mozilla-xulrunner192-gnome-1.9.2.27-1.1> A AlpA?O=LQkGvmDA6I?Id& * VLPX\t  4 > H \  8L |*(`8h-9-: ->GFGGGHGIGXGYH \H,]H@^HbHcI^dIeIfIlIzICmozilla-xulrunner192-gnome1.9.2.271.1XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.O=Fbuild33mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+ or LGPL-2.1+Productivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.27/.autoreg exit 00A큤AO=FCO=EO=F4O=F4O=F4d41d8cd98f00b204e9800998ecf8427e67e08b52ff983d2fa2b847ef9a866535a12be6876e7648706209a8dedb43ff84@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.27-1.1.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.27-1.14.0-13.0.4-14.4.6-14.8.0O@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.27 (bnc#747328) * CVE-2011-3026 (bmo#727401) libpng: integer overflow leading to heap-buffer overflow- security update to 1.9.2.26 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-02/CVE-2011-3670 (bmo#504014) * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild33 1329415933BBC$C&C1.9.2.27-1.11.9.2.27-1.1xulrunner-1.9.2.27.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.27//usr/lib/xulrunner-1.9.2.27/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/mozilla/openSUSE_11.4/98ab4edfce2b7e581ae3eeb3d07565e1-mozilla-xulrunner192cpiolzma5i586-suse-linux@(ERAe̴?] c]Dbq@l{e_(?HPt[' 9d[㲞_+It?V1/}ZEgS;CTzI[EBSEʢ?@XkXJwP][dis4_N,Fi9/OO3v4cxpc<4i* xK$K`β6~TpVf @\wJҫ(U"%x@VfIC'/9{mc\ /w'mSh~Nuz\Hwe3Y}|lҿҥCt#dΠDe7(Yo*A/mdDRV‘,~xHUdvV% =Ǡ55[i6>-*sG}-Qj{MX[t`8:s JI'1yQCH(?6bxѮwhTE0􈶣*sPO+V_>{J>T6OnwElI?2#o_{1M_70Ohe?