mozilla-xulrunner192-gnome-1.9.2.26-3.4> A AlpA?O/N kGvmU<@u::<:,v ^7'x878e7e3962d5701396e63248538ce0291ec6ba45R{<2Ql?O/N kGvmq6YjW>ge}=,anЉXʆC|W")>6Ic?ISd& * VLPX\t  4 > H \  8L |*(`8h,9,: ,>GFG GG HG4IGHXGPYGp\G]G^GbH:cHdI'eI,fI1lI3zICCmozilla-xulrunner192-gnome1.9.2.263.4XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.O/Hbuild08mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+ or LGPL-2.1+Productivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.26/.autoreg exit 00A큤AO/GO/GYO/GO/GO/Gd41d8cd98f00b204e9800998ecf8427eec41540cbf155f447262e4bbf0e73d91f56f2cd0c593faa4da8e8037ead7b1a6@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.26-3.4.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.26-3.44.0-13.0.4-14.4.6-14.8.0ON@N@NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.26 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-02/CVE-2011-3670 (bmo#504014) * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild08 1328498823$B$C$D*$CZ$C1.9.2.26-3.41.9.2.26-3.4xulrunner-1.9.2.26.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.26//usr/lib/xulrunner-1.9.2.26/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/mozilla/openSUSE_11.4/112cf1cd9f2e217af8207b1dea3b5a06-mozilla-xulrunner192cpiolzma5i586-suse-linux|i<?] c!_ KLuEj>sq,k%QMvQ.7 cy,[ϴvo/`0AdJ8жJ HgnHYEϤ}j@9)pCDzhGSN'£|ٓb"h(S Oz~ g\EďoZT:4'U11bw.|eL|ɡLq^n(_{;N{t1Ə߆>ےlA gz/ch\z !UdzSjzpiM|.Mi14KxA2J%ǤCZ.ֈؒ"HVDnԯn3 /li7 -}L8oh|q6D7U7`7*Mc67AWvV ;702L!`8[C#Ճ 57ج {g^_14zվ~,I5&Q~rdދ_;JN)Cw&-Oi&G;ۙ~E2?@s 綐gxYCNFu+:Tb+Q4)Ccş1{_Zn,:>a{!*K>,dfc}zs-(=Y4$ JUI(ڧ~wIo(t tJ"O=_h&fW^?r:!-Yuɇ0Ϲ@ı~c) OFDpVpMKzAUC7*;lWh CE6_  $#M3㶮Ct^#XW2!LwA}GX55wƤtd'JwihSN6 oÌ^#ڃ_?