mozilla-xulrunner192-translations-common-1.9.2.18-1.2.1<>,|N>2/=„/0@z !t\ ykHᱎK:d>u >q,X4H@-~BpLp50%g4tVUmzi- 7wИ#ɺcGVOі]vx$?,ނyrザt`qx iZ<$anR*K_?ه.)b%Ǭ +C3nqe^uUiPo2vnz |O?M&.ORƫgh~5'U{>8L#?Ld+4 : b\`hlz 22 2 2 H2  z2  2 t2 n2 h 2\<P(8$9$:$BEFEGE2HF2IGH2XG|YGZG[G\G2]H2^JbJcKudKeKfKlKzLCmozilla-xulrunner192-translations-common1.9.2.181.2.1Common translations for XULRunner 1.9.2XULRunner is a single installable package that can be used to bootstrap multiple XUL+XPCOM applications that are as rich as Firefox and Thunderbird. This package contains the most common languages but en-US which is delivered in the main package.N%Pbuild13openSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.orglinuxi586zfp(f1f6f|f'W_W?fsfrffݟfn@f4ffE1fgSA].fmiAA큤N$N$IN#N#N$N$N$N$N$N$N$N$N$N$N$ N$ N$ N$ N$ N$ N$N$N$N$N$N$N$ N$ N$!N$!N$$N$$N$+N$,N$-N$-N$2N$2N$3N$3N$4N$4N$7N$7N$>N$>N$HN$HN$IN$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-xulrunner192-1.9.2.18-1.2.1.src.rpmlocale(mozilla-xulrunner192:ar;ca;cs;da;de;en_GB;es_AR;es_CL;es_ES;fi;fr;hu;it;ja;ko;nb_NO;nl;pl;pt_BR;pt_PT;ru;sv_SE;zh_CN;zh_TW)mozilla-xulrunner192-translations-commonmozilla-xulrunner192-translations-common(x86-32)    mozilla-xulrunner192rpmlib(VersionedDependencies)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)1.9.2.183.0.3-14.0-13.0.4-14.4.6-14.8.0M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2mozilla-xulrunner192-translationsbuild13 1308763472& & &&&&&& &!&"&%&&&)&*&+&,&-&.&7&8&9&:&K&L&Q&R&S&T&[&\&i&j&k&l&u&v&w&x&y&z&&&&&&&&1.9.2.18-1.2.11.9.2.18-1.2.11.9.2.18-1.2.1xulrunner-1.9.2.18chromear.jarar.manifestca.jarca.manifestcs.jarcs.manifestda.jarda.manifestde.jarde.manifesten-GB.jaren-GB.manifestes-AR.jares-AR.manifestes-CL.jares-CL.manifestes-ES.jares-ES.manifestfi.jarfi.manifestfr.jarfr.manifesthu.jarhu.manifestit.jarit.manifestja.jarja.manifestko.jarko.manifestnb-NO.jarnb-NO.manifestnl.jarnl.manifestpl.jarpl.manifestpt-BR.jarpt-BR.manifestpt-PT.jarpt-PT.manifestru.jarru.manifestsv-SE.jarsv-SE.manifestzh-CN.jarzh-CN.manifestzh-TW.jarzh-TW.manifest/usr/lib//usr/lib/xulrunner-1.9.2.18//usr/lib/xulrunner-1.9.2.18/chrome/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/67c6211cedcb79cf9c37f418db284600-mozilla-xulrunner192cpiolzma5i586-suse-linux"crk4:kΆ?] "k%oR^rjae