mozilla-xulrunner192-gnome-1.9.2.23-1.2.1>t  DH`pNLP/=„wa~ti8gH=Wm'ԋ2' Jy~}bv47cr䀘g[xۏjq c S=y'C@l9 \LdS6>}[nj([B%@O?Yl B)Go+^Nrr] ;IVܷSQ;M K=ЍJm%ȕ^֞Yb~zzs-xfaԇeH3a#Ϭא9 7f1794faed77a8c7e0cfd102b29848e734690eb7NLP/=„:CSR{T jTݍ-,@.y}.GƟݼ]F ,Adi{G%*<]h$,SMŊ[;Y/Ph"EB-fE{&E1L㽼f޴U+Uɵk(zu Xr}Y֜;xy=VX=xn ~`NYv΋&l^S_P(~ ESK!\ZmW#>7Cl?C\d& , XPT\`nw ( 2 < P  0Dt"(Z8`)9): )>@FAGAHA,IA@XAHYAh\A]A^AbB6cBdC0eC5fC:lC<zCLCmozilla-xulrunner192-gnome1.9.2.231.2.1XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.NGbuild27openSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2+http://bugs.opensuse.orgProductivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.23/.autoreg exit 00A큤ANGcNFNGQNGQNGQd41d8cd98f00b204e9800998ecf8427e4c5d9929c57a0d9f3c61c08805fbc238ad2e3371fb20a66e3adbd1fbf11ca0c4@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.23-1.2.1.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.23-1.2.14.0-13.0.4-14.4.6-14.8.0NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.23 (bnc#720264) - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild27 1317226472FxFff f1.9.2.23-1.2.11.9.2.23-1.2.1xulrunner-1.9.2.23.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.23//usr/lib/xulrunner-1.9.2.23/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/05a87525e89ad288fac6dcd84dd506d1-mozilla-xulrunner192cpiolzma5i586-suse-linuxhIr4?] cw_e֮ffZPGJ9KtVWU+XeRX+1K9i{:2†:ET_-zž47fwŗgZe׿')wW }5"LeuҙS/&\'urC3$6z$HܲƏd%/+HOE?"u4}8v/ ]l|b q'KaX$ J%9kj&nrʖ^ڌMt;f'U^Mpt2+p:׻]T4!,, I[ ScFf ã\,&T!JQd=nA`o ~:*NvC'l'|@єS/~ `5 +RW1A\Ҵ8d9 