mozilla-xulrunner192-gnome-1.9.2.27-1.2> A AlpA?OFqkGvmuwnDd?j<DPk$ݤcQ>_e:3f0d165420a877024f2be92522d627f782931e47G k$Jۈ?OFqkGvm?^ǭƾ\_LF \#F5ڔ"DQ6nJ>6I?Id& * VLPX\t  4 > H \  8L |*(`8h-9-: ->GFGGGHGIGXGYH \H,]H@^HbHcI^dIeIfIlIzICmozilla-xulrunner192-gnome1.9.2.271.2XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.OFj!build05mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+ or LGPL-2.1+Productivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.27/.autoreg exit 00A큤AOFi{OFiOFiiOFiiOFiid41d8cd98f00b204e9800998ecf8427e67e08b52ff983d2fa2b847ef9a866535a12be6876e7648706209a8dedb43ff84@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.27-1.2.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.27-1.24.0-13.0.4-14.4.6-14.8.0O@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.27 (bnc#747328) * CVE-2011-3026 (bmo#727401) libpng: integer overflow leading to heap-buffer overflow- security update to 1.9.2.26 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-02/CVE-2011-3670 (bmo#504014) * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild05 1330014753Y`1.9.2.27-1.21.9.2.27-1.2xulrunner-1.9.2.27.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.27//usr/lib/xulrunner-1.9.2.27/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/mozilla/openSUSE_11.4/98ab4edfce2b7e581ae3eeb3d07565e1-mozilla-xulrunner192cpiolzma5i586-suse-linuxt>ihOl?] cF]t/, DAH1#jeOdZqqnVz6Ո^YOY}3ũ d4#rn읒B|Ak 0\50ۨ)Vp pj&.18sXu1}Hg!TAd'zLw@`HF_( WˮPd=iRNl(^P hE_B\ҥP"6F==,|:r3v%a85T: C\QbG^r-O<3`ߕETL~߫! VǨ~iF̅wHɯZ ]x|G]c {}, b-68Au:Ihhk[$o|> 䆕\8>?P՝@wvw_ :$ͮށծ|T l2ba -y&ZNމ|Ҕ4Zi߂8""MAuG!T$7b:\O HMl8>iij"OLJizGYob|,]GazdTZ"V6bW,.\-\W(epN qa"4n14 wz;,F;  H/\-!;lr:kH%ys$0[[Q.