mozilla-xulrunner192-gnome-1.9.2.28-0.22.2>t  DH`pOqp/=„Ul{aq% n/gncacbflD\gdtECٱ NzwEDr,n5G:SLH]LNi2N~Z<e'H=a1/=*팔XYdKZYyUjL[#gPDZ%6awXV!=B3o9(_() }$rj9Z06C87832b571f69469f95f2ec67b1f861b8da7667a3ÍOqp/=„t#u/ѷU1ء)r5֩%;e1+)j7=1@7_z"EQ]I] )61|L"FcDE~ق~""1ɩ`k&I!:0 {OH&Ը-%Ay-4TT'KŐ)x`NM`kmOVo}p`& ,v岂:Ⱦx) h\7QZeaIj\%(E%fI,O6nأKG&lW3>7L`?LPd& - YPT\`nw , 6 @ T  4Hx&(_8h.9 .: 1.>IFIGIHIIJXJYJ8\J`]Jt^JbK cKdL$eL)fL.lL0zL@Cmozilla-xulrunner192-gnome1.9.2.280.22.2XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.Ocb,build26openSUSE 11.4openSUSEMPL-1.1 or GPL-2.0+ or LGPL-2.1+http://bugs.opensuse.orgProductivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.28/.autoreg exit 00A큤AOca*Oc`OcaOcaOcad41d8cd98f00b204e9800998ecf8427ec2e7109555214736e965a23c519a88004d587e5b571367d20b5dea22ac60cb0d@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.28-0.22.2.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libgtk-x11-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.28-0.22.24.0-13.0.4-14.4.6-14.8.0OU@O@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.28 (bnc#750044) * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2012-13/CVE-2012-0455 (bmo#704354) XSS with Drag and Drop and Javascript: URL * MFSA 2012-14/CVE-2012-0456/CVE-2012-0457 (bmo#711653, #720103) SVG issues found with Address Sanitizer * MFSA 2012-16/CVE-2012-0458 Escalation of privilege with Javascript: URL as home page * MFSA 2012-19/CVE-2012-0461/CVE-2012-0462/CVE-2012-0464/ CVE-2012-0463 Miscellaneous memory safety hazards- security update to 1.9.2.27 (bnc#747328) * CVE-2011-3026 (bmo#727401) libpng: integer overflow leading to