*`*Ov\6,v蹻 ?~>6͖&h2 OTŽ+rJeo,cS4kui<,W94Led|Ot.Hz hmXk:v`SPsH{3>, nOU|LΓ!nQ,tNV|Gn KD"0߸6x)*A"ACN^&"oI Q$eHWUPM.W 3Kw}njI;̣FTl98<ֻ+z6 NcD8-~Rr)#]Z=5-$(OuDHZdbKsr*RAIa~k/.ţ(N:#^cJC)nqx<.rD C~f ̓[tByW$8*,VΔTD$\4;.EA,WI \لM3:.t﨡(Ν=Ի( 7<}QuSpeٽlN%WXJU:lsb4Ɩ5}9r4TkgϬwOxiC{g4R2޸("J^HJ!!,r ΐ"C[v iwDnV6R|Sg~u4{ ̻1G(oTdv ^geT !^&@dEpPbЮ]VBtB:@+ߐ8߅$\@|w(aƾ3.=$a R8ly0@RuqK>EtW>&ڲW%FOM[lqe\2҆OLq)^| nȊkD`:FIeYFJ"2FnB^lwV&˻.s*k6_ƒgJ=f!."(7mQwQv|`7΀=U3 ^ی۝tJoADԓмzMƒ(xI(Nauvvv$$bjYF}dixH [zx'$xZ.> aQ1u q:EVQ-"@*Nkp@[ڠCp*s  ʑ}9At'a:ћ4.j!;H3 yU/?&3b;w>C&w,Ts| A!кWQPz efx w3]kXxiq-]EE_LEXẂC>mHom5?mHu*w0Cdw&Pj -ԭP:_!䣹/n|JUuxկ eF; cm].|V`[)`6}$4SBY%쌷+&55[qKv8U LqڻT-݅ud2 `w[4} pА~3):O#yc)4y Ӛ0?wO7Im.rZ9&Mr @|㗒6?8[6R"S%:]g)0 WgЛ\C#:lcxŹqc'QOc!ўfyw){8ѨYҦ$A$8GS?;K.k쭧\ ^퀄DHqSo5,"?ˌ!a*=E>́hv$.TC `ԓK$?+ ,Fąz$4qvV੯hgcpuZK$!`Y8QXYZi9ga4V`w-+WbA X͑phF4h8K2q̄Tݝͻ$F"C[slϤn.,78 w<1N;1qސ2-VA is`sxC=u'&TN'X1Y_S<-."i?@  9g]@.ź\)l]ot#0wY4{t;G/^ ?F&w)Y:&f9=zP=ֱ;ƖWsoBbh3PT.2OVV7,NHd9+}g)4OJGϛ8k5Om\DeRsڴ@kp$J/ X%`4~GZ*C 32e+(Q{w?~I2R9ȃc{lHgS{016򩪇K`?;^5-}>NmL5i WTLX:PӟW,q]Myk!B-  rmi?Gˏ*]p(k U3G [;*%:)M$]@_w.5Y}蠓3tOI0,-HE\[2+M;)eA1 of7# |QxńaԐjl;j̣ J rj*Zbg0TdU4FLڔǤIfN׳2ÿmY J?sytvT\ PZ- #ICNVx v-o bkU7b7G|Wڅ -= 9ˇ[-+MoW1L@h9 AҴB8X^DI x*J}ojI~?Y6;OzJM'p o 4Wbv.op7߳hFɐR ["C $|":Ecs#y⮦=˖w A#W";55mMWQUSXSD&ӵ)RC*M,uhD Ls%-T* e8DN3Zh.;;넥7z#cAq=1PƵJ <)'s \!q?9>tog.inې~^ ܖdžYu⎿}k‰!- sQD Ok)C5YA4婍?GـPK:v}6i :rs"Ton4kUo'?xP\]f hr^һvȯvJr0UW?Nx5,Js: }W`ar0`d٤,<-x{zx'>_jCQ1_[-X'y[z[Iul- .t~.S_ޔ#i1D܊6$wuCSVgĜu'HUYc JduH `{\jv`vܻ|cӼcj鼵BjU~YIr@*W J cBJWIZӰeuTiߪ0:)#馋4rkԿx|ajcbM+98l,' q S/6 ]f kN4#zHϡ\샔 HY?=8Kh'-8U_cqCΆ훰g,5B2[k\\}R}ԥCzY +.}!)7\ $ok)Q8MQNX2Ӕ1lmǍ X2MFyά՗illN~:L/0>U0(Tϡo=441rD%RDFWD[9Z6bd!