mozilla-xulrunner192-gnome-1.9.2.28-2.1> A AlpA?O`hkGvm8;l ,7 ˌ;a |d064202f82cd3c013c2c2c6ba34bdfda11f5afe6CJ1I 0Db/6L+?Ld& * VLPX\t  4 > H \  8L |*(`8h.9 .: 1.>IFIGIHIIJXJYJ8\JX]Jl^JbKcKdKeKfKlKzL Cmozilla-xulrunner192-gnome1.9.2.282.1XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.O`cobuild17mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+ or LGPL-2.1+Productivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.28/.autoreg exit 00A큤AO`cO`bO`cO`cO`cd41d8cd98f00b204e9800998ecf8427ec2e7109555214736e965a23c519a88004d587e5b571367d20b5dea22ac60cb0d@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.28-2.1.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.28-2.14.0-13.0.4-14.4.6-14.8.0OU@O@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.28 (bnc#750044) * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2012-13/CVE-2012-0455 (bmo#704354) XSS with Drag and Drop and Javascript: URL * MFSA 2012-14/CVE-2012-0456/CVE-2012-0457 (bmo#711653, #720103) SVG issues found with Address Sanitizer * MFSA 2012-16/CVE-2012-0458 Escalation of privilege with Javascript: URL as home page * MFSA 2012-19/CVE-2012-0461/CVE-2012-0462/CVE-2012-0464/ CVE-2012-0463 Miscellaneous memory safety hazards- security update to 1.9.2.27 (bnc#747328) * CVE-2011-3026 (bmo#727401) libpng: integer overflow leading to heap-buffer overflow- security update to 1.9.2.26 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-02/CVE-2011-3670 (bmo#504014) * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild17 1331716975]} *1.9.2.28-2.11.9.2.28-2.1xulrunner-1.9.2.28.