heap-buffer overflow- security update to 1.9.2.26 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-02/CVE-2011-3670 (bmo#504014) * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild26 1331913260 1.9.2.28-0.22.21.9.2.28-0.22.2xulrunner-1.9.2.28.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.28//usr/lib/xulrunner-1.9.2.28/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Maintenance:368/openSUSE_11.4_Update/f3adc86d6f9e8409eb2f4155b1b8201d-mozilla-xulrunner192.openSUSE_11.4_Updatecpiolzma5i586-suse-linuxrk}C/ڻm?] c22έ>'iR[=VGl ; },e8Jə/+(OcpµtqV37 X\BLg=r4DyE 3bZ2-Vb64nӝ$yEmOR#o #AM'#ĩB+G'nV|[?:N`j[5;̃:B (~ fOme+iv$X)CEk/!{Hp_a;baةo'O^;垽͊qj :Y'V}x•H`up5 <,u|Ec;q-ԣq͓ 5d@Œzx3{BYa4oWU}IR,C7H,Ш_jɐpX+qPjۅ%:zZ3k_wVN9\295/ 2IDp!g-KvY#$ Z,!^嘡7/[r+$P͵⬐<<(j h' dKȹ=h(/Ƈ:OY>4 \|ß!E+&z=?d41ط6z+6<珻.yO8c:!;Ǔ>ʎ\쳸VoY3/js/+VÖ ƪ a!#'z/buϠg*.Ey}q*4:Sw5yw{;HP6GCq®ӈ ssM8@c!)o@CT77\q8 >)H]'kj@T<䘆r36ٲǺӢ*Zp:r\Jok9g,-DƝu i1&O>>_rï!&q1Kfi&%ǒRb!*z dF^rdgwR Bc6CiM*t_[!AX5/Y[ܘ(u o/EBQٛ@Dr83D=u;h[r<}*> uZ桸2t2#C26kcuTQBi R' v@XCc*Tݾ&!)Mi5W`Ja)4@ԥv\G29}ְMfH&[f6.iB˘)+oqҾKڂX@MF;#jw\2tt]ChQph^޿ƃ2Qȟ~˂۝rG<}VyiՒ-[ޏ2# ĨfnJۭ`d(; {>Si#R ߃h<{ tlBGCzvӐr.ope ,[cŸ.;)ioL5ۣrLQǫaɲhyS &ʅ(צPifR+t"Cp|';:Hvv⊀P#99 SR6O'A {6릹=!#+P( At;^>Wc(PL~a:쿋(sQ+[l rnCBýfXgvH*(50h`Ψ-wdYlQ%ar0JքTu|Ӎ}Qi j9'a{jk͋kES?,k!ni!__STWdp&Wj*e  MA尸54{``Ldy>#8-m'B,> 6YL$ |F{Gq|I/"}F I4>+cר"C}_'iKN}mgN9I.UffW7ʿXz1ڰ}g?ӹKD&Ah8);?W'1lӿݐ*[zgʪ+]gvFLJCShGQË> G qǚ7oZF v!rZkzS9IثHl)8n7w;:UCRHm^zznBey}X\Yo3@0Y9#ݏ`$Tm_!s^;AQA2l{ Z\_U'$\q~5(bv9S(Y1?#] @"w?QlD녽ظRe0j!ރDbf/i= ?@  RwˈC2f\tJ Gϭ@ꦣPȻWp8JZl2/E #M@]ϹWo"n2Nv/YX;L ?5A0)Uml;c Jxy Ux\KjtoLiX]/+`xVO<G4UG*6-J |Ƽ!3}jQ DɬV[`lWDԭfzR45ZDԦn|#<( 1dS,׻A2Gy9S$;䷆mu1tA Rt/V ebUl>-?