mozilla-xulrunner191-translations-common-1.9.1.16-0.2.1<>,.M#/=„a0O!<2I5HtքKcnR:gֆ.Zc19?9% Y4nDӞ7ZGg0f,F<4JS@188'F]aBo* yue)"،hI0"\ ,_*`X鍀~ 6ML@Xûa`b+/ӠᲮ$߄qqF$'keA$Oj*ht-DՃ Yۉ^9>,GWds =HnRXL>8N?N d+4 : b\`hlz 22  2 2 L2  ~2  2 x2 r2 l 2`@X()80'9':f'BGFGGG2HH2IIL2XIYIZI[I\I2]J2^LbLcMjdMeMfMlMzMCmozilla-xulrunner191-translations-common1.9.1.160.2.1Common translations for XULRunner 1.9.1XULRunner is a single installable package that can be used to bootstrap multiple XUL+XPCOM applications that are as rich as Firefox and Thunderbird. This package contains the most common languages but en-US which is delivered in the main package.Md|build31{openSUSE 11.2openSUSEGPLv2+ ; LGPLv2.1+ ; MPLv1.1+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.orglinuxx86_64/f4fgfKf@.fJ6Ϩ]fGf=fffIEf,f f-(f:oAA큤MbMbMbpMbpMbrMbrMbsMbsMbtMbtMbtMbtMbuMbuMbvMbvMbwMbwMbwMbwMbyMbyMbzMbzMb~Mb~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-xulrunner191-1.9.1.16-0.2.1.src.rpmlocale(mozilla-xulrunner191:ar;ca;cs;da;de;en_GB;es_AR;es_CL;es_ES;fi;fr;hu;it;ja;ko;nb_NO;nl;pl;pt_BR;pt_PT;ru;sv_SE;zh_CN;zh_TW)mozilla-xulrunner191-translations-commonmozilla-xulrunner191-translations-common(x86-64)     rpmlib(VersionedDependencies)mozilla-xulrunner191rpmlib(VersionedDependencies)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-11.9.1.163.0.3-14.0-13.0.4-14.4.6-14.7.1LOL@L@L@L)@L@IKK@Kl@K4@K*@KK K y@K>JJ@J@J@J@J@J;J@J@J|@JuJn@J]JT@JL@JI@J;}J8J/@J*Z@JI@I@IHwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgllunak@novell.comllunak@novell.comllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.1.16 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.1.15 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to version 1.9.1.14 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange- update to version 1.9.1.13 * fixing startup topcrash (bmo#594699)- security update to version 1.9.1.12 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-60/CVE-2010-2763 (bmo#585284) XSS using SJOW scripted function * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText- security update to version 1.9.1.11 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- security update to version 1.9.1.10 (bnc#603356) * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.1.10) * MFSA 2010-27/CVE-2010-0183 (bmo#557174) Use-after-free error in nsCycleCollector::MarkRoots() * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- security update to version 1.9.1.9 (bnc#586567) * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-17/CVE-2010-0175 (bmo#540100,375928) Remote code execution with use-after-free in nsTreeSelection * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - clean up correctly on update (bnc#589094)- update to version 1.9.1.8 (bnc#576969) * MFSA-2010-01/CVE-2010-0159 Crashes with evidence of memory corruption * MFSA-2010-02/CVE-2010-0160 Web Worker Array Handling Heap Corruption Vulnerability * MFSA-2010-03/CVE-2009-1571 (bmo#526500) Use-after-free crash in HTML parser * MFSA-2010-04/CVE-2009-3988 (bmo#504862) XSS due to window.dialogArguments being readable cross-domain * MFSA-2010-05/CVE-2010-0162 (bmo#455472) XSS hazard using SVG document and binary Content-Type- update to version 1.9.1.7 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193) - added missing lockdown preferences (bnc#567131)- fixed new gconf backend and reenabled lockdown feature (bnc#546158) - add baselibs.conf to source package- security update to version 1.9.1.6 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener - use internal cairo up to 11.1 - provide mozilla-kde4-version to make KDE helper version more version independent - use .autoreg file for autoregistration when needed (bnc#440872)- added mozilla-clipboard.patch fixing a common crash (bmo#495392, bnc#556886)- KDE, use mimetype for opening url if known (bnc#556156)- fix KDE filepicker (bnc#548267,bnc#555438)- avoid possible deadlock with KDE integration (bnc#555202)- update to version 1.9.1.5 (bnc#553172) - strip unneeded update-desktop-files from BuildRequires- security update to version 1.9.1.4 (bnc#545277) * MFSA 2009-52/CVE-2009-3370 (bmo#511615) Form history vulnerable to stealing * MFSA 2009-53/CVE-2009-3274 (bmo#514823) Local downloaded file tampering * MFSA 2009-54/CVE-2009-3371 (bmo#514554) Crash with recursive web-worker calls * MFSA 2009-55/CVE-2009-3372 (bmo#500644) Crash in proxy auto-configuration regexp parsing * MFSA 