mozilla-xulrunner192-translations-other-1.9.2.25-0.2.1<>,ĉPqN޸/=„Z 6=}V8@ F /mg-+OU-ٶ(/|菜`*_h-d~ 2pS H33IJ ڕѫ̦JژTPZxC 6jF.7 Ξ~̲N3$PnnCܵha`ku躓,,GU\AuN Y .V cѲ}4M3cjsL-Eq u?}l@_JY>8g~?gnd*3 9 `$(04BKl h\h ,h h h h ,hhhhh(8+9D+:!"+B\F\AG\ThH]hI_hX_Y`Z`([`,\`<h]ah^ebfHcfdgBegGfgLlgNzg^Cmozilla-xulrunner192-translations-other1.9.2.250.2.1Extra translations for XULRunner 1.9.2XULRunner is a single installable package that can be used to bootstrap multiple XUL+XPCOM applications that are as rich as Firefox and Thunderbird. This package contains rarely used languages.N$(build02>vsopenSUSE 11.4openSUSEMPL-1.1 or GPL-2.0+ or LGPL-2.1+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.orglinuxi586ff`lUfzfgff fff*f fv\f[\Pf]f9fj(gff6f ffQfSff%ff fvf/6Nff|vfkfGfRfNf]f>f7gfff,fffAA큤N#N#N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N"N#N#N#N#281b8f272193e7d15a8665c5cf56887a5501abfd628633102fec0328a81e615d473d12a8e5dea524429be94256fcb2904ca52f8beb6c95a8ae39020e4c820df8a9d7d3a7e27ae6ab639eb07d9caa8b63fd7a49c7575f1be1a5dabad8d7259f3fcab98d5a0c51d76807e3207c5d308c95d394172e57b32311e00848bb79e7889a8d32a8a911c28f1dd3866fa741656ce91120227756997aac3502e73acdc342075b1bee292c6b9a7f4c8bffeaa883da396d131ea049a3e53f5442d75703e0d5ea0b142baee6d9e7a6db2b15fea26ce2dd0cc4386985f2375cc932de37946a0248bba9e9334e12259c76c43ddb99c865b513495ed90f12bc2aafbaf00871bb0d5ab2ab69d6e2bb72ae95ed52097aac449f06c2085d6e05f79ba125ab16a7e4373b6f911d7e77ed0e041aacb63a717221f6f6db42ddf1458205d549c51339d450ffeb1079feda9d9976975f45406652f566897b62350c76d0534907a19f25d7112370504de45a59cc620f508b20fde12eedf5f52ce2c73900170d63bca78e06364a101316723f30ba505721feacc4ac10a3e6fd17310850fab1c2f12deae7eac64d3e89f38bcc8959498b0b514b0fd33e7251eb97b454250c60c21cc89ab37c86669fed669a5a7d387cfb58280f7abdd9ac0e7e91f65b8512e0085139f22673f6653743ffd4b86ed91c24f0933136dbb0dcb1cd076e33895946a0c1d61577d3d2ffe448821c5760fa44eb0ffa635d12edfc1532ef6cd88176fee83b403f20befe440186177eedbcbbdfef85c49f26d3aef8c9b20384