[:0#/h7"i"@8 spPwQhŮPkcOJM Gj=$ir* f8&t'liy tiܫYLax08M ]`UQ6&5>[oKH`(=߉t;;*q|c{! :?pT00(/8j(q})+xH>k# QfWm}fAvsܔAʟ i(FHe5,'%ՙM_%r:ϡT8E[L &t}J &|l&H̞$N.- H0P"GbGx\_sB,pwJsAlw* xpRKI*bP[H gCNcHL$aҚ^FO,CaG1(KuW\5JVrbdveT9ь+J%;{yWpJ`fu]˵G jԦ^Zwx+55H&7ү/rh=*2ujk>"IZ G͟ekx,hh2qFL"{{Cb~ot:(:DF+:d(9 ʦ :JYSj[V ~_LiVx{sHr2n!:=*;3QYWShqT,.MFq 5Cyd%erd=H(ߖרpWS[>.spMVȶkih$.}'Fٓ}-D?aqCحH3G#b'db 4[hem?Mچa/{Ϩ&2HElJoZvӞni2t%<]#(Ѐ~7>L֌ݮctt?IMd.ۼXi"tT6BV?`+UQgYcxc]== r_Hu?^ؽhgr,6j֎S${@ͦMjܷR屆,T6,W74'Xד,#ūnc#ΣL>(Ip5>:hA}opo1{HS أ2/\ˈ}oޟYI5r?D}ga>a\Ki,8Y*5MVJg%d= Pkx"şMD,6d4b;M )ry8num&C".N~_ݱUflJ)jeJ\HfD;*X|[:Um~p-XW&Y8Tl X`a HE0&S ؽ D{, JDq_4+Uj0!Hν"JPE @;'A?߂3Rz%0rBtƐ}xff27k8ҳd &uv2E.>MK^〱=X]BvBY!Me/eC:ۣрϡ{/?l?êX,pD1H[X衲Y7u2vfzEdmy9IJʯD:|E1JVy@|K}\|mm}gFzKsjT}dF˛nIY%3K0hIxKYˎl(iiP }O-gXT *Eіcj̄htȎY[E>e?x2+P*"ɂZܡ& :PC=2'CmY0XQ8 G+i 1͔9|md5@\2;$ƹfߺ='r.GaS,K$]!iSȌ_P1T0צ# ^ _)bջ|=^M# qk ip̺6G1>Mϑwr$WX"&'PxMAn'Cc9׭SǂV^!t9PGle2Ĩğ%W7NdCJhpJ:gQzӑ ڷdk~'Yմ)Is^~R8Kg@w}dgt0ִP,2\pIW,l=b2JJ5?zTPc*zHE%@^f% nv2 -t֭4~pM36⮵Orݡ4*AM5q:\՘;j 8FL gkط &뚵7N|u3}"eqG;>nkxi#JB)/Էk'P`'T&M6QOۢFA8'_s~(~uǖ6B j|n0d^^4np?CK6U_oZ !̑8tMf37gr^XPrŧUS 0M'mSoG;ApBU: 8L5S kj[_t*N ڑ/5V8S{XvT#,K]5|ӞRIbɨiT.xh%[Pԓ@mhU] 0f$5`GuigGTl4"jKb.cKAu^O_#jX3T ʊy]׹sҠK9X\"/qLkǐ{(3c7ASkO!bQ- &uM"k+I]s+ҝRaw󗟇o'jq- 7:ŗH@?i{`C'yF&o:AnH-RJϥUaȪ)tיyTQcx+ʰ9 zjd5|BD2b/5[ lEɁ͘ 8 )9-rtjX<ݡ4U)..N}+,Ej&bMqA($yG;_5gnlBDbsÉ!/ |k'qHo! U<-S023pSqQ~'U(F;  7xɽSp `>^E-A׸b47fx@E,˱][S2SW%9]=MPvRvD1aN6St\Lz1U[u }j^WOee;t<i ZtAจ,ה}™[Z ::kĄ3O u ]m?~C$ 3f2q?