mozilla-js192-1.9.2.23-1.2.1<>,Naظ/=„bz4q@q0~wC_*TmhZ~v9ZٔThnXq;xGRe"^83R(eW&6Uo rȗrÐ?_X o h͏~ͪȜpyZMg;SEmJȮk'!e`zhq6f=O$!+ >^cz*`=7@ \7iC3~Iw͡AsP+`^Y*!*Tn/>5A?A|d  5X\dhv     3 HTcr,(8)9):\)F?G?H?I?X?Y?\?]@^@/b@Vc@dAPeAUfAZlA\zAlCmozilla-js1921.9.2.231.2.1Mozilla JS 1.8 engineJavaScript is the Netscape-developed object scripting language used in millions of web pages and server applications worldwide. Netscape's JavaScript is a superset of the ECMA-262 Edition 3 (ECMAScript) standard scripting language, with only mild differences from the published standard.NGbuild27UXopenSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2+http://bugs.opensuse.orgProductivity/Otherhttp://www.mozilla.orglinuxi586UXANFNGcNGR181d7aba927a1c202acc4e73b821877cxulrunner-1.9.2.23rootrootrootrootrootrootmozilla-xulrunner192-1.9.2.23-1.2.1.src.rpmlibmozjs.somozilla-js192mozilla-js192(x86-32)  @@@@@@@@@@@@@@@@@ rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgcc_s.so.1libgcc_s.so.1(GLIBC_2.0)libm.so.6libm.so.6(GLIBC_2.0)libnspr4.solibpthread.so.0libpthread.so.0(GLIBC_2.0)libstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.6-14.8.0NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.23 (bnc#720264) - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2build27 1317226472GFxF1.9.2.23-1.2.11.9.2.23-1.2.1xulrunner-1.9.2xulrunner-1.9.2.23libmozjs.so/usr/lib//usr/lib/xulrunner-1.9.2.23/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/05a87525e89ad288fac6dcd84dd506d1-mozilla-xulrunner192cpiolzma5i586-suse-linuxhIr4?] "k%QוkH"sQR,%BiO[jCdg>j.--lAWzN?ѲQz\ Օ}pHJ̋ Ф͢^A .s#>BTЇڱd^Eq[a*qt@P`a%S6ف2c]/fԘ߱78Fbgt< uyJMpbr Z,Y:3nBᕘûMs? ̓h/L[PpҞCyYD[Mӯz.