mozilla-xulrunner192-translations-common-1.9.2.23-1.2.1<>,SNb/=„'$t{=67*SǝaPQ~.n}ǾG@P盙SXwj&E|u? 6lU%Gʠk}{~%vJ:" {TBP):j p7sA4Xg'ׯ~x3zjLk] E>%UW$Y~> y^0Є ryYBK }FQn _{s"3?L:NŘyuH & 4چs^Q*>8Q??Q/d+4 : b\`hlz 22 2 2 H2  z2  2 t2 n2 h 2\<P(8)9):d)BJFJGJ2HK2ILd2XLYLZL[L\L2]M2^ObP cPdQeQfQ lQzQCmozilla-xulrunner192-translations-common1.9.2.231.2.1Common translations for XULRunner 1.9.2XULRunner is a single installable package that can be used to bootstrap multiple XUL+XPCOM applications that are as rich as Firefox and Thunderbird. This package contains the most common languages but en-US which is delivered in the main package.NGbuild27openSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.orglinuxi586zfp(f1f6f|f'W_W?fsfrffݟfn@f4ffE1fgSA].fmiAA큤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-xulrunner192-1.9.2.23-1.2.1.src.rpmlocale(mozilla-xulrunner192:ar;ca;cs;da;de;en_GB;es_AR;es_CL;es_ES;fi;fr;hu;it;ja;ko;nb_NO;nl;pl;pt_BR;pt_PT;ru;sv_SE;zh_CN;zh_TW)mozilla-xulrunner192-translations-commonmozilla-xulrunner192-translations-common(x86-32)    mozilla-xulrunner192rpmlib(VersionedDependencies)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)1.9.2.233.0.3-14.0-13.0.4-14.4.6-14.8.0NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.23 (bnc#720264) - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2mozilla-xulrunner192-translationsbuild27 1317226472FxFGcGdGqGrGsGtGwGxGyGzG}G~GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG1.9.2.23-1.2.11.9.2.23-1.2.11.9.2.23-1.2.1xulrunner-1.9.2.23chromear.jarar.manifestca.jarca.manifestcs.jarcs.manifestda.jarda.manifestde.jarde.manifesten-GB.jaren-GB.manifestes-AR.jares-AR.manifestes-CL.jares-CL.manifestes-ES.jares-ES.manifestfi.jarfi.manifestfr.jarfr.manifesthu.jarhu.manifestit.jarit.manifestja.jarja.manifestko.jarko.manifestnb-NO.jarnb-NO.manifestnl.jarnl.manifestpl.jarpl.manifestpt-BR.jarpt-BR.manifestpt-PT.jarpt-PT.manifestru.jarru.manifestsv-SE.jarsv-SE.manifestzh-CN.jarzh-CN.manifestzh-TW.jarzh-TW.manifest/usr/lib//usr/lib/xulrunner-1.9.2.23//usr/lib/xulrunner-1.9.2.23/chrome/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/05a87525e89ad288fac6dcd84dd506d1-mozilla-xulrunner192cpiolzma5i586-suse-linuxhIr4?] "k%oR^rjae E,z5e*4"flŽ-#sf~-Ѿs! /S.r)J$ #Q5֟ >eV W4sa}y] W YX Ia]ژEnZT^4Gjg)p*^mm Ԇ/Ysnd|"CMTs_g'мUҦzH+/:.*fCax(H[5ڴh;! ; 3H?<3&*ՈtVPYEEA<9Hz呖/R[q0a}H%wGPs+zY!Yr  }=#$n]>{ (s,䮼g$|C~%HgdPricR1ҍT7em۾@=3N6q1_?QtdXJŽdUYlN{bYO~$pU(1.%~`}#F0Ÿ:o,!x`=a%2D% l8 5s,tZ蒸X4\Xv#"xc}Ӎ|K}wQS_=@x;rDƃHg^nXjNs DXdFJKWGm5R+} cmڪbubU nҤˆC`8k3(Pmr9{&*:_ryᵬ@Z:M钵Lm^d?AVIKDj:\R(NjzNx){=%^X)h PF{zTب{۶F6&s,wm)6%w} dԥwoB=w PknjxYwj;r~Y aۍ}Tx]IyK'bqw#RJ';,q`6j*9-Xnlz\\s(6+ 5P-PC %5ullL hA' d';s=tÛKR$VQ;\^׈yB/ȴk$aNΑxmH0I@ 6NAM$-ggIr `3A̐ oC 5]n ͻm`A3)Uג) } Z-^gIPW z#*gWBrV$TtiOQ|GkChEA?~تO=J@]ɟq+XS'!´ZhٖC3yQ^ kLG. "鋯:h}:>=ҕzVJ09fKSG~* Hd>[wm8QI<>_9[sFS}bEzU4L4egFAzq"U_&z= k`#P?禹f f)߂Z (%KҦA rO߶"|z(wn/{ϔ<&ʧ߫U/G)SZҾ9͗gmZ"|7_Ѕ]w}`u4QϴF(C\%B_ /?;:wKkEQ4^VݦK(ȑaNy̿ĖrJ:k]~0>h/Yu8b%)eמ" !44Y z˜@Vp ggv;Vb֮Hhe /zڵy׀" RE11hʊZuajN/Ksnpo*[BjQb[aotۭy~P^OU?qFNbiwSOF:x(76G{Xd*xQ&@yĀƶ`tvY4=PH)m;"= +gxo}1k++vR!ḥ @/݊@&;Kj͙K-M s]'6 >?LZgK{s,-[ܩoM cMw<,ǣ $p|y(խNB7=Nxm4gNiNk|}94G}1:$n'jhK806 Q78* kxgL۵5'[O_Qq ԴcI^~6Cꋫ PO B(j" ?I}3D!gXYa$X8;'w8oAi@U5(wyẐC~΋!H IRGlOW[ QLk욱NN+b>ΫV{w}>^|Em}#1YA7oFP ?zr۠bו"fVL~784Y.g^* dyWb%a\3m^onH,¶30'ѾbUbbvSƳ*}˓)p[\TSh]`S{|bŲqIl2u=FL &r'ٽ?^@\@V\T4P/,(qT/ U%E SnssnD> ('GI) ^L F)^hts}njN%-ۀ/;s&z 4|p;l8ʞ4s(_դv(я3fl.Q3ow ˠjjk}O;ɽOKx"a/.@㨱] ℁)ٓPS.:YsBQВss Võ|KU|i&GI%ƪǝW.Xg"ADVa0,(|(Z>40k{_t3"˴T1?] eg4߶4=` - >;F91}D9a7Bm6(&$ػ9[^ҋ3L}(V-|J\|;KZQMzE綘Q +Fgj#,2ДeЗ{|+#\fsi,Drf3;_CV E:#s,fz|8DLHǘBzRs>G̕WiKи|^xF2ǖ""YM G?mZ<wV|T4̧ CBBPҺS\K 8Z0DE&(n&֤$C ^3w7B_2(S_gg dƝ7MH1u/F}ǔ`KC8X\.ats7x_,m灶y\5tf,)nѓ*anI]ʹGu!ׅ>u|'L.ip5[$=DOX2CWm\ ˤy8exj+తt໣K053ؚpF`kf?ݞMM_mZG/6FfrY >ɠG 'sI/3 fĕS05R6QA17 W:P X?u[1 N˨KUti p` m&_2uCh1C80("ӞG琰8G(] e jbڄHpP ЈpwC:xRE#8 ЏxEHӄ,Чh$rA&㝴xBaƑu=hr;c8rQb &ˮMyγ%o)(#K!xxGh2a\ѷ"dj,,iKŢ"4%dEGv> |hՅ)ђ5d00[m3*]wpvKJ pEJ2eG=R74-ߓ%]Qs0|ֱeauavjLD;΀0E,1;;Uy|jj*W10@lB"_d ΔNoJݪ Uڽ! N=uqhDJrf#YZ|.'Mk9_VM"D7cb;dŎN0y">WX=aQ bC+5+XmȲN<)1n+ uDl祷(чD"b*EE: /' OU/)L4-E3uS>D?ADzvM샘#f\ˎ^j5L Y?+v٢5TtweFęCJSp1ς#j؍RPs6 , iT#aUMM%bw`&RX^[Nj9 $Z{)-?&4#അ׽*6L ;A |l$;yHWL(/xɰ_!F cQ^D=<;xe05A^ΘQHunml'pIkbb,߰o 4|-UJ!L;I.ٕS`_opy=Fsg9(/}+FػHyBC\Cz-krDI(|.D2nYĔO>.KMh.Q?RqH#) %8͟\єAs/sׁ&Vg`rQ&)|GhA&\LjwG ڳ-ߒk- ! KzcQCuJ>| N$oWeWu՚)VD_+g҂mW)’ `MT.*BRW\ Aݵڼ4d*Ҩ¯"dWt >Ͻw}t aGRΦ{m=8{>#(E16_UҶ*~b|;~I?5"ܯv C1\=s5BU\+ޑ_?:;"]³oĩF|XRSV]ǰ:.Zx ?HcNܘ?$Rl go49h*N&,GpVF6N$&b28|ŗ/^Ъ{Mix Kkx4A^}Z沸"@yɜA[1i-g>C-oeCp9?ر:l rhoWVm-I.qPO Rt%`3Ig;2\^ˁc4Yլo?wOΌɟǿ.3–mf˻7Cw7]&n!ޫR2T:OcXtQ;JUr &,yOǶΡY`O8KMÙe!7}aN1>QZFY?AvpZ(-߀0şWɀ5ڠ ? ZDV_gmĺ0"!ӌxf* pU0JJa s UmkjTV^Oc8 w_ נxH*vff)uzfzZ& t`bsUyTu:)k@2u˛d֒ )q x\륇C?P:?L8S|'x_٩-) '9w9ti/f4Bk!3 _>ǬXxɝp&:#M! -rՄM2Gtܿ3\IR0 P$;i[]nGD}lD)D>2ʛct8f` ?O)[TK oʐf E*[+%Q@U?:=LwP܏;?^39ZvM6lTOX?֛̾Wn,HLcu.^0.=_9FVFMtrOԱ]Wh>}m=S6-T+g Ј+ִ_׭tLD {mZ,Pt+ary<`@(Oh1#,meKԿ T:ҚpIgj)0,uD!2<cS )3@%h]]ښq 9"[jrP+? D-*=<|)aj2:dWܔ*H;. wd;2K܌{ a1|!3wp EE|)aSyM_S1L?PI`M~ߛ.)Xo%ݳ ݧb5Rfk`mޫCf=bL'Ia g75j}*s7 jͲD޴> ]Y  RQ(y==-%Ii1gqXURN[ok!Vn)UQ|O ށyZ @_B}IjRQ,%KR=Nmn3<C.V?맬094GbS+08t52ф>CF~K-7LcKt8+Z wJ1{uhSE=wbs dN.0>[w$%@,`S, ]Q *dd!åxĆb`ǃ_ʿ+b}m 6 ycXƳyw8xgv/~GE#nƬ@roA,"0Osy|Y^F3N8޲.ޮu*Vr$2O}ˣ0,Ӗ$U#3aqrBmA>y R(+ܚE̙G݄SKvGNm3>뿷B$s$@ќ )w=8fhTc$)B@ԹBE?#f]kV/:Eƙ1˗O XoAK |p,!] g.;.\UoRځ,됯?=mؼWKu<_hnۥ!݉RxYmfGg˸8ask1ˎHy1ʃ]\8g:^$.GZݸ͙r<98l*$  tZ2%-uI@u|o! $j!DۀcU %9vh]O&އI ܌!Ag|' N*a p[Ԥ;\vHU+-Nj% @\kV:2jDS^l^e-