}l(ݲQ>hK:YzNge74?rSfhF242v㤮nR%J8̌7LUW ycrsL`Kcvs#T[ZPf1'U߳!Dh[*|\B\ [wq-N9LTbƯ ̓?h\HPzNEU؃ ̐'7)[5Vo@2 d,E ˹?ܞڗX̊)QEN 2 1;{pIOxpH6EaGAd(j?mX?jGLGy2'zy]- BYz†>PVD&)+\F7娺MX?*=gX} Pz}ޘ̀U&Z*7e'|Zj'ox;[0?LNܦ.l|f!L2J73*3e*q+#1dw(ǣS5RDWe2;~#25rf5ӱY~;ܕ!Ч$?P'j*a +!fx; +b 'ͱYVyuߤY\nٌjZ|go^Hw燵tƜB'C2P,@E3b$XNBw29W9+5L@yE^qSh/~5foS>C mWÙ>'{+M1bFyADž@>L{>H`,ÑTIQyR!`̭eZ&k ؏G}W?6k%|<6+Ԙ]Q[`yY ZS70FrRGMÑ ̳ fii L}u6Nˆ"\rc 7@`%HLP\6zaAH<-T,pKZәŮd3/pRP,a>lĊצh}կiFHL$#]c)4uڐ͵sj&XU*SW_z)w=N8RjGc>hCt"|;2,yATGZ:J\6y>硒N#98"ҷ$FTP[ڀEET_W()k|3確t$ߥ]^P8hYxH> pXjQ'uj)@K*̬[%:BQC]_{c6 g:<# #D@tfy TM08 T|12ڶ >c4}EAc|! x~4Z~řf{t5^D-,ZT,z[1[V+ahXXB\(je+_eŊ7G&|GT俼7eᴿs0d=v՜~6:RPݧerbomu?p9Md$@OIbJR)0ǨVO]fS\aM"-%y*jͪIeH|b̼VÖ~pꟗy0%.INϮiBR&a`ReL[J})Գi|<)“3=$I`k]G>l>I=S@ߐ|5޳_'DZNEIq2E/-Bpȿ9o!k8;6}4m {?oк1 {t6<#R_QrIQ9O< VE //K?R,nj6'[G8Phjn tήAPYgi3ӋCεb݀* >-mh&`9T3}4x/_i6p|!AjM:|Bг2%<Za얀ɶR !#uFS`"%zQTI`%-5{vtMMFGJ@@(DJ]n&7OadAsсԉtv_cнrDdWo{R"6+WH4Qտ#3(F ѺJ.#$Lu=C2]V!׾%5p` ݰ$'W`GĎݵTҹ/嚲g|c%3&%h͒HxDT0#_剣E=B5l߸ }s^CqJ[Ni,AZ|lrcdžys7]2 &AmpO@$@Q+P>w^""* !򍩃.JϚ7x jzن|P6qFڂNބVMyfR-der._ҿJJ{􋗵YPG`54zd V#`/KĤV?]ܞkdD% s?~4A5CŹ=^˧(ZAڨ+ :$)w+Oŧ;|"+4YO!t 7<@)퇚pGGRcXnxq,{#aƎ >m&_.~}+ͣ{nXrp, bՇq=a!)u^Fty$lLF?1+2V}%<ƉE䪙Ⱦ^S"@3W\ʃp<݈;*jȒSJWGF:T=H?GRx:Ɛ:XየJtTLM,Rubmm`զFGەi&_y  eT(s5xB(J? etMqg<&NGMD&rߩ)竁,jE]q\:Q,2,rW8=buF#Ӧْ7º:%8&ZWD%QFExm6kG͞Q6N:;lE%Pc3,$~phrƺx- E3AʧABBתKB hKxE9!dmUnPswԛ9I9[%!c:UrrʞWY7# hF0~Zl+ˌyo`g.WΛ#yǝ ܺ]8ĺlƅ* SAk'5yYkCt+%y9rB[iƢz蘧)=H -kaBɓEx~0 G֠s\tLs1VtlMl?EJ,y'hrOD_@ELAXk Æd ӷ߰R1Błi_KN$k#uLӥȋ.--/en #I~;ʺK7i)p'mב1W*/=Gu:~33gGk-ojP,QC8*nj .E>! Av3 }PMUf1reC5XC}?[K\ጠĿooP%so<2Zyw5Px sͯԵ읞*ܴ71I@2(rlɲ*zwrf ū˺S@@#RfFl3)⊿+: qh=Abs mg͵ &ê23aލУ}7BEY #Mo~Y/?