mozilla-xulrunner192-gnome-1.9.2.22-0.2.1>t  DH`pNh/=„y4njjY4-ظjQ{N>hCX,LWnnfB7|λZ7XL@+(zZ0R!ž Kk K;w'Rۄb|SBkB(QiAVt>*n,W7XzFh pO+_.qS`Cm#RT)uxZ&$S] vU75ee8f812b26601b79ca1680eec614e2455f17c0Nh/=„s6 eh-]Y8mVI^{ &dզI֬-$ioHSrxf<ES_J)M?# gDMԗ9K$ ̹&٣GPр9htQ`Egx5YSmDb<i \LB>#q}th?ZDǹ[oo?Û-sjpT #ڨc٦~Dpް:ǿq<7>7B?B|d& , XPT\`nw ( 2 < P  0Dt"(Z8`'9': '>@F@$G@8H@LI@`X@hY@\@]@^AbAVcAdBPeBUfBZlB\zBlCmozilla-xulrunner192-gnome1.9.2.220.2.1XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.Nhbuild09openSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2+http://bugs.opensuse.orgProductivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.22/.autoreg exit 00A큤ANhNhNhoNhoNhod41d8cd98f00b204e9800998ecf8427e9cdaacb266d778a2432422329ecc0d705c8f7102ac50dfe014e77dc8561fdacc@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.22-0.2.1.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.22-0.2.14.0-13.0.4-14.4.6-14.8.0Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild09 1315500542 c { 1.9.2.22-0.2.11.9.2.22-0.2.1xulrunner-1.9.2.22.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.22//usr/lib/xulrunner-1.9.2.22/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/4aa611a2f87df5b13dcfcae819091fda-mozilla-xulrunner192cpiolzma5i586-suse-linux,R~C֟zJG?] cx K}P@܊謞U<ηț>%eC~u)x ]'"s{B$A)6U?kRSQ6 .UOa&q պ;BE1T`W&!,qzɐWzI_~pY(~i}i/{=S;,g)tr:׽\}e\ެbWy*gǓʛ=MY\bn'$Lٛ=fq:4y"v7wLX(!",;ͬceUT!@Oa1TuW>'&w{psz3:je˄L"rHk^~;`[m,vbD]{>m9 mx6:,ϝt?B=; AiI_ZwMD )ShC*r5r?=vo;@J\ZS({}GR~efsyUGD!<'}Lt3oF{Լ,@i5L ٔGCHesMs0;e滋6ƗK O}H-X) QrI[ :SKd^3;)//ãȔ .J ҟ]|%0?}eDԖ܂ k+ "O>@O2l<w $#9?߷l};/Z XlSJt.hKaG ZJTLv'2F]gknm6Rf3[|cHR̠܌™;Z34HRD%$)CG[tqw#1"(9@z0t փƔA#$҄ u^eaѥt* yJǜl[) Wsen* ivPr+J 7FEww[\U,TrU&h =STRڹˇƒ8¨$R;kjjV|>/ CBZd!zxK;g7._;S[Β|5_8gjm5LgL>t =_^Smf7ԧgVR?*z>v ?Ɩ3x*;N7/, 7r#OE۠jpt!S + ,ֹwdoNly^y+S|Q.{c#$rhiڀ9kF`PFe9a~KJd+44NI20Zl{&48=Vk2a?DOθVEH dxӬ gACRsԽOwmх[ |g6oH= Z[ޒ@vR*Z̀(_ޔ{( Jeۭn עt6FWjיH}` [ Y/* \x[yw2|+𘷯IIû}{?pg?b(>$beG,VHhtrq g;[Ŵ ,cv18Ñۑ{Tf?$& ]Lǖ-4] HLe͋guvQQFtDt6 Xʬ-~2tT;/\Oꂄg`Yk ܕNLƹD6j՞חt?1X|tC\U,8"[ƫEqEpmƕvP9t6N85xIyѓ)g#djA/<5ЙC#ٺ+ah= ^9D$ zvSzU9;$v$J;fmcC?x(:q+D[woš:vE ։p*JE$ڋ@:k29lo>ͽc<66%)OZ+1{R䬫]y'bei~pA|(1g _"pO7Nw:Gr); `pUW=\=cY"%յ̸ ݑu^bw(p֫~J-{^ɩ4 e# 2K*y'n54~R^綯𱂃[H"|)E 1bU\73!Ut9qxe]u9/>mՄG>2$yc@3kρ)i1- ` HO DVS@zS~ [Hj/d dz"]w9Ag5֒hw/حmuqy h)_tdW٪aJ@CgV9>]NCUp :h{13((TcDzwaeZO=*f*VcjkeGUSc /EԾna_p IEEт"캭2x#ny=&-JIxhߋR u,c,Z 'Yg,EU@"KnĹ5/`hxfiT0E`EEjQR~!dv_ij\;l.z`ҝT ņ|,gAGxv5`N[p v3Jom" p[]4Oxp_/D~%v? hE+KfQo3KJGr͓[p*߷3A'ޥ(8@|;'bQ^~Hgy!qmuuRqqvCy'e71VLruTk~[n H,y@Pg y;oz\k4aEWbQ 3W,P>AA$p  (+%3%+r2 ݻ%GNDP!k(Xְؔnzծ8ڞۢpWM%NIJFښ_Un`["Z$? Wdܸ(@jrF:,Jedk q Y'Ѭofi[iO6XB[fJgVr`r+ukS$u Fztg@E5Bw isP:*y5&,8Jx 4diz!FtjB#ZALCa>P Kpz=[Gw NgyeU&~Cv^YPBo:Nku+Yc8C)e`kTF)2ˊwgq4&>jE.SطC:)nNqKgWbl~+%dw"2#>nӥ $z+#!h]cyTt&yViA GS,93A=iI&ߊQ?؎/s) Ɠ1>qi=>W5C䖄uZ6t6T E=gEXអrQ%su^"jmf[6~ن N}+p!#lEL@qv^.>{hS_t\!eRnT:?_pENwjV'iCEZj!$>`P@Kď{AZN+{8I(-}~Ki't&)m4:JRX: KIP&SqVm s"9z^y0rr. oغ,ǘT О,wfbICI.RXQ*4Ϡ@$J:3 4{ts 1-` <Տड़IcdGs>v;U#i1.WP$y۷aO]1J|~uB.HiN2A'c>802/_qUi$V+|λv&i'-ϹttXv1lh=LO!r2Qn?wWb/ti:ΨZMKƝs{&>dS>V/([ ۩$p=&RqJnhjGn@ΤO#Lx!%G_ך8|7S3)(jNmu!K L {b] +=2V-R<4Y\ 8sZ~ U ~z+;[)Ɉ_M_+ɀWCYZ=V`fUBPћ6*$) VIx֡}"uY< 6i,R>ӽC \; m]]ؕ(&WN7 +1@G}cV!48iQщ+4b8X1/8))H$M;i!Wf >XN3bwh%ZBDntOdjXʼ?IoŽˡ*ݣNO;`VZ9L `صHe&(l~2$H${K1+Q@Wnv1DZ lb|5Y<ζSd7ȷh6h/!nm/'%,tހVrg?=3G*+F$Lo9qzԟϪnm%@u˷aJC[zy kަhDk nX,i;)>[&:q: 8b=oq?o奄^;5Thk ه3T\YwXk+[.%S aRދRz6C}`c4y7zeYFxv(.]%z!]r Xc5+$` eU\`c;Z6E]HŦhlҁXTc}JG)yg[i|e/Tbc]NCʜN`CW[Aa(l؍}^\[`TgXٻmarup!R~:HRpe]Z\rDC۝[/%v$[][a$7wxΈl36 /.%SW -+kV>JUϓSީiV "k-e3#Ga0F&I=yrڍQ/y,E/Nv}v c~Hz\C]B8ϿT^HN[C[ Y{)ߺ,i *S ya~gLѾP]n4ko+JMW3dPm KW58a57i(mƐ.pib!8cF-Vcyf/U__GsJ,@fwTʶBpzfȸKODGC`~A%ɍ*m[qD&za4Nđ&oG z}Sqi{8Zq7  qAr sN$/]sj4v?uB}.6z(Nb ;h<}"SǁI[JYnES:-υϽo[]?^06Q=`Vʐɓh$ td6 =@揶">)j7.I-ȡN;wpk &S]o8qD+jюJ$[8J}/V.0yȇOEAȧQ^*`!~[)yr A+Z}M96FtC8(*6U"-CEp6](nRX䒋Յ7\ $h( !] 1йQ)maֺ`IVvct Xe:N&@YV%֒v\-Vx >qpw3D-6[oI( :|1d*gpհRo}ݷ$ɟ0+vW=S.(qH!%CHTWA>Y>2u gݤ<qG+lil漏$g8 <(cwJ9Ӷ)l9~|/XB}pleC_lho@zz8^!B7:zxIjN=ƩF\0/Rs7RCD-h7U,^Nv@ÔgO[ KFm 5N8Tqz:x\Nާ[oGW-M%+J5JAu6t.KjY9"&CN}eRhYzG ZS6ʦ*'\5-Aϔ+8܃l rxy>vUM4aɞ ZAأG5t^ב*Elhz8fh6E~h b:L 2M{ W?hi pp_Vv[9)dg0nXoA(ѣEPz+{Ee}J ecrPЈ})l`t9d(X\7'a 4;WBڻѝ~gQ+J\R6 Ak]RNqw=q1_. f Doߕ~bӒ^a<눩ѫc(莋 kїc0Url4 ƶ!N4&H F5k܀rLD?l3K юIx1;CLJHݘ!kIFj]'pb\(я ZO4q2˻1;2jSw+;yqpgyij/J8L]G3m5c]₞\Mf?Xܮ ȥUW5x<}hi#v&$.F9['$sk74OɿTkz ʉqHک%a[-JQhޜ$5V4b.~v~Qu 7,qQx%$S DKm}=N(/7%)M j;]&<WHyE[d-A'O{}P?4 5jUTVgBP^G~Ǒt5DZ)cA@"{5j{_"S/=?uLcAN0¯t\${t +g/|쥐1FzK"NEˆ?]ĵ(U,UWކJ5V85Uzđn`JuDbٯV-tDi :Dеu1qe몒IZ8r[5fxRV)Uy"= jnc7G}-$DjٺMǵ g5K}Dn0qB$Sأ!3^>CKYC n)A@0eRu¤Dήx:c%Jo]vm>Mvlϧ`B>Q !_84!Uj06pV |ҪэUm3L])ȹȃc^,h*^kR* b*^d3Hۧ󯏉m r}.^ q.XGi`lQ2"&'-=RG CAvlqǨFQմN۶'N3`}V C&:X19L@h48cqj4f)Uj dDyW5aaCubU5tqhnP@r(eNDq8] EhYycMl0e8r.& .U^*Wtg)?w+0]܊[&~ 'wԩoB,hi!TܝnG[x2|NP '=Vv?hF2O\Hdhq+_K3;Yd H1w@?{\etWE`lKԜ멛(ǵwEE!^I`'~kr, Նe/O!(tco76PN^eR ֲ Ÿnv7uI18}sN"(k/dU 6I&A0DYp_m0W#/pǎNta@~(6R<5eAD&:pO҃8>ӟ""&gZ nf: ^RU\лi]=ZA#7w'Y!UŃŠruR^G~ЊQt!!W ۧL?*E 5lӅ p@*M/ܜ*WgyDGE Zz'#fFrI@&3]Wz/G82;EAQ RΆG Ć>7sBgN"I*r:۲x[/n[#~p@'ڸf#|v'u)䣏~ 3|m_R/i2QNњP}Vz6^s$Z c" {=M xNa8[Md.Zu0!zQg+W ŠkSWڞFOU7VX^'MD_]~Uffu%&JA"e*Ī`B{tJ{Qs4i'Y#[Z?7VFrMnjbel5{[?i%)lOw}ҷf@Q3 v@/䩕_]'9:M~Ot-m͔8S&?;!-% -m6Tb)1ɨ$ uW44v =c^Rb:h)68Y$0:FK4y$A=ٹ)؅xjvb`j#}NQ͵XJIs`ыlK/ nЭ6VZf2rLj QWh!/Cr  ׅJőK [@!r\o Q0+Kx[A۪֟aEU[Y#=ATzV7+(s2V{@S0)QGgkq/D{LDCՈ?^YtE8#IhG؈8'*-F+*"At4E52vf6}mC;ސoߗ IYnض|`#W`zP֙*Wj;[2AL5H PGR)> B&IxĂ鉶[<wb5} _BҞx2ˆBFReM q34dlW#B FݐfPI HZXvMJ?{hl&E`vUZW/\۹N+.Yd\. W HR{MA'M HAʳf# 2-@7u-@O3 g"LK]qugep7$Z NkscꧥCcKPm/)cJD0+x! n+‡AcI<`lbR5AJRF2Mn ^G`o3U:O%ӼJ@fPs.#ӈL.O&?)SK)ujx ᅮN'\ ]( mO ڹ"ŚH= ps'M>ڄL : ]y+lfԀ'%w, "ZڏfL"Uҧb PiE#5CgqWv簗 H!Lz< Yt屷/czp{KYf??mE)RL^ m~X~й-\rs$ɝZ9Ⱥo wj|Sh'CNc;1.A=}`n#1͹'PAb1/<2+QeFI<_d+p V8w+P&#89(yhNiyxp8p(Nࡏo-g7!S/`U\ ُb{4c-\uWD=5Q<AEz?C!O{r)P1m)2B'[odÍPqC9;y"lޙ[ =BB~fNtyO % B3/hīVL%vIU]4kg?QetWB g{JIf,ϝ;SjLjM~2n:(qxJ#鋏EmA5G^mBdui҆c[e~GkDaO,RͦOXK`vz(o/KFNS&1Ң3,SjF5wUm'gTȐ8RcgU A>3,-3=*`}x n]A3wjyamo{e-w #F`ż uKpΙNsثY#oPq4 ri-khXN=@S!1t2 I1ս[6y޴q5;(T2ʋp}R"MWznf#X@"ѼcĤvI1Hys*.*8Pn}Fy4Ewa6-@Gt2 9*r*ip)-@S,L[j0jIJvʸN؁΋ U7?g|O<_؃E [Ilj |r*y$?H`bGFex6^ٝ&L 慎_nxxFWN~1P"_V)JvAyL4L$8~.>ܛ"xWdo uE!4$_", 409\T _lrw?=莌:rso=#:N?Ue$ZvH\w Ńd߆(xfixS8i_8Nذ &ttrsU!2U?1)&:=yT*@حk/a5LqԿ\g02fh%[yugF=AD"~#wtdad8\v|h6hF6x~ [g/)7Ga]NɩMN(r wwS{u+w7!E,|!S:S>@ǩ8 =YvmG}IYi=xKT}Xd[x 9a*B'ZՃ7  D2;4+7LP`:[3M,ݍKmB7M(w. B#iUBj0؃4$~q")6+xn1;t[fR32V7Lݏ͖XjNp-`jW| \'US\Ƶ(d@߈% VSrj'UQ$V<) UȈ0 $ &u@$7$yM4qJ",5Yk^E8CMu-CAnF-+_R)V_BmN4Ǚ N\gJ.'y-Z ݋Tעo896,։POz5#~n'lvF-W#x9OW^iOn(z5^e\n>1td6QacIZww>v4:nwh* :[oZ'\@ ,J}̍nTY,- 5BVM;#Z\n($e1#Pz6F2btb<;1ߊuxy;nlsJڥ0^~{҄ĥv=)Ujܝ•8/Kz#T}٬CJ*uXq3|jEYe_QRYY<?