/|@ NID̯_*b́!CbV(dZ5׬ny5~@S y# 5ҕ[m3pQ!GXA'JtT2gTvG ;O Z#C o4Tǰ*A7Ql Mҷw$ruFEH9? r5Gr UIՌ1֚f Y@~&2IMfOqEKaZWHpisnϜEB?/ӮʙjNf!~!+T71IEuU~d HF9rW7d+)5r]BQVWaҙA 2w "!r!~&R4Ve0(W+ܺ틸.za;Kg*"NWȿhq.Fo :¶~;4m RP$DTTU=IwfrAޕhbQM㬊VYl.p1heRW$XX t2>nR[Քt/\2B* {P*]|1&iD,AA/ws p\rmGl{|Թg'.JWϙPTu.)TJ~ĦGm+sL`]C340+J _ϓ$)zJ^B'`nf^!weyV [,"Y~O.6851ۃҭr )l K,w(ޔ4Ze&O卼?q&L~ Boϥf'n:$Q)@UI-ɏ#Q'#J ("gmҗ$%WpfHxmrpq@WgGгcI|Dd+uǥDaa+$zj8ߤwC^ ܜd_8)bgߤke,L{Lưք{޹⛼n)V6e kM;A&"KGuc1K &9$i ϛ=5:9Bʯn7 8{4A%F.>έ]^WvEY6"%Hj>T%7Е0z (nY^V3^4(x5;`4ʡ}6D&0+q/%|7C?Y)K=) F ̸d6qL܌hOȃ й}{la<;VNSJA:P}va}hSQ?KܕD0)5%vԣq*7i.q-\1[F) ;~!vm`CrmWs$6mcg$\p,\H-9mt !DY֡vSt~]K [Xc[}JVQ_83ӡ[b=UҞ+Lڟq\=`rF?٭?cР yp-(rn O_yj+zkV.ET"0f -Rs^LT $9yE)Oت L2Qdqx.J 6ed voC2\CGoj"ŢvKƶ`Za[2΅Ttr~eZ#=J%cihŪ.5A2Yzl|9CŔ5#AHD3K']L=5lt&7Y-7+즓S-Y\(v1KN+]PbM$.tg)5eUfyU,,WHN@[HQ< @qxڨ^%+S+h(ѹA Ғ!P7"r UA \e"N:JRm5gmNC{.vV찑{a"S`cNT0bǝmF\#P\zA蝏.دy8i[ʜR`%FҘDB?@f0ХQQpSD Y`x x/OHTg+\Dr5:b2~\StZƲaX%J`r/2 b>e6Ÿ'r9i`&;8?bD@M-CrwxNFŸjL+Y: 6S!G,WCk%◼8*gndHЙo,j0yqR(3z^E< BN20PFA,{F~i&˺fJ٤W2fHN%6+řpTq|hkE&cRw1GREͫ*Dȗؼ#IdHDku}̍<-W!>xҢT EյzW0|Qy'XEr-㺰Rќ;MgC; 韴|@m)|_&Z"{v8X+v 6nf2IF?WJv8vݖ|:BM48?_ԋQpf#J3iOܱ!<2sMŧU,ɩ?rCKGoi<6};F-ttp$m2r4(oG0Z>UWik 1r؞L0|KDV!ؠu 4A>D|ug4rsM_su.EcБ03g* {\`2kvLGԹgC&9KG  pOY9C Ƅ_}+s)R,|91N6EmQ[dE _s ]hR4eO~)[N-@ap/hxCeAÇ?pugJ ?jVy}<}(#~%Q8ݡ8Ly <ȿ/v [M VsbGwA%u؟5ͬ`W*p lݭ]XPg7Ƌ:tXOCך+[K Zee)Slᰡ"ݗ-t _e5|~ߟ6\Gѹ:,%RF3Kh[ٰMĚ簖yCpz1/,e(qISA~`bBc=VW|ā7 ,WCdM˫X=vdRェ􌄁J?Y{Z 2~RWg"MI+H^-.`ZehEs{c6#@f\OG=+e +>%7 s;@nJA^j9J 9697vIh?ZvTByb%`I^ !K9!ڷ;::P< ՉVǠ/-$#6:gƌכ<vʵ0G465>{&^f+TqD>.