է ћ_.]HyE Hx'd}f%חn_<ӏq#\a2~m"4gJWuС!MҨ˃ 3)KV|93ncxSOd؉H`6'D̦sC6Zv,jN9~IcZ@:tY#g~F2e )"N }{&LU:H@^Cd5lPEN!bⰄ1ʀEPOW:z ݤ$Iٜ,Ӏ|Nx!z-!4;Hԭsb {cEOYnsCs |0 }y/"1=K2-v\n$FVG?gGz3ゥ<s-x[}w =|Sm,wz& SSA+M!u-0km^)_tCҢM8(ѲAB}1jjeOoMzvڏl j9.4n֡|69>33״vZ4=)2cONŽx *+dO ]50sTboƵwFH;W%Hg9Ac0(M9 ]#LAo9Ojn7zEMw,yRsw;[3F+ x@?է"Vdj]Qu 0U1(G TO[+\Ŷ88*h:;Y$ھ5%h{KkKa%Uy; ꥱӄ{Y ;26윽mwnKŔZpf)"AЀ) K_)wxߝUr3(r/ƫcOnSS)PaC`;4Bܦk;C 1BZ}Ab>s,&GR- Uʤ9Q8KV#>d~OǗقg`nuyJ4uD)i_ }fi"om^!q [hjKÉ&h!.v&}_ZcI|` 0+CoFu8>f'?'?ޜVSWSo9 ;Nf7dlJaU[\ӓQ)Z\(0D6 f0_Ͻ128?;RMuRHJ7޽>1<םDlDY1UUvɅq%ƾGjYuhi5 aF'Sg0C ݆pPĀه"vq4vt;OⳂ[Y <0 s7_na$σF&o2:sɭ6t,߆/FuTRGzQ?6:]NljF~Z^#?[aa ja}GEaZM4l:L4X2Տލx~P~7~F!~x_r#Q>Ff+CQn9[1X 8 ʏ7M7EipCƺ߈҅yQ瓞 4zl<يga&w&qc,p>K@mzb 4q |uId`b=+W%zp$+Nȳ,kS9Wvꙴ~5hULOLnPx;wD ,R77@`P98%O8`-g uYZpg> x.QIXNy%Bڕtc$QCV= .yTHO,$"T'ʈ=N0D@vlߞJ 8e41I>̩*B5V ;UeIº0v<R=VAD N}dM5v[EB+&l@E(dc";q@S:T^\xUWweoϘ7oG)\sҌe܄pOcw*iTN5LZ } 2n7nKA7^e3Zܒ_{-Q.TX.kc3J}2[fO0RKĶCPx7=W$#d6'-QhjoJ69VcS&$t#w劳0NKb!/)8|v,C%~>qe1*RZ Z!goqLăD׉׼W7PǥpCfTo(fbsώ'_1+/׻bVC"Gx'L7O){ٶ^M:?0ivyZ# ݿJ&0vT?w@͐տ `G& ~G#K<vmh$k/֕$Ǖr{Y+o<K'6`Uئu *g8☙9iڼ=6-$-܈D`36\) gհȢTW𨚑_r4|vZmP=V\iI0’vnP,N|j-$coY򈾆 \(Vatw#|%axkBP.)X?ORzUg"ƍ}TnW-^ OQkdQe&C7BW'ZVSnXQj+xdCR&w\% n `J #YwS1tūh~d3vn%n5M޻Ƨr0j¤53ZLq "3 (Eēd /YEH V CJN?Z}& Z@ ocs걺8=aX"rѥybU xA1-uyv£u"K#W pD0!%zn:T4 G삔q(':wY%tKC')!NѫIf$8#0HXb29 K#ynU^g1 ygn@,x%zlU/ ߾tz0 b6!SUoy~flQɮw;)+q`R#:Ĺ" _0qD [≭v Eq;blQցH4UqÃe8ӱ4?sIWolico!RH:LoH6" l)s>zvbI0w.Gҫh8)I/u֭3fzkWYAOp=<,o 1r Ɲ^sHI!W"*8V܇LZ%O=x¯h7vk,v\!V`ͬ?6%"&=qc Y0-FhU9J,: V8X=@6~i\yq1VkqkxEW7~981}*&!4`ȘXLX֣LJs~A{vyQL'{?dx Xi=ݚ]vP-]i9ᬈO,b v:i;gTֱEw^0\o[aE|giמ*afZ@GR9'N>𡌤n-WBL},|-9!fC>["Ϻ7znE܄Ɖ&u'?Qsg#kZPHcjd-H\l-JT0츕r'vsH/Ep 7Saim*~<[3ծC3ױ cmzPSc` jy/.