<[u-)]pk%Z7;*[) ?U~_*S53U >v:uWK>;m{h/P4>\)b'f( AÐfrكM(0:5`~wg)sr3E͍/ꪔjqt-)D\~BG3@rRr:)dd7wdUFJ@sRO(elp(?eG' 3m._+[  K'#N4@|\%>ٵa<|}q:>*.u7lb tr𩟃xOq u!|{3ILSfLϱa10U_29 1n=s̯MM6ftnj=QEPU> {xi& 7J@m _A6mlK2Fqk5ǴJ!UΑvK bFV]wLޡwa~:T+2eDUy]tgFC$.r=ִ 6gs}XRiYߴ%QJ#eTG$^4RDe'<xI9^ *&[Q0W3 T7ֹ-: ψeg7l$!p6xَ$_(2|`.kx TnN$f*b i=E@ʡ%简Y!drб E?ڕ /qgT ~ eJgen|!C(]^&_@h]J)` sTgGwLS1."j@d~StլE: X ʓ J`a=*xHQ Ffwl˷k$Xr!xBBgZ+$Mp7< H;VZ{&Aj@Zq}&TV}ԒلG{}'}*%rYڔ#hfO'32] N?'PMR +Qna:"|:KĮei\LB_߂4sD[2c0ѮKJAKIvy93r!agM5$=X^pKBA uIJ^xbeDG6Q p1] 2VS6݊;VP+Et%/BL<Z7 0[\uN:&v[nDK|v1CbӒt`gT(5 Zr zS6+Vg@ ,t#%Y@"~x޳3]_Ŕ_JV=q6ĕč(eP3}Eihc5 ѼpCg@Es2/LoPYQsrյ"<|^Qu#*|M>vFttX!_XXNd  {ZrEMaW RC F0 OMsW`ĴVǶm/O We ..8aq HxH){̘[tRsQ*ܧfo^;Cu-ԡ#$>tFj_ur>]ݪnY,y+Mɿ>/[ت~ᄲb0%9tQRP.PµoYts Xv}R+Lr zL; ].$T~'6L Sm Ua7F)Br˜z+^uoZN~k1k "?R|eJQx2E~ 6kK4zHiz0G73j\5_>Dľc:avOi{§-"_+gQi_K*˦,%?_?%i`N[j-cJ !eW/ ݮ3((2 2n< Va5.c$*쾓e4̗,o+/k~qPY?iA_Mrc Kh>5?w4wW/w"$gF^hv>^V,Dn캍>L䓕;qEbxad+=F쑗NeZþ ɠ3X.'l|@XUTԌ 8@{ 0r%+T2 d^Sy> ;:e{t@u'vo6o}j1縃Eokz<>,4aO66Ti {FHUߛ= +'e8qR@h[7ʱ{B2;̈́9{׏NڨHc#3xG?]3ŗ1{ LيgQ/k:9ևIbcSfujs_DtJ[UGlp!3[ U)`v-3nmUFx9Ү8;ΡR? _pDMm♊Z2Tg t _7\rvvsQ8m\=mԄJW]Q`W,  _~Zi[yO޷gPjEN o߂cW45͙G_"\MRGY RN IS@nwص7Ҙ;ӂ:>6S6N{>[0$6*TLOj ֡Q[T~-ʺ F+tkTZ/YiX94\5 {kk:ӭ:0vq^IFNrSp ~wǓc'BݍXi;#@Wk&P2#.SV9*Q'~>nqkd=g6ڠޮ%zwQQnNK=B7K3ո8%wMgѯ'U4}Azۻml9%Y@Kh2餋>j!_no@Ȋ#a %.\B<"EWSz w/jvܧ,MȘLDR6'wz@ SdM, AO'ME~~4*e)Bڴ]zjR+k& spm1'Bg4m/Y W[SP>( Ս2VڏToـI71FI܈}څ9cJ]Z96’OUb&5(;2__%'UpOt*3pCk?!؛r7MeV?{4hYV Vt|ӇFX2H5Ͱ:LJSY>w F?)>)h$H~nڮ0 # = +S`B͵q*^T1dEkIWU"r.-Բ6hyxVES= 5=PspX(u^B7.Qg= 3_O]9ЍcRK1!Fq_|-[1"o+(~CPg72Nro7,HQ@hK*H\m>mz&J0RN7 ZB'^Q͕ȝ]4>y-sMk,X ǬE2s4퓒] ֱJ gω<W?p%g)0n8bkq7PNKE*c|C x!eogo􌢅,>\+!t_(ک ??J3] yGeA_e`LUc+nvBݪm:="rWq>,)=fTv}NVZ\:|@#(mw$oԞ.fT֒kRcX fU'TlBJ7 wΟ<<1[CH⶯#D4%Fc qU%gزrJ~4xPBBqI1W-@ﮑ۪;/[5 ǤjWܟXQI|e)^g !