2009-56/CVE-2009-3373 (bmo#511689) Heap buffer overflow in GIF color map parser * MFSA 2009-57/CVE-2009-3374 (bmo#505988) Chrome privilege escalation in XPCVariant::VariantDataToJS() * MFSA 2009-59/CVE-2009-1563 (bmo#516396, bmo#516862) Heap buffer overflow in string to number conversion * MFSA 2009-61/CVE-2009-3375 (bmo#503226) Cross-origin data theft through document.getSelection() * MFSA 2009-62/CVE-2009-3376 (bmo#511521) Download filename spoofing with RTL override * MFSA 2009-63/CVE-2009-3377/CVE-2009-3379/CVE-2009-3378 Upgrade media libraries to fix memory safety bugs * MFSA 2009-64/CVE-2009-3380/CVE-2009-3381/CVE-2009-3383 Crashes with evidence of memory corruption - removed upstreamed patches * mozilla-protocol_handler.patch * mozilla-sysplugin-biarch.patch - removed unneeded PreReq and morphed some to usual Requires- fix startup notification (bnc#518603) - disable lockdown feature as it bitrotted and breaks a11y (bnc#508611)- extend list of supported architectures as ABI identifier (mozilla-abi.patch) (bnc#543460) - prepare (but not use) libproxy implementation- added KDE integration patch from llunak@novell.com (mozilla-kde.patch) * support for knotify, making -kde4-addon obsolete * KDE-specific support functional (bnc#170055) - filter libsqlite3.so from provides (bnc#538094) - minor update of mozilla-helper-app.patch- security update to version 1.9.1.3 (bnc#534458) * MFSA 2009-47/CVE-2009-3069/CVE-2009-3070/CVE-2009-3071/ CVE-2009-3072/CVE-2009-3073/CVE-2009-3074/CVE-2009-3075 Crashes with evidence of memory corruption * MFSA 2009-49/CVE-2009-3077 (bmo#506871) TreeColumns dangling pointer vulnerability * MFSA 2009-50/CVE-2009-3078 (bmo#453827) Location bar spoofing via tall line-height Unicode characters * MFSA 2009-51/CVE-2009-3079 (bmo#454363) Chrome privilege escalation with FeedWriter - removed obsolete mozilla-jemalloc_deepbind.patch- remove obsolete code for protocol handlers (bmo#389732) (mozilla-protocol_handler.patch)- split -translations package into -common and -other (bnc#529180)- security update to version 1.9.1.2 * MFSA 2009-38/CVE-2009-2470 (bmo#459524) Data corruption with SOCKS5 reply containing DNS name longer than 15 characters * MFSA 