`HGdبS 0r92:ܣ& [:>gG/w못3/kFG1y{~2&)EK̍II4py#dYB]fQO+7)o\($4D WFz1z3U?+d_k9'͉_P.?>Rr*D'y4bvT~P_ptnB|a#nK9)A[_z &c rZ{Qx`4Ồ(CA(=iqP0tJ5N&#?!v\9HbdZ O"Ob=!3RݾD "yȌ׼FS"wN[gx /#ϓԐ .DM0Z[R;blHm 0}G :Ƶkg팴M 8MLS1A7׫R~h_;C$0dh 7GI]xWU\cNnP Tp})Q͝?s&SbYGɼ{f(fi EfuoYt>]oyMVJ3 clAà;toDf5iJJCUzY'uED L̗PʞW45ӷ-BNt;҂ gZh7,B ż?K5^i5Cؼfgvo=8.U3=REE5W.y|fY)QSb78|uW#J<($SU1ʠVɷ鎭BE/ -f<MR28K5^J3B(D"Zh^ЙBN%Ȩzը؞tVfT./ct3i|<( jV[]y :Ԅee#(dRF6v =%aa+A 3M{ݛl3\Ա. '5B VJ245d6]/m~J@{az@k"W$Gf9m#~@{!Xjuma 49ia 9@҅`Í7[vQr_!̑1\zGk{.G0HէD|¥n?cBDBeگFKClwͳtju[IV m[l^/^x PB H앶[̗_#Ɔ~@룤\!(P?W.[K5@MF#vQZle:mnK" $G6g/Ƨ] , "a/I}['}\Vt™{HsoyfK (8U j)e/%y&>1RSd40lFCFcT?q'bennRϵ4q_(B0<Û8YXF#_w}ҫJgdj"7} RoRZF i?O[i7T$ڗtid (٫-M-"X 5>hJnUiMѩ!Ʈid3w"dtcDgbs sʱ2~#4Hc^$xn>$ge9K`mͣˤ4:bSdх%H$#tlY6n)Z!asGhr'a]6le`r2~ƢߨJ.4<;O+9YZZb]ŝROQ̣<0R :r3QeJz`E[l.7$g&=|tÎ/j^m^/U. Z{ N+L7>*ϔpnŜ߶kW?R+7y@%X*c(jNb౪a!l٤;hAbpͫ1]|ڈ,Gt_IڊD&s*{<~cS1-m][(62S} [r)aH9}HgA ֚$|S:jǔ?y2үς@\}J`f%ؖbf68jyrD"B%߰"&Ͻh#9>B$s߯0lg|gr\ x5;x|%@S|*ā24I,Xh1c-gڂLπ5;. pW< s\M Գ[:5~lw x 3hnUNyҢF|3p|rJ1vpFks!!~]m?N>Wëqb f7"(Ia8J^-?oE.Įb [J|R5 2 Ig@+;H}0` P%cj϶^YXFQu*Vb7JY<]gEjbI`\|q bsy1> H|ˋW/CNһoak_bBn [:K'ҎOBR߲zMKR5?ۉz^ٶnYZ+]0`ۀ /?R(c!Bc5u'yәdy"2Xak+d2UvS݅jqA@0)} F_0訙ݯ 2~^zfc1'\Ѹ"!Tz{MU`eoȥ ي 5G fti^:,;uH$أtxYeq֝F~m2GJ-=[d5A#I9tLV˷؍}Yy-o;Eʩylb![0 ecI鲱WUoWdV`6ssŢ=܈hQ[7bw9Klqw =Dbѯ ]UBD}ۥM,_$Q}[Ln;08b H4,;4ZV?vYx00X^#qhxS6kFA5nYHzu Ҭؚp x?+c€v3{G5/V,GeRde)xӝf!yxab^~jw쀂Y >]W¡'YDZ/8^̈́ #fXTMgO۳, $6eĒu;S4@f*:Kr(ݪɥ컄sup1"giuJ5>edS{؜π"w:sV 莝̢=b>(LfnNY+a67íS :ii nH@G_C"I6{?fɴE2w7.]4ZWh:hhj'@gҍ@S]i?a鵉X/?3vKT36ҋ{R('" /B?* =3!_%!H{s) /9*x 7bPT\ $en>5'(< H],s '#Z{M{УuQO,~ȋA'w~@?