mozilla-xulrunner192-translations-common-1.9.2.16-0.2.1<>,QPpK\/=„ Y9"2QV.f .9.7ЋiDQ)Fۂ~? ;u Hy/Q72&;N@^j!zEiŖ=#>hyܐ@_ S?ʹ)4egt=ᦢk]/:: ȓu]KpaBab^bX~>tx-L6b d Cd@`<]mlK!A} R-.j>8F ?Ed+4 : b\`hlz 22 2 2 H2  z2  2 t2 n2 h 2\<P(8 9 : B?jF?G?2H@h2IA02XAdYApZA[A\A2]Bl2^DbDcE]dEeEfElEzECmozilla-xulrunner192-translations-common1.9.2.160.2.1Common translations for XULRunner 1.9.2XULRunner is a single installable package that can be used to bootstrap multiple XUL+XPCOM applications that are as rich as Firefox and Thunderbird. This package contains the most common languages but en-US which is delivered in the main package.M build26openSUSE 11.4openSUSEGPLv2+ ; LGPLv2.1+ ; MPLv1.1+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.orglinuxi586zfp(f1f6f|f'W_W?fsfrffݟfn@f4ffE0fgSA\;fmiAA큤MMuMMMMMMMMMMMMM"M#M%M%M'M'M1M1M4M4MGMGMJMJMMMMMUMUM\M\M]M]M`M`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-xulrunner192-1.9.2.16-0.2.1.src.rpmlocale(mozilla-xulrunner192:ar;ca;cs;da;de;en_GB;es_AR;es_CL;es_ES;fi;fr;hu;it;ja;ko;nb_NO;nl;pl;pt_BR;pt_PT;ru;sv_SE;zh_CN;zh_TW)mozilla-xulrunner192-translations-commonmozilla-xulrunner192-translations-common(x86-32)    mozilla-xulrunner192rpmlib(VersionedDependencies)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)1.9.2.163.0.3-14.0-13.0.4-14.4.6-14.8.0MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2mozilla-xulrunner192-translationsbuild26 1300898003  )%&+,-.56CDEFOPQRSTYZefuvwx1.9.2.16-0.2.11.9.2.16-0.2.11.9.2.16-0.2.1xulrunner-1.9.2.16chromear.jarar.manifestca.jarca.manifestcs.jarcs.manifestda.jarda.manifestde.jarde.manifesten-GB.jaren-GB.manifestes-AR.jares-AR.manifestes-CL.jares-CL.manifestes-ES.jares-ES.manifestfi.jarfi.manifestfr.jarfr.manifesthu.jarhu.manifestit.jarit.manifestja.jarja.manifestko.jarko.manifestnb-NO.jarnb-NO.manifestnl.jarnl.manifestpl.jarpl.manifestpt-BR.jarpt-BR.manifestpt-PT.jarpt-PT.manifestru.jarru.manifestsv-SE.jarsv-SE.manifestzh-CN.jarzh-CN.manifestzh-TW.jarzh-TW.manifest/usr/lib//usr/lib/xulrunner-1.9.2.16//usr/lib/xulrunner-1.9.2.16/chrome/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/41d37d092f3960059cbd9dce0c348350-mozilla-xulrunner192drpmlzma5i586-suse-linuxSdx%ߺ@Sy?]"k%M/R^rjae E,z5e Y!