2009-44/CVE-2009-2654 (bmo#451898) Location bar and SSL indicator spoofing via window.open() on invalid URL * MFSA 2009-45 Crashes with evidence of memory corruption * MFSA 2009-46 (bmo#498897) Chrome privilege escalation due to incorrectly cached wrapper * various other stability fixes - removed obsolete mozilla-restart-cmd.patch (applications now have to export MOZ_APP_LAUNCHER to set the correct restart command) (bmo#453689) - allow alternative button order for Gtk filechooser (bnc#527418)- fixed %exclude usage- security update to version 1.9.1.1 * MFSA 2009-41 Corrupt JIT state after deep return from native function- fixed mozilla-sysplugin-biarch.patch to accept 64bit plugins in /usr/lib64/mozilla/plugins- added mozilla-jemalloc_deepbind.patch to fix various possible crashes (bnc#503151, bmo#493541)- update to final 1.9.1.0 (20090623)- removed locale.patch and added the pref to build specific ones - added mozilla-prefer_plugin_pref.patch to introduce a new set of prefs to support preferring certain plugins for mime-types- update to 1.9.1rc2 (20090617) * added or locale- removed outdated mozilla-deprecated-gtk-macros.patch for now to fix build- update to 1.9.1b99 (20090604) - adapted supported locale list - added mozilla-sysplugin-biarch.patch to use /usr/$LIB/mozilla/plugins as system plugin dir (bmo#496708) - added mozilla-deprecated-gtk-macros.patch to change GTK_macros to G_TYPE (bmo#461277)- fixing rpath linker flags (part of bnc#501174) - improved pkgconfig files - use non-localized Downloads folder (bnc#501724)- update to 1.9.1b4 - removed obsolete pango and gcc4.4 patches - added newly supported locales- add patch to compile with gcc 4.4 (bmo#483956)- update to 1.9.1b3 - added Pango patch needed for API change (bmo#481193) - make mozjs consumers using rpath to the correct location to find the library at runtime (bnc#479505) - don't use system sqlite (missing FTS3 support)- initial packagemozilla-xulrunner191-translationsbuild31 