*Mn :S`1g7z` ɎcCJ'9iC `.9DK 97hg):/iۊ*Omﶻc q-ލ9k8ToH9Ckp-+ݗ2%r#GO5qG&7.4)05ċjiû1 Z,VҖJ" "VZ%XS$&\Ԩ/=y0/-UnR 3tD agsm:T Wr`ihHI@@:j*ٯ`t;1tuZ%Ņ2 P1|iG(@\#sS߆[Z];ڵcs|c'i=T0¢JvgvSRs/;Lڐ4ظ;u49yBB7e8 ,[~%r%µD!hceęTD*@ 2x 1 -ľ El ?SZӔc9;ɏХ>mnOMfըYf̷ԩqjONf +j.rB {R_JR Թd+;c`B̝߹PDKI执 ]M 'QyH k'y1zmJem/Sx,'ݚGcPe{4Be.(:Œ\bDk|89rEŽzZeƮ% |(+*T-h13%i~ :C[ $k@'jqCKA}^7HGNJNJ۹ BEMD-?RUhc;{d5trlQe6_=771 &b̲lE4Q$Jv+QyR4$*sb]AZdbTڣee9hUL YbЬ˽c{jϨϰlneU'vQ/FT t~EN-#}ɽzZfG#~ f+x㖫Cb+Cy7 |KD1﯎!-@;)+!K)Fr3nck*q8>(Lo*v)K!Je\ jN^!q.tf:1lB9U((A~*R'o֎Έ׻p5`Lcvb߶l# ձB5ENyhUk U^gU2Cj/BӬ7fX|Q*#M 14|2Sd2]F u&P*j߻r^3E_Q6u,ؐ;/r~Nv8 хyeD/~P Ow:@-˖\i<)\c`LK]^. @{{SRiVqjMNEf R8M0-B0uފ}hS>V(y(43L0=<ܩV'TAKo`BMfzQHz?@3Jča p:" 9hBէ o(GP{h0 GTlRyU>/?F(n A/zsZ@ `]kTj7krP?l5.Es z@l|9B@brDHQ0+aѨQ|)yU5,ȗ?u +%v WX9I}poUT3+om:L<  |ţ ފ׺/oԱA&xuZi+QÁbZ |VR=4{1)p~Gz[G{5Re&Ђ4f3jV':' csmf,Tщܷ_"aAK 8)B*8(yoVbPVmq>rnbSD3a9C`nU 5_A`IETF]mS!+ḷrn/$u "42M`OX 03Dx,b<-w\_4GP]mM"VŏBT.xsY'@g9: p9C*[S+U=#M%a-aKvLulV2T'Fj笝ރT5xme6[b,7!Y84r>O~HtZT%!0QǏ0ґ~F艕.\VXMR_(fa^%?6g_/{|v(#XUg {(q=Vj- ,y~Aϴ@œ48_5 :Q3/L繭?( N #x/;ǭP͐.RcrQ1AH6G+Q< Gb=HRg^V8`_lIT CdƗ0:o:y"06f3( ao,e[NIU7.t-ha%x*02e a7y+ksK@"`$@tܜTkF7 .6 W*6ܺ<'Ch;F&xUy&=|į>i庋V<1eЦ }]N| nD i6fmJ?7nd\H,ph'ĜSH>x8h\@uwg eĜF4^(:4w7<Ұ8![O$À~MC,΍ LPGGbk xۅoˢXSm/q~<䥊 b^ >g~ j:b}QE$Y LFM4%*)FTɈF490 ٮ^bTpvcL^,~E;t{j{w$ԉm'}7U&8@_./kJ@bh^8kR.U؍3> (]..YJ`I_#P k8?fO 4SvV#͞ K~`Hb?V9J֧ո=wiYC''5B`|ա%G8H9khbw;l]pņ5zvSCD)ҹ~В5ޱ\m*+oPv˾~p~֋=N64??8ʛe9yLY˨2ǡcy^ƅ(6Q* @`|Aci_ djZg]Ua7&|تٔt>i>\BQ]: k{.D $d-nm\v;ZYCUݍ>dUu2eH2XUm{q׼B.UvPWqK32%fs.ˎC;ڇڪ"J!A:.h(Fc;ᯥ+@}C0 hX@7@D x< qGbËI"`' RkOl[!M +"xBㅆ)CM(A$g::c}M) B ]9 J`c"!I(Di}^>w䇷d5OQ-/6VR49K;hK'oΞ>}OL3mRΧÓ.wLO8MydmO`oEcVF;O {$yp•(_4-;)FYّaoۣG/@ 3F̂"g76!Z+lVL^=h\/\ 1UhimJ2 =>0# nXs.d<85Jr1]8"Vz*!