* 8#M]iMS>|g1X! 9ք-^M? !FnXyDC9Srz>µN+KC%e S." zC`BokPń(O=') S~"{",DzTt` 5[y&I9,o|"r#pt1W i5RTaRLs35/*^S#1a$õ?1[u}r[f'"' N@JVLqcZ^Z'V8wAW X߄(6O Ŕi9gFaMaguUcJ_1y-"mnoߙ&Ȉ~|Z F-M\={bvPb@)ZP-( UPg%Tj! a_lț(:kʉ`ˁVkOoܭ7DΉFUnbKPhߑVrt_Ć&ome)!tWR$hڏ瀧}BN]FC(2taḫeӫ*>.)[CIPh\I@H"q>.E_1&چ 9 5͐@=Wā+.z V]N o1Fn)a=W֝v' 7Tw]@8)Ĝ~/plCXdAo3lh&~croK*m^YR݌KHQ@R]#n5e:>UuoYϬ)A0lPձG,1 tQFmP*cBHxAFʌ-Bi1h"+ zXk䁎 C'Ҹהo2Ww@! Z]"b;=SJ˚/CaT\ḫ\LkL}ITȭL`{U:Fy~+4DXKna W濢'oAJ&-B nnm>=`0[Nř_M.1ǡ4RqJ+#f~oW/ [Aիt:hu21Ԙؘ}q'IV1SMX/{^~[x+O˔鸪ɽ^`\M)hsiz )R_pYpy⺿+[ۍ.6?8DRvoV"Դϑ4^"~H;" ]K24v =_xm9Sdgܳm#;8*ɪ{'g%=3NC)GP٢['hZr7@z(Ѓ5٤DvEFc' zՉ#0DLQzyo eKixAz Q%N k5 Z%4wm/X`_hJ(P}W"T6`I>^SB;63|C6/9;y'Ha1˧]wL97*f/9c`ܧhWb*ǐNz&(s?Dž6;)*` R8MMY[Nz>[ ΓBGVfЉoL(QV -Dq2n =O)Ks% [-IcK FooAlj fa2]DVuh\]Jȍ3jlq݆%:6g~Gfrj鼁5ΏџkLjge(##%}TrHonM;<N.queBk|"tv״f'q8攱7_1ĪT|0ZJIHO.pxW z`'i@CF8לUdy͒4ƯW>=Qy[J` Pv?xwR1{(.=?EA3*ۜmCBp eW4vcwVL!zu}H)OW P .eqy;5g~5/g*RNatb)ϙnƘ(b&z7y_@ |(P¡*KKֱ~|Jxi+|slFza(Nf'\Q "S\zeu˕(pN$"K RM%ML;?x>e{Z҈g_ۃsg?}j |`+\=k"{y7KyrqY|fE(Gmޔt TZ{T~[h9vt_uebBUxu_\'>_lWY:$_Zl,uDL^pRxi6d܈8Ơ|S*dJR%(~G`<5ҿ=Hl2|jjrj-5TL-TP@ PM2;lA!i\%u52lඛ'ir`J-[9I_-8ط%ᨵI>O6r S^.jVxG `+vc]$e6[Z 5o%BĎPCϝpqW}vW˅*+B?F1(|2M)`C0ӑ Z &'VaC x@x,V7|7ky=~ݝ)Ev~)nzGH`{;۷ yQl2b{ 'iE-"f&񣸋$ߡ|备}m@GF=2elٕ;08-Dr_ҏ\_ E)-|Y%kOBa,ॄ]i1ΜF#"N%}2uAkIP PXy3If] ?Z[m.o /LLțZ8%Y:gJ>ƾ!NUkT+}[.>>z6QGXEA;و"_ $i5 @Yf;l-O8$MV w !}c쌣Uؗ!%{O!avX3%G*#] sꡁԵ4ˍ 1Y&5A%b̫ Np>u9+X7ewA26!-i_2K{8%˲Onå:0`VIpm+; Wr-B#\u"_5x28埐[w@_/hhӣ .AD(&Xph*4 E{Z6a)o)Jo>vzLko!y\`|Ùo$^ʇL?(efҟ,}:Y~11iu=VĤs!av#1ʂcIOr-mH Mcܑw@#5-ҦsACX~B!Ui5+ߔ=i-'|tW.˾c N"0n .,[]/jS"Vs/nloi\ьg^I$n.H6wD֯MzqJMџ}e=Rkz?n_)?ԣo/^^&9*6oA9_{a%=ا8鑵XR_1'fӟz`J;[8&F P'yTLLt qnjGIlOk*7}d䏯2 )g;g=¼]e/ i[V8 nb۪u?