-͐I)6uɎ:8p# p]+ZY5Z0G1AQC~jB4&)n@9ArJHrSFxQ hEQ((D_acAҧt_eO[vhEm4_ [0R|_91%`Q|w'Ax\e;]~N އ5wV!61gY {Fkl{.a? 0蛕pxVUF-(oCJJWϚ`MTl *PFMq9h ³q8m${PVɜ_YE Z`qQc_׫:w.2M-xc>xDA={m :%tk {גu+/"HY3BeGrβJx\Ză!*WPn)`6ߥxNk.E%A@Jqw(/m&MuM@vĨ:RmJoi5 KY XX 럕Qd&t!jL^wz%/ɾa eRdL-so4S^MÑrk)ZU ܟTqcch.TfepQM4@IB8Mmszyv~ <̻>f-9C"Ψg)w~QckhUkXoG ;:exBW:} 7>=Aеk02dq"wu0)Ѥwz̻<},g3 LCo ,Y0ntYlL1HDnۚ+4w4eHRLcJuj˶727z횿lK*9PVd#m=-'3O]6%/ML4`7d,g ]D2EO{ ZwvIJqkku431` nP'ŧ%J#w=*P[7ǖz$ gOؑ'ʫ`ym5ި$߾wI=tx!|JnZٽM oHn=B{q@ܞ(#: wR ܓ$G;3yJG6wJ;>sИ~=59*.\Ιs d>X=ތG`tPwpL=_e*y5j_j~P6ιY:i[XdT6lQ5X_F{([nL2׈ϣssxYO[|ws49ZM'ڲI(;| 0@7Mn9~ҳf|Dle`n~͙ 1-QYGwZ9OZ@)+ˤ/@;NgGaŜ(3fypW'֛\7 \,2Ϛ:t6&d?lFgSt csj|JOζ~M,9ڿaU/9VJs()COAVIYI;!K|$fF0d00]aA3*r4(U=bǛqY߬DN9i>GkjkgэpnNAŃ,όHPVuw"xߐ"w؜0?9Ęp8tE P FIi:賯KdAY  .MS[W]צ  ʼ8vqGQ(Io?c;v7( EsKߕ{9ʹf&}pYͲS=\kK)"Oq{Dj'ЏS\becAUEoaV5{b7&Xq} Qd= -?,cnG[-%C{+J 7:G:9,gj[s鱉AyauA_J/t5W> ߡgݎUc#Ld\־ȆY ]:ݫRNB{9Uz;ExXhm2֍&&,9io#:N|h`U virYޤSJK g$; 2 A=;w$"Tr9ڒQb1ݮBims:AE,8 'B =1Cwğ+ (o9$?x}(p$/qIcPjCpxdnد|AMv>ɃJ_8Vʁ~-╭+O`,eO&P0#ص<6\{'TSD!xLgt|};a D?^ܮ$ɡj7g|0¡ETeDӚs3uֶl@(JI6ŨES:mj)AX걧HpksPqƔU&QZ2 ҇DVmI+-Sny}lq[VK}]SԀx5+1WǴCU ptOM:e<"Ήu3~eJJtH|gtڰ(G\P~G&qrq`dB˄PDSo' F2N:vZКOr-uvB!GqZcq 1VkiX-p.mLlڞ vnA!|T#[jQ;ʭ`~3BӤ3}%qb>3_7> _y5 @,#z`$g)@2GD x_ˎ d̥y/(#Q y8{ p=OsGm_z3x2=Hy$^C7h-@C,$(( 7v[}`\ ր#wQ!pFF4+ثa:^ bebwG!\T*'B+8%th ٍ~у~F. snk¡Zr"d醑97AgEv)o߳4z PHJG"^m.;r{:1wm= O& pNP} 5SŹ@N.1u$c;|D_Z~3^;R}(.%?=L*Ѷ}+(P^(NԃlI_God0?T6f}pmX-xƻS^`E_?[SKC-eW(ᅑEڰ09 |S8C^ޚ 32Mlj, ˙c:&z wy~v* 6>^c36typHE?ke0sbh t$vJ/g nNދ+>Bw2uW\JsůC^ϋW+Į||W0P˄C0x'Lrv&|1Uq_dX+-fʗl-jNeE-o!Bxt"ۗ9GrI[5> 42 ]:L Z K1Nc.!2O`à QnE:: Dne/J]Éf۽♷@h׉a cChqټH/l+]^hKi5xi$%[E -_#fN`21aGd`CaG Sz\)'4Lܛ1=8ZI6kHZZ!.