1292199036Ba=>IJKLOPQRUVYZ[\]^ghijyz1.9.1.16-0.2.11.9.1.16-0.2.11.9.1.16-0.2.1xulrunner-1.9.1.16chromear.jarar.manifestca.jarca.manifestcs.jarcs.manifestda.jarda.manifestde.jarde.manifesten-GB.jaren-GB.manifestes-AR.jares-AR.manifestes-CL.jares-CL.manifestes-ES.jares-ES.manifestfi.jarfi.manifestfr.jarfr.manifesthu.jarhu.manifestit.jarit.manifestja.jarja.manifestko.jarko.manifestnb-NO.jarnb-NO.manifestnl.jarnl.manifestpl.jarpl.manifestpt-BR.jarpt-BR.manifestpt-PT.jarpt-PT.manifestru.jarru.manifestsv-SE.jarsv-SE.manifestzh-CN.jarzh-CN.manifestzh-TW.jarzh-TW.manifest/usr/lib64//usr/lib64/xulrunner-1.9.1.16//usr/lib64/xulrunner-1.9.1.16/chrome/-fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.2:Update:Test/standard/28b3c9a7ee331e18b51edce2b2f27fcd-mozilla-xulrunner191cpiolzma2x86_64-suse-linuxq(s(Wv?]"k%5i h0= 7m62G"{yuyu`8A VT@Ĩ4LF@Zǚ+Ԅc#\IwX!?fz##bCr}F$leL sOX{6"?~!SoMysn+Je4w ce:l𧉀WsD]JÚc,Տ/W*ǭ5?*s Ƕm"w@)\4\"[xI?Pے{"sB DNkږ}wj4a*0P$Ѷw| 1!lPvXs]I;>x k_0dnw>Kbt3s\sZvw^!@U]O~!Bխi9L^KGe)wYա8wg; Պ ޕ {{:9lSa]Pչ\=_0S Bw7Jo5km{. nhA!#r4hQ Dο"OS*ffJsL+^!"ɽ8-L47bb J'rDU xI〠j!Jde;?py ?cQ Q^puGr'D.u 뭚>=1U<1&$x_gt|TGߋ //b'C[rҷyǵ+ȐN npa\κ?F|1蠑Uy7@xt1*L>zŰ#f;"7ZTp+n, 3 ;l0ASR5$#o7M5 oK`BRp-,axYy54y}a/O'E6C&V;Y(YEʦoN/Ӥƚccadr$&nqc]EfUk]M el=5x s }#,Cev85/PD0r ;̨R;Ùǂ_rZ< y3:+۠:<$7ъ53icx:yHRjv3b0F+JVvv}0Y)R׼^EZSA 5b,@99ҼKHZkXu›o+r'4eӤ-FXSd ][ .++[TvRukmwX&[+t214<>-r˴zBynZӻs3[suΐZUkݸNe5 EZ{QkL,ĸBƐvʷ{Ùb/qR+^ _~zț1n{]SԼ2u 6ky| :{ąMw}En m?C<Ҁ۹1 s:;/n&v5Ӏ0ueO(hҘk}N5o߲N#q$w1c?=ڜUM?nڀǗ:_"!56J 7af.7-%9WKE^ct٭ƚug\m |5!$/]̊fVcwt|s4JcV4Ů-~!gT:;tن|:)$}u_z2;_}SDxŠP4Ҳe##FÃ3d:iǶߺv5y˯RO9)zsts.kX\fi87s:@:w@c{JwU]E1&Rp|8 $&$|I"۶'G*]KRhܬxH]x?Jq*^SK{]I`"r<.pG0Ǹ$,pܕ2{QHmu_w\G;$jI6{1P`s/V+o̗HO~1{;Wd_4/%O`-L=2ka)FBۙA=;93^xOgл3ddqȯWyRMo_ і!@C`akեg PmJN-ȬU)1_@np< 2DR7kFx TEth=-nóIhsu/N1m*V4{e(oZq{&gL&lp@/Yf(EH<IwwTWs,"7 q}}v\ WxB< & a/<иV A̖$ 'T4D^gTeRMݾ/H VOkRxއrps̿zh?sz%(#뤮 ./"VR3>*SU hU؊a UМ@ ,쓯~kŽ9,򉂝'3eyݴMbUس=en1aSlr ee 2>~0jSE/ m3-ҋ&3#LC` ~mq>!XzqUT /yxR{zA@ 3o)5{h &-@߰鮷aDv !OTVvTLE0PM gr0,߈%mVw-l}DXDQь~X=ՠucQ #Xs5׾u>ڵj-t(H`_=yHJdL2 Щ˿EUK١~ϥM"#`']1'0^HP:= na:AѕI;0ڵׇRN[iZmC6Yǻ)i*Ʃ X,>(_X@68C%|hkO,FL(?!D,:`+_M,FMO@֕=F)A15'Iҏ(WIg{{4wU6jȇKR2o.ǹ8nڒ5PQ2~B[[i QhҨ+}6 !%ǻ/5ogƋ9XkDj.gXU$9Mˢ;d߁T,&iQ!7>~f>9!]4JU[WC弗̟3Ӿ@[i>xQ䌵„0_+N3;M 㻠g[uxpn* NPa|8 p,yy1ߨr.B l8;_j,7[EX!TBbRuZoNlۀː4J,?;}k+U]π#ﳏGca*' J ʜCAK\Ab"0 ΎAce7g?Ÿ/Ih3jgEZ/U?TbEnewi`Zΰae4:MKTѓNOzA#f#jb`5.kΏ`8[kjHgW#e@˯!V!TXԗ |+O=i]+gl>QԐhp~Pһu xL"`%b2<VNH< S`_MEqhใ9=(K]?|Knf{;Dg"A_ v+\v'wh|)t#Ԫ2PcC'YְqXQtP zYy0-K1+xdhݖmj;MTX9^$O-DH1 LU  0{.