn,VacVI%!# ?~5BXkvey Oϔ3|D/Bgg^J\4}ClJ]STi"6 jU7H(IB9[3Ex!<,aU1t.>W+ZE(ʱk_MXBD6IJm_(K%'g}V:较^yTx.o5<kOcBp:M1^4.''85?)2 8qTݲ \JA-n m S8ҹAa"WUS *1@Kk=b:gf/K;ȀN-De)7m < kȊq$Lm"Un]Κ W+U?'d\"g B_"J[Ǐ\<ƃx>!'fQ |->'nTț1s2̏*{1]?6@)rE˚R.YI`^by6C/e`jÝ!?V'3H\H*MjqsIwXq Ѧb&NƁe#fb6;2!'.;y _javT\lLghZ'Ez]T?_ů1Jz*&n.['yd*z:̄^tz$M$ 5l˹)_fiOzP3Q=K Տi /{}gi{ŮsY"5nz{=o@|;84ݨS)/B9_sDu_FMЀf/QK5׮Yz9صeCۄl\c?I)Tqοnd7 +c_=6!{I 5FGuK-81$ab 0\6PJ;F_z@X'>k褈n1]/!?$9{#mRR/ߜ/̬!s6s}/[l՝ⷹnfsN7Yֈf,ߝJ۰XK:Yf96bnM_}PJ`%@g,ߡ,mv жpN*c?aAK='#Ck`Ad Q٢]6A͖d?|0Vnbl e9շ89k`{ 2V?]3T]:@yY7m Քu!FE ~11gW I,K†/+ĝQJ49&zBy.G7]&6K g$-ɔK2AI3olH-ZU=0o?| ,7R9 RM cc4;X$!V<ߠ:@D0nNG$FeդtuS#ᚕsP.BJ(t;n²S087]&q.~tڙP( CE*.W%=~5UwH95%%\E8 J: AY[G.;f7; ]"1ۂBvz"la?~Og"\UxkWyU`u:O+gU쨙zRQfRk𑕁1#M mt_NJSO9vxEs?Tp'a8C{w{Ly9*A&KBP-7Va9ro\<{aVOaXzXS +4t3J2ܲ\]ejmVS: Zku%3CA?QV餼8 b_ FT<+ e}|1`>ڛ/6Ł(?E>6Q5C^J6}?N:F*nE؟;m;5sv/&_7^!q9h]Xg&,x>2lſvURfd?+Q&e|jdGTDIvI_?qZq[]N?i)ުk=\@oN~g#9°*}?T:Q91al쥧,L#)v.K;9K׻d y,H4 S M%BL<)6EvfP̕˭()@Bp:YaeEnjH{-܃rʱi$cXN]b\2u̯|14DIG?:)bb! &%wniX z;%5p᠐^@ISHB|{j,y^ѼgUl3xQ)d=rۧdQov5oܟPp$;ޠ?ioM(>!PoK}'P a\5̐1pج,/n@ɔiX{?'2i#Z{BNٺx{KQ0rhQbCptB,[5.P|a*\ұ 2MzYvZԳrF|;Tԓl8 M \qLUd:^lM~8Yc8²ӵbvC F^ ̓8asHl%d?h#p#J^vCNvLK0_vb2hEm>ځṾ,[uEf#6[yaS-+M+l_GmP942nhIm[)BF3i_ QxJn{0v8D+D,vKdm9jO#|Q쯯:;ҾLq=|FQI֖Ya!T( 5/)J4wMwnfyqwrڂaPI-ɯf^OQ1׮&G\gkgBmF,k8xDQP=ݺ ?&dt(O/X^o>)}PnG p*z;˾&[{Z&@QYj[W4'\Fs,'F klE<:NBY=/FRvnWyr4gu`N% ^!HȓLߋ(hUjY>"YYpAPȚ?#=M7{jJyw|BxvăsAM:}2ErqgFꭂ7@ DՈv &CKP5 ,Yʗï芢˾dDeԂ-y/ lm%; q'C+^`h+U,p2ͳhD?_jؼmUgk5 -Vq(o r̙ c&d9H|PBUqdF ^V;7^KWeHM\@5T 1WYȀ8n'VJ˷_ vzUiɔD6p8xFh(U&kj]dPZmo&:U|sM2Og>Iek#cpM-ٵ.[ўiAd(Au \d8p8CN4X:Y9%S$?pP.2z69vʦQCC~O/|Cd _+UxJk|KZrT29D,ӝbSWEA(Hj'1vԞSB3Q~g g݋ v[ְ0>AdIC#Ȅ0ȕiz}&jOՕ Fz1mHm!