†21C;:rWx­Il]\X!xj🶶֟،%'i% PmLscJ~/cẐ:i#pYc:R_և!. g_G}<'eKt^Vz֤$'/ՎzN--`1%sgJv5W#8>dA 15N:#.bmKC(7Plxbӭ$ =:hJe9(Ot M0:{BZrc|)MDΡß339adgz=W@$O`I;|Xw=$ "o8E/OFyA3ޘ=$~70Uیrhu-_;՝ic& gucwotC Vu+JgQm͹:S鸥 dvqM5p-('`P=I{x' n55 GV>$]dT'4spvLgpa4<{jV67Fi^QPmGǕΨ^cO\~3y'8OGLM #IOcHar8 y{W4Zg7^o_.Lr<*0iN=dȺk;G{֦,hy4/{"-l*f1U%AE^&#2ȟbWpcdZfN<ϳ] eF.M 6d O|~lX}sEĤejN*wlcInb?2Wn"|'-0;ьuB_0f-+ ! 9$nOVfm|ccd! 8$b;Į+!&[Ԙ{]V5> P'O޶UiU7oV-BNr3RALd;V:8f (lxF@$ԇ29>s6 ӎ[WdJ[w'h=T /t1&a9=ZRtnH \qi2Lf"dF U&" Ȯ\J- .BZ6evCCQyL+-s@0Z-ڝGj="='h|ø't:`#=8=MAhq/#7ʍ_WƁ;]Y.c.STfuoS~^=lH0w+פFP,Fur>]HC- T\xjo)U䘽wEcUR,x[PQX7bi2< \Ư£:G[ig` qG`GNZ8 Qs{=:^̩b]чC,(d&"qOao:]EJ\9lAԡjȄf"md+ۄq>8 ~"LSVH#'{Fk+, Xl-Z5yw- u$D*aj7g=eȒң#g(f>M$#BE)[JLBī@/(+E P6W] lf_+9?X_7msqtfNgsD6=Ɯ`t^srl<+ԚJ ?akJ=bԕ أ⻦lݼCU,ZQ+@PW2m _A)F*#w^ȻSoz4cI<2GLUo*!C:J'!>Zm"Io_d:vڎ鷌hs⫁ܞ @)f c) ]jIꚫФ0OH:Y]5sHr5}Yh|p$r2DO(0g͟'e`s6`J[+ kr>%$uCw=ɻC8.RAOSʄIu$ _z RHw`|أ bįHh˗ZS'h-GvBد8Y!UE^zH(H5cF/Yu9Q1) .G/1R*e4l.G:}؉7BΡ<$_oFB5%&R}vż\`Y|{I)Kݨ=&dK='l;rkD\jȡO)1ʼnu 4_cq`8h+Xgsb D 7l;t^"ƈo>J0zBgŰ  2ڤUEN$K?r|zDdoZ8ju*@2j|II-NZo ͹z"`f,]r.yxl}EÓ\CAW(&nR½OovC%F9ل_$oUPZ L2 h"ru{׳Ԭn0V.^OŠ|RWNI6r@?~Z%ul؎՝8Ϊ}$Uo5'zOk#>KJ;0-#>($qug򉒚BEw A(h=Tar3y5+#B!Jڒ/渠3 ֔=&h끋?'[ff`a% N{(A~^2NZ&S홢/wUi'yG;>(S^vҜAi78֢/|zvu/ W*iNM/kfmq16㯥=Q=h_sY9> 0/%ўb΋@&?:gĒi'=;Re"'-cgU?D*R3}@B~=E"j E=|7H5AUro'%S(MWcf1\mkcG*#GRjpr\'Z y}eLjJO\q"#-OoDnd%\[a 37[> &/Hlv[1 gvh紿юF!ӘkaDbeJ[tK)UyV:d|GiXԕ ~&{~}KY3{//_-  ;7FH3Yw =-EH\%)~S9Q*uS st(b{-wi#yLu8xv 0؏׾X-nejIJ,C#hU9H]lqɘo֛Z9!/\i2ppgUȝj#֟puQQohst?E/]WfG\C%uU`GԠ\CZɫEQ «^tl}7a^E@Fǒܞ#a^nMZkL鰮[MU͆K[X:_  =Q_p;W"IOG)E}p8,df(!stN㴻DpvpNl\gED _9Lz +fxd7AgZQmS̳S Y Blѡ |3fK7l6qc>a,^SM3y⿊'VmɓS+Ws#f^қEЋA&1s:{S+nή;(`6]-]Mu>:Sh5d oߩb.lV'ĩ_ُS"2vG0d]ptA>ŭ2g},>bjљ m.g4M|M4&ȸA uwv|O]"h43nV4o+ PXԃ[ 763BO7НGg;ؐpR6$w|ӴC?*L)=FD=N_#=j]Ӷ}|82d=V.'