$P$Ύ) Vn\avOkb~Yk[dH"@vD :UQW4woSqaDHJV;I4a K1Qx[ZAMyDsRj}'7vN-"khBB Ea|Fn^z8e\~']BH&Jkbs,Rw8FY)cgt(a'23)an:&bduĀ2 E` odL$2vo  4-xQ1}P9!2V˜&@k6\RtjaT-;PRoBs .$x('pˈ܎MwcݤʣbEܐ^{C|$pZ#=k;:—X+ߙ5CKuwɋ cH"{.>c E [KJ<艌GrN QG(^~l`3FYs;yTQ鋙ҙ;^>d jP׺Z-7H9 q) >7 }Lm_4ΟNЬ̎PV-۟9a'%BV賧Mbݒփf}ipHܲ38Bf}Zd v "}Vަh|8 Ś6DS[:" $agv|&VJjkMK(b1ev/Gs>`^@Sm" Z<4  ikFAFe% 6(IF>ωW8YWD$ȉ߬ b#љG{W8Uo Lx>^ Z/|n3hrt5x~n^ X0䊄G ^Cvס&Osae,%YXG~֢<E:ɳ1)뭞srըcq=S$ !}aumV_j$uZB=TaWp7ܱ~wݳ2|7Iy4Y Bk%-h#mZe`9n8pK\Eo0 P0K?zmD(6l#&`Q^me~Uf]]>z%VW߳6xDfre97QIؓE"IC#ww {t#SZM$(KyjZcu~-gҲ~^gFq2͢U5sEӼ!)buBÆV-#2 IŲmǔmO{ҜoX!]i]s8 Ӫ܏?Rpt<~ R܅Quf gPv.W9 ,Tt'r@ezma8@ %G$^ lcDMVqh{M؆54զIo湥L3[|kh%O1CT`oXj*[ " i[Ô -I4j\ȒV§^ qgb`^58jCQOKS~#u͈] Pu~04cl,ËH1㌈)n>%kSn6laY될@jw5w٣V\on(dwkZg02:cuTT|Ist?.얻HCsjW׋$#2΀1QQ*(lOxy6V/}Ɖӥwh ߽ |Ooi[VJ:6aܥo6n1Mb3DP؅Bj=~#60꼞 GRC7.m{8Y3Y^9` CYf;G7 {{Ivj}`:-x"ZS6ym5Q,wjزѻM{TP*9kԿ#9!1^ʳ6ܾ 5D&ժA3N}RG%eBLv :L>> 4i! \4.O_K]W$yz>>i{7#. Bd}/O .6e'3F:*ieFgf/ְl5c Bp4HŜϫգ5iYM{({dH45@멢,0Z?#\NAk7H=xry$Ɍ*l"T>`^X 6 ~7`0ް淎"Bݒڌ!7kY+Rˢ `EFq@U \ ;vFNM:k{Qi;T#Jkx] jVn]cX@'%>%macq75,Bq١A7j~;liQ|TjN4sW터#cNV(DTsoYW|m2Bn ^D(pްeL{mGN{tCRf3Bb0gyug,Svn: E&E ȖSF*O(gUdGƷRaxVp*+.}ZXqFd]&K5 x` e_gS']$I\\WR>m,+jܝn2ñgzNDzGTP#<[X7jdϒR%=vzL[q]VO\%ҷ^Bͽ,( ^{`5U̜A\+ -ű)3g<ǡR~4NRLLЪ0Cyѻa공^Ŏpؔ FTC$d fzpA4XMڈY4xNhxikShC\泗~rSuiv Z }_~Q&)^͐Fxaˁu:By-$s0eLq)4}fd!ǗGDmHj.p!c% D Nݲ*`e9͜A'#hV8AOB;KX&vѶ6ӯ@<*ǘs{K~kz˄#j47|鿤p&~'x:|<B\!1*zB1߼0vh?ik3a-޼*?r0UY4V#y>쪾 )ѮqqKE/*Cxua'6:Iji{ve6xRS,~ x8V1kLGơ)\h@kFA/Mee+VA!?&S_})~ɏG= hk/ߜ:1qh8z->Yd>@;]"~v^ۦu5HyN+cy_5(}Rdq!4e:Nz#BS\ |vHCVQ,˱qSTr3D@˛K>xJOZCץ떼=xϣҚsI|TJVcT^0Q~wGC.Pa`a{21Mojң(om!PN t@OVeѼ2੒md9-'!yb#bf˪;D c8_,dߛwp< )7Qm8׌m} ̟Jl)o~Opcp! #8/צ?y]G]L,gY \\nl,9>aԬp-w6CTwN$^KNaWX#[s`cSl2nX~ȿB/x+3-`f}gb#;^`):ĒF2$沪!h40hPnUGtyȡgX]!P7ŭaNF.v c3U".3?