^=p" _ޛgPRҞžN !gub%yv')~ܺMgz Ve*"ыsc;oB9767eu`xNz ~Ih-Bb\3TOz%]+_bq<&WH/L>`KfdBDdHͅS*pwRfJ(D spgD>ۚeAХ3ϸ*F#2hb" 2&@:y%!|$A#<-MDj\md3e~|Q~Dj3Ni7U9"-+Pounȴ3JfČq룩n?- ]+Tl)6n|)b;-{I|)L5Ԣ@.Y` }QJ]T1VFH!L酖*~ЯV+C9TՄ>>Z\pR>UQce% lRaT9ڋނ$LJY6oо-ɨe"$ETrͯ<.,Xshc^6E>BXZ|.RqB5OmҟNNƱ!݉1k#]mAEkŷkFlǜz􈴥 >I Eyˊ[muUt!w*0JٝcWaujq99UnU9FǕDb} mΝQ 41ŻM2M N|;T p12}SCmUɼ?vF0F1a\R-z/p+ju^H]PI6+D9ʢ(%a8VO0%AaY.vK[w`CN!-k!>-bAF#KϥQwcAN Nr_O?ꁤ~ Z*xv=:m3'ڇtðX@NsڷAj|Ɠdd]IĐ-WlKoK>̵'4`+9yP1SX\}?B3K4&zt"h> ] j:+tSӡx o0tʦ gM,@oK͍Gs)C8yqϽr+xz"hp KJŝ?c ⳣu+Gѓb2DW:!P+^h9xT5r|KKċn}: |I<6 a/Ư'0#4ۃ8W.)Λ@LNL{*|5l) 9#j[Ȝ"'yRc&k{D%!i̵(GVg]Zqu*+HMK~rtj>Ŋ;s3m}ɽ_ !9w {(ٞJ!*eŪ֮Cx*y,ۀLK~8}QC_Z85uF8MOQj˔Da{mJRBCWxVܜN<ΙR<ĺf Ls $_D.m|xԻ :QG;{Q_#(-xw02-B6l{REA{(; %ӗ'ʈY$w:dڵLIUc4Dw2vǻa͗Vg8s3:v6䢄,m_(f r!%G*˝# }Q5t$h LS$OlU8DJݑS0}xT`mF !C5 r Ϲp2gV(2|1\ pq#f1mLVQdHAŽ>uhJrD= ,'|ӚB +Ў"8ˣeS_eː6 (hsA=d3K+{y(4Z hElυuLR<hF(|Db7T#]ݞCP^yKꙂ!t!6%x|&*P4C^JD!oP"vվ]xKZ2_>M.L"[Mxَ"qv)eFTҋ3&?E##l` ɶ7;H gEx"@w^tn6qٿ)fALm2aPygjvZ[)D%+p9ՎLUt5hM0V@暵ɜ:ϖ_-̵9'e /ґwOE`?wxZ"gʸ=ΐd?PnL> рb<}\HS/`Z 7öE$/>M(r(%bblP }!$:a&☄Y:SbsntI%'+I(P!ͳ@>T]5EvM35Q.'T( 4| zERƿc-GaYOA#Enp@v9І} A(;E3rY*YFҼ9u=ݥ\&ZҸ Bk_45GIVVhN&3Ə^>\l J}9+X=!LUxCKEO \H#Li@;` MtPzFW;rL$W6V5JrXUʷ9K KE2G v=0X6^#vSLo}֫)H)aj|֣dY;"O!4:};nCƵ[Uc}"_IK<#\F%wɍk_q219%g)crv750Tέ -+fckIPV6ڧexzsh i] ihž1/xרo.<[w]B<9gswǫp=6G;[oRJlZ4Fх/;7= _Vp Y;~+y0:b*j^;D"Iڄ̘) s՗ZƐEW!vYC̈VYw*u]qmK#焀/ѕwo$ (%a[^8˰nU£39(J#P|bF2FDe(^~;|䙩{@#`95F*>6[A% d x8a~,m8*cܱs3]!_]+)$e78YPH/]K@ncoZ3 rhS>~g)H^SlygPtjniOUf¤,k0$f`~sϞy@ 41{u24af2P#3vǩg'<4~hT0FHRݘU`dzL1\.ʌD~.7 '"$fsa[zrIٽ6c*NSD0ion cf KO❓3m0^c-j"W(=w0w$o`o;r~+c%Jkaؑ;OSsWч9>sLr]t-=e\Rr\B[;YmAOC l!icԓFv0(3(ftL(*_JVJ1Ap.>q-PUc.S\?|ْn)dqD+ z7Rh2 ’LNq/M5/mm$p=SlEbthWOoS7xrS(dd`c~0(z>.4O+К&ב8:u5T~u|C[KPΒw=GK E<.mGDy9T&="|YmfX6pzv~BRdS9L;pxāĤn h)!,vqQhA7&zU$CyM|f&m`)L2#̗pe2b0q"/;Ӎ@=+p{$rë详l8ԵQׂگ8Z>$Ke)'B 1W[N1aj' BpۘRcYo=}꩒Ô83HZ׎TfΛZWrn q#toTv(nC\ǙC#;>_'1p( kpۢɭڙ¢_AJn@pEdoD @4 YF̴x m)q7E:HəU%@sWdс ?>:zĚs,%C41}̿b9lW`X}χ-)X7"׼/={Ecs &P&in{.lqMw•ۋtr`6Q=z^!: {]n=:ѲgȒ|ʷS!V<1rE iN-E.REp}p|UI!v|zDٰS6 ChLrI慀xH0Vd +  1o{.\`G\ *?mhK=n6 U[.K{q$]XުeՃՎb=Їw2\(YHA1 [gvHe=;oF"y('ee`ś^2 AK&DCzց&hhM ? b`埸m ߍOG%Dw+cy QZ yyW ֘x"Qqp0~+|crN䶋a·ZG^ᚵgbzx0ΎFz+e'z(VFy2fK',}TΏŐ;RV.2j,_ !