}Ō䏺r)"T0o'r41$Ip,E@:bbZ ~E~n#ii:y),|pN(D?EPçf6.4#0t#fs[BW-y5c>פ|nukSVFD8, /6 %\Ϭ/)6x}BAhf(vI,L:f{acsWGV(esLeiK7C`$q:\Ԩ]E(\Ia|K/zqLZ.,v4" bS M[=% -hқl0zXE?M):Vg&C+*囷]  >"1!!3[Ы+&eJdE.SnGL!f[D6~3>~YX=/1 J!}ZDdb WK =D"c0<~B3s쌳!4ВCJn:rbjCU2FZS\>ߋg~DREw@Dӻ#o|%"]r2Gn.c˛)w;h=m #*ae%X|LmBP[g˴wtK >{d#BhQVozJ5N;/#wZ I@tB8RL 68a_-D#-p*@2=u?epܠNKB)%!` v1"DW(\ g諝\' _z*# h6N)\F{bHΠH@?-9'Q,W!ZZ\04Nމn|.|dx;q? ש`z-ydafMb;qFlwFY㍔z;1ÐnGiNmRsÝpEAV0L6zCGC:^^>G6g.|zi24kSpעc<wuu2̪ɦGcdcu8Nq.:dE8Mxe.^|c$"9|Džڳ,NUFv)a-xaUa'5k. ᎌ'qOM0/g3ŋUЅ_1p@_6Ҥ+ TTݕO\4(GJ$'9kKdd" i.;G zML]>5scXGER Al |*/=YWBU9LTk{dll$/d.qw$Xw|wZrKz[ hqO_)jq)Gz~jQG }jk~+E .N}엙uf=>ġl,W?|dGĽ}i)<oI7h](d/DF. h '֟aSss6Bsk=0 WQU?"}-D캄InxR P3]G-ePH+h!'COB Xu~ydsHfx}ix<@35kxɦqa{M5cr/w=KC@w0.J7= \3PV?·`o/|Y$$یg9v$5dl3vz~]Lra~Lwu)1\2 qJW,,A"{*7d5=ծ*of^)KO\<*Wpl)yC*VCr.dsi/$=,xz@(UlI0昚5-:&KH̰/! ro",j>﵈~rL8U8Fyeĝ1Y Z M9u#T*2X{o!@Ep8i\c3WXV 3:FPgla+vA<flÌ24_Gc"( !lɰ(R;REI_ X[Xx3:$h$"dӂ'.&MƐ1ZlTZ2oA\ky`;bμۭjs Uh*.sJ^Wv,e71xf#6txCfPN,G>,M{bۜMɾz"b1$'쭘GcuB΄'NN>#G#Ydif?}/9&sG;cA;g -&=ZD]3R׉9Z++,I?5. ՆћOVǤKt?ummy:pĉ>1U4@&F`j ;\jҽ՚QI͡v@T_rnvEO֦J}F*JZf|R܆}0Sd#1m"غHyL*֦~"%*^l{+R+e8jءF-F2nʫ7숢6ORoJ2n^E-/fL/YG>y-]ɲQG|Z%Tvuu(D5Xq5/jqXa]/ :NSXPGI؟3*v7?ܰ҂Тg6Y.QtH胸=3L%\`$W[#ߏ_t7XKj:Ub좆DŽ.6 GR]RMFoqO@هi>3ݩp CXU/GeV~"@avu?;hqm*=}T%He(H\EÑ&VVn_zDl}ȋB^:+E| 6f3{tH>|ًGXH`ܾ+-+puŔՁqlszW-⢈ JbI A`e'/TR.hܥʷ}IUB^n<O?du]a…TJwW{YK>.Qa5YnVw8പpCTxk &|@%R}e(ځ>4hKԎoVre~FLIˣk(fʫ+#62+n}f7OoEJ- /Mh67A;jD0ʦPV*]ޯV3GIi86_Ivd[Q4V臼v{#d "fy%(KͰe$V(ꂣê=аxvI U@?^tIipʛb?z j7s^tPe'>⮱cp^ƫdL뛍M(Ϊ7x ia1QJ׾L&rS.n)/ڌ33&$B95]QfF 4v{] (dj|6F3t2\1H!A#<ӗ/CXdžI}lU෾ ~qN{C9]`5 WnsnsҪhkZ{r4Oh^G^2+N{50ժȠ9m@4Vŧm0̸<>h.nm0 V:"s2;Y:Ȱ7B $ ơۙa1M C/-dp\|^0ʥ{^];ĒX HJVXsփlȭb/4gD:ojǬŻo!@?qIN߅[WcO!