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.28//usr/lib/xulrunner-1.9.2.28/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/mozilla/openSUSE_11.4/0b38709c0a67ae4fb803d7c6e7b9f3bd-mozilla-xulrunner192cpiolzma5i586-suse-linuxu= CuOnr?] cKI!fXz$gA)d!D/iIZ'bPQBʿ~+/b$suw]p=?TXczHG]Y ]i4}}tu6Y  y9b8e rM6] afwC~ЁS5P| 7FH@,N/{:h3dU|݄%C#FݕFFBqU!.Qx'KUJ iYOZ~^9.ǠU'9# 4?D+0 npB?픟d {W-ѥ0}Ob,'*`MS @zbQH+>~I~wUKZq8gQ+u0cH.>vC"DpFH#uΓ?CAIRK|f CƠNʗrjC!8j_|mƗgnWe+dĆ߸xW$fY %>hgצ ί 2pk"SpiV|mpxF|͐C/49}2ٰEZm9MꇉBj=i-?78m8[> YIz>B ))0Gaߦj~|S?0OPKդ>h.6   .R Y^&;B@A؎kSFu?d>[.-romQ2jVC;QAQԒ*OǑV{i# ҟD`ާa&ְC !c>qxROf@*-Gq "mpO$STBw#Ji{FT(oc/aPSϮ7jf4hZuZ/FnbSf6ENfzb hf0H٩ɍu'!-0aWuj"OxK@,SU‘:9?SwI6SE9T2kJ1-,ǎ\HI0Th OwL yƌ}W9q%ٚs1X}+czk6) + zQykױٷџ8Y/V39b6 r<z ̑`LJ)G]>w#=c`h{NḤ!AܕrVFFsAg%&vf{1nn[Q6bB\H& )D%Cmp/TӃsgnǩTmsO f0 0s|ؤV7K^dt)<fʕU,**B,4>u迎-៬ԯf"䤏LeJ)*qM793p9HQ]Ԃ;#pC4QcTҞ{!a5 M‹ƓPaΟM֠ Lqmr@u2j?-Ty0[ѵȕ<*{xfm}⤮3 N%|6~,h5uŃ%Xu 6Xё6gag-j<%te|*Q-ҟ 4`8DaBKOy/Q.8 kzz嬅cmp7_ & ^wŕ,ɆzTfS:zsb2!%1mi_C`C6jqgą5V.Ns 2zE{/y4dܡI,?6郘|?؇[xQ- ( W\ГJ&h,aq1-?|&?GïgX&=ٓҩi;_ϘUxXt5PD,RvZ_@`(\x | >:dtJ ZdA+HeF7@kрo+HRԉ+vO(Ϝbew}]Vu'w?PN.v 8Oϧ< B9PmWj4U`O6 c_ Df4e y% "I:3:xbڇ*ᏺh ThHW2+'ҍuPb郘廸v9c&-swi1 ۂ=c[ױ338OėwE.\|Ѳ`LϖiP~cJZ'QƲ&% .ڞwo2|aőK[)K]@ mY;wI0?B"O:P 2<;"Q\nx{"qxTr-ڞ2:q3M Yj7l&5sm#S525|q])|70SN2c,~>[9Rn(ڼ5i^(gONKJ¬W1m pϼ45NN>6x𹤿;@+ +`IZ3qAd^XP?U"Rw0N~?oG\D}nN:oNlEbznLq3Qfԁ, ep" mDt!4 !\§x/w*f7AFt&*d{WCIf"Xǰ^bSm}%P+I;sf+LN"9G^ġ*5”h1i/zx|gp 8 |&/@^^.]bqJ+Ѻw+GUg/_Fdpz_fuÐ%?[]̇29M'րڍAք87;*w52-e`)<$sv!_4\V4 qb6_Qu8p`~+ûͻ_˜Li6й#DC2d؇EK2zeѿ+}R73&6\iW+5q!FЍV_ FJļIﻡhXcֿə$bUU^U9 3#=hL̲ r-}>-Mɓ:-rD55=6,"ו&^TjLcrՌ?7l쳵~k<حyr#cҬ^HӼq̈́-B*~G5A5mzbd׎)l08fY2fj%q131߬Й7Q^j$=hbi!nkK*[0Otҩﶔ52=c$_A1+S$$ }Xw|i3^0Om$9%,tM$i)Cs|H? Aǭ)[ῼ4y&$M\ʘ+!9\@T^CC-)&<# Feaqq缰kU>Rr҉SגSi΍ծ0D9ߑ\+hwWg +|8]n 3b WT&Ru4 "\, 'o&=mY #s۸73c.Kʝ=6'knϝ,q He2y]fϳuLq sbq:pӊ[cm򚼇"PHÏ\U؎(! ֥N81; NƩ.i|Ƨe6beUELO `?-GX?ݞ#S#]Nc EyDfY ߚrt5=NT?5&.Z|[ԓ\ڍPI 5_/ieЮyfi8Ex@zu,@jşdP`,S=k HǕ!H>5<တ({z/ک9 @dB; UO:[8S-޼t-$"-8;P%J% ^)BV95?VzsQTp7 $VH6'򃜠Buf#œ?G% k Վ Ɣ) -.b3-|DEbCvO{J~p(u 6)⽶@թJ_W~e[R)>rH֩a96AĜeӿk`RTfEыHtF'k_eSu8ĚYJm,b-zViaׯфv/sg7fANN x09 fb!Ok/ %Ӫhd}\uzo9J+&\zC;*[A)ңaJ צIw4FC qߚ_ .286_Y8ZVN6<Ƞ~D $Ȍ2yC\U t˵JF49L!;`m墁Vo{T$>[Q:F!]{(aZZѨџ⌌եnsIuqՕFb@ڻBIY.NMQ[Ǔvڀ?ħ ㇑ ΊS||XXr-a襡`XLԌXu?8 CŏYP:z}S[Nj!eb]0Id_rX<"rʇ{SM)VMƂd{46H.` YXnj!Q@Mcm^^3g"0"[ЄC\5 w`ֆaWiL}WuVCc@)փ_*1ekIk:6A]Ex7)65}3G2`$/!|0]lx6[Dw!,hAZ*tLJz r]I)洛F'^i2 :3H+r:I[?ڹ+EDϟ$-/4k9341Ik1_KEA^@}D8z;'6uR| wc DkFLWz歨/}M87PIE,@ p gOV5v k(Q/iqr < w u|iahUE(ZlUQbW/| S[@.)Z8ݹ`A\?UȫQ 0y1{ke o9$ESƓNؓOIl$qm%̩mq[LPBxc031Va/Ƚ !TnPx1ݹ YHHzڀۜq3ەY+5oNaC ݢbxQ^ jˮ+ W=gm9zP0cH l{ ŧN qP _'olu!yn'r{eδ }0U" .Eո~w?5Vfq=&mUm|5#\k%ӹ̐I,rt2m0a\78WzS3nCYhQ)؜?n:E i~vY;_`@ջQ]6ŀn*뻹د;Q+Jnb1o1!Aon;X%cpSlIwޜMN5n,o7.=E+zvMҬCSŁE~qIPT֒/`c^ޫ\S;ΰ/,^_eqi}Ûz*yM;UPEi ^=)VPd_S @g/Rt`yOHh7G<(d̚/"[bmT)w6印;lHW!>fՒ13LZZ!g &Tj0`pkX9icàe@:g9ŭ$Y#b.Ȍ^c[|J SZ{d5# \q.hMh,&zpH00¯;S3W5_bw\ .'W)(NeĒ@zG0gAd,ۗc`~;(= :@$ޮW8ڱu12w\OВ]|\[i0_)fGB]$}&"*53Amk"JmkŋZfA[LegwA6vM Q0l񠖗J:%„%^i 1K2 }@ xWlȌ.nJIAX} оVoLE Օ1VOd vçxk(nYowv<_Q*`ZR}q͍dz_\ĐLfEý]dMN,u;"9ȭv) mn5Ŵa]l*ӯ sfƀ@xeQ H'dF&!-C}~;ȸ^Ǭ%d 2?~$C{h ͧ2Rh]D|v?9|QݏI9aAޭD+զ &sOrD|g7mOC@UFsj|U{G,OuTА0cpik_w|Kf$q AƟ81V(U*~4Qxpe2x%$VG!<=r_sG&qn`߇ϧ>]Ed? ~P:уq[seQtN:*$JhefV֓ ®sHR!֝=D۠%}.