PDWFBd`C@>y;׻>e;LRjOM]?a;{c.8<:zrs4#F1}l8R)rS3Ph':wf`k?5!i2M ({ޘl23s)&Mh&4lR8КymߗKIE7Hr$R*Qx>=  H h3Rd )\@ [T]t^GuTibA{Yg<JQc:G4KC\3IGdsk1{Xּ4ʚI gio?m4tQ.k;~2^v)*88UPKi(_l,j$^oUE0*U '-3Hwc{kOt'_ybʻ=2SV^!XB4+iHkʐ ο ںj^Z`a=$}iAaΗ\*H||_WAk$ 9p uaEqq%a7ۦ>_ g=ٕk`6lwC=x#ř\ГH) Y2Qtqp ő*`R"ZfT:_O^'y+d>ҎΨ13 f\щ-9 bbڄ_Ae&1fə /#DyRS5 9Asn`z gP2Fw);$W'wM9wbh|@>z[z=(9ƨY#UL9G?o+4F,pzv) MKNC')s{ sPd^_AV#00pyXtÁ7W:S+kb]ט!S;SWYZhSJV޸"Y7 oɳ((mW=-@ M6>ıj6&Za1p J"lPUDL{w*aĊQr7&w0 *UYW.U9PF|`hBT0HcTup>N4,l:X;*hs(ޠ"PIvM!ޫ٬WM-`#o.ݥ+(Ws іrȥ&M<~YY[_~A%PiY%ƿ Sdbqϭy0=CIzXw (x_.~M<'Zު@[]}T(59 ڴR]G-Ҭ| ~i+0c&bu@:)ȥ6uS-"x&WgV.b"u"bSa`ju7%ӭo;{GYҒ|.ΥP0ݖBpt_#~!5VC4UqdZc'!bճP2lx\ l95Bc)OIH(Ua_yY pdNE}Rs{p9>Z'&Q)+lҹoG3#: *yb$ BІN&C"%5lCfh:$BC ^lTH \M,u`)*sW|I 5+Ma_C |AmYI58YT#H6zP̜6qO{xX #~Ӻ&qrX}kFf>}+򭥓$Ÿ~3.fnќ:`RvS"38^0l0 XAHHBsEį{ZESN`u5Mժ|6wm$q<{^:qͬ]"j|QsC͍Bժwn N;koG(hF%QR2%'@ހ\Y[+=w@?9\t ˎG UmInN/jwHE4n6qWK?go78Am-R{rIZA?/s~ɖyS|[m.g,=ȍ_”#yi|=ީ}ր# G-]8*Y=ԡ\F(҄FnEW!&uoXA*õ7bzD;N\jƞRdpc9dzH IЩ_aclP! V{Yq1:,*V|Tm2T# g`x~$ꘙc7"8Iq?k'?:^?W];|hDTO |9?ThQ}*JS p0.Al~ @,ŧL)&_> 2#K EfuGX5܍BܪbM9 eWޔlx7U,Hȼ"Sr$!%272'I,7H)еWT[;)K8j}8AqɚE\r[~hoR##?jimQ~Ӑw~(>Lǧ>T!-V٩cE|bnY4w9bm {sLY4pKA+|T %w nZvsen*~q8-{Ak-3 uv^#棤Y!=\́Va6-9ݮz`Rc"ᎈEysw$Qi,PFEF*sUrPďٮ\HLk߭ +Ie n"3֥]( \\h#~ܱpgLޑbg^3rֿW~[G S4Sh}ʰOy_!hח,ol!Du"9O4~wKǝ۳0_sh8s!,d&݈Zoˇ +~?$8''֛<ⅦرmL? e$Ur) [<|۽_5Pk ZQ<Ύ&Ӽ< }-UFQ^aTCf۰U‹XR%b<^&LZtT?#XnIFE;Ug 7./7hk $%}«Gx kMĈ,*Gf$(O~lij!ɍ*DnIBV!rĸY.U3͜X?spᷘͦ!U:F*7%t!Q޿|іlLVeLk &U/n}˿ mRaExK!4u~-J` #lgrx\\I*[ݚvmy0"P=CӲ#i9UuCS$8P's56BS0-v4G< ;t<o3#O +.W[9YJWްQzBpkC^+,(ө&ꍣXG&@""Ĭ_:qTE3%㧈j BUzGbx΄(ٱ /Q1SKw{yԌ\?\pHjnI%W'|VC CjI\ .