mozilla-xulrunner192-gnome-1.9.2.26-3.5> A AlpA?O1kGvm]|w,9 ` #R_wW? 18034240cb06859291cbdb50309f438a1eaff7c5h~[Y*68䡈?O1kGvmf򧠹ՄXRH); fu*0=6J-d>6Ic?ISd& * VLPX\t  4 > H \  8L |*(`8h,9,: ,>GFG GG HG4IGHXGPYGp\G]G^GbH:cHdI'eI,fI1lI3zICCmozilla-xulrunner192-gnome1.9.2.263.5XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.O1build10mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+ or LGPL-2.1+Productivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.26/.autoreg exit 00A큤AO1ʎO1"O1zO1yO1yd41d8cd98f00b204e9800998ecf8427eec41540cbf155f447262e4bbf0e73d91f56f2cd0c593faa4da8e8037ead7b1a6@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.26-3.5.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.26-3.54.0-13.0.4-14.4.6-14.8.0ON@N@NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.26 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-02/CVE-2011-3670 (bmo#504014) * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild10 1328663310 ~f ~ ~ ~ ~1.9.2.26-3.51.9.2.26-3.5xulrunner-1.9.2.26.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.26//usr/lib/xulrunner-1.9.2.26/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/mozilla/openSUSE_11.4/112cf1cd9f2e217af8207b1dea3b5a06-mozilla-xulrunner192cpiolzma5i586-suse-linux`˭ FN?] c)4:Ƒ{PNi-nPhV{z;7r)&W^:{eN A3\_#%K:%&0)IDu-SMο O: ,=UAQ|ЏiG'2&20p[PSpҬ\&H܆OG5Lk¶dJJ. V $A돥Ld{c/mӆ/v-Y* rgVx:6e(H7Q^R*f s'^͉bIl~Gh0\7_.NPo |!+TeHUyS32HBY {ost҅k;u60d X=g³TלV1+Tf Cw!qd|/q$8ej .G׮~gE"ȵ1X@(Gk!Yk RitƓeJ? =:V>bYƕ9~S6Jq] WxKf1dEz>i戏9=!7ESxoJGƘWfN[q=^s=BIz4XW+#רURV [|yhf׻n\9ިq@KX{SWGu'3s}5x [B<7,^ RST}`\sO A/G53UOܞ%4W–V+2`0t< *yky}程_⪋#Ji>Pi.ҿ zCCmVQ( a6dQRx$eL*3DD]S4 sϧHDpw34OƢp8P~ްd,91O>ӯ-bH9AQX)T(<~4m F5nRJܯ#.m?