mozilla-xulrunner192-translations-common-1.9.2.20-1.2.1<>,fNL"/=„etiʡ~'БC#)k[QQ*dE4|>- >]/3MkM!cbǠnԒχF+*G|ZrRL kF>,[!}}qM B17ym4.!MVqqWEfA,-AwjhJ祌wl-6zoE,(O\U1iCR6nesQ .2G+K^ą,"?1QkRz>8O??O/d+4 : b\`hlz 22 2 2 H2  z2  2 t2 n2 h 2\<P(8%9%:%BHFHGH2HI2IJd2XJYJZJ[J\J2]K2^MbN cNdOeOfO lOzOCmozilla-xulrunner192-translations-common1.9.2.201.2.1Common translations for XULRunner 1.9.2XULRunner is a single installable package that can be used to bootstrap multiple XUL+XPCOM applications that are as rich as Firefox and Thunderbird. This package contains the most common languages but en-US which is delivered in the main package.NKbuild14openSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.orglinuxi586zfp(f1f6f|f'W_W?fsfrffݟfn@f4ffE1fgSA].fmiAA큤NK NKNK NK NKNKNKNKNKNKNKNKNK"NK"NK$NK$NK&NK&NK+NK+NK:NK:NK?NK?NKNNKNNKRNKRNKUNKUNK\NK\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-xulrunner192-1.9.2.20-1.2.1.src.rpmlocale(mozilla-xulrunner192:ar;ca;cs;da;de;en_GB;es_AR;es_CL;es_ES;fi;fr;hu;it;ja;ko;nb_NO;nl;pl;pt_BR;pt_PT;ru;sv_SE;zh_CN;zh_TW)mozilla-xulrunner192-translations-commonmozilla-xulrunner192-translations-common(x86-32)    mozilla-xulrunner192rpmlib(VersionedDependencies)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)1.9.2.203.0.3-14.0-13.0.4-14.4.6-14.8.0N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2mozilla-xulrunner192-translationsbuild14 1313601926U^  "#./>?@A1.9.2.20-1.2.11.9.2.20-1.2.11.9.2.20-1.2.1xulrunner-1.9.2.20chromear.jarar.manifestca.jarca.manifestcs.jarcs.manifestda.jarda.manifestde.jarde.manifesten-GB.jaren-GB.manifestes-AR.jares-AR.manifestes-CL.jares-CL.manifestes-ES.jares-ES.manifestfi.jarfi.manifestfr.jarfr.manifesthu.jarhu.manifestit.jarit.manifestja.jarja.manifestko.jarko.manifestnb-NO.jarnb-NO.manifestnl.jarnl.manifestpl.jarpl.manifestpt-BR.jarpt-BR.manifestpt-PT.jarpt-PT.manifestru.jarru.manifestsv-SE.jarsv-SE.manifestzh-CN.jarzh-CN.manifestzh-TW.jarzh-TW.manifest/usr/lib//usr/lib/xulrunner-1.9.2.20//usr/lib/xulrunner-1.9.2.20/chrome/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/7c8aa9e2d874643d82da90b31ba4f74a-mozilla-xulrunner192cpiolzma5i586-suse-linux_WO?+ "?] "k%oR^rjae E,z5e*4"flŽ-#st@pLOj^ _ݱO@ u$V٫)=3տ_2)nJ 5ynf61#MB 6T"B)>Yƻ џ3*ƥ=XSTr PDnv{^|@?̨Hqrۧm0^@bGTD06^9DY#! +mBo} f^ί7n*Dk<.i͡?[ߜL I4r*sN]:8ym#A~>J =lkz%=ҏ v37>(*HQXѶI;17(\\_얓Io+lbJ]%ɚ]rdtbbGQ<Ќŗ"NkT()Oz o!I9C*?&1@j)R~K*0$gxyV@l)|lfc ;az6LC' U nvRUHI$ ܻ!kmP*ÇӾ F`9v?8uwPV3uȡ1וʟf.-,]7/ŠUPCԖ)Rl3+-jkwtZR*,^SbnӃ#K&4A.,,  AkE-vn-1 A>Db.xGTq4amJ ~H1t6 OQkY5N_Ie#JHhE,(JQ9]$(~}i7ҤPqҜSoDiTJ"iZH@3:ns-z*¦Ger/ؖ6" kR9`8 TTx'gt*( 5Ao:_lrFt̞`U4̕WJE#<rwʸ'M}*Ң7R͕s%阦tchT2ľ|5︹ʶ$CX*`p0%hA*ztvһlDfO-AM:'JxE*,~G+>4kO(G U8={ Vh2n.C]D<2yw[8V; Xa-U EGᄈl+Fl*YMOd\vbV.˫Um^1+g5; t"Ԅ9'w )J C[B/Iho|*0!t@~YtTglϽi */=^ s9RL𤩙Q*,?HM,G8F 2KWt~(͜]G^GlbB+SXɝ!zDґ8OPJEFTf'{ !!@ JBFWJfq>FS0  km{̙SelnMh|H؝jEod]K%cATj1HX44Vv;g˓lL*WhLAu7+y%'DCAi 4XuXEjX% .jz:n]k Hf8Z B X rbZPpOI.ڶqVW ,)A3^A(OO~X e1qqS$!ANBUwL7|(_e4pO5odZ%8YI}^U.Hn5 ˌ:)tUWjߢL8;@R`m̬h-C䩦f_ g(xJJeL2Qu|Pǚ$66%2iTCϘIN ꫧxCX[VcEr9֐~[qѾ&c'Os<0;@d&QU1k1/Z/ Bs`J|/Oja1q! NA2'F3/z} m%GݘX'3ʢ%[6_(1\1 Cń1Xpl / BؿB*SkN)'| ]ʭsM6!&Ap;-9Nz&,~΍`=*:9t-xn_H!j ̋*kŔ?ɮ]" =9 ([c1e(YCLS2'ρwE.Z5 4@קcM⠧W03Xea.2-odIT.:;u'Q62EyHZvJ Wc\UP7}|:vxU|_F5g Ynog=nvLas< 8ضP)Gr EMsasa3kA3e#IE.5{qD8% oWT 9~+8cfa-!ǐB0y d`D+xZ%f( 16.RBpJQD5:11 ~R[%d8jxHnY?MZ=* ne:V{俹пY1/aRCpBB ]spk}˝&wұ%^cF:|FGUU݋b>ވH$B,4''*>ncq417 lTf<5X_&LLwixZƌF3wỤ1 o|?jH[7CVXF+F*:<ڿSNp|eZ7:ȻQ6=NqQ S>AWKOR/ |SRBCX̉߇˼m_$#@! oUcIAյ`ھ 3#'ܪ`!}SE,x`#ÊGOr)镳@:'x&?)|w׏oēc y}Qu,}aJog~AL>j-z!u3ĨH'c,VjYm VWc.瘦=] oY7$A._tU #A0ʛh')ǘW>a"(X < e Q+wj?!A4i9Όת ފ7 &]>y|Dw3_vS}z:ٽ!P,N:|m1?zX*MmY}*_[\WK?zc ,E>WN: SJ "\>˘q?\01bx5T~sKbl h(ė$sSUj˘z?~g :l\8>1 ,8섉QӘ5/6c&NQ{E{כjWvv'[BL`|Lɜ")Ox[ PW vh"<'3fٷzFA?KIq쵀Ѵ0sYtihS:Vm;\m`mT:֏ȯzߺ#${ )B.k!1|Mk'b+9zT:ĩxפKr@+l|ޫ:l\r4TsFw~:E ML+1ːhP7fHOzadtZq:;i3S9s';5j5VyF, )'6yBixgl84Zaz[zԲd&xnųAy9glASf'>SG8>nMPl۵Od;+R+J!%Z42[`<1?R(-a(1x}sA 7pk;dF^Rd[@Xsz\3CIe*eǧdڟ#ǦLIlVa55ˉK\]G_2Dܨ]Q7$0Ei62m5Ο/buצϫ0" YQSxL@uuR n8VY2 GPNYǖuOV}$>>x!&ͦ=*t{I o^У\1_yn9ָQ0DqT #M{:e$NAz]{0?]H^@VQ*Y3C1bkB(0rd!&^fr#8 cs`t4Ze!Af@]/~^ad0|,T{ yD7^NE&?l 6 {9 ܬѦ968sUGΗMH{B\10p vpdZo}g񟫞<%cl"R ^kO>Z,P CzY..SB@s uȥ;/`@g I(0XBZ궓2Efׄ_պ8N*u,tjM%PpW rW <\G7p4$l ݘ(Z.:a{ܝH>ZJ n7 `kQ[W'>&Az`W\͎ޗyozR+M=IcS]Ū?+z$1ŗ[H-H`=^d1N(% ECoaz0 lYY9'A6[ v2e2Gr&F LsK~fmL oB?BdlKÜ>^I\`_2`Ks_~sqe`_ p߁~3J]i*I+\RD"9֋7_18k^'*9f'M‰} [Gw QzR*nሣl MP*g#+ϝ"2LAԢpy*kƣ|R#2=Gf6B2PQVe7x|3eM2PA9qToSz}7}c,61KKi&Qp|blAVVGCxt Wu܎eq@)K{$[[l U? jo2(Ui8q 툱llNDuxkXQz@{jdFU{oC ئ:`{6C ]*eYgQӱYYyo EȰ_z^ɚ횡{Q)qxP$.P> MUvG` UVr0p ØT~,Pd\/‚oКnuQ|"EʒG+fDBt x;&sPB< 0b 4 }O>ۛÁڌZUŨen;ţAӕTULQa 7{Lr](gf)? QrPA2uEw`%Q܎Բ )@*qU~ޮ4įKfֳ!o 7U |NfC\S8'X+LζLgʟ?ËЏV6,e]!6D5lQBAnNrϮ~D9ޘ+L,RwLI Av?:Yd:Q7p r]C}vmn4!@?4щ޽bǃw8љs(3@ͨ皭wkGENV(zk~iT q Ib<M1qKt.h2Z}&9asE}b\1X 1; ~Me Ӆ]\)}F lqS^zz֥~RJ,,ު D_|ux&K0T>)UɈY47. ߎy#UCׂ!D"v%BY!khh$Eq$ܬfhcA7iM*4$AJ:koUl6O6"KVпeiH6ǡCVi8$r1%_d)goӰ3|Dq2s +#jܥˉpBm)WDtz,_- h`U)itq_rqwXoa6bl\K%( 1F k Epцg__h>ݘ;]%+şCGH _Gy|5X7v4x9^w]}m% 7IK0(q"ĜαWRmhÓ2d`hL!V14:0fdɬ#N5J5LzYQimgfl[h\^F]̆pbxQU+XQ~_4<{z,"P{UV( C/" *0d!wX+9@ u) x^)q1^K2#>,xc Q;(a8l$qnJI񭸍t΂zZ5=YQgG4GQyQ{Vlρ?,TB/"VJ{ɽtܧ7@Hr }뺶V͵QǦd^ֵ*b>C! L<75y`]Yu 1\GHD@Ѳjf92an,'];jd%/FUMƦQ2#F%czfR`uY_] H"w&)/ rl?OXn8L u3'3:NJ^<ϒ]#F@Kyvl\zPz3e71޺gOF4k|i f!ɹ=*/~鿕 %nv`*&%j, \[Z"zN@n8ܦ &݋ 1|AEJf}w؀zu)R6$Ǽ@#WU. :"1GH;cSv`~HtޞB[$8q g+%b)<ٗF Ւu(o@k\y9#qBeê XNB'#sG;G 8d%BF*>3wH+ o)' ^B'VB"o,{:%:'xw .sR1o@R߹??+#SiuQv&&-l|؛+wjT^44x}qz}rK%u ~b*g+\>`dc~SeDv"<@HXt}͇6q;~D_f N+lm8ֻt%SWaBK>{KܴOHgH?9l;Ce;=y;ֶVՆE^sT OeƉʓT0B/xaMWk(1VGW^MGQ!\-򕌱5&=o;"yrj 46e5,*/ `m8_0/CE.m31녍ಾ8k-K֑e:}F݂>v)ڥrs;(HjwC::͕Q{m,=M:ɡ y:60lY"r`wAUxfKa#j#N4ƽǢ`9.Dޚ%>7gPf57pby- o5/K$#KEӶ{;вAK0s i @zBt|^!:ґԁebBVR֯ywz('u/ `Ptҧd؂Hӈp#[# J?+G}?<Ƽ.aI03@'iz:q=;oG7$tڅ'e> 䏀#?ۇD5R[ op{@% Oū,Y K='4&~O'lخ*+H/D.AC>ō,E*V$"g`u E۫/d`A1].]ЍG/iqW.(ѽ.*l ֲCUښۣ %p<دǑBFDÏYޓb0veЪ6'H^*`"9$·ft;|p@/a$ |"6[1te/d; yd`VpS{?b!mt~Ɗ,q4$B[Y*/(`?TAP9!d抗 )-m3lC M67^ܲ޾OLS>(h65?!pq_gi piڴ !|R"" 5;'[覼3Үʹ "(Z~`G6/Mr &+V!׷Lzty嚶'06kiq;Cb70@+,Ym\cO32t&L%YtxvR7##Ms LkSѶj}ֹ'ʡPPƎLEގ[W*%:&^eaI ̌OQ.}}! 3lSWz[S^R˞zV.rRf,]"vy{M'ؗa}[V624ۿHt9%)ĥ@c--6pwk d٪inAb>wJoI‰:  sU"ecd^j28)#wpbmӒD9j5 -0F%bXԠbP{2K)$"gE8<}YI-y#׏8H[obؒ+8A^Kyʛ[v˲X>aVu栘!0 Z,h~% d;z6\+82ݲNj6- &}* ;vzr31uz)ljj8jkx68"\bNokAGO꼁MpkIERQvR;E8N)6| ^CFVoE#Zq C WU.W0C3Ր:h]agXgrT&x)w8xzCb)n=m?ƺQTyND0VUzX6BqIMahؗh7e>vx-!ؽsİ2$XA3;Sp2C_Pxb[UNF/uM~DrKHK S^4عsh4Wz+0e 򯜺oH!#C5d9tK,k##QjofJ4_dw|oܓy"$4-ehC-DC=Z2a"Dү<fGFtGz%;T;̝?vkLއ"Ƽ,WUDc;옕fym$N~I)mHg04v#㜬R0?[[r Eۤɷ~uNLhs勓9qFtqq>?y/'"/S]QRV㋎j@hGʽw_qfCF;i#jKΪ