Ϻ]J-C6aʲo~ ztF5p{Yq *ן$}>ס`6\(pDjk†ɈA0:Ɍ\,{Zc#d<"2?h b2HQRIJ^\Й 0٣j62_*"`(l t܆92pSL"I3 medV* zC-"dH`*ZF!Rmr+|vXg@d&aق#t&Es8!B>^i}\Uw3RZl2f'R$z`cBX+M\ Ẅ>'7p i$v83Egn,4>?.Rvӏu&͉"MYxddֶtEAaS%%k4OYOL˓~@e-D!Tp Xe a5*`Ot[T!.So ܐY78':nCnO~.o׬Fv%cvL4B EpeK댖uV);R}]N#Kfg"|9yݮ]EX t.>ӽ64ikx3UhP) m%uhbN$=vwy%7ԹʉZ{!! 1.5n濳bK,ydZޗ! uփbFt>e@Ӌ 'A!lIRsk( b}|-FQ&VOgP x @+|μ4 bR9UZg3h/vbu}C9~\ߵ$iDp8 7iTLxny灨tgLIcJ׮%Κ nͿi.c&CNi6;L]*5c9 #9~S/R^>~c xpO 8ˆ3t_Y*ߣ78/.>x Ԑk ݜuS6.xs>s֮_R!9č4DWndRZu][AZcji3"$;(e][o#fkxyVJ 铽'/&`e&LF(iwSr7@9jU̖#k#_{ԓEےzΉ+o PoL>KҊ?JEȺȡ,gqOAXj?.RDKL]M,o2[WӨ1pOPqqTDҲ~&=[ԗ|i`/}y^0<[%ZiVWul$ {c6wυS`25ge$Ɇ]ڝ|LbVhB\b 4BS9*uGMNd(RuHh ܞgr8K>>MPϯ^&2}|W[\YSCm5y%|<۹֯[3`A:%cXvu5Z]v"6Ϙ{,t@l_q%%-w|1Ѫ'YEn(h5sO'i\2 "Z =Ltb(D 6xRI2C6[bƤd z Rg6XKcYRQL50`,_r4wqhT;XQ7a:< A$PhCpky 036@"⠻8E},q-h7w,}]%FMҼKCǪ"&Wz (3l˃'BKjDfoRa1,ݜ1^ Fdo˵@3a$Fn"/ˮYmڨ]cH.ȗ/Eдƭ,=b- 'Z=ҏPʈMt5BV&ΩSpCcUbB;xlB fǰ1W=@,2@>n;ilzk-ӘsfxIPǮCe!^t1̌6AM_~!Bdz1YcȄPs,SVAqtMwe \SHs\B2 4>qյ*ۊ=~O%jU&=-Z[p#ǯ@~[Yi$duA%|BY3 r3ʧ3д_`a?#: uAYF.ҨLڍ-X]{ӵ2wR^kI)׮&='J\2qc}^1oa$ʒ$15b̲f* Ak>~ne,72W5?Ȥ0*f*D,Fp4S0$kIn) p uDžA1m+Jbw7{b@-THP0mQ2(mj[<^ŗSB}e*9$kryT<" zQ)ugUzB " 5E(X+5A_\`'qo##<#HɗZ-7#L> 6jm5ޞϾyWuۺTfof3Ӣ7_.%WQm[`iµHo$ ?GW [E)pZՖ FnVu7c.CIL*rHnpJ'o x87,0%z D7Xm1WI[QL 4\f{?zAerg峳u ]=SS16hIm6c!eO|LF5u=qi)۾kU35a肀8Ǒc=[>dgmIjbGЗGFL0+IڎES9H?ˆ뷈}voZFi)C&b[,QfkpVyh|̄@7,q+lI ڠu) AֿTIƸ፩t;TrjLׁ >]鐲?g"XYY΍ /BcvEX4o˛AN!O>u>Sʎ].'уT s_ ̊ޖwZqۂݜ`qwnKGBHjAZMMU &l|A5GME*5>+%Z0.P1Vh[0v<ƶk 4ʪVC@k?%RU5G ϐ}`{x F[jk7(,k*ߠAs96UXxN!4+jh8 RSљ´WT6,"|٤]p&}O_5(a\z_ &XU>Ƚxuȩ .\Z6}T@~xX#O 5I`Zd=N݌FοLW>NDzh`|<)|d&r\7Vd4 9ĶB_P%wKNm&29Z?D\f;N"n|[+Otx@L-G?0,Mbg 8= u@S+RN 0\qIU\,"?0H& DkY&?