[Q>CXr0}ik(yV8/pWZ8qdm QEsyVw"!j3DΖ$g؝_G1X)a|H.!}np/=qZꥩ|0t}(7hwNuV :Oڮ[Vaawm9Njg]s/Q}1UnK iVAHS23+<>iH){N^q$ Dp8:W7H[yxO/.(Ф~tSpM"MNqz(k0ɛ2]#/MuR)Ax8g̒VrBSe@-dQSn"+n%ɄX d Y|`(W&$l{'t&cr;L&ʷz4;D5/GFh*+W '$p/;{rR܎=RG"bJQ@h'{P0BP$],BU彜=`DF,'}/L6sZ-qg9)ך5?=[߲4/Ѡ$U eLPU5ne-_7%*-PVYQhE] Gß2-Ġk&3O'vzԅET,6zQr֙bG'W5ӟS3!+ŻWCi9%Łg/T{.ЙƧaËb` Va,;f39ċH{e\2~1wMl~".OtYJ".4N(եӤ bÏw5RK1Hߌ̷ҫ"XWh9;e4SZČ% ,7؀QI[9| 6Rh<_/|âB`r@z! J…gZDqiTiB訪!Z=C:+О,7{j 2շ^̱%U/9}<eߤG;~&)yEh_~ qat$Tlʎt4u $&Ԩ*JkD'fg.5* 84dw`#v2^O_pI8͏Hjtȹ⌬\θNm_Y#|N$ynvˀev#Yjɥow!]OV\N*`kfaNA4DigBbܱ (Y¤hʪ7~ tl,cu{ŁhX|ׯ9`A]{ކv|h(5BAUTCi&yR[lSMn8L3'3aav0=.W}">?= 1iv1tQR폷w3%y_,Ħi T lEz{3$ JS 0LI o74t7(nvtUpE#ӀlXZj M:/a Z'zhƉ>@v>ҴY uXJ̅ %q%b|ۅzCwhU?.QsnHMFl/?S"&&EtBgΎZu# V@Pf?GkO#񿋫~ŕ&s.)^W1VjG1_kF!#^o"򍦨Crr%\}ŗ<)Dazo?D!(JW>vQ,=OV/W39'؍8?ۚ#^U[^guoUԶ#Yt4n+Q+$s+1?8$* N1sƉN~ջ4DQvHq9ljbZey~YHLXqg4rּW:y$`Ee܏7ƶ ;yĨkh3IXA}ۜša"ӿ. i,)ptAԵ:^ 9lB5Sͼ9\XhÜ*lNzq 5^_9Fޚ5|>~RNX^6 '&xO)Iܞ+5w_QT&K޲M.3<&]xp\b(]8-P+:?Լa}@ſA ZR[u.ݹcJ9^,ffB ~ UUpYh=&-eYn1\n5v¤+}Fnåǔx>V ~gʺz؊>/UM3#7 DZ}R]fݮҹEo)gUUe+9,8*F1p)d ,g[ws{!{}% 53%n\fqq:?1ϽiOP[=Iд=WpoZC hwAdDp/i"қCIj0/߈fCw,H3cU5P-_ pjBzǁa,_TrV)g.VZ{Y*$b7c8+&[ a=xc%1tRUR;c3$+k(]X>gR oX$V ;{wb9E0(FCOZ} M];VA-!J2N =gYX4;tf}_{ kG6`ͫr\LwA_XrfRԱjh #M;.ܸ 1&ȹU}n-3҇_C_Jm 3vqaU^%{c\CEgɻ1^ub !skP\Jx,!QDuA"4sVϗ̠)P̅rmRn׷+Z)TKȰx!eD1P~p5~5GGňcig 0b awRigNռoY$+EΪ33IƴsT+K+lvoKp.&p{DeI9}Be[Br>kM{sh0x0ԇK `)熣g?n¥0_WAb?MH7X ®|ǥ5<4Qajm:N6@3j|Nan h .S/*)3Hcx o?֑µ1M RYZgh3TOQStxe X~*Z,?OeG@,9U .0=VQ(V1!0e6SLV>&}J}uҎ;yBDSml=0He*U2T7kd䢙𒇛b%9|I?<lN0@GPYZy&D@b=1{\nS+%-1k 9j+k (mǕe~75f4 f,1FK4 dӪިpIz ?