=N-kKKA-SM: VYړϋxL&GN(2VLqfř*f$Srr ϶p:&{[O{q5cp!:K[;N&J-БSvko\Sdj&P|}s?6_p9Ѣ,L_5{RACJ {nX DX浫-Xs\ e Jޜ=nω\ C,qZs'ecAfuApsX,yKG_㥦,v+gdThv:Jdg`'=i12vˉ{vR?wy&U#HP-<ϤnoxhvW;h8cS W+7 @"ָNEl|,ow6Ӌk&ivĀjrTr4cݟ=<0h$_hrnޯy4 W hqˌ?}ɇ"NpcSǛ"n,;0jO"YXQ#xe_g"2-ȝL0Х.aRZtnCMNsB_v5T^*nmϣhK~TV5AGoa"q摃An\RYMK-i?nl>O`Fh?p񿔆ylYT"N.+M~6f˞jVN_C[=R\AB7 ;_!WC̿ZiQ1Նz=G n"8N.T C@\?`3*gLK{q \M2Ie7]Znkty5]>Q>kMh'ba02hN/OT{AǿWСHȪei,xCj6"#< u OL(쟞6P菗@vӀҌ!1c^OGRI,p[:wDZOcێ}EAd_ )zty0 b,\mtST9`՟sP*s/EZro#m(Q}n?jNyGG_U*DWU<3A:Xq?bZ䎨Pr!3ယn*ډ;õC.m`ąPH&BqD5)>[kǮdFr~j fqpu%"l{t͈ 985{gG:%iqC5_u!UGŏɏSz Qr(S>-uSi)6^mjԗ*^ C ߜd՗싊 :~n.<צ:Bf{՜I)L'ʶ%(#YSr*FZF:Hz,c /)^A^:M91l"+o\gԋE LJ(5K21"X>*X+}0͑ifK.ȖY≮c>sEDksz1v{3sn1FO&TN>2Ot6mqd=$D܎{E։& nTd)3j6{zG甉mR3U1Q4Xs.;Fw>HHp[F50'@Xqkχ&x" QnLȒ_h|;yAV~F}S$(tl!XdPqKܷx6fÊ,nuh9Y$CBhM46 s٪b,pw1tr>26HkkJ K%~s aKO8 0Su1DYz-/57I=Kxy!y 0W%:M&]}d߫T1M'x'+1cR*1L>-(xm02dx-@ ]?6KlO -S=A;|׽*[D8BvV;.,9j4CdtqRJ0l|(;=⥧fXh8#?M##|Wؐ~\N4cQZSjzdJu\nd<JSE^3T elg%W=MKmE:eqy T' mT xVH,`/Xp.{1Z#qIKѲ,t9o~$H(8,[{Ơ*܌*yݽ^zvSS4ua$j(±(Wb[rnR-#e`Hh:6S!7QjscB4P{Crd~:dMl)蒓5h2f9/όRX1獓bgˈ 07CG3g&J#F,EId=S33nWw~dl! @&QJoէK/+Q1vlڒ>t0\R؆-= 4]WB窥Bf qj،Cg궬Q2 ̿H|>|WA턑 Tnjx'gܯ e\}ҽ4$ w㬬ejmrc>/ yYܼ.Sq$sqMP W. ۦVcアej| ,u$0&KZf7=vl#Z9\O&lt$³F)5[>A?3C7@JBtdѸm'پt?5D゚N}+,6g!깍CKT]&ؑNo'2m=C>Ϫski,%}צҤ 7#r(g^0Ayesb2rj>xzVټ勧c#dIrHZ qU9Nbĩ6c0-4!<_?A:k,6ui=_>%E$}\JE] bwS"yݢdO1C:T}"xWG iWQ,{xtRSr@} dp׸|1nf`@6T}K/vpPn*wNPw*@b baug[`?FTTR(|qUlWzU7gjzܶDp@}Z9 *x)ivNFL ϖeh,ᛠv A*WI8v9t-ؕ 3(1O"A|Xuӛ^Z? i)0^j#xTzMm1Q&r㫃C;Fu?