˗F9Dw{Y\;YF }ފ}UOa?xبZX^Pt]1&&-7W;OYo7-jS u BKj0&e4,6\!kYul58o 8QF,p]&4ٌGmⰉZ=?1P7΢AfJXOfE}^ƄWawIN( 8;˭S1/{&!*%khJ`~%CO<ZtWndZ ˻y\WPkV΋]dq53eajJ5b("c})s]%E&oM71ـ4o;r a8"2 * :]|6 ڽ;'/uP\CJq?ַcmeiXjm3 ~vaVsZVն`Kchpbbo vҴ!H8̓iBX_QLS"Mqk)KβZ ϕȉ u| ;/,7|KЍZ[ ŷ )9Űy{Թ yAjD}O}&}+i!A7研sz!Zmb0jiAoӟ{%#&WWkK#Z=1TmC6}'4Zqy(uB\ϟE Η]bhn2j7O!$RG׹|)]4@/hyY;Q«kܺ}'t8Fz*NI .CQ9p>vDEwZ C(ZfUnte?ddJ>nj3e(ax2*.ndk1}DbVrb"[9 XoBk6$8VVMzD)-kU gm,H|Z%WH XȻ#iAe%/kd"ZᩩQ0T;ڗk2Cn b(WN]7rjS3Ӵ}n!h.=㎼I=+DgI]Fsh"V3Zk?)w l [=~4vhSHm VE|{ݍ۸ zG؉5QAt֤ג_OQ|k >2$)zh&lj0V?\3$ ^FPL? s<>i7NPRƎCiv0ژ 1|dT_y*6'Ķf6 AxYoBmk3%>͙_dCf>80 4hE#.i[n;hFÿxh9Bu9/˦ A Bh]!8 8@ZCSgJ'U&l|ȳt98#zcoyQx2O)W>?s~Al ,0nT:oϸ}ApN9",NX=ҔGlFX5y`ya(ɡ7W'AпJIF D|w5_;ٜI wɤF(߁ON&.HN$/ ߵd( OVYάb'ټu[7α;Y) ^Kɯ_b^3_X)]ߟԕtn֬,j`ƒq֗9+N15ΦM{]U0(cX/ c.)ml!kh$"#kj&x8N]7a1yn MپoOjn1>ZNv䜷 }TPڊiwU=gO)luD.PXEu%[*d<dlސ*01{u52z{Ediscyi=t/.pڣy4{ܪ^cu37pv2тQ]EYnn5mdw>TKVk"q+p%8@Ate&i"Xɲ*U'AYkۛ*mMKz]UJ4;j W3Jf%|{#P^wb1 ] S977';8p2fN;љmrQ +\bfZR“f4D4Ѐ  Rt'T넌 wvV͹/*mG܀(g`P BϝD\m ߖ|{S vѓsٷ9Agpl,m-oZ'W(Q_H_6 Ho,fY1JN)yxs5XGL-|TFmr [W3 78ս`ZhP[IPk=c|YC]o$,Y9OqʂWqt >2وϫ3JqaWPM[&S2 auA|Gwς, G#+Y5VrOh\a5\ߘ?2tEܿAD;P1SA5kKEp|^ dkHY2=NŶilx$4oK2+E)m|B@Fwfb&t.7>T?w΢0*㘈毹&߅.4j`Z.;5`=\~LnƯ52+ɯUSIk.At@RnA(\'k[xse^51F(z0?i?p FzЀ]J05 j>F[+](opG]Q Z0ؤPS{&]jj6@So[Ͼ1]SEFP EI_އK>i_i|< ";eyNh+]qٗQkz:PԶՌ#Dއd7Ȗ&w"啠;3+yz~ 40ʚnӣK.(YZMAD帏U"z b>K>)v0 c= XZIRřPh,HKoߔB2Cc _qMdB"01}׈i]Ӷ< $ uFxCw]Z殮VX_Gn5]t ,/o\s{ e ^%(Y)P >ĸ7n/̒w9WbZ[;սgsvLeN =YRNf揕[spbJ q~!jiwAYݫd~/bCv?3O'T74y(qÊj4;?AݚűE$pd8I}۰l)9 ̶$5Ӥ!>C?>laqE3y%6ݩD uKTG.DAN{tHN :ʋ8BpY}Bzdog 28э)93gg]'qjF-158?"VPXnϿ{E.?=ߡgbvK5'NiLLyT'-)Pŗ(xQJuǃ} βorXCf`hV7mP _3݃^.>\ >i2'\PyƇ֪lLE.(dN@$7^,׿d#'$g=:p15};>@+ !@vc=R kxXd @s=az% Vggۍ'| A~x`e~;f`s*`i;bN\gxhzגM0hF6O|,{?*#Gt ݜ۫d1eq$Փ)צJmHJotwAr>Z݋Yv0.Zl"@!W#| )1 MW `Z HSg9=~6=YsP J< ykk_|er&FdS^LYۊ'! ?:X^.r ꭂY:*]Ճ=Ο__a֦(XNx % P $GMdY*:N|Ғ­`;D+92R% s1hwQ6(XV#a/ovRK+j16F]GnreToj]pO/|Hx-ZReF gO4"S}]޲(6Ӆ 0^VL$Jwv}z5\Հ WX2+yVL|Fb0ks}K ,X{Lt\L:$zW);8)X8#VV %qL, p'zRjfPT}* XVsJJNG p =ɦhԴzAڤ`6궸8F+D 0̯Do8;˜YX2u.oI[^8'9zȧ'^~%נ|\͖&i-XR 5^# VxJRJYs|^示5k#XCO*gCK0#%LY#WK~g@W"aĮFX6Cf+gUDQ.p 呖NjLGں'{ @khwU>`HF {u՜K`VدXGK =-'yM ke~pbܔYG6A@dSnf#Vr[8STg+^ȇ9+1z~Ktdo0kXզLOxl7:OjY؟