|濼%[z RkHL k vjNmW xFdKlO,aØD%LJ۶Э@J-ӆ4wʓčFrxM`WuG3de3Y)Lӝ#'b)7]|H$kuo&kbY=6iƫmߴahSNbhS1p 򯨲`$k,:椛%3160vt,`j/5 eC7SD7L2,ц軶pJa_bksRM۳,EtkSvh G솱 xGzdEePPg1֖ۧ4K -?O&YЗYhOom/+ԌAGە/h[SEea۱86Nd|Uxo@L+ed QOC׈5dPH!ѿ bDW%U}Tj ZqLПV':/.1"54bum$x/v- R%)R-2T,Z~~1":#neؤB_tT3f,^R{]/e0P1*o Jl| mc\x,Z=WWPr i,UrO?~l؋T#hXua;ZCqIkčuN`x@ *s6L,XhXA=p6uTѤ3O֗J=-)zCH{鸀}cyԟEY1j ֟DOr`~HK_M}1rz" b./J7e|c=a-vr:7L"K=[>Qm?Y CW{2k8‘]rqe#*iNҍxB.avP ؞wII^T/BT .oĢMZFF Had8IlE5|V̌Sd"ɓVaCVQ2 i  r˟ΜB!iptgFhTᯎ'PƾD ߾ ޟޓ{O!vl^Y"]p(06{wLAMeq "{Wt3?:w`8] u(諠I(V *%>\;4(!5^D.]B[=gw0{?]&_=Ub6q  C8Tp' vP/;3ܡQ 1PM̃T#JHvc݁$0Se1oAWLTM.=C9XRhiZ Ya }U]Z&|r2jV3/ŎGs(ErlǴgHk瓗B| Z]'wQȈ!q&o^RK]iHpY ZE h qxΓ㨕Cq,0mjG6%LQl֟QPnT*5 \iaH$!K0&mj@Ze@ ##< OF ?wl&03^5p|5Gǰ9a>,-UFX̆iP M!pü d}US@eH$-58tT dșJ]@Q{B|˝ q29p vrof28D!WAOZ[a[ .YOS;rקZTv|in^ŀ_<% 5:;)va͂t7n:܆]KB$lS/ӣR,6!hcޛXD)4 ()D%-%m`M #~ mD9ݷjR71©5_}k>4&#GF>},x ^ɶk'f4Yܯ_q=²|4h|2mu ]80']%oAҽ1 ZT WXlKYfT5(SZ*ԁr5U O%@c~XHDI!cpT9pC8Cl1pk#D#[y sBt2ju3G^y+>~?HP&:%:u[$2ėɛ`bXy8]gJ=8}iNI@yOj\ϦS=MZf!#Fί&Zó꽪П SBL`VH*iL1 fO?O |yVk`qBݰ1΂[+mzg| ƺ\oܤ 6brJܮSl3 !UW1.j?sΐw+Os aywkDױ2'=}vVzĨޱPw3 &_)+*9e@aB Ŀޖ`t̙UYl tbơT-$%c7=oԂcjZ*x51dO "h.ٓ1v]w[8\^PGTSuG<aO#%sۮLWe,|H8{uw:U/Oy¸<3@9喇m6dGֵrܣy+}*R`܋]͉ͥ]i!1mO#nH"OER?/!tJ3F{NJꮻzQi,pzh,axo+Viݔ H;3[Q-p%jrI&6dyt|鄍v=N0jC;2G1zi(Qbi^ՐT5ıhj_23,PVFU 'bڡVm=?_-d]>N%Dxj(#&yAJ8WÞiSɓq`!gCmSl0|)j!gB%SW"(Aq߁ ͦ|WG$Hjd U?BξcGqg Sc0O~]scɚU# 6=qkh<'4x]?E Nfh`DVW\n: CYun m8AFZ~I*߀pAG c|ۑE/ӧSUy",5!(^jKxH3zi߯zamu7MdEb7,OQ7ŻK9WRT< Mbϛr-X.0/bcQ"fJ;ikKzvT=G|3&S!<ߙE|`!E&œ"O)'ހ8JAG.Rw:ajghK,yQ-܁V"Q/ڃ!wO\~Hh2B=Ïߥ"i?h@Z"=ꂢ(Z Ps,\&L1LQ'¸RXBؗ[ +UcEܒ1W,0n>"Vd!^ءd=$l)j`WK%cHHMI~nmOkEpqWDY1ʒ cwsy銐WBa"qoۂ^ sA1n^`ɂTkOn@y(S"4C_ 6M,l"zA; 8NMOl8neaLPG=lTlp?UnjPiv5}Q"]>' kAVI"2I - !ixUP@tA5 4 IM Tիa{)T d$_"\i1qg;C'םt<)^Huynw>8Ud<}QE>AT}?R9x%i/jf,_H{w1:|u{~JW92r  =ͪru1'3޶|ZfODTM-K|}a@| `!