ܡ2ag:H/-ꎚ+ &.o!]eZ^%APSjۅlv#%QAO6$v<ptePe^"|t&j }pdyxw$ )c.Z/S$Bli8 J +A(_ SO ZDN~1!.I #jKEW9 y2P#Ɯ<>_Xhn\GtG^_W%FMʼn7mx|6"d Z: ͛=yjWVIqjJucwZ3hR8j=TJ&WH8ץ{ė%@}=S w IP"hU tYؘow*f-~ɍg !tݎIH(䤌&cQ;)evJX>Ԇ Bغ4Q'\QWFwc6:g(2Wa.?c-"iHN6FS׻ 2D~dSAȴ(VLD}Q];7EiaUV#r錤 򞰄/Z1DD- .lfSAvNS6~M ;>CtKjܚ\ s?xSAYgO|niMBraz.o3 Gzip.UX4tw)dԲvT|I~Z(bm '/ZkڄAZ2iS v2fYJ_PC16[Jӈl’m_y9 ԵXsj6Lߜrn6p^w%498bYJU:F`AΊ•zTE|cEU(- xY0 |ÀVť]|٦lm Ǽ}6=ܩ︘YWŁoz˧P* x*PJog Q+Sn,+^&(LA1y,,=mv騥 ?2pm֎ṣ|#ao:U?t[& ݧkQc{LI2PtޟK=hk WwQtu[1,=mA>)^Ԡw033-ɴ O3Ms0eciTh R=G&ȳ5j:q=)` S Na&{aHݙĘ,2vm&hcHz~Rd:ýT,HI6fV¯T7i!A7R^9c衐z1w)H?[&t@yl=?mrpi@P4cEX'r]V]ofXvtH]bD8qޫ',r'C5}/z6h Y'ũ7/d5$ ֠i+&zU /ٝԗyfݍԩbw6<ؓd+QέsÑq.c 3>qŰt?ހI&[Q&D4nNͷQpV<BNrm=;&B] +i:b x֔Em ,\Es ?H@ T~dBEPrea֯g~0 U4mC8ˑi+ k\-<͆1s;09 `Ԉ^n`]! aSeƽ(ER/\y\^Z8V:ۛxaԐ55=cA{3r<gD WBտX>r{b1X_u4bCQzEK<_}NFҭwj˂qыj&j*Y*v4Wb(cB8-wS[Ʊ˓cf4 W~1 Ty5 ذsvA마d$h-+휹v}RNw^e!&!/0U΅ү'6kPWy<84V$IJ*Y/C5ڹζhSӜޛDn_O'dΑ/)O0=RvՈ_$ 1}$Ugm0dBhY -PV [ZpvuBNL^>w!7FiM,O;W5q\MJf/, I !T=(i!Pޱ ~2]OrcW5P[7اw4CMmyls}sfߟb&wXo & F:{P FǂBBJ6-;ht;2:=# xktXt}ҝ6e=ʍ>c7'D&&\Eky (;̛Qq9T5"+KE\C,]43!,lf!1x=^FR{4qm;;0ZϮ715h Pg0 (~چq<(n[UF$f<a ß5I3,k!4~هRj)MTi(s-k=4_(-ze׃ TFy^:ZhX؂>ʋ 2xS9S!edK7 ũUfIM`Ra"-3K; NX#= s)C]mP ^i-zypkկ*EN{b ջK('AK՝m%j98 ^oSڢSy&{p:4:Wh?6sa*8+RT/OH:6z)C#y;T) t(H gsǒ4:\K<8Fj,t7&V8r-ȉdޚ?'#Yǣ'雎=gՊ=qW(N@8O_$A~e>W_&DX6h]y.")tf&|Q9A O1vԱosjyL`#Wq/U'ʫu6d!}cQNiiR^2%}PƒF5F-| Xq}tJe K5SZY\ d{ww6`g2*0 hiVD9Tn.7l1FU#^=J!<vݒ Tx:) On F3򬭘AkY9&787Sf kz@sam*c)_ar?,KǪ<&܁>}ViD<ۺp*!Z$:nƉ##eᣯ+!wKV5ȶ?LڕAB8(t0k#t A ؼs1h-S2Z gTF¢eA,}ݽ4!$*p\ʹØO>mPVѯ|dnU a͒*6qXP"Ԑ;) iJyʓS}Io@lbGd`Ϗ_&elma. yZ~!X\˫d7gt]9Y~{oAUKČ`瓑}S_WVFgҏig6ULX4^Eb_6#d s3\7= )>ќSҐŠ{/)<gL#,HoYTLFKeAo(<ۛ=E%j\;'VkFPڥNm&{ 0lu,XT'h].Y盛5"˶&iXk9mb &uʪ5%^M'NuB1R=A{]>g'иyI}ur5Ж+_`|=![[ڭ(Y]!3ü NR6p]T1NI彁* gW:E=`2!@Po,үai*\F]1+HPZG3B9֨v{)v|"{y3GAC ʷReR9:5P/W]A40L!~܌6JP%:c >``0~ֶ{ashj,,ǁL[˽Bf1ΔEOrR!HՑ"98 Rf:ϱi1]cіe]{ hOOjUӀv?mYV8-^<j=סu%0ò(Ϡ5y: