mozilla-xulrunner192-translations-common-1.9.2.22-0.2.1<>,Ni/=„S<(BYZB kxij9*Uє`HN[pwLNvżJ༣{$|;/)C+Ewn!gA| #mPS4_^d ƚ`˸ިV\;.]ix.?}ЗB/<Y@Φ5[o jQ_M x%j:UcoV-ᯐl!RB[ uץݞ9Хc@aQn!">8Pc?PSd+4 : b\`hlz 22 2 2 H2  z2  2 t2 n2 h 2\<P(8'9'::'BIFIGI2HJ2IK2XKYKZK[K\K2]L2^NbO-cOdP'eP,fP1lP3zPCCmozilla-xulrunner192-translations-common1.9.2.220.2.1Common translations for XULRunner 1.9.2XULRunner is a single installable package that can be used to bootstrap multiple XUL+XPCOM applications that are as rich as Firefox and Thunderbird. This package contains the most common languages but en-US which is delivered in the main package.Nhbuild09openSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.orglinuxi586zfp(f1f6f|f'W_W?fsfrffݟfn@f4ffE1fgSA].fmiAA큤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-xulrunner192-1.9.2.22-0.2.1.src.rpmlocale(mozilla-xulrunner192:ar;ca;cs;da;de;en_GB;es_AR;es_CL;es_ES;fi;fr;hu;it;ja;ko;nb_NO;nl;pl;pt_BR;pt_PT;ru;sv_SE;zh_CN;zh_TW)mozilla-xulrunner192-translations-commonmozilla-xulrunner192-translations-common(x86-32)    mozilla-xulrunner192rpmlib(VersionedDependencies)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)1.9.2.223.0.3-14.0-13.0.4-14.4.6-14.8.0Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2mozilla-xulrunner192-translationsbuild09 1315500542 c        " # $ % ( ) , - . / 0 1 : ; < = N O T U V W ^ _ l m n o x y z { | } 1.9.2.22-0.2.11.9.2.22-0.2.11.9.2.22-0.2.1xulrunner-1.9.2.22chromear.jarar.manifestca.jarca.manifestcs.jarcs.manifestda.jarda.manifestde.jarde.manifesten-GB.jaren-GB.manifestes-AR.jares-AR.manifestes-CL.jares-CL.manifestes-ES.jares-ES.manifestfi.jarfi.manifestfr.jarfr.manifesthu.jarhu.manifestit.jarit.manifestja.jarja.manifestko.jarko.manifestnb-NO.jarnb-NO.manifestnl.jarnl.manifestpl.jarpl.manifestpt-BR.jarpt-BR.manifestpt-PT.jarpt-PT.manifestru.jarru.manifestsv-SE.jarsv-SE.manifestzh-CN.jarzh-CN.manifestzh-TW.jarzh-TW.manifest/usr/lib//usr/lib/xulrunner-1.9.2.22//usr/lib/xulrunner-1.9.2.22/chrome/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/4aa611a2f87df5b13dcfcae819091fda-mozilla-xulrunner192cpiolzma5i586-suse-linux,R~C֟zJG?] "k%oR^rjae E,z5e*4"flŽ-#sa!G/m;@>v\ DaǞ e%ԎPYUv eU#,,wnq6Lݸ0Zo#O.ڂm%C1,w*nаG:&c{ݦ'<H&rG-V\,xihbF.43-]M{}pHG rc C¦bEkrSVI QbbwFWzt `>Lؒ[D|߆sܭG'>񘃉s#!n6`C" iaQ>&vn+fjb:YC%HH}d~p旐ƪd/q=\md\jx|2' >`F[d^0H8%N%BG0XA(dZb>hH1 1کC/?:{ |"޶_ x,M/ vt*F8㓸1UĒF[Ȅ;)Ή Ф5n)[N$ߴ(ܳ\Y\knY YgpȥVX{Wi[|F"oW:n\䛿)C{ \eWޠt?YK. /Ho)M`Y%m]Jjڄl q'™jUxG0B>GEғ1J|ͅԖEY빪p?wxdr<0',EM1›eeueHzZ ۏ6^έTY^یk͏zvcW QD% 'NEwDYKv&gƤm)vNY!&XR!qǗɶ9H(uz0 fqm޵ԗn#E%sAcBnnx]qs+ ꌭOX龡U/l@ D@φͅ[9ǂ>xnF ^ӶbXC!|2u,l8[m/0br*['ܔP"Żz֗ *H}^ p'yP"oT>&P6]? Kr>7`Id"ٶ'׆fIQ@uSq3Pb7>v54Ndpa0cjל,菵\u$(pKlʯ R]+kf(D{!a? ޿;FjN\*7D@=z( :"EqVBxŀKf>z0Qtƪ00ڂ[)c̄ٯc({h}3=ٌ3ySIyIFX*i\Et=ty>L.D9FE7[xQ?۔wn\_:Uzti tUG\; ڎ| `4 i |紽vQe)L-WtD%*[h.I:ZoI?Mr:a@6B]_xw'譩.:ʤ3'yI\1?:]L8l3 u.8*L=.#iZ- VLWN`F $F)DTN w{P&]8Q2VެUOnQ/!{UC,Dm{o˾_3N=#~a]f 3?ו*(hl{/rRcIIt#G~gYk/=;7Gfq}QI )a gίu빍"a# PsXf{m2 -Kr Ҕ{N]%ҧмAUǟ+~*@]chѐL}h2惏&;ՙ%}w\oҢ'欚 J~$5QmV2DdžƘ+Y*;Q 50:%k3jt!WC#!PM8`RE3{-Ɗxz؝,2C.ƒ#f9 Xܜ|ޝh0[hd dti֧rι߱ ]&7.Y?/8*⏀^H)}WԄN[B%LzS`ܲ`Oܨ暅fv˩-f$gGG֔Zݣ%&ll 7֔#Ա|!O@g1ro- B$Qq,N|]yWEdIvcd~3/IpJYi@IhSus, EbW}FB}.& bsՆ L/R!$6jyUVWrN 4v!b|ls>N*12 ZrSN 7eZԪ$R }^(\/r7-S-rl$nw+t hSkC}Xs|ͧ'?` x3IG JJH\beh#W$мICZ-3ri+8ŕˣ}\5 z ѻ#V2xʠ=>FthKa\fVx*>gTtKP9]۷LFhd\,/ M)־dth}!#,.0U0չaO[fR3[3E|ԁv}QL]1vǧ;*2"`ZRJ6-l<.+wpKHMyc?z cGI‰%÷!68pҕO$89D`pzZödG,QhdLR,2NH 7r˚IUjj8fk1>B>.XDz;`o'!9I= g~JON9 K<jsiѿ{>X^4M?(Tߑ.'Y_I23V}S[:wNPQi`WqĜE^o៧| wȠ_٧A,(:kB6k o1 -544Fwȴ x:lp8SM:ad$;rG;)v\~~oiQd]=V/_̈́w_xLٱ@H{y5qU 4hM&5};nJ Nk%j UѲiT*nj&xbhtM͆:NWri$Q|c>OV$T9?sY? <ɽ>Hz"SaъUD* $nd{0m$ 8 e m2J2Ji}ozRh3w\88ؠu\OɅ]2KX! 8(E,iF뮬!HI R5u/h1'cjGt&]<ȩwHYVr/naW BNCgToߑ/z3WߖZ؆2.|ҢUqu6SE#2e㈎rJ[(67{I2BpOIUvGM=o$!x7xc-w8{؃ [ʨ( (BQYl$/e4vd%5:ݖ`új3epjr2Mnn\}[8Vp !;69@m7h܎"O%8:IDuBj>:Xy<,rQOĻ#Mu#,5n}ٜG)>󛌵We' =mZ:~7u%j!0'`T1lJ%"%wF&fO62Ӌ- ?gՐ4A?Q\%<e{\x~.aJ9= A  Хu(|ݴFʈvQ(_BQ=?3Yd!Amݞ?^p6(cuGL(Wwɮp{CSGh g֭ۨQ0cjx77:r11bb,इUk"!:/p lٟX9@C]{'ptii=}\ב<P;R4mI=T|C۱-sZEŸ w}JGS^( k/4bZ^^X \SJC"I,n0^IW8dPšC'L1ŠֆWd6@[*:07c+o-|Sl(G_fa!C..a"y_K}E9үx>b__u0U 8$R1 N/wo vD՚Qsq\x j%pzx|ڣdUL z~]WG<&f^=Ꞙړk:1*ӏ}ѡXI0%򡡌9Uz`F> f6~l]4IkOpHުv> ?8OLp+#S'X#MѲ0ӄB˜v1״d#l #Qmm̟ܚ8;I|GTH%94T&VKem5ь  SV ,omIJ ui?7 h0mƜAm/s'_G58Ҏof*Rq-}FãVf 1eh$k~mk X;W&1C\53 O?٦sjhJwʎ\m]aoϲ"POP%}0\Ϙ h@[!LxM jp%7E3.*n^ FC1_;78+PU<ړ)Ckw7l'^dަSITp*r峓=L;ٟdhH#uaI\}rUlAd-٭e5UTigsK#Vʼ%c!V'HTd`=]9bG7( Åu>aKjx&,&l5/Q|zK_8;OAerUvXQlߜ64"Cİ6=n"%cԸ/2|0z4#n4t=zڋ X !߯v5v}bǭgre]Ц9qA[f0F ŁcóNy*_=:hرJGUhUuEUB=Ȱ;zNXv1^6E}aB]VCE-H-$Ƿ_vzy߅dё ='$=sf"PfL] wި0a*̗"SPetL7KVIs]v g3bO_[!(<}@k {сXJT#[BeZa,s&.cD!zMMLp桼- ٗĞa=6E*Acv3 BddbXbt ,lޔ;ORlk5rt y]Jq;۸j'2hXR"srf$A#06QBk'LČzu|-e>P;2bwX::Ic˄]f6 >]N; ˢ:@BOZxx{'!oB㴯JZa LT^z$ՔOPw;kc &L$36~ ӿ}BOKMW]ap۸}T^K ~hS-"1Bj(9Q& d޽_G"(uk){Z}5ľFbFu ؋D/ojwl q|`b81m䎒DRŐiLrB=ܼBCP=:p/^P\ϷvH(ejáYBa?./ cD%suWInj{ew`BSU:ƜU#G-LN/&s舫$n.le: Si*P&|;BE?ESV̯~pQ1 %j—Qu@c'F('rGL Kg!^PӓLsN7託 X$?X.E _ \Ejv h82%˾ ^ܘD/7 VwT<{;SA (Y_2 #?OK(/g) mF4\C|ou9;^",%d^/+6u$|YU oHܰvɞlg^iD-K㾢܈*xXeieXlN:\x6X'[R!#kMCf wgfʻy&^j|ĭ̳:Am#f%DoX,.v`–-ȴG't޲c"oYH`mmSV)gؓ4.(FJ2ȧq\FgʎCÿ`}9dN(nuD.L/}8avǕELvWr}ْH] `ğ^oZهiE`ĄK_[S@%odc*?g>uWL~bzKO|tP$9kv[\2i[^/0]yf1u[bC2.ePUɽmT\PLKgTbLDz疭vw4KrnyL>_fw>a,\;eUM4%MuD8'-[߳Bn/ ?=ڍX\J0'l@V#c<oꥬxADBSZ/Z*wE+Sg>vY9◩+V6=~Ҩ|bhڦ;:}3v$5#[6`@Gĭ mmA oa9a%y&@ǧC} <4S oKMS/ ٽѮ $[76B51!#1jwi5({:j*8D"Fs_N𧄵1}bEW _=NP—R?wmo/NsZfKDE<CDr8o|nq~U_[55:rYk,uB %\?|>xY$haC5Z=_?`,Z3Лwχz%'9Hw7D u:OD@|]s&P"^_2Jԉ EҰ|QezSZ߰Z۾tzA6Rtr<ݴ4)BKZn 6N d0ЄI6m&B형\t}b ų#t7` Wy[w" OG6%s^.,w1pêͽ|D8D#? IQX(]l~&:.S߄dfTHn- 8R!4!=M~qe<X,#: SD`։ e`c=emIKOMy;E n rÙW mglbhuY;* |X²9EggIN9=~:#(G[߯|-ǜ, Oj`bsK` >p]ݕDLCߊ2QG}0K $mGx84S]/Յ\}_]ttb6F