_ዯae9$_lnO- qM|lޡu cㆉ4 @.>Hu91؁^rKXqsOhz ㄝj RTN5\zhPP'F ^dB;ivS ׀%= ,u&a)Ymue_jGȡeZưCBT"ܕܚR'zԵE Mg:nLˆk8_]KY1|^#vGϕ޽VRu_=CPVid:FJp!0(s"ڽ93ݎޫ2xBŽaB?Fo ;3ˁo|=sGu:aÏ1e/m?)h?w(x[X-3^o@OyyQ_ `rEjxY:D?~/%װ)K'RMН{,SU$pEgSu;HӭGza[OVїY9Oc9=:Nj˯I#Wi~XCX:Yh]U &Ѧ_k0wb aM7 #IkMnd7?+t:%K`S.;<_$=ZiT_i@|+}pOijFpCYikboÍzVFwixW2xGy;a=(P4ܻ:H;L)D fMffe*RoRJ׍DIHQ鵉.?;\g;**V9ڌL+ܓTQv(~ww&sQWy_JMOb)u:R&eRDMrf qbn݊6㿘kW gh O8 TvA9L =Yz_5NDBob-fߙXrN0" ٸqgmHǍ'BJ"xbjcJ=d'z}Ʌ0d+l+']"HlŖ(V#;9p'lTFwPNHӓO}o]%c;yძt#`dž'm FjU>— >-=](19Q 9I';,0E bd]dˌh! +" f#eL+||"oP'P2EEmߊEW tfӲjӥx³+ &KzW0kqlّ#xlӈ?PSH(BքO 0Ə# Y1Ƽ>m%ڒ;mQJqh^>Ŏ3GIݸ- ?,lsUk53B( )i%lc1OlF3ge#&%ƄTm\W4*kЖ:L`A9Yy {-.Lne)F7,cN끏hS-cf4 %3Z,8bbTK v00ϷkIsS@!hwfj NRdU~d3UPxX?*⽅䣰 ;$hB?›˷8o<Åxj4Œ5xgcZz==5{)i|ߎ&YS~QV ͑Hvt*@ pS %w)]r/ڊ$"|_z8ܽ0"vrQXxסS:dQnyVƷF靠'MJT ȃ0JCc@;Ҽ X)4,q??ycWtG˒lӜBR+%? C+uA2,lf(ZQ%# 1d"$qGֵNzG uHAbyzNe~"g:"ԦE^!NNM5v_o ·Nw' r*@`vО0ùva('NAEP`&9Q,XAw[xwT⋯0|*ALI- )p9/9Q_e` K'w=ƀ'd!7&`Lچ?h;8@K/^fGIr̧ы͏x iO,Nsv\%e*T~GZb^EF }@[f1,R>wK3M`F!kALd+hNϦ Xğ{{!c8B"St<ÜVfdFӺًksU[F%6%/` $5zFW"5&^(G*"E-?4&.,""d^ H&YN#߽VrӲd}/:/Ι3 糂l1Qd{K:<R%xvcԲ`a/T;7nR5&>i</_8`I;$)°4vTR^:Y雊NGh,0!nmM/+;-L{Bʵ]A" ůPU4Ѯ=T7aϜq 8'%r1gӆ2ہL)ț=}P \$ IeϠ awˇ{M˹@V+d!R68"ϘWg?3:ro'պ}}(QCF_kö)ATyڵeBx.2[iW;R{{r6V ʾFK4G9D2e=v(>λ0DX̹-Z,KCyamAu 4Yo>MZ0gQkGaIܼQ]H CmH 0dٝZkC(&{*<%x#[FBOk^G\AOiePq"]  HeCt;i͍% `2!_h4f,Bo=+z,6D_E>\{aLޙ0CeO).}b&@i1rOV& <{YWzJS iB&uTo1)ܮI5$Ap4BɟPBW^#ꠚŁ9&O^Q'+u[p>7.N87w`m 5o(519,8F 4MfEs= I%#2~76BK]~?R\xoX; T<~Jﺒ_L:fq VaNsTR7o;"v(ߐxF(5`y8fH|[9][옏Ij L 2+,"!