/$8u3ǃjD8H8u%pdyr6 ˊ_oh/7n^'юHV˲K`ThUJj{ -e%;ړk/eJJkԑl؉\u(•Lȧ6Bަ {-dt8nkf@L_9w<.w (3UWwOdWYop G\0+'YŇ+d3:9g%y/G n(.-q:.&[,{6l!Et]"<g͜30okQtEwہ)~sYz7vPA_8|>??Uw1GK볒k NJWt]SyUySBh9;=8?I(/EY䳹)j6&5bJC' u]飩#K&K?c"tQIjHC!+uͯd𘀢 Pg~3)@u%Q3A;'9%bY^-&\YDTI'Y)Lq TԒk-}+qoJ=UNX1j%. -hmP~軱^@: Q|Ko^ŕy2c h:yiYqvYIݸgeRJAK(`} ?kXG2<( l!\g #)=8'\ƕ`@ UL'NgJ媬ݒ*#xr-5@~m:U'^INk0<7[H W@ts-qVlA `97ִ.kNz\dgEeSXd$ 7MfrƬm;@981aoz!U;^E!K oF?6r+?"'ϼY + _[,|z'Ʉ=ƮY.vsIP42ji\{ N'e1b(/F\N;-!ХDXxw &>*[%$ &)IuܠYd.m{x9MAߗKsqai^pbXJIgfX:Ѣ* *iHLȽHȠΟY)1YZ{O8qP[l{b^Onڲ#Uf0WϓX.!}FGK)$ B5 ln~`k֮0Tgq>s 3/iM&6=uקAr\(l\ܻ9]J ꚱx^/ ̔-a_D_Mɋ9} I^s$vɺȏ׭PGI b!&DEP4s:53؛nv2m:F;D$?}Jڲ`2ClNl%FviT#_%KVhmm ?Fhm97uC,Ʀ>VgDEJ.Y3wEqS)TH}ծh]^gwh$ L]aa!4KYWFxO*ii_c Ly :!B|)n#BSm=TTC7_xP5bH~'^[(ZC\tS@e x-k:Ji1эNnVٍ&ܧ8ƶ_^<wFlma,ΫpU^ uy?.HF?q:J%.}tA L5sVG^W +Q%-,} OQPзȷP7hn$v#^#ttѦ~Խ#KCksT.v벂W'x%{FWvq:0̯ګ~*B];\Jv~ - b =7Ŕj˳\Pf'Wމp2Ï-pҳkiyvΫiE*WRpI5I\61(r&NKUR]镻)Ce a:tp0٪\ ^ e*ʹ6-EW{f@cDօ57i@6G*@*Zc%86-z V;yWD{[ŏ 0'4{50C[*jQ2>sWTz5L{ukx( rݱqݗy+gf3RLj"`B!ɂzǮcrp>nnG?W˯iCۉe0䚐[KbFBȸ}Dw^6HeҌ pp.{mWmy]ZENȯu]_:*m~I1'ZXsS4lT%1gQVšB&PQg7/IbD˦gwUNj.ΊRtBp`9v^TruM!+E;H=m}I9cqoT&v,V_Du UxdWI:5x.LRvɳwBGea=Gfs?wRlG> T-JPHk+z<8hxg9XUH>:cP {{7հ{MNÿ^8>d?7BiG5Ihm:@ tّePa\SDg XŚ usPctvxymU\齆Tm@MssaAt7?*MŚ7!80k`9pkʑMA}q,k5mv!Ŗ5峏+G2ltV `yoVi'?Ri)ga8WG1xa]`~ݗsrgm509C{%''%bҁLyZN3xٕWC=L\Y7=U1tű3Ɋ¦gg,O.p:im8Wj%2f'rsH{ u А )RB .HzE>ASCwF`hcr!+)Ӟ eB7W^C-x׹PR$bܬfKjsf⺠;45 ?