|nMo+L "ķ/8e2;ߝ`3e5`&b63e:.BU^5 ZOŅ ^buXTS,{K$% C9P?e^&7۷ӓ2;T>o.f̅jyQI6,UJlByvlX'i*,W c-e_ Wg (P0'P;qMZ MGbFRegM/| fjET/NM'QYu:@ "Qj. rV&ٹ="#q%8'(Oatx#`c Gftsc͒ X%!A\(Hw =/T"$.B/}v@tqKжE ^ÚX#U"q}J1j/k j 8$>>_8pA ED6$Yy>V8"(Hz]DE]m^Dv7om1N3W}kHZqE~r\:n6уM-<:Bv =/A>Z$-;\8Ĵy" ԰f.xs{Nk{)Pn(hK̒-^=v@S$u(*"3u {_HxYG35 c NV_`duT~eP8vAAӜꕏCF`նۄdنTon/Ys.ܶAwT{N35Uղ\qƒӅm]wn3պẏ7T&Y烠\&/&M@A>D<%G\~Ru;Eq[ocϡLYy܉NW&.ibs~) j]e # ƌ8ϒa%bhl7bɲ`q=\tx3àH[,&Ս\g>};v !!A\uqAHNw'@q{p4{d[SteM_50'C2.҃EzakE" 8k w" q?".}H,V(Ru N9E|!V7E%Icv# \ˎtF"qSaWFS.a%_ɩlbH߅Y5IjV%НrW#Yz@1Ye`n17h֧CA 0I>=(ݯpQFl]l/8] ) Oo!5S"hg#< ]SK KR{nt@s֭7[:(O|+d4|9pL:ۚ`%2.Nv{a5ܕfX\舟N} HQgopBӍ-N1)Uod|@2܉my09Lʁ#A"Z:&( ;{D^kpdZ3*[KKm#s|^F\4.thraq9z*(Ag2;W*,I d7 aA:"9"vaUMD {c~=pōnwj ưd\jtE d-!}\c6q[[zV'[زy .o=~*׾icHK'zsGڋ3?:.7>K-`p5H>Ds@R$/8GՕ17bp%-};F NָJld)9.锓EG^?XeLk&]⠬S️gtd5irjB3 4D3=ڴޢl{)wjOż;-1+;a?INB/!:mU%sZCoF{CDTi#Zq17Q(9!|ě 1'MOSJ|f9NX.e8=踧E{a / RwVSխʿ˔< "hork>ݨv}ՙᝧ4??Vl޻ӓUO,Ooγ䬁Γ_#Ɵ'0*o.|F~ lQmcUܑ('ia&ehu|@O,Ļr5^.Gvh1ge@a9zGP !3X yz]ukp9 W!<"/H@`+PxYzcZ2sAQeFP q`qW`gFѴoէDeқ)ڑKCߌKgZɀUه-y(ePlw^Jes_ҚN[E)2J>`0gRbJ^syOZ\U4[1Cٔdqo_?$.rˁW1+#TWf`°l,TH^;fjZF4ʔ'J3U2Pgytr\ f>w fD:ÁYP[&xZ@>iWb"ɶ^zr_ˆ'2,GD( fdeyc[{u(\XS醡ȵIW%W/@NҾTvkGtN+ՠ_ٺPoB,g*\TDkh@NۄkMr`_zl1.i7mW7:9,Si<$U4u(׉#,(-8bB6Mf*3wA |o"GBP8Ĉzyif,@ C{06X]lxxn#$>FV-16+) 7xЯ: dw>pbqX &z(`Bm&P33e]cޑq$""֐iXƹ~z7 ʁ+k+aՈ~*>2Vrz6vOvKr8y!`:g ދG.zK6tƫSu [ M(0"'8CCgߛl>G&G#A.{D1,*~<[i:] quY\5!9C;Nߥ_|ИC] rMލ/ Oƅslf]@ry3 ]*@PFO}d < S˦l_hL~U2uhDq8|us+Fy;jw5cь(AzfMmZ)RQ[pڧs9G<A1.I㫊ٱ5PoOk pPL}/[,>wjnfVT tD% IJ1< n \T4~4[gwmwKwpI,qxk]*WX؊m!g+*0y48*MV#kkg'L.eܢ 9*,D% {A MNVdC\aWWT]C= @;/ h!YKj-ѥr퓯ɔܫ. bIA",途Ӈ3E3 '8*23I E^9@C mKySe,ˬVɚ"ގLgs+} (ԕ2J٦"V^`<s$|Ms'mUW$&kpdtixC_ʲFWXҎְ{y-y;(Twk *m'O- o{ot_d D )~儯AܴZ? WЀi xy.TV|Sʏ]BdeWmrL(tj*ya;/1@-Cy?B(΁h L;WN kP:cw!BK 2ܿXYj24}wkp9{mMNrc69ŊD)f7V~# MȦ! ҏEcJ5VCV/hV3żrr*"a9Яy[Xܐ?