ϷOy.8o1ΤI ]6V5] ὌdbG0Oqz^㌼yˮp=tr7P}<˚TO3^V,x.8<p ^M8-@Iv<*Gwjzxɰz A$I+@RU\s#h9&F)hUF/R̳ DCPjH)[$_q )<>%0?d5Rp~ukH=54,LY1c9I ǂ8T@]܂JM{I_/;Z">`Mv&*&44⇎VDiMtd= rЂ<ŻKUX30Dd_+~L |tD#nɼ63jǺAJ4ی\FFU3㤣Xh) `m td}~IwY:yqX?L_ )d=͒K'%1Hki54ąic;D%.?o ˿h)Y0$܉$h%5jIC`#+ߣ-8HI)PC&BXٽx)R`4dIΝY|;Uv&4mj,\x)gG5%Dml ,ZΩfWy]{=ԍ&7¿e/HAJȝ-O_]0Nxz}SijWW^MHu5S9RZi@?4|B4g"GN{lh)o,7`ZuMi~=m '%wq#֑{70%/lc0vkgEjP00 umITS^/!ƬufIeϓ|@dRfOK漄N$j5 CoVvp`Z?Yt? W.H"Y0!NNOdKV>H@&_'kܫ*l_eJoZ3)3VԐ. zz=˄LtGxR@'pɋ|&Za%q'BNcQ$ $O޳i,PW'Weʁ-b`f t +_=ȉ)@D8*nü& %E ?b*od]Vdhݛ D,V^}4=(^[yrEsP^R-'˦șB Q8脾7HX: Ɖs^84E# 2ΰ:ɒaP-?&.1NY|֍zT50Z_>$bZI;.ƷA_Pn OA`|,:dWkktl.|6!I,sg1x% 3~a3sЍWS?oogO*X Ɂ?  ʅ7vANbwMs&\]%ރ @S<:UdM0Lu; vOH*VDFPlhA -$ fQܫ ^oK|+rn1vBVH}UUY,m#T}[ԜC 3F3޹$vlkwg}: .dQȡRbl0j n)H"F}㽥s9F{+%g7f 8_K|.`kdi^X ^ c\Ӕ8l5ܽCoUA&aq*M+p|적YhyoT 4l"ὦ+"1O¾hg Ƕ,z5hviTuUkKza4H7p1 Scp0ʊ}ٟ*[y-kJEgS_Ye0csqYُjr_~KdO uz G^`i#A`PH&%A{VxAcI Qx1ul(RwÙF! ݺe{ 0!. 8bQ Xآ˺49{7 W*3xJg9,,dr,c};J4d/L6um6}>u-dUp)-8RSAywSvN)mJ C0PԩV֗];Ty'ej'kN҅$F/Uou i%^ο,4N7'P82ȃK # 9TD 쿈aS5Yj- w+ q)VLsd6U>M4{ g飱-جe`xqً4'GLc' Ko;gkmC NgпPuisS֮:}ۓL~_Uh &;bߦ[[`:G9#˔x`:%+oi;!cGʚΠcݭ)U ˶gM [HW'\q ?Gizy^[PX8̍9 h@ v3SfB8O2?G5 ϶عєĞ"d!jAtɋA@@SX i#Gvϐ$?̀"It[ff} Km <+,,_!kzCM eXwM7L+ Ǣ(4 c hfmKU-;GHzl.$Ĕu:p.β|ǐ3K8‚ P\Rk'\N{h1~ 3fxz Ɛ5^+HB(LŊ6ocJ'&k` d#{{0frG|K,cPCSIgG$pɷvìI!O9#WpYL+鱠`yьbn[wגEtiK KAq hY90w\Hі}CwsN+U]B{B/Oy=%4~4rLL#8;C ,  YTȦJ}oPV-bs 8?v&;5e*I*!F~ҋjC|H ]/ܠ¹dYBۊe=Zm^oIc^FOU&IT4R {3/X/U'YtBnZHQ<8uD4FjEhsA37^27tW!{=6FbC&s%ޖ3? d#=Xv_!^Jj(O\ Dc$Y b?Mq" %`;k1ep-.OjKŷjr-.d*S\x|e `KlEgH@2%ԆC+'RvAmPL"';rkϾu WeͲU/!9/RD ʐ_T(a:N",l>q`<|͓6&ntU3pُÈ ;B:!k3zQBJfla9¨Jfzxm}G!9 z<1rC~w4?9%ސ l|77 ;)a?\6]* { .{^ks S.,;ggM@u80:[e1=IB hżr.XcMxrPP@=֑['IY᳜XE|B^cʽٕ p~ e"0TY XAX/3 wK]&Od o+7mRH%\vMcKl{WLmu}[HepeH. K}a,c:,!VCFrկ,IpoƒAzM!6?