|}K!CȗܦahAӗFdgMLa5j9\*! Tz ,Cp~8XB:&rtO} ռ;(BPgH\7L)8ԓ]r{%l~1cAd?P35Rw!q~EieX5x&+2gec%wO&ÆlU7VwK6 Y]?3`'zQ-s!_H; ($oEfwvX$3!h&\E- ,PNvOv#aK2e~5UzN -ReOHzX)cG9b;EI9/2ġN9?0m8Ki[3j5FK#@"@k}"`RU,2r-0~"45ڸ.mM.ڨ(Y2p[%WQtxl yg |5kT䮺.j¨ Y]h1j1H%0K8i \<+K`\z4Nu~7}X] 9~pNfuF( XA0zذAQz] m:>.Uq@f `%|K!gr$[V_ܭЄtʬ@@$F1RUvxweCFﮞ /m| a _{źT:us9D'r}{SQhZ8ʸ>a?MxZ<>^=8r^Ì[/f5 {.ˆo&!󻪒2^8% H]ͤuoB' [u&^}|_nmvR>yQ+YP6JUpu#sY䫼"PS 2$}B?d,6>݁+ 1%\vK\M34oȥf̯C%K[5S9Uج#-73SJ g!:r(AC7]ca}P*{IgZN3f2N4}CYD>33XJQUq^{u9(AJ^**܉@Gmjʒ^JXm+#IYP1fŌ^ĐЙ_((-F1f~;gW/}{q{sX,ћe|Fdj mXܵFVvM[VU~bU$-Ç]FK E|>ltD:A &e :f{/WA;`1DRc|.=N)2x L:UOF)F)8GM|lJk{A9͚V*ӭ ktn:W?6_Hp:>?LF1!1,5Z9XxT`& fNQg0Jc|`$$>a!B iF$tr߱WvyPNޢkFxO/ 8~)hmH` @H~sLYurY1/ͰٵPݐC9%CI0aK6!*n3\hZ fR(%$|tt U-na'mD&T.نZ?O坂/DT-%'=3΃Hḭ]U;@On{[8_,/wkRS^ j[cI8ivہȽO-q4!Wm( )zɴzՂ yYGPU6~{ȟυ]B7 o^怈W$&374NO:ankn-;">;fĆ,< hbȬ(JyS?K| 64tdFԵL% t?OpuOXp:!*GEeH!MWT<(:;MJJڕ7D#k\ $kY]Lmq1V/|@u*xob*9a:ts=Sw DI-#^ WCq0/g-`qj&$2'~f}hauhixZ9 N@mWoNFm%sfSnۖ~UA Ƣ|2' [X]zY asN e5[F^tbB1؃kؕVbAD2uifSƎ1:Eĸe ՘MV/|M=FM'Gӽv҂ Tt>"n53~4hS_%6{ R$ZY0앋y٨ =^ 젾i]*GABu&e(co d2$i4t 4( ?ЏܪVH{.ؗzgnr`.&e`M񉊀]2pL4nLm3ӈ 1p"ԻvBj?*8c+^iR"u #鼚aTNf!?]ʔd 3"ZEZeZ GRhFhԡKi>Mh_lCWku(.c:xVJU{8@ogIAK _(rnm-U5;(fPwxw@U+&/*)7ߔWLPv dW_޴)ѧ:/yVLT`2V}^Iƹ7c0H}jGw[")F2_g%`L ZW(an`/^}3K=΃F%l8s=H [g~'-N;(Q"r;d|V|A ]\n#+~xwfaVri׏yW1CB2ޮ[9|aVDtq`+n`$: Rݺ/M| @4;vC6-}G^/p M4x{a@O%\t_w{8&4va‰vl`Ő"{g1;qr Dh撶DT:rrZO5,A`xK 'x8d9Ө$d62l4V wz8IX>e->(e o9@)_ 5ӾL5ƥ|  7d z+Y6Y,QA)|8N8-˪,%-?DWP`>BJC{3Λ9_>w0bQS5p3[۠<܉gBj[tT<<#YX\y쿖 BkpdsƗ'ӀuOɂV)5z&cіSTuu(rB`Q}RfzcjKk徕C{56W+EwNrlvx?Րrt^gٺ;Vi/ϊ&!$Eq:$GQܻ[}k2'աEg]*(ys2'] h[#'O)_R//UY=(ZԁBO8SL/?(ګ?N>Jɐfrf q >sU麐 ctqj[mG.'8A ̙474