{)nx!j:mV+gd@҉Η_<ЗqH]^t 軌?Jq_UbE zܽj'pP3?]Xy_J3wbMڱR|-ZMf-*x3£8%b դr^1q%㍔6D ]LzT Ij+ಶO &ט+whݻzܖm(=l*1i&OHd%.Z@9G$`p@EZ=%Ehu7Iu/dӯ<4kYhK Z8:is4:U31άKTg|6"j8]2R1=u KșW*g "lW5cW:Z1s sR шy_lE/AL;]Q#XeQVѠF_riaj:+tYavy|.osTcghL9V{؂ltjTf1⯖ KNQ}U~et&ůs^ e7R`צv:].&.:T|*-S,QЪgCc@ YVBR\ys/Mii&͵4!XfAFayJ20LЦ#|i%hc Y{#ӛ13W%(*aV%6<3ZClw*le˺>:_ВW9D#:ܲtڔ LU\js NP`.z}dLH_#Ly&'D-))<)^ *OKՆ{:f 1Cʘ;qDX_p<7P3OLz>ʭ l ݽFE zhTr2pLܭPhFG8 Jt9xUYWCi%C"iWQfKď .gVf;$fҙܜ3lyDG]* 2%mt~KݚhR&:V&[ff<0 7{c_p5 )0Hc7k ejֈŃKH9Ӆjvu&xjUPvC꼲SrߚFA GߎVU\_-x}\\|ΪHs9<I`  ϾaEē~"$ t2nڹd߃|D+T8-lb6]?u xzS':w,ʦ GU%+!h8coJ$3.bZqM" Ns fDwԨԀ&oJόU3[̀FeOC2aO/`ϸcr:7ɍFkg qpU綾^e3Alϗ._y|dWV}9(t32wɅ@|mh7>Tt}ybLbK.Ob>n9~molÉ'{E\.׫a$Ty0DS &~$ρ- AbȗQS[iVfܣùO\Z T<}wuNhw_/`ρ>,Dt>Ja[-dPَX/[gsOv[܎QB\(oᄂ=8fm:6+.ٺB$eh? x*B+KK2;.s>ZYf8pBܕ'h#~<$A&XbgHi~阄Qe+Y$[H[H ΜErbܻvruIOBYB6iLj_7LJ ʐ؆t1솞w#o ^N1Q]+!';_ZNse@Y'ʶPa?m\ TUQ-Xu ]|1AlSg^̰j@L}ȴWտcEN Ga.Y!95ݥL3q"clSYA<9Ji]@{cmqa4Pڈ4Ӕzߵh m?}7ʲ4F UcT#܏qa N-CKK֜e7!i Q! ְHy*MM22%C>h}S"ՠ^>'xo`^ 4݃P`CJ?T]_Yf﮷k? >,mOP eʕ.OUMD1,< S0K.A^.$<FDr۝T֭x[j hF[6+m^ZD/فRE*d@bLfCs/*oyilhLvvsJkOڌ}< /5C!Fx ЕG:8"y햹I vmߕ[#V0(Q+y4V_Gs^2\`M kp74+wa/gMLt5K`xgueo<1a؋3%azeDվ@ ;sB0$rC}CZw1K})CQ|(Qac_V @֬F"4郋u ܷ{n |KHEմxw(&]o+~]2>*EΙ 55˅5F^*+P>" øHUFvf0p>zmYZ0Wv5tkxhVtM1%Wo1 (LFiO/ dBo+$w;~b }!eעac!~LހCw% bt#dJd*яͥ3 c8ˇ! @{ 'h;=ȃ`#31w7ZWВKR>n}_2W%bct4}EviVN CZpoH5_Eqˏhxy6Q(9e@k5H ?_~x`0b8LI٬ɚwaRٽ6@سè܃0TVZ˴FKYnuW~Q WnEsS=|g0B(l-X4S@=:S}gA{ }paJXM{\|=X3WXgϻǛBj >!&Tr-M!Ku[(P_,U~Ϟr̡Q3d$1_?C̷~Ymq?9X㗈cmw$AH:j4H@U}"*xE1w` OSnd8M[, Tg~\sNGUu!h, ˳?Rq\0{Qj ~,CIXt0BEpI2 >ĸZ]yo:OV}h8m2TMޗp ݷd{ǰQ$(Bѝu=y6J%~Ѫdx!"b#fdڦnlqU5d͚> Nw6O<8H4[UjG t]s5&D$hlU1$9ƅPb=wK*}g܆_415aA/gwixS7c؀g6KC& p 'l_,BYC˂p~uCөp}0bc8_w^r8FPZe} EhqG3:AFT>ՍZX6vl9NZ.f=n:\`Qփ;B-J^RbXlڠtEBEq P(QIY