}w0u+ZV: P e 8K+NcVYO+ҭ|grꃶ9t8'f\jlD{6D CykRb\_'ΟlrK?S6Rh""km-k<уLv6̏lQp(>`60hZ V\s: E↽m;0W\: 2.I={*VhAdѵ1L qHsz֡Zi45Ã>dGQL6]lZ9UU>:7_p }γ`[FU yz&͢<#][O~29o5/Kn&uXI6ROf ;UO'w-ܱˑ؆iJfYۅel2"qsf eV 4"ApySO}^D "q8ܽீ}1ks! ~b&~'k ϙCCɃgb呀d^f'\9Lҹʕs-+{u}{\[+SdeeucWތHvhn,䍕6-et+ kِ&'[ø GmK|=;E2zMU+?V,YY3ڷрPp\,O:(:3aF+8>ՉA _$_+^YN-Oj=M۬WOi1UMw_ua"`?$4\_9}6Z`950i;XFBy ƣ^̵F%F)`RB8iqSq)X|iR~Osʕ6`) ( +?0 !ʹ<KIN[5B`Uy|6ԭxF󊦾o:`9TX(LeLRKc=plFUP-r_0lVz!Y|B -o֞;rOdsN/g-u6I/AWŸBI^xeր*7R;}1oG?:4%^ĝnuNy`>wӰpGATP,~1 *?zitS/oL5?`7at\^wpyЃH":`9Wn"吴>x5Wʈ4cm8\0Et1$559"dJ$J˄Aa yz¿ .Q+(0/FDyuBZfLDWt%yAsOsW'>`U.<;SR(8ʽKX#foK<.PĆÀE{;h Kj! *|>V# e h*sSIGڡNL1h IН^l B0IRP6ީ 0IVk <8]& _r>KmF†p*${qg!䝇4%~"lw7J'#m+'f4\Hw!Ţoi#ùn^OG $¾e` WݰRf_4ò5YY,#m""faRT΍17x6\ 6`K\#W߸({%40d.\i+˩]˖B6vu $zyӻRTGDX] Fo`c?Mo(gK%髌lEul%J̗׳+tGAnKSde\Ikmxmm7Hle'LK9K/żj8ƨƦ.{Rݠ3InLw'n XElS`3aOb<_sY:nSܣR}`vܴ0o 8ZY).-nQٶa?ZnrWJ1(Ջ2NLj(=6TAh Cv14i{szpR"Z]]>l|B |<.^dϢRP/M P~zd?P_0!`@]rGW%8!8\tCG`^W`'e#!&kCLw$Tx AHiTkX2ojW=qޝBh9ô4XioD?^Ck ԩ!?xN+f} GT rx>=}1rL[!ɺeH潍#'&.nhK?W" ΒG'æUt_&G^ٯ2hF,WS[B6 MZLbOgqw^O? E7r^ i f^ݪ'5Gm787,BA8;<-eQ閌))NZnIvbjr-4N!|yrIXq|NHQ \$9v `hBԂ^a*d`ֿ$h)K +&/C-ksjì/Kt' `-{'Wg|$ ~$d~!Ϩթ0_ (_[s87-~Q#yqTpc+NEYA4ߗZfm=|"ж(a8gMDaRY. 3u$gi *arlpd7$0QS{"A"'ڀ-_V8e EUd m_ݼl۔ #bC:缙"/7 ̈"l駧c<5i9yNl)mĔpjX# QFwZ7AyD$ h<AmV!$V#"yqڇ7F^vTkJ_ʤ Těqu2e4uk|tOib9.x/n.tO$ RVIk)$QB=E@ 3Lq:ɘ7l~'Zt3 Bm͕}.Ԓ8sy4.\ޱ3{Fu"G9"=J7}:)]*Ϫɑs-qԤ<#r}" gfGP{/=Fo cP̓h"~8`>]Xqv g]y?QHZ# ,QIEWb8E0mf1{c)='vΟ|t+5 9ȻFLcpkL2;#9LT+Y,rdADû[cf|I6؞Pe2 {a5^Q?B@ n- @ɚ0a6z+J{R/]b=MI9DaNDv$Pu76l;-jHkrl(e'Sjv}/14#'Z&0=190=tԄK (~YI6;6NH`6f3z,ɇ׆=wT6M*љXx.EUu7&8(>0,PGt*e'OQt`Ĵ k({ztX2w̢}BJipPbFSyR`@O9|S[PFAO]:Ri eE4htRfENR6wc$SҪS ;e+% 3@DhͧU;bv>mZ2c1 `*MɑX7srjRΤN;rX<޲׀jyR.