\淼F2lzQLRJ϶+ BRrļXǹ F!>TT_WX(+uyWj0n0`2jJV3wVeb+ |UNFL7Pjz-i39h)?5@t놀[le|h[C8l8+Zzu jZS ĄؘAKylUsm<0Qq{z+Ë#yxBkzz"Ysݑ̀92a:Ks(L%P]y``7b05Q&xþ4☺q<Gz{C7l ab(p:vxīJ6rnÅ e9yrP*cQ2&A<' ]%Z!RT/ӓ?$x&&S5UpnL!p:gћ Yb1̼ނA;Ue>Dr\=]nzf9"9YkGc#LPT{voМI߸) ( CU)&Mڮŝ UJ& BXQ òc~XE>kKP/&흉mB VW 0FoѰ~-L*ck`5 H3鍝iBa1KJ)QtHU 7u|* CVf:FTv ˡ!Õ{!@QzgbnhIvoxr@?HY\%ChslqJ(@lJ@:jG+{U\S&0܎+H+¬E5#G,Hȭ"Uy3VƳ˅^J$eϛ#Aw[‹G[XtA03 W廅Kp XFkb@=ހ2{ _$L2UP&.ݤt"5lb@4KexͿAxoDnGM^1?pꟸZ3u0OTY:|_׃ 7GD\c#@edmG,glnؾޥ*l{gZdީG1ۤ_*{$T%`j:ɜr?CHCgz'T<%\kA(TDe6DLFB>>AwȂNO:|JW^^z94LD܃põ;GPM8D-WWD<5"cv5cݿGɧ|8t+.\jIx9(_*s0B_ObxSHd)$P]_BC>J'YHR05Eًʖ LVEG\08RYemnxp !Tìx!3E sn?2Ze0K5F8A wo8+-p*J0;%/3vK;M7buײAVp×'PNnr%At/v~DƩ?3H')^r=.nި ݾ;V8xŔ ^,^'fu:poz 4>ϢOI0? 8_K)-R (陠1FHn莎ADnڛxf4jr={Z:A jӀ3=8sI\ƌ%?Oî!RyjX?` *)fCɴ*D+ƺ=,lu ٧9Ēm"OMA)OI41G`b;NGn^P<-g=}Ճdy*Eǚ&*R& %<9Q?{'L :7HU>#PnvML4{ K4)o~}2*n~-#؀cN ͛>MT4WduoOݷ5K"FXΝe;VM=;-.sFgVOPCDNuwg۝ fP/.+xNT lu;y^\GxAzBz$-Y0u7&X(t)w2!-aI -~2@7W%)ԛ_\'"$Hɳ=,_u2--ȍ&fRte&c!Ĝm'*9( n悕JqrCl=&ی!81cCo;ыf6hR Jz׋нX.jhGS\2%) ~w`OKnBGe<+l4ȣoǠP¾ȃ'zD~""Ǜ曑 -)jκ["L4#զxnb׏B@V84aj8]lv㥟#)ֱzEbLejw2 9"e nVE-GIdkadvۣ!uQ_*'@ueeVWhcJZ#w_)%A߾=\+=cpsAzl49]'/;IPrp]QϴPQy%kfc UZH})gH^m<6mlW3r&H+f9z7M#j-[:ag"+wi8dsm*|@X8OX|N#Pgג [jujKG:ɨc` WeJD?nl+L_苺Vc-xl3;b ҃Hf0|%[߆NDSPvąBSvxpA;[ PP~-y$D]f0N%Rw*~d/2IG/`+SeMZ+<0px{غߺmj|^D8pѣlT\>udݖz_BI %)OD֥NjEOE"FK"2\ Zm5$>Kw~뚑ՊǷ'BRkxo˴hT_i/wZri& D>u^ЕʛGI 5S! v$f6b^Q]2vw#&͈vvRbм=w[Z- O-k;=['nIzdΊ5V첏~PJ=~|2\;weȉED$2Njck]D@+Sd_W-sp=ЦҏmK;zMyBi3^F_]YJڴe^jU: #t~: "ʦ)Y$旐 g/%5_3;`|/HrTuxly L>q* CxH}ro`uOĂ\>5oġ;mDh£sr+iaM(Ҁ[V]C c; ,g"s!4X:1b \R'8Ocq&}H-S9 QAlH? 温{aɊQrS{C}^uݫ2W- 4^|g,rJ*J||29"–&84{9idjįSu`zԻ⿤m;h\"DZ & Y+@͜("_}c<ƶ) -ҧS;VOrǁ3Ph]})&YJ󝛌#s1ODVvi