̧=6֖E ^p'UQwwrU4>wi֝rxžfQ@:<WosM4#>ւXJ>2qt MֽP)8T{2Le[ص%yL@h"fKʹL7˔zZNi9 ޖhy+ ~j106F T2 kR7f*ŋ*{o+Jv ^n7o<'nmKz-~0{~gW-UmJtH9ڰ[ߕP=ngǚb7kDp'{3zeH^M7!%ÝfeBod/l:~ol<J~zuDǁF!LnswhPTR3=kKۊw<-Eݞ2)I"X_%<^A B1QZFUgv=rKa,זhQ\f&Xpzl0},T8C\Z[Q3Nױ -v1[sȨ.1՗6ZFz6#p^VPG"qEN*;}`|(Ϻ2U__ݭNz <01mW++{mzđٹ puo<#Q 0 f*u};T^y z9N:=ب%h@L E)%KM5ܡs/L 3xBjш>ZG[iXnr /_ftN!EMgc'h(zPLjvGÏ.J3*1O)={AeE: G,Rlҫ ]fyuJz@TSv[(y 5X0ւ32hߠ!dB.7 uxwHx, (CJݜ=%.̌ .֦HưV,vǕ\X;Z.7p8x>l]~PW4}Qۙ6g9n̯cٯ ;% 8Dݾ/R/diȟ`a!f>^Rz6ݭ~VS;dJ4O@L4XˍG-gy,Q3Wgcsn.f&H./z/\+N&z,%ZLʛgU鑃 bHI||lYRD1..wN`⣿(}uh<\кaqX3 iJ5- dd74_KPVܑ1He͔/4'>)oWy ]J-5f!g\:A#w6]ֈo;rPt?o0甎(jWFY"bASq,5>+%Wih7O8Qo?qL&`Ztg3t4صSi9x棶s_^jh}p25X6dO ]WǾ_I9:N[%GĒ7SP r9QKU1 C rͳ(iXj| usꌌCoy7~'H7+U{pA;[=wzQtcv99zT-[TŎyv4ڱU8js"z?qd(4&C+Bxt_UЗNU g;C.+Fݹ|·԰6k2?9n /AB!i"F mQ2:zK otOmul Hj62]buS\=`4^Y!2s1O~$˓P&Jjan1*)T"o/|d2[f#`p[d {,7+ 3>S!{݈azSSD9o{oY$ 8 0LiJ{2AuvClnFb TiERnS&TXhG׮˟70qGD /|<ֶEEԊ|? b3$,D== a*[{U}\oH# X+Âفfl UzX8~b~|C̸;ĆF&}02@~2JL藳\q\nnj늍jպGWISg+ho0"jJL FŤ[8ռ2n )/?k"V#0KwP*u}ZE[i?goYS>Dg7PYֽ*u`.E|[${f&GC'g V;u9Ԋti"cOMe/@53>M"ʹ)[W]^c~Srr^h&Olm­U&b$W%O.Nb L#B<0QGΫ|i!_ qxqytESj ۝K$4:%GǵoSBDl*|V͆E[~{7[Qcv$1 gnZx7\L,wͳY} /S%?%`݇.[t|34܂=@x4Y !êcjaу,MRDk'5ʗؚnQ3΃a',Wn}>%b&ѨQE<RAIgkd\iPU#)W$ pN#FIh-Uz/5,9\xuN- Rqmv-VlFzNMv0ȃeRw]S| lCD U+;h](9E8U=xD4kx:o]r_R2SfڛTjh%:.0 8Pp=r9#sZIP4|WAN24Eʧ xcEE A˵!y|sRw'gZdT&ӂ\{{צF!tVS5u>YULv${7ސDfngĢfT:_o_i|&DSU y|9ewaՖ3x@xadPD1wRyʙ0IBb(D@( ;XY+o98iw̋k|3b6BD c+@oWoV]+fsWK؈R砼rTD~+ {mU ,4H>M0N۝ԁJ0/&D\$e`AN$5!