E,z5e*4"flŽ-#sgWާ@nBS'56S^ GQP@jrɖAߡYKvJSXN6(PU,&?; LG;֓`%ӠBG!l[[O.zB=̰HZ'U6*VDZ"9Ho {SmZfq(`wi[T*@s^'&3ݻQ[5ZPqV%iHrnꋤrXy. q!}(='] &"7Cm0rbiZR%V\B&M!̕d-}F.@oeX3?(VIdÊ 3G? OӖz<R#^З]N0jb=fa]uMYzj?»ЅP.7B-Wu[Gp0Ƽ*77F+Y7'"kJ)×NCp)~d@HNGUR~TGnUe0-v Җ3#tSk/+⹸OlpBd1uh߃K-d4Ukuɍ b,(-їtDVDgkRoµЁN9bC?oZZtw͹d:'"sh/lpW)/Sg̤__(ꇒĬN cY]m+OO"@I!? ^?v u=vd$r+Wx%y *Qgc>^Ӆ>1Ͽ~J:0d "4"7*m9k~mN`s=I:u<#tͷj8+cas[7ϤԓӨO x:7,{Vwc2nX6ϯ_X0葄o'+ru}Tstf(gp㧃EFP(LA B75@sPӨ޴e w)h.s)4?t˒#ft'3QwG=cuI^q: VcB&g`.{U2ON/A86\Rk0W[G1|ʌx)PދzvgVN*S+=P)TG\!7X*r յ'C1a_,Hw1d(ʃU@㞙;fЭݾ@(& w v+j<%;XB2/`Pi'XyłU)͸Fs 4%VW-?1B0v֊X:SY) *VK 0#ɸt 14GJHS3I뙽gޟ잓'V`[vj.3UGd1h'R\G%/vcxM{#)YzO'ODN.%\1 TH0 4d.f9gr&-TScvx&^:I_7s-SȷghLkI /k϶=%Q o{EW2< T/᳒](ѻ&3yY/ZUsK`X*_W7:bH -Pٝ(@EMqY9kY. ^=oޜ˸W?/.g)D;,~jkltqlxxN"|r5V#A-1G6"qS"Hn"i;u^c6QqHC~"N`#ӹ$vN~V~pgyN xqbqQ8,JpH#P),)>0XL$6>L*s!-bC=FCblxeB;Q^ٽB U{ ەʊv감`qt$ Lo~G#R=op|uL%8Szu;jѮBiψxԆ2r8q篟O0zӌ2bz4Z|AHj17;w۬^]둱uQ0&fа$rq Dk|vفGGnc~?KK_%CAawI~Si AjHryGQKrP*\ D < fnP *!F+(U$m~=̗,ipr?6>O5,7q{bqCn)^(Ca# #'j^6;<`v%;qHQ?Rw ˞`ĉ6 O-TS 2uJfp@l>/Rn 緛%Ӫv& ,JQ(^k$ic_C#/Ї9Br fB(5Pt@ ,Yw֬e CJvRk~(r:zn 2 <93*W_G%X/9 _X xl!'Zu`tT"&J98 T>>cM+=Fa!(>.yߏ,h 3z*rNx~M:ӯŹGl_wCSe,ʛy=1-L!M,WN,J2ΌM3⍯L^a% h^ʏn.`OeoCz?:NKB3X).Fa uwӥ=7yGO%*~@RYsM.eHBi+ns%5$3w*p)Gt9oʩ?%Ђ!^'tn*OkW {#)pmj{>7ՠi˾=,ɹ.E`Yz;4 EZ$a^Fy,?>2A9a4qq &8~_=@y xy5X0t+|݇cPl[+ynx`<{;A[ ߺQ @KirW{4FhY=5^ #pra [KM0%)r:;Pw9b2&))b"Vj^]Ŕ+?? MЃotagh\7Q8<dњZ/jyqN^p4؟A1X>6 E,o ɖy]ʑ S<ދe!wX"W $@o=g/,"($ T ^i8xHrB pl67-}Q5u"Q %Uǽ/ƒ"ǽ麮(Dpj>cAT a*00E`3 蚢IFFT+F7Zw8O hQk\p3b_Ŝ%Ϫ*ߵDa mߛm fE#^18ɱp$US2)ߏ`Lc H`ZW{ϔ piaxDDAAih'@pRw:hpUj.R ToDr4&=qJ*&0%SZ?]fslIxfz"VBݠjf5 lqj{mIB.nB"= +jɶem,l%*ɛ"\@RaiV@ oDeJէE[ګGհ1*;xhd=./=_$>k K XItl3fUv}si @7t:A{~{qˀXLMW^ՃzDQk1-w3{((8~DpƐ ?