A~9X}-!SMhM6"ːcaʈuBDKw:q^OgZAOm*~XC7BI3wD|fLNh|unGNi+i/P߼aǯȤi2bkrB9!q@Afl)^ױT֚S-Qa%@5P_J?LPX¡ϢW9A'[K~( 0ء<#ӖqDP?aYfJEYnȱqNG//FᱽjxFQN/$q}`kWfiIr A9x+h;)䙳8!HP,#qLO;ctZߟ\JfʅV+PtPWI^_WIav{e3>g ^p̀߼UbŸ#'Q3Z6}u2ptRmRM}྇l,h'z"*$n%F4U'b@ PR:C3M@|ޡ ~t E~ï^TɈłOq˶CIs7QMDMG)·Eƾp&1Vvj?x%c J lR, V};~,hyKI@0Tv ,9j-uha&#" Nc8'Bồ PRnzw;ͳh-V\AsǛV[oǑ:19QA?^,7yݐ5?VB"Z#ڨ`brQ9'jh'5ˡ^K{Қ\ 4=Kn<%7l I\>iHJJ#0p bVl?@بR=zT[+G}B}k7xSay)*vO:g*\-Eꝣ#&au9M/B^/3 c7c 'C?u L ~ζ#ݚKEL2fIa*t@$uz:`M*~4}kĉ. |1F _&DnG' ȄX9Eدl-=*ʫ_ j-e.6/yȲ3u =wQ碅L\&ѱb$+n``A/ H3N&t}̡=ր_D 2'6j̈zpV7ɎPig-M~*2p5P[.U$w[l>.k\d0h`!y\SV # +J2`iĦ<3uAKM:h>:o'BCį0z"_ ~%0]k\@@?U,1Yk}$A<pԐ{ ~-Mx|Dzm[~XoiE5@qDZp@w>iу1P~U6CDjK=(Jq YY77ZNŕlcG)o@DE{S2\^9tqI+~nGZ厞Sw<Lv ݊Qwc|c{a84ZQݓƸ{2!x HXuYng{<=,'R)%r//1O\Uu8רM{M4Ue8rgmNiV9(4 G9o2HGK*2>d',C/.p '8`rFx`O:` .nn\/ٴM종lA\BYDo­=:߻at*Z!L}/.ˤl2Y 75V0RY2*6#$L7tƧQ;ÇJqyM#ߐn5>)Ej,[]{:X }%³ w1F[*:w='{(alxc7.mz.d?)X;{s)خƼ-vO#2@͙q`K2{Ӟ#9[x؋NB9`VecV&âpC#<(^ mmBcf34;jZ"K?[0@ c*S=N&k)&瓫qtz/;@{EmZ#v!h|ýtȐNeA~*)y%.隵QKLHM>*Ahz5*lU$Yw5ZChpI Vʉ^g/t370t!{9R!II 8 K> &azFX;낆*o&D!q&uPXޤ- i>G <5wZ.:Ϭ>7uM׷^-(Nqs hnjE arW?.PH>&}"K$r`mC&$|ȏ!MևaͺN9 ͋DGMvK~.,f L|d@ =٩H2,]FjP=1ɢ`%/No{Or[(j곲ÙJgHYV÷2H&KUwSQ}dW\r!̑HC 'h~crKT8ε?ap\x T>xaϖJERJT -gsdۗ1=}8FXkϥDi ê s{'YS^H㚎}'=/]^0> W? dq|lO"lJz]eF&hvaV7>4۪d!sVo]xA5׈rA:5,E5[4yV3 rCɩTUDo8;гą9jMܰ e0]{27֘yTLe7M#!uȰ kN b V% >ʯr;/+_}NWZ,>j_=b(D|z|Wxʹt/C[X Fb E=kR9H)CJ]5Dm %+IWn1,1 (\se\S-T_ڰfmP*#·sfYp-iԱ-ƿTzG},jJ~@65O U\-Ia(HgEX^hε#&k?u?OXuw>xzg,TTV7{GLe"8MOIhRqmb!5{mp{xj\^z@p !D\fM;sķ^=ШW!A.*Vw';PT"~ fb~?P34NsGl\) $䋫&dזfd_ͼa4teZ}MZ\+;[. D~k[xq^oE {;g;N`N6Z+rs:LV 44y_@v$'c t͊O 7{1y|42E8yʂ]/sjY-d {7թO7VqyZv_nDs .*BoXJGƴMG,oxS<:%GIvP>$[󆬉k\z~ܭxk8{[$TxH՟dwe|iDWz!bf"ȅqgl<ԤY ҭ_T@P)űcQGJX WZGƾʰ;5(Nihgdž,4 : NB{hF’!/NU,^ԛ2KيS_