շ7\5dWY1V;܈W{+/+¾Wf].&x""*KAwh|VD#B@Td-8Ҟ6IJɻHأgY1?J1ǁ ]~(HOMWsAc{G2"Ҥ[&unFKE^հ^DRsUkl#U/h{ü; |K?1㪕ԑɾΒ_O5]a6eG@F&Rp}Rzϰ"{_)\EOd_~,&:Kk,+X{ MG&LEjjݦ~"]FK8x (إN $PZzM Y'%^juu},,\\2}z4bV_($([Z`CӒ?W1atay}%{L)bG 1e)*;G#sYEr y{(7 @$/Qk.HԎ9EOoĵK"Hb)Vv10%j d&xpY[w):2^05b|呅]uN zrAI pΉ3CLm1Y=w=p6sANRׁېcGLh=+,A˘7ݯLJG}l#CaCOL:߳iaҁi4?'.`|-~bQ3YQeP_$2nqݹD* x/bA-I# ~Hp (TPHsCm[(* =Kiت U]^C\ҿ|'dc0hJϜF8c^=ݢ =HA MO@rxSvbdSi!Xޚ5ݠ6mQ5I /(FI"(0I,s 1We1;X!5gRX]YW.5P\$ j59Om}K~}XBn?G瑯ΰ|qEL 6]5Ԋ+g~h?}j!8vҞ^&D iryK)|97Y6|VzB?b1Q&{Re IQ֔'DO!G6 )i9*{`WK;_~Ĥy YNՂKrM7˜\5z4.=+Pŏ*Oݚpvm@=QQ]|/o|LN+ YmşGr? G r|Ӱ-T9wyJl1G *q׼ .%l,îNSarvjsE ߾ &t%*&8F%m^ӓb%4^۱y[_ƑT`z6"(ܗE IYC+1a"uDׇȅ)|r<,e77i.M&K8怀[1Z|ufc}s9$Oq܁U3 ,ʜv>W$D1ڑ~ϼsXi1筮li֮ӡ2xQ7BJh,^&d*$۔ib#!NWa.j#3tb! !*QܯI0r]oƟH_a|RZZuoR2ʛǐ'_/sak9pHQYԴęf'9vt<`J?w z|9q6@{w66FA|pQP}UGsJ1Cb>䶠iAQ><䩮~}xs8H}b &vc%"]Of@Ae#(#xp:wrE?W+Ch.*H5|́J6*`(fV6ʵf^FQx_|Իnh1jEI-ϖV=ŘgzjR(+ߥ+6bt. 'm3Cjn=RƏY~KTX#G,ws_fS%ߕM$96[KJI.߶@6hK.$sˈ6rEJ\ҺbrZEʸ1Jr9y@I.L&g`B(x#uw KCx=G~>ދHҊnK/gt7R0qS$^j"ʑfJ6OAƣL:$;*_3'(JS|o'=lBAךɋ9)sj"bm)Wϯ|Yϫz P vCńL1Kg$(NMmu:LG:vW)訝;^n~eFv'y'Qϣ~Cgm8u3mTG)xd֜;P,@@6 [YUB#.x-:u/v&0GbN{ð *M :pinJ fsZI/-t*O~7! 0/~ ,+ӭyw|~HgYFVX,է!V[a]&[OCZʈ̒m3b`ƜdX817JkeYjI>B" 6zTM? afHb vT V!?H_ 񙀴-\gz{s9AΡgB>!u+՗@U J.a#CPog9WgG-R*₄`@෺%7 ңRڨv}z\=f(^MHR7Se݈}ԦG'n]0ʤ3NV^*NEjAd9O4mŶE*zLK0èҳ^Əݍ(݂X6'0?g;>,)\ ~*`(h%_yd\aJ%Q.x]`LDLulSR,r,S`K{]-I"v,PKN*Dn{ >@buɂge9Z48#Uy!͒'%G/n-->hȮw*(1 #p]M"h4naEږnAKוUVDl7:nU"#[h)=|apR!wYT;S6)WmԄvq8)#ݖqlbm|QrIm2rjBoY*` -t2mض.]$?NK姃+'lY ッlOCH{!KQؾNY?][k2h̩|\p3Oq@%` Ο泛pJ'W 6{ Lۉ=}z߮9ɹ z.?YjijnS?Q'uW1UaN6r7$9Y[ S_w H; ,L)[aJ@0L"g^U7=KČ՞DI6|W>~ $`,o1.,^,b:frLsxBwCA y5)cm+_e2$  +nHQz=w(FH:JZtv)T%9C\}{>:Wդsҧ?%*O_`` PUsQRMÉcjP++&N}PޕOՅLG9Lnjm2q7p^Z& ׸1x2/.aLIi,TIиw^;]~/qm IĠ^Q=˭hj^yqx=!cµ). N$PcicI]&*xHѩY4Pq|D!:'H~5#޼Fx^]7?ϤNX;x&th4):c *na6c g%Ά@h*RķNqTo+} b+t1Հzx$t,~.Զkqv[J5MYdjָ:75ZF5i,# ^a-z4ԉc^>mHꈰ#|#rù5ᘬ>`}U%dk6~l3,2{6e 6 z뽺Hͼ1/Сzkb)qpETWxֶ =i>3g;"k{Ǯ2vC$o(j u tF+?4>hÐĪ*¶\=XE