$O O9bƃfkkBow 1jFqQwʫ6uuBvrچ/f=7N 9ni\!@޷I^ZH]9l]^3x-9m$ Ӈb"ې m"\_gô1OW` +"^~DKL68y?k4$EKDo׼Ѕ_pL0ew g| Ӧ54V[z_2dZ`GN +g8Dd-&TxAeF~gGB)B4 own B#ŇxJ+*j6c*jHם'og@]\>gk\ $%an m&P1qoxifІXŪQ -lYoDyY=dEYCFH HQ@H'M!Oeh\f+tkl4%yï5b`G$85`Ĺ꙳ەf1ZG^ы~V2\ŅO?M_f QE4l'mI1iY\v<Va4IG(72$0h7qA^T8?fqj˴^G}IfBWCŠ8Z2. ]&ΈMs  [}(F^95Yp[=sF(GcIa͍ˉ6cd=8"ăldȬJbVikOM &5XpH7Ҍ ^OD%oq1C16mBIK@df&733WNyKL'ZJp R ¾3HDyeRZֆ S^HO RH}󊋗{o#a<*=M|<@+W4;=JPBLk05eOZ9ҵj3z9~_E†^VsV%| w!%qV%j+ 24* ~q3WM>( /?4Ʀ,`1kXVh̓nȌNN¿"<'f&F)k@%֘.~p!j;LI WP GąWV"UwD*i1C.n(g[uWҬlsW=;GϢlXcN_1TOLHmGpEg5*s24//!md1cB3 Ms"6!|'Xo6K D\_iRe8rӑSsJ@uK WSPӠ)N`qkᯜS_u=ʱypI|UCZ6kW@`2\暸d3 sNE* QK5[':]]tw/=2)x2–,.瘙.5gf>ܳeiYd~/ ljYfN|\6~?of)NYd?GvM9G0'T*!eGLiZGA4xUߕWyC2K㜃"T.kY$bDZ;gRP -y\ a][BU)I>ˠ'18-2D!w:dLjJpxjS+5΅) 80&#|qu0|q>[=yD5Ǩ8 9%9xk,^L Qw1HGEq|%gbz\ƨ]+ƅBDZdsMi'8 `qAs7cqzՄ~p-:ߎ}ݕA cy]bYLuRӠqPO؇@eIJLv"a68Z^E&Z rs{=\Jffh !~{˒h4 L,P}m$p;e1Fk_(Q#n6Ca&KM 3R\X#Y^kf,Y! 2 t!+/}2.PkjI1M03BK*=S>~ޣ!XK02Hcu\㨟 12dz%$S[>y)K$Fct[$Hhǘ L ko+x6L|ߟ3V`tT>]fd'f]!JeX{bI8 Є{IA$6vXko^o^MF]G#@#$D{3{Nor5aT&r} 2$o=׮] IDДm2xp|v76u')i]zk4-uzPksʎ6ȵu?Yckw#pRGCyhkI_`.2v!qJ୻2@Ҳƫ5|EqE8l>œb Gףz7Vn6Hk &}f'8 ߐkOiO3>a(c{!l]&OK &d%fa3;!|=bCesd7O]1iWŐT*5{H$Zn6Pu38"H/AR?`}:Uy6~<_K0aj!Gmyw%j-SK{u_rxz>o _+%O@Qnl˟Gvg0%ΊLCqvuvY]-R 2~^Vkz3 IV}MYD=W ә]-u\vBq9=VF+;%ïVC)r r 6J]a)zF~>¦2h7bU9VnB~ cJE,)J-N0V>Myޮ|LݽH 0 n/ͽ9Mf835mz!ĥ]kF@?/^:"i4JTǂ16oBʀF+4fXyQ']ԦE浑9mAÎH5Ӄ@7&'jWsnb# ^ pIX*lW-¿UoE4OpVh3~[gt$ۏor29zɲ0mjҨyQOG:Ă6 H㯛 @7IZ)׆D)aM>IX1AIVW^28at00T#w3)(3@7 yi J6樇^#nх5Z[-3b. T:'brg6:p4椪m(O&ݑxh5a|n#wA,bh=o3n߆gA q$J.nL|$e Vj)Uue.p/%6稓Õ}!XhL}e{âg9;;7M`܎^EW UFI]4^gBSs{jvS=(߿#RhR_Ě~Y5!mDvY@^|R*y/{aZd6ٜ OSo$I]'E r8 CD^fj#_9vWLblVjpS.ۺyPF k @w]\7~(@oZ`f1RQ~$z:?荞Xn{}_۠F1,Ь K~-Y&S"%$kwФ Bʀ{v T>3m]\RMN Gh=x w՗&GF,PcnMS X`@h]8%_}v]~Kt 2e/! M@bLXlwnrB'&Fy핞|kl6I"\ټ2-fqc'FYK%l8}f䨛gڷPg۲ny(8-W~j J5{T#Z㋇ ;"ob3ەze ֑e?TTM'lg en"*]f==E# TE哚Gg|o(dCk-KqJK#mé@sBiu b+߹$q~h w.~#6'>Xw(*RsS)T8AX-+VcD2lS3o'LIfg[LiCL-Xꮳ=߮.w:^.IߝLyNt' P#obV&o}e!bDFN }_{DZ5{wfC_n4xI$ vWg^`Dn4Tt]#,E>$|͙oDc.'M7G*+kĬ1O-]56',e]\Im&8;SW&{˿[;vħ&š#b|⧽UEU1%d7۴i=rg݁OtUՖS_6 " ݬY\N*`_~yqEg(imRpi r3f,RK[ߦdḡS4qEb:iZGY]߫F]o3ڰyۍ5`X=:K!htqs@ K3x=鸥BSGaҦy@x=*_]ࡤ1P-U,\-ͥ18KH I"NSaKk#o,VYk }{蕒Z#+jh]>MuC]`U2_γ&1;-j ~#3V$7Lrv9Xv->otW[LM-jD$p>R C"s 4f'hc,tnR(v9rT