ίw+htPYzGI * :/ALgQZ!O(cm}qo>{=Us}.XH,d)F I! Gm?8aBۓEt4Gy*tAba+#;um.c TC'=B$8 @ޗ-1s E˒zj(#o'/1ni!jr`!2`@+w+ImʆN #^U Z%mܮO$=܏PH'?l eAȰݏ{Dj,BpcB({[[`y> V~{5\KIJ sٿ:kF$zc[_TGh_Z;6[|', IIbudRLT9]2N7J8jxDžDԑVgO4KKR o.(C2I~N 1QH-F% )dW ٘cIFWKE m޼# d2 Y{J#D}0[5{WZ6{Pv|8|gLYiq6@||,\IH~tpb٧ͮ^gFS7^`3B4ǭdBn/F{qw3YN7$f3aըk}ٜWG 43 +CAa+9mT&^/_H}1!L͍GWXIlzM,{6x':߼=UڗS7MabzP߼!`h~D dީW(fc ϳ^( y\}D}bW;`qPߴ(&*naջq'_@9:.Ԋ4 l^qGgi0{jqvp#,RGR }ˁbŧ}zJ4)c-ӓ?h3@00{b gR &JKI(k2%tY(x4p QArHt2i^]Qeu/o$(:d{9ې<>:!\1e,Kd{Ѣl#gj]͆1WjޏDe#B.k&Ia)yrMym^ Z70Cxbr#9V^9_*Х~zYT'rē()Qs{khҶH4 ǢӼJϒO9/K~?-wlA}:ҫv@GO zm]$HvPw@ˤ@WfNU2MgD ]׀O|o;`09XLc+?M݆ߥ!lJY n|&lCzc$s+2"~Q Z}t5[Mة!"5_A 4C:&j9 uXA4Ɲr#N&p*S+RGƟxXij.Y4 D{\6qj%;2bhx {Ξ| q&?[9ŕ}*cuTʄɣEU!24H$"W b"Շ_՞EW!R`'htMW h|nsW!_8(c]]9;T! ."}ƨOW􂚥iC(6SfKBQQ{2˱>[/CbIWZ6^N5 M9_@>aLNjXq>c^.$-m$[ym[C\<I1cqٴP۞>XQwb@A,_ԭ$!INf嘍4I@$θiGt<@YORNhO[0*ڄxӔu:LwX^tnwHbZ{lDu*MR9J" M歐nO2J;Ny$8ﱂœFM8(/)H5c[xODX\[O%ϴ )!R _u:% č.uxUB~0|郎>ۛ34Oa&^%zW-}BWON" AxIUZw&H#isS)w1-XHtbF񾝚$R \,, O+ȅS @2 r*B׌"v1SeiːET<;|JX;υ{ƚ]'E-K1zrm<MZ`#OaדOM%(852GZ"Q Qx UV$| Bf\Es8|mt<_(||3`{n`A 1ma|B W|=yp7m`M2VYK;3aJId74W v=L*{$uG6Mߤtnd"'tK2d2~ߥyMDennds!Kbz,=yEQB2yV^oR".hOɔ: Q(axq(Ј_+ٟHE]m`t5?p(DC\W>^0c3[E6ujdg$e7+Nr@GGH&daZ)o "H+א bMNM8c3Ԛ qG(P`D1=9R9wr r}Ndcg AP_*z Y%$ƟJkYk)J=%jQk5vk4FelD &K>?,/ۼyTM˚j_(X)^º@{- ,&R@Rsa|wAB,I+5H 8qjղg&7Bno쥙Cg}^ٸJg EεۨyEoD by`NB mk^:V |Kkn= +T4$==-_.@gT W֍~_Ifr@:QjxD(Z?rC7 Hd2wȝ芪Da'q.|ΓeΑm>K{eÒ^C/H$]+"n xÈNhK_17ı\oPX ٷI@R߄g!@>5.~ /hKEf H>C`x0N.}Ii=߯H,D+9T}`HT5ɋ+1|S:QL5kṛI8fsVa|,٩/JO2á7#mtM  ˔H'Qb@'h~nVX&*B׫mz)!?vv?RMq]Rg;5ղ{ ے