$SȉSb@|K%/]Hv`?R2RW1mG2<7 n@VZk Syrny{|y~( l?pd86O&I\چss Wv` ;u#F;-#U۰UKhfCxSikKd@8dLZ)VAN `Һڝ-?5CZ ^r]*"PaզŜaӸFkD<2%@jjRQ̒.BYP\`}r!u04mX8DVJl[{b$'B ] a./sev#a6 *(˸m#/5Ds8(;?[]x 'rSsq5'zHp{IFρK_$ΈuU,Q773/(qPVJWuHSbq:{vdR[C2e[BLR4&Rݻ$&%UTbo%A fۣ'<$ZjhTJ#Os P(j"/0Ѐ.b5alOy&# $0dyO6=`xA7ĢQm42*Tr@7qbʮP-cj Xi;rx1WQ~,D*/݋H?UkF뫅1]#jbyX-M?l l>]_ 4=Ñ.rYn3 n0mq5՜.?ȾK3Mgnttk#[9K&)[Y\0nX|+n*(]|i"c3V)75K>.N=lMfU}\X R/LIB)q`1o(.WKfo *rʊr*Zzء[:vh Hi=X7ihRwL wVc&t]_Þ1L$3O4UB-$vksݎ-TS!N+/U6B.W1lX>ad 5f5`泷ms2!i I5vnд\1Gyv=¥5b|wf#$VԶ6V/ іAnW vBEbp:LveOK O7Ԏۃ3KfURv PȁF{`/Fb|ΐ PH KoXڔf 52 ?`-$ }D%`P (V%Q1-"D5!R׿{l@#,7$bI-#qRaZMyk Tv+{uapOCpѻITӗ֛I~o<%6;Ai$n25B@L)9z=#. (_ oJ[YR[̨mMunpwe-N$$qW6欤![ o{+gdN |&gi8`-YV]Zf䫇?'&cF]<5im+XKE996`2 8M N4D}GˤXcZ7,Q-7.WLLM\8@Q0 I<}Y{QNWԮ'.T& 8-U!̊?3U%:}ww'/<(hq L\Y@T7b>%-m94#JA:+`jO'· "rdR)Hi޾5)wJ5uvN= 7:ƈ$^:^MvgLLA bY+o_s1'p:SW!޼P*VJ+W%n\# [NNSNYR YlRtLHO R;%&f8_UZ$=0NڋߴbGK&yB`W5F֪ 1d齄 LC o\K0"@T5K)mi}$! i#G[n ړ]>Ȫ'%</42I\Hbz8*4eVt86@^*ꋠ+'v0OMCX鳫U6 eIuN;6 ns2f5J`eI0)e E6^Hp B<۷ʟ$7,K@>gez'Ec#8 6QQ>當7\v躹J-ljl(dw&-A639|SI#9fZ*"?"g\(h X u8R%5GiϸSze'tҡQ]/wX(N)hѭЎnѮHNzEq)=tf3k/qQJš$l>/Qdh~zđ8,UYycw+ }QlW &dQP,qv]!&H4I.d55;ȯz:v7=B>z€+'iS/}5Ȯt[51ܛ~:uE,3|(5V4I2G|q37b}3)H+OA*JbXLZP")աhUc bD~>S)xO<$I~ܠ(IYӲލ^|$R3^+F,ieǼE&SiNT f*"!F}x)fB#t\ `qSܡ ZͰ:G&)>rc AB SD|DtmnU%k%roG-ZH SL>G3R FcK_'f_stOup)UWגZ*L'74[ ޏl2;f鑜n˲=I.xTۊIxiyMSҶ[[F#H4ZEAQA#LH|7\ GDob Ip~ .-4ٜSF̷JS.