^h"ڤܡr؂HfF*,j=V=[?C(0Iԟ c#Jj\a|H\{H܇U&G톴OikI:` 帺zE9ӓ\z ]-1} 7)#y&_Wҙ`.iwO ]Q:CL1}j :{'FmFgʍbSE>kB3{PH^{' ZFMznqoŐ@~:ίK%y?͊LrQ{Ot`(ב"s4OD*mt`_n)f}GЛͮMT;̅0uIZ뎜 [W v/YU GW! mqݳ]CUd{HGyT 5+xYŏշojI껚EXݍR3dU#la !trN"^qȄLW/M"``6#kL@ : gV/[KfB=6zc#t;Pw6ѢfTko>O[T6kzyUk$giiϯ]KR/B2c9Sc5~:;]r %k Z@G%VuGg˂Y\q;I\<~%Jg>.y2s c4;S1P!˃g#pDٵ˔ퟂq9V3ÓxԒq7;P,zxKJ8=Sބs1Os "KՎ+=;M9,~}ifm 5Vϫ*p$*{䜔G!H^f{#2TsL×݋unr N~;tJh\o 5>VI~uW(-T5tA]n $s=Mt+ȃ=Yu )J|HIdb -FFؿlD(Qme@v`_#H!DurgƨD3T X{B76M|0@?Nל7% #gaіFh\rp~{eF)>r5;ZQѦ x96[ܖ;NoO`?afR;?%U8\{H6Ȑ$Rv9_t:ZYw7[q=FH l|"OiHJ© IH{!}mtG]X݈P5?dtf"ea shHC`CT1w{ uKh8 r΍d!QXC61>c(JxN=gW֠nI Lv>:G?VH4C"b= /%,!>z7uKQ;tS<0S:POxTcް^1͝D+']5 )p#k\c [j0˔\X5/ؽQU4F) x~+޼Y86n?ֈ 1Þ*nvc@Rdn{+K1,Nt{`d˜hF扒3, [HY.y}6@3Fށ^fTcw$ȵ{N􀝝# @J VlmN{$gAp.!妦x`gwfqƊ7ͬ3tUʿ*  򎙆$9J0UcM*˿Gt^_ɤXo[Sˉ! o!tq<W/I_)-BzنXUswOk&6C1Гc1ֆp(@Ko@Vd 0%!p6on?h0PW@ϣ\%]*o+=a)ʸRPԻXKæGs5߼_2ޕC10 {rX*0s5ܡAJnّ,F 5n$Y!PpFK;myG-FzK1T+H^&# 8^$qr=1cR^^Xͺd[z-&R r7'Ď+t-oUhц|h}DaNz<}- L`m]5;{^gQg!+0`P0jMY zmryKUyo_}+5R#h;3s4)#Isԙl.nv;q=I'dƿo.5jlUů<" 0 H#[+Av'aBdDJW:ӴKh^+'f6 ~I(0FȂ8dw <"ϕ}$  /4.~f)5~`}:( n[])L LәETxNլ560?\ uQz[Ck'0ePcd?lVIک}썺<2g 9z",ATkKIIwcw8C2"ȅ2^] 8|xSOWzT@9珅\3RXgCY*FP쭺M8#,8R)BPzr0|OŦ.Deʾ+.uU|aV`+ h[ZA-I8{RS L>Pm!4p>Ě2qln) ]_ʁbC]®+%ʬc'Ơ|qq7Tf%xLw;Ų|Y YNj|8FU+rr{UcDۥ0dM5hD?3-914,qgA Y4U8xsAeLE j[f'N^r1`g 8BB9D4=վq7:8"^ƬVѻ}i<]{";(X޶EԈ>5p#f݃Aӹ M+ Z$ Qr1vcˈ3ѐd=)`]Or p;SPv ^xLC>'X~y~}Y^b5"R.ti ~^f8ձ9*K:@0kcc =8󛚥LO}cӢN+Kד >PtW%&@`|R^  &ˊ/fq* V Q*HՊ_ xE'0.H3^vd;W0uR]D:z5+LFiiw߆bX_uͮu1!DLj<ͬ}ennF֗?O2L{MoFlbts|w6K|}TOKRHc:{|~g]I#"|ޕXmFYTx}hڌ=x'#c!g,” 'I@&7"Q QڮQThd`IrsC6yq* {83X/_S='gŨS{%²l5E;1%5EiXm^ErqWKJ CES˼Lhwz#L$\ڒiOs:٧nj*fWkI; id8[iu -d z0x#ۅRP} M@j Bjl>k,I@w|7v"LM+%Xb5gJl2gL:Aj&%SbC}7lϒCP2~5xmr*Ő0v)cpbe=/cGo8I M4'ИkУK24EY!