ƖhFdȆZ=/5E$̘w r#0̌j4P#ƖiF !p ]l_zNG?? 5߼U&EH{՟5&⽛Pgw}HRdH"(1] / u ]ވVIi9oˊ.f* 9yĞb,Hߺ2q}r4,W2{C \DoTkE>O׳;WnD_< ;)(wdžᎦ\b6eLZRuLD o=j⥘irS4Q e⎞yr*'$_;ppL3a #ѧ;5 A^}m:(G4`5葿{z]RkO~,=QAߘ?rtkstͲot]Vm:2uy 蓉H&*6ЯNv`Ozwncr/WnjҴ\T RQ}%dN ]P>[HPBMѴ&:~BZ0eVpHՔwQEz39\W$j.=AT]-5#yP aV[1LRrG esJ ճ|~6X>bMPCv?2F鼠Ax0nR@BmaBI&f.3\iaڥ2trV޹!G#?-O^9z\|%0RQJU:Tвψ2-0vK./2m8=5u _:oI~R3BH«,FawjY4\l.k ?SE)^jK\A)yoeg@Ӧ՝$*iAtwQ} 2A3Ȕu~ zwx:y]/Mݫ{֪8pZԞXoK%a26`rd RT n73ߗpiJܞpur@ք|y(|WI:@dga*Y>@[^F~p܊b{*xLX Tem@L\ob<%9|i%Mu+c=80Zvsv0.IDƴLl,<,Y8P,O,0Ifq^9ezҳd&ߩÀ>#V#IؓDPQU,拲:><{08 D{SԵdYƀp qg%. ;l m:8^ c2<pL)A,~Wk_b)"<}FR<4J .aK1rs#6LV:Am#F< Z?VWcqI6=x Iozij%O*bL]Y$x^oxN 7sWNUgcHC׽J- or(-oWus"2spШwThڽ6XӤf!ncٞޅ0|cdo[c@gx~I-*'}K `U؀W6liWRpj}[o5gZP-VW X-D &KauU=m^`Fr9P1y3 -vΫ0/tEwY0ͳ|Z7۠Hw $!v+8 叐fوnd+{܎ 4<@@̉|Rʇ>VM=bgDT'wȔ`΁ӮۋTq}Eϳ߬)?ܟ=S(+OkN`VrJF_ RlRK8T8!='1RױڠpHʾ\wWYl:eS5m`ФeZd~`mAXN6Aϖ2b42#*Aiڷb5Wxdw>;)^*>] !Exa~-?#m`-F e`QH5-QM- ]/qE %!3[!hwB  ?7 (&a]^]RmQG> %0t+?60Pcdl_B| +(\[!TbZA1)t S}2+EV@ӈ@C"F|Gb#ܯ:K95̋G'¤Xkip;`dCt bK5 4G~ g\'EBܬO<' GaXA]hſ~9t5}Η$?i@޹[l=mPg}.vRlO v`t:7^S #FMC%w.T^SF* 3`5Y0y'Ԓ2M,6E YzTً*K#g}fgS0@a5|є餺rc(ڶ A?%A_:֚ $k^vgDӖx=K6'sVCVt)}G;Ģ +NxUNצgE;FEԓ2 ! 9C52gLZ(_|ˈqn,{zqJ;׉q`0ͮ1Ɍ;?mG.7i<.L Cw{=o'9ɦ Q,dާP)FRsO.ցG \2 ]*RN6K:O&O}} 4 ND)5@|Jͳ){?2J~&lFU?+r%"3 'pRlޖsB˺K+-[IX9cum.٘\괢{ӔCvɯ^yb'=/M2YVKγ!蕩;3N6wPkug<![H杅ƄDV:0l4#wA1F nWɁ#lkymJofi v9TC8c(x"*Y]0%V'[(1{urd+J@uF) (C<ID\l QOqˁA[5HՀ^cԆ'n"guZyZ:جBw!y>U{}Lh}<.g=W2إDT~0ޢ7n`vj]sU2g &b35ckp|!e|T:B#GK`?3 24J  c!z™2m|d<Ú/8jZ@k櫆fN(*yR8 YW/GϜ/+6z1CP\iZ4ݟe}$+4gC-_*̰aHzm@5Ieɒ6s`/㞺\SR[)e;C>bg=w'ypшgOcġ/"'(b+̭'M)0ԛRP(71"6O;khez@)LZ:x*:^0\H5Iv7Ή1%Sínhv(x3X+nк?Ϗ@^z=,jӠK&)?.ֶ?`$JMh<-;9;.RqZC/ ҹZJ-Xb;s? [KwӿTʴ%di8oġ  ":]՟-m>"ţQv}:x|AUBnLUq,g +Yr-^3K=*[8y:<9dW gPJn|a|jFAc8b)́)l2m!உ6.B2LTi=eR̜PK ;$ObnB+=DuݢN(ɆL5OQ2׆OaMϧΞ@&9uJ1\JlHt8(hW wmĊddkX=-"/ǢtCi.:ɳڭgj,MSI{:& n=+٥+(=*L?Amp}u^5Rzr;{Ui&:8jl2xo + euw._^X35;b^ YӅe^սuϠk5D1Sn*$%ޑִZ}*&q/&Q(g AVF'f ~jăto$Y4I}Wľ|7$aQ7k 5a![ *e+b_c~A@ #Y&K#߰4 xpLh gکѯRҊn,w2 O6sBǞ#CD F2>gRv#fl2}R~hMkO(o/+4flZ8|ʹp`aϯtHn3k=Sc 2