ӑInuDO=]IYm5JZ17C}kVv3cK]!5 0P- xo+ /BTHKգs@qn#(*GGb"oU!v;M{J^,&'A_:2&ON_ :YǪ\l w3it=e^;ҟ }<8PBsв*-ibvwqz;:494xMh7W`clĜM1Ku6;)DA 7{/xd.mW!CjIWć_ix1 =H r"h|i>!h2='1 GAYاh)I3Fڅ]Lk-V7NKH7,pP{7SIJcvʐ{ Vc٬)5Phg(/a0z -h %UwVDaw7vToY^"K+g91fr w&-aGz0ry "m~e>c]**$x}0 Ws۲rKϩC@h3L۳WP&|+ pGgf^F7kWu(8&Y* )YEbUo\L Kcn"amA6dΔ\/$>;QdAcE_dz!fكãBֿRiSȒ޸#(oIE|F#\WK {"0bW2๷,r5~ )YbfdN{\ݸouhh ]%ƃV(&^vD 9sG LO|^u]=Wlm"6SPt]cnF _Rj\,`0:$<Y=Mcb zl3=5 uCo0,.85O/L/-e-?em#͐h8mBhSA*\.ڒy<96Ȼn<欺^{jm~DsM~kc?\C5 rr*vO4$W@c!ss z`.y>I/qY윛NRx^勦[E N:Wo~j31\sd`I`d]vi0Trj0(<(2f>9e+ӋZ,]n3肫r̫ ?ŋY;0b#*mzkV/]$"kL9L!v푖eYP;\lWK Y{ƂLgDPņ0"K[uGUP}xrEy NN ?V@%8mjFAB&ZEEr?:$`ST Ta`|. F\I3}π@KYEϣ=+'%C® !4<2<ٴfBWEr6NwFGOIys` _](BEi7*Y[EA VZm[ /p7b @#ꌾockawά -O'X Bɍ3kK .!{fvkC77z<\E]8%_јQ%H*>+à {*8w`Og0@hߎvAkV,7k0~/* L b[D3B C"M4^jYyr0DBȵk,Zľ){FjN`jlԗ0ޭJ^_N)5vП~LOQɇJC(܏ jdlN-ݤ:2A{0om;SqtЮw?Ry[,wHTNq')l(t''nd Y@(:D'ϜW܍ejt_=l*eOy;V͎ܶG5AQO*ʤ5׍S(LAiQDcϽIoicYiAQMs=y{|ͼcLaH%mp~=y0g;ozUQ 4|netr:ߺXb2P'^')vյ^:]:z0VNXfEyT]X{ MSDm{e|+\E X蜦MwĘ{V%'\\\_:S\7Y&,_^"2(P܈JP!/޻AWѕL.2^Z.lsӃRmui (nO;v-m;sF4HIswL(^޷>׼3ÅT`bWr qbRdJsl!%"+܃ė)S=tΚy|eq;-nU5(zaฯK)  57(nv5 $viQ`(*̠Q e^(0g7\2:Ds: C>|)e 'm39 ZM]FBNh%GwMJZX. N%ě)0#|H("eQ<$`녀"3wd>A 0'ˣTsؠhvD&][Db;B7[!xd<.b -h[>X SiЊ2u%qA~zFD\GVq0HvPgb>h; M?[cyF-tv;5gb tkmp}Uam]$Ʋ>MsLDF{i(?{ *Z~gհVlTj$ h@EZ\s}SPKV  %glWj̭+1jбT 31Rڿv3RmG_2-UIqkhHcrl gL G댈Ƥ##%`۱pӟJMOX2j/r*D꾭.1*B&j;'ǖfiFPRX}7 B<:Ul6a)S K+~Y#Tdv3%0|.ҙȢΕ"m:֚vIJ{?QCp+gHaLU`A sHɊ6"9.yi@VPg~KELW 9E9bD7lZL3;JþiÃ|@Ylnm@Ǫjk'?-N0ݴYNoDW sϳ1bLLkK @ k7fE+-@)r !]>ZKĻQ GsW~7oW1lJ?Nҿɝ iev$xְ EA[t"&NLh4YY;j.GjN1#awwBnF0/ ׿" iFmhRϞT 2g@nRQ==vt@>SZE&4+@@:1z(Do);;k􀸡^`7) 0P;ӪnWBaI}x "-([]Rf.۷V0MYpCEKb8^aLNQd+ ߟXQ?U)R&HF?{ed?-ᮝQ.PI*\Ҁ}آ$Tc 4M]:C!]\lw)'Li1YibZk"FL0=YwLZBqri )0\*X!Ev("d,ʮ,K.yS+`o_N>$}8H)$Nb;㛿6MEi>PE?kek=ɢ)چK"3FY%&A!b 'f Yggy9/ oKܿ% Fp~ϜY:ׂG nIK>ɣaqtYԲ |0lpMHl.PTu\cvSHElᙽƯ nn*u!