* NsNgMAo4/`&N/^ZnA""kD Dޏs,QKKD>|vDnIwgX3%o U'/,׼QU8 "R-wj5c\mHT6}ʄ|8yLx""!X 5xޒ_>1\&[ju.N|l˻Ɔ[F+^$␲4@ac8A09z >4 WTO$jx7 @{ES#\Gp)=zJ.CͳJV#}Uim1o(}wQ~Pu9~n&M#L+39fՉX1Ev`>#rItǛ)HY8GDF+I|G?}Pfʗd)e$|1m ]++J9o|>}cQs$̲lZ۝ 2{rt qc[\+^k |%#K`׉$?Bo UuRW)^ gLS:[? ʔ+8 (r@l<,#!`:xi ְ >yǽx@(0+%7"VCzR "t!ly40B93Zy<eVc.Dp81iذ>@P$*%i$UW?͸9ffϷ0(^g>ϚA@ĤHY|e_tPzm#墹|~Ake l54r&6s`ӆˮʥy\,ub=!eG! ގ57ŶY%]g!F\[rva?h@s$lZ(J OyxzQϻ@d0]5%%N stjzíb_ D]ò<7ӎ h7-?hm fSUk,bUbΪ xj!9 Q&s[J+ x`0s_BZI\dPߡWrjݝj,a ۝oۍn_R)=fhJzaЇVzVtBrU,B:6a<ӏM2Cҏ!|@;88 RA.fS*8fe*>, r=jC e 8UWZ-QJB6ԧ6sF05”C3pRڣy,hU65äymEao'B.(/'= z>:]Ŀ;ZmaD $LK12b(>;a_k i?E-րE=$6ޗn -OᥧJ $Z.fW]{4!f~ꙓ3ّ@ڙ5"1dEǩ,Kau͆y'SSptU`eU83t|9 <݅)"DE6r 1T\g.SBqޝu|ESxK#]O=ScPqw ?)!J}mi*=䠄!&G*,\PRxl H/`=X>Jbs˰+ LtCpmwǛጀϐb}*t2:c,!G% t^t' )K]ȼN.|ZTezEYSBֻ(=PO0L ŌҋM_' .2}.iV%dޱ)s vV"ox0zBtY$FF#Ki߹RԦ]%z6.m^] Sj\xBΩE29$d;,:Go uŹ-K(lkkBCO+bwc*2K:FL z tPB{+17v͈grKTVMf?,J&M} G ӚJ0)^[ SndbF)T,cW >3Ba+ q((}ۅ;Q);;O}(^QCaeyL@MG731jϊ1(QXHyFA*Ʊ,w|'u$O^8Z=G#45爵9X\5L+ʒڞ\mV{~~]q qГ|7Hflq}gv?xjPq+&Q6H GVTgo*9AgH^Z"KB#v,`0D7&jfg[|_ZI\yzUfy։1v mj(BY Fi֡fEVI:i7rP >Nv/$ \*o4 I"qٶ'Ib'l9 1QdThy-y@8}~I69N5%"X)Pwq}2|I9}3i0Y߭BGO6ǒ]8V4dfTGwޣ6bR2aӁYU֧/yg Bq:)'HMPE7\|dw2,*QY,ݏ!v-!O*6JqDEeOS~]o+``ud_GȷgS J@=,)*D>kjޓ,6#DĞH5DŽ/lFMpOv(UxbƺNչo-dԁEJ?v;{Ğ%戾4wl+X%F 2; Gu%1~zS?%5m)BxS($syqHEuxy$vpIO@| `e4CHvD yi'UڍyQCҹs&h$xKe)ړ<1--lƪUկb83 WZ'\M3 ſ- T=dGvtA2ow5Q'J cz),[LFeǴ7e3H`Q[F@ >zӇDfE6L=hpx5 m~mN\O9XzFgILcJv+ @գ1}dq|򒿎M5K4}Qb)[UH1e[pb@&{ݒ jn"‡F"kxM5}T14I/}xհg[DI*9a;zk,:in8 Kl|WYSN[]I&scrYugly3?1(4UKZ }-_{ &3'2YO{\[•A+MPVa k/f QQV5 ˳6 T{ؼc5X1yJoufyOŞp:˗'1%2|(fx( 'l$- ѩ]hKM~!8zO9\.@HzWs6bD>;>upW[Y4-Qlū*?8IY -NSxs%0ך;zߣZpn_NbO헎7AvL,6D b6ηA߼i鰓-bc3]ٝ4'8,i)c']Ru