ȖyqZ<,SKR>P0^ {_%¦Q&?YS5V3Yy],R{+$#zS۫EEޙ/lC7ԮtL: AaYHi>4,wɲj>Ϊޙ ]zfw̟ j)e0I¹{Ǫ/}6H('UIс69ʵĚVɳ!Q UfX4)fլIC;B7g!o4Vň|`3z7؈2WTAUSyF:fgd74ܟ )@&v.EiFF3i6:/43E64EvRKK{عayT:C{9_۵|ɝ.ɠ?w94KH.eH43a=Q1Iu`!@xnB.ܕyK&:6Bqm3dj ?_afل8# ¡cs4Olgɍ1F?9,ukuweQ5fVV+ΆJL ?$;;Qv* :|;HālO؁#}N,,PJAgXp;6jTܰPѧ,6%D+6ǶXϼ¥\O pxTXӈl?4%ؼyE5;;[$*Pe8&AjzvKL4SI8_yIz ҜN+-%K"LdEXd;9`S\C鿷C O>b9•M*Z|9 Ǿ24鑆  ;n ^2SZ_9 #=~LݭЛӁ9b;*urd7֪۬a,MJO*ZSFgF\Vt9܎a˜a|&=%YƏ]" }p6劃L?\HR c9+:RO\y;hc3MS)iJ;n/h*a`KO4zjKR?hۄ MEǁ?KOGҞ8*328y-;L`RBP,@G$sϣrb_pnrpھRW:5{]͢FGWR;[l84?8{&$jN^(_&m2D4]'6?jʄHEe? 1m?pѝ T7i}Zl4SHU2Ef8Jt;5,y=v *ơwhȜ \2f-;?RJW3볞edtJ# tqn  i¢CAK4g>dE{6%ZZjAq?خٲ=Uպ0cq $v]DFx)Hm:sl=܅;>\t='! NA Sv&;6p.ePbzA;J$_!`:3L17+pΎ4AA/cռ=ܮ`'͍&g:Օj?NdP/Vy\P6bd\ Ŧ ?VFϟ˗}O/qVKfJf#] f7PS: Bs.9maXN׈!X>u@w>41OGD9dIKK2b7{t/Og'ZW}a0Ƀˬԥ5e[YH6QTB'ڞOڎ&zꄙde^ U;V3g̉1Fw#~`O#-с>ac X끺;|aoq_/ +ݮKtLGfnK>6zWO0~- )]Nď}4lJ0h)#tw[GG^&-2KergQS?뎶R:M>N7KK _Jh~ˣ_M0o<$KNb$%Uc(/y">ICK .P M3`M6ea*NNR'6q^+y H(wX polgzQ#oFcX`j&/[K@֓NXXO"I _VH'^7td}?[wj΍1eêTВU?g)/..u{ҳ8I Z;Ԗ¹ ^|xGC{^VsգPu8c1&ػX\a92D}fAmSNTS(bnnc.pWk D ' ߺF! ox4ESb28XQ+ ʯYt qXG:|TO{m .΄^]UBge8G+j'{AeQJ5r-BL~ BeQ!s0hMh< gmep>D똸b K IF){ ^TwaG;cW~N$ :bD^o9ۇ\!ӸX{Qd p@0Ս[ȁNH)o׫'zP\90":xB6Y/J kzL4lŸY`b~&`|Ĉ\q,ks'Ww"y"fsǁf Ӭ0q1(.mvus4: yhǥ:SJY[6fʈbx6ZN`mx^kV #pV+v/hqCPǿ O[@ӓpM8(oL, %iHJMZabz0 HOpȿ {`.vOHOs ]!T\%/8dLI߁y"'f% 3ǑnrD+bJwOmUz?r6p)m+Jig~jր06򩖛)Wdvm$=#W2O^qCܗ飂!}oQh8M&vw5Suq7&%w_\e`:I;mc X[Jʚ5 cNk?\dUgX8@?eRLЫ+U٬U:nih1Q4U?[I@iFqe[`-U &|0o]q`qDj?2wy>yxS>jm""Z\NZgqs2eRņz 5 بsձ6BPƬq k$O czH̃Q"T'D-rLDEi]NN((Nni9# Td6㬓N(OlzzM9)|"2p_E~DȖܨ4u¢.'H!W ln-rҾKd½LXBY鋼n a?