̋V I*nWa)8KXfx_-3 GTElȗy)A /jKIRY";W:˼P(Pvjی餎&1#><6R4CA"pBᕱ"3PpF*dxE̍O36˕Q NuVMxYʻ w8E|v>tLohE>i64[ӓgn H7{I@~IU:#P$51KB?<5kbM'+8N]a@ d .9y;)Pf # {[s=(Fjg)w>`` f[[g3-F>֦ie@a27օ!3嬓&J_dfSZ@-÷]QfCj$1 3X0 *hŞ$(`, 'Dںɼ|Z 1V룢I˥WuK>h<D xChY{ u;.oD|ΚH O82+(˵F~w~>:oSY[B1bblUCP;NyųtO[3ŗ2 1Ƕy[-u͓c4sA"c);A~j۶j$H-PfT],oVj(NH%GtU;'Mor@-1#i@"(f}$5C~,b4g>騌>k,mWKi&&WwkhܔTsAA8Fh |OVڦv\տd6>V~tBMS3t^ZIk jBESp3Hhh0Z-YA)]F>F?{-Bv}d,iغz@`=댽j1c-%A90k餂_0ʪIWUj R^$pB\F'H|JQK*Li0U鶢K4 BtxZV ,T-[bݤPho9Lku9'Dj?U݄GܺK.@$sٓ?03466+իMʺQ)nLgL̶\5":LbdVT*hO γX^/ Q.0&!ݣe&-^Eg !A%Z٢#3V LbgEvVNApnB;ɇq(@ lZhu(Guif#m /BʼntQm$F IetemHY,oI+ )F1 OrG7t@y fFW%aܿPe+Ar'bkRA"[8tNLI020lCڵ.Cs;5KwFbLX.Sdƒi$jM{LŃdiV$HYD"-Kl_5ײ0N=Sap7nÂ6y#櫯+}"ղͯ(ŀ}srwYi{da݌o"p󺜞_{#!dz|@3!^9^|:K}3JLH~[o~cά_fXqH Ҥ|TCT'3x3c:.hcB<{11b;= 'm*eQH2ZG=/E (b5|"Jw'6G_oN\"Lc~Xqk6ayo(H""$D2cΈ][Dt/֯'|΅^ka &T+M@ɒqw"$_9' n՟RF6c|KyX]Rsj98t&EG3k1Hsȏ8/7HX~yIs:S~0f EM@'S9ScR;'߰7ذ ٣n:U1(5v) (>yhV m("_+3LexJ2EQDJ=AֽͨmLyc-͜IQIs(#ӭ0 {]:zAN3m7y^v;ްw} #"% d!Blh9^69sR#ukPXQe /2h푸?9DRϬ5S pc -)*~sDHHs6垥2 zf68pH`lvRnIqzŎʻ^i Dq]%L{XVxe!L/)<VLt$ ă)g/L¤g$W-wzT3'%"7-4Y5GB&4 itcZtF:>sq;3o21}K#um+Nk ۨٴgһQ1_A$TIpy~:×;P(\YOo1Vö̱*sYңwtG@7Z08]vS#ֲ#r]bZ@gk`"gƦI#׏4\N4(y\`{BpyK*2 +$:ݭ3 5 @ %Ziԍ8OF۽ 'ʓX̗^7LsGVI(wUwE)zp0 8 ]?dWq!`70X#b_΄r Ѭqnj.1?W#XBv%D^/404 ^$":®_&B5,&Wڴ1 Uդu4%Oi+{{r$ =bY(ĒEzƿY_&}jp]oN̤™,$Rqv#?Yח='ʸJg(=I=1c?yYh8қ8F$gFwrESh% !΍{K{q O#45<̎@S-gA+Εy6u)9X:P42(Õa ˥'0^pB.o!J~m.Z=LcrEVb\\vŁT鯍+}Rp ayZ}^+8 tdhH*zD'cɨpT#Tw c0^NՔŅ op~B}'lyQo0?f}wJy<~'cL tS6_v ~ɄME wXSր7<3&@L_NjRFw!MS%7Fx 3r,'7K[x$j] l/.,g*8V.~zMkJY:[6blaol{vu,֛C݄LSu0"_b|jFDJ@Ѐo lȂ?Tnf!iv[.:H 9`p"/g/2"5( f0@>|MBCpE:Rvw֢\Xj-@*-p,'`S /g{4JIʷ"\5naq V#,)/UQGۉ JF B>*a{~y,sagF}brog7v& 12&`--X/wi0(,=~|g&$} wR;IzKYDG%};4 Bh P3