ˈtq>RvoUx\։_PR=euZҹ fưx&:aaAϐq޷ph'yhɝxo}]@1ڿFvŇ cZJ0Pm_Zм tz忮e挽 Hg_aO>qBW)(AܒuBc!3x8%/`i)9bD3GP*?>%t6OCIJ&{c=LB.7}`*k@ '*P%3!~Gp$<,+R((z (wV\z8E?!-38V8˙6j~39Vf@Ĥ0wv%Kw1ldռ>ܸô-I e3l" 960m o}w ȱoY!>ŻnEm6t/ -ZWi l9^p-h<6&A7MIC.[Z! )YӐl?D29-`BBw =ɞ<nqNq`~ 8.Gk=W;.PWTۣazmG-T:{5dbEάyV1mn"uU.&]i@&3hO&rAk"?W֙:$b>ɏ*8:q%LYLAff3x&*;#ȮbydC6"l9MЬp|woiC !b!k "⪝f-<_2Q̜X6a.]b TVꢮmKV$[SiAMo&W'p~Ѝn}=!( v Pϲy*h)\YDڧު#nH ͨ/U5 E ?L^& CcEڹvep7,Uk՗P1>0K)8 _q~O~IKnt$:#vl̈́FưrUa9mqX;Z"wf#ͼsp4ۙv>F9*]ScM4~D _gbeSQ}um,D/1M&'z=x] "k4!ONKLRېm$\2T>Q ^WkἾɒ]{K{>NJ~ZF9?X@Z?C9ShL$/.+OLdј f|*] dQ&GrJ64.wIMt{mwW\D#~7~eR v&)1$C֑vaàS:,Vv4XP9͞4 !%C;5l}/bhC<da5K*|-5~S!aẩ9m9\K(/IܑahCeRseZM>@[̱(hE#:2k.C Ɍ}^@ݡLR꿷pEs쮄,W0Zv'QK*(4Q*jK^+sZ_ 6/c.q<N>1 "B'הAϯ%4$''PJ/A@8ISÿ-ڶ J[j4X\{uX+u t1ɩx5 aaM[j0^~\-5FIBCE ~d&hh3s=xDl`L8>̈́%Vp"7PrQ-7Ӹ6(x+zSXlNOP'|z?2h#wyxVŸl +ْ2G|@1ǜ<9p2QVrJYb7mR/N 58zQ~,D6Qis{#XF2TTGm2OQ5ʻCmC[pE>d~XNA=M ΰ⻤[fp (G~' m^onoOVBJ+7N`h"*3*~֪<}T 0Ac?;;>Zpa1QDyRӳG-xz礚?#q :nlٌCY<ՈvY䳂 e2/%sxʕK*o􄟠#-:-92q*ӑ[dƹ^ c!3SZ "pLPl4j{<7:q/qLwC jw fm*R󘊉CUV]*Ѩ%&N-2sr Əzf_(1ed+UN7[hH v * 0WD]j~p&ͳMkEzt (/+'8jL=@KQ 5 0dIJPlOVBuH;&g^z»{? Ig~ G&<SZ{F8Qof"Nӽ<5lxC)s bN #~m9!re2H1"θo7@neiMe>c:sW(fl/; OQHRg a/ ݫM4OnH6LRn.ŋIFc'lOI\#OZ `{aYA\"MmxTvR0fx` A3j|nTonc^=ib#:+O480 yet‚Yx0l/?/)xwZ`}l dC8xIU?yIڔAv䊯7Hpy_o*f{, R0X]Jsqpjc9RK#8Ɵ ҂uL5aaNq!ewCN]ܺ@I $ؿ E2f;=S!J=9[BJJ=@߁.xp6LLוq ~Dl"J+X u6mUvB6VhSvLBHs#G7N?v8k0_@lFc뒑vdxi%wJ;n?s!z.FME0r^A#/HNj>_ƌ^Ift#ke"ϝ0H\jNLX&ǞڎevDBXԌ`Q O )׭@Ifz"_#en嚖Nt5qfS*ۼ+y@]A/De}u~n()Y#Kewt6W ?6e Xl4'雽}LPgݪGnl,,#J]"gG0*;.Uws{vՖ4dmD/hZ 1$/a̘c,'\ z*ᦫb/iYŒ[Q+$py '({ 'M%36XcťJQF뙽4orwD ij35EkdK6t/X/4oa`hoIkNsX;3?P_xGV! "flDGҺ0XB&yPd|?MP"hyITi XpC8o7dG(4|h5 H,6✨hq H4mxvS@?@%nMꪪN1U鳉' Z'3o'Ve=n^FxӅ=&P>69^U+a n͐A!^oR'jntH &Y,B5Ű[ $Wm P.QgE[Yx" ~Hb ~yjBG4{筍];Nm\iѐFQֻz ̤OcqoN姻B"PrT:qQ)25ui( OP@-a&v&-_aJc̙늉Z|?:=++WͰrG d$<< q}9`KԝBf[΢=j,%݉+Ih =ئ lO\:~'`I*zoY@i2&{Ƈ'2 In ^涭5 @1{~WB1Cjټ_9K^Ygi0Y~TV'!*WY#IQ-^NŕE}~5V)Np݅*.WnTj%C[E BR g*.Nr>-Ⱥ%3W48GTp@Bu{.|k1C(],CdNˁ v]*yb"ǸIvȼJ9d@:ʽsȧe;zJ_|DB; hDlubDUd^E!Ȃ Ejb9񓒥^>|:cZ50kV̜dZP󛱬.a(@2+7vC{l?ٺbmF6unO4<'z]Ϊ#W8F :uhIP6CW;tNu&}gum(ڂƬ\X{e\ ^̞ߠ+lХ7a$y:=pnA)njjJ,/zNcej}$Ue$c2 bt^v֊UĆs_Y* W7P0RҊ^ȃL%DbA/Zb!ޞji:D܈lYѓJ;ă1.BˈPN#HvVV#5#IWP;%jl960nKa1IK(nsZ$RJ,Eval' ';ɜxd&wqAd$.uJ< tiځZ&0Μ(u5\\rAZivJ@uK N k"\˚%Hp>vw*N@MQOĮ1B}V;_f'f`IVR莡(䠜>;Sed~meٔ]ۢK2k7mN'0Ygo'p>5o56eMHް({k X>P (TiWQ:e'bQ"p#+Z񎀘ކ,TL,j/9Q 6[uf=,2KE@8GmΜh0=8XsHA11hBdiJH͘Q}9*WI~050"*-Z!?Me[Yꢡ% F4\:i/l8 wCʂP "N6 )gyuƌ,cA=l%@Z?h"jT_D O}O9hwT#05Q$<,pONR\49nJDA$B=~]\q-8yŨvtNz](|%jEKp݊Xdlz94cxa(>=(_zUh Egjn[!tLe4pTx-O%{q%Tg}טo8[p| HǀDW:C~vP#WuǭVmpAbAfquah*0:&q{ WW@PC.9lp =[h >ܙ^iBrO&bKo%Ku}Kˋ N#!Lp1ZxJwdОpE8"zf!Xw1Wn[DWSG-f"Q[NZ5O:rrTvD#C)8byb, )^ Y/;N˷=voٝ^Hu~΍N<ә~<8ѿ8]p}:fpc(7(笿d>LWBfEq%wJp&XU*ZbZ$+.tꂸN;}jg+a gKyTSduŧ:-< z/h0GS栂II2|fa;X]YE-Dz9ۙ' YgNHNQLCӴ/C"Gn&M(I>`+&W;4habu$(hb_ }&iXxFq݈Jz֦}' LcWrN*C!vL$U,{6=ōV +GYPվ`aʗay _ڥv%ZjhueN O+] "-أllƱ"OG`&t)Q&w%lr: (P]t:٧ $NI lR\#^ $&R~fGkkܬD5@KE?"3- ̧^㻷;z]Ɛ5˔ 4 jLe vo"d0i>1NOU# `$.<6&T>?!XIJ.? R<[+j&̭^xM%4(7п\ ~!K6BylNZM| 7DM[@K<)|13x(Q4&L,jw_3͊:wBsēG .B(5.0m`)o3?PrrZ*ZV:ˣQ-33p]*R*RYpwR.G|j %4Ë9\ .4Z6PQeG ĦZ[=a'"O@o'E >T4!&!SZHOZ6al]rSS`5z'y1z &'P_lS LBk;wָb:\ x9!_W[H">ͺD_g:Xnd}E< uR"$'jXݰl\O bN)Q L*Qe榗vmKM],J0omӒ\y3Ĩcиk;SocPbR[`հjEt࠸1Ȑ-m|9~V:!E7nfk,@XT =G˞8j{iJM-(ss^zU$XpU8^Hgq\tJ0$7>Rv5mPȠ-/佰1Kd U6s8L?e :e-z7!ڶX3QqFn%1qBhsUDR_2&W_B(ZB !r>f ԣ`;v~夰.t">2w_!sĤ3[uiN8a$Ԍ76Y-T]2]v~iiJ*DB08{4 榛w)usa{,4vvEa-caRgks:r@(X 'oOj萜@K7=m JIwU c=8Gѫ KDv5]r,+Ve&;-3=|)ȀI%2K<B};su G6c \x=rj;i|& Aw,-`eb }¹G|:i"b7qвDQׯ'_){.%#?|@XPXh'v#W |O7*fybQcjh0Kma|땓z)/-J%ͥ;!r6z3_ #z+d9n/[n{:h +kyZNw.9ؘ%'ڔ0ȷ8e )5)gQyt@5!NLOO^ܫM-JmR$NcỌ ӣ̢sW% ;^#U\6Ak^Gk$y(q!V啌 T㭺' MÈ>ZX8,J.-DD_qeQ]:(z gHn?6X5 C)b7\Va6,] 9DɘźF[=>ۜ2H(8#a黉kӍf?m%D858Ĝ{rñ#&B0bZ᪯JqIo޸Pm4h6`23x?ᰥZ n_B*Xyᑂsxz_P2U;pk둳f>$Vi;42Ѿ"_ [I\ʗ1\QIIoXb:OHx귂.^y/=Dv+߯aI''@}4 ~vY'=Ki(eZpӞl:'(e|zr./ɼcy< Y$;Nc6_glV>q-6曄 ,`^F<A;y%z4rH+~~4*bs!~)lj> rcAtzٞ#8 7] a(J5|*Z3,mO pK>f~X_Tc]0;|q1¥J)Z<| Od%~EkIx6O-Q])xqlbWǟDpLݜ0al^zZ>VnqЕيԦaUk=19"zkM3;/h2T8,+tyYls%uC 8ئ{MlԢz -.@} L=u޳zZ frbQ͂Sԋ Ctɣ*"'>#੾E+NWUkg ?nׅNQ17&PcLEA݆~PNe>"|UVvT2.^Bpܞk=r0꾅BƵsChP}1HpuFY0S3ڻ.:74#b;Z euQa^qΙiBbuա{}nV%cFjQw3X@n$ r/5 Ÿ7|XImş6!6eю;q&D Ae@ږo`ʆ6 B[&z+g6BHLR0qdj}8W/+)l2e9zifYPf~~w>  GGy3_t5hlnLf{zt(snQ~"KB{9'n禤kP-oB ]yؗ=PCFťY^_ABHÌ C~HnHWIύ"ʝ1sM5 R(h:~*c2r'qw9lhѴ̱ҔˇHV6Xi)[o5DjCʉ*a Y4oV}CvKgs+e l=4]*tL6E ! sMH`_K2%}kD X7&C]C+hZ+l"QsצS$jhUb/tϓ^mkIs~OL:Ġ/@li`Rv S棟C1K?dJVHT!&1 \ܳ>K+kZa 4. D/Wx-9= b)HHcp gARV T.Gu'1.*vud1h.;닇 p̗ڷqeh7>>oAш߾xxHy: ]ռ <]Q2ԢdjʝꐆFͪSA\Hv ^8@kQ>ҥ:(mb\%ΘeFG[ݘ]tFψ0Sb`t1G^VeV[!Gj:@]Sc9Bb`::9aܫϠ&WR֩:'g6R YwEtq#(h1c&+U~T1 |^rTм$/ ` ?"Յ_Z,qP5iC}L@! em=7̄ !ԣvsm) 4 s$ s=M=&<Y