@5Yj n 2`ƸȐs>:s>ոK:Ӳ5DLӳqo{8VCʻu lI)[RyW}UV=;H{nډ}+0\LCe]W][&ݫk3;)Dׄt]9X\ }飴S V98}aEWI2P8˺_I9&bՙR ̰S5يĊ(b ũ"[=,ϙC>.XA:TP2vX"w>,0YP4wEQDjW>ȫeY.c9̴ vK& h? hV9 (hʀ oq%{Ht:>JYS3j8iSmm{=#eӃ -nHn)ƋB$_鰎X`H$t`/^Bq X[, bw7Q)UY Mep>gS&zXAېDW?/+" JM8=Z@DV/ՎdL;͊\J}2 WszD`n}?)ɓ]T2̅FO5>w0ӭ{>i : ɚe_F~ȍA6鵚0ݯyK~2/Ç'%+Uc:"EGR_pn&k O1kFؒdd!2GUW(B{!eEXlÔG~uD@U}>a+^Md7h3L*q:PN'f!70IŮkE#NA'=V٣dͧ{; I=h>etn_r f #ґi-#wjL\5!#UouV@S=)8>|Bc]SإZ"jhQ7&1fN `0h\Hǥؗ#~u|D@{G:EReO;>-Jze^,56ծ, ,kr g㺂3!4mh"pSu/Y\^a);O}Zv[̄~Ȥ#Qɋi?t1NY YT.Sf\+wM9KmW~-H4A)" ݷm! "1\ 1D O9Y2P U7(wr'. +i ꧢWG:"зRSĉ 0-| 0MDFaKa&qTEqoZ31ØeFp/YASNvTP/6E]@Y2~#Z̑kr[wSA U,]Df*ΙVP_x@-gEbR^R?.97Xԣb&"SS(`X4[!|;~]rU$۫|)bi{Rk]R2b&>4kƌKϸ*'Ot6U!-Z!>LK$OFsA|G)h"tlC#t(<\b~۹Eq̒nxQIz5ݼW8Db.o``:0 Mb.7з%d|&CoͿ$G y5CW-p0of@ Qt2oH~ ޻*D &I7]0'=JPv(mf=/CݖTiUpt`Lz~Pbd"8>M3}V{'"~11Di7oʟKvF v싹N$"- ~0<. \1|'y}Tݣ17-+'/Yao,x7Ǩhַ6h?gnAUo GT9: hs2k=,i2YEgٔ\ỳD{ߦ يIqrR994C[#vXHG!צ ]}!PϮ[x7utKLN/3f!(B#icʌdhԂk0'Ⱥ YO+F_.'Aܹ"f]aރצ7NDK <wc M WsQS˰/Z ~ p+4T)Z JR7 nIK)"q$}')G-]Wr,5V[hB}";-z~$#}nFؔCEj >G"3/qp:к\Lo:(xAٸ(|3ر۹U]iR N5f*+r֕(ýN"j S=J="mVb^LEND2Gr_qTrH Žipy:m9fB”?K>51myݞ0{]Bqc/:?:r}C-c:;Sdj5`̯^c՞zCMw X9OX@/ʫbN $)>6P9S`UWUib,vg{8ڣɴܓ _Ko64QYuZXhHڧm0 drb>QGq=>r$z [6a=ªzaz, e|Gįbhc\AV"I0>yZ 88-*+cʳ^H\lUfFQ''Lm/c.dCNe@Dk>v//KH14x8ufύ޹7Nm:Xo:(w8}AˌZ#T#=*iOY!O,GFv6/ o\nI8yǷoU1Y }: ybSu?jcTmvQ( ^@;L`^jxW#.c\ g_o4Nx$zȮ*sqkߐb\+)sQFSxV7;Ϯ?Ƶ$˅ AXXK(u;ӧVgxj@u߰B& ,3 { XgkHZ_ Xd0y.[3D`iYC0?RXzغ6pe?5eCr" gU&v::VC0ٹ#>Je`?2-&v''#՝= @~V!}ѨNҌ1"Яua]  ]2+\h }yV(| FQDPT^q$ \"n$$}SZٻ~-Ǜ}hy [S^˼׿PݝN7PḿIG+M=HaLL̨oLB\96JaEGܐHvMmStpR"I!gX P,zjQK o .s%?ܒ@O-paR"B_g@B#5$}m5NXLUaP: 0Zy6M%j9qh,da'*CnJ9WTC[X'E`J0 $JaۀRp66@ 'ol'tk9oRuƆ߁G>>Sclnb?rTVj{K`_L5\r,rJA,>ψ8:ڍ,׶b?܌@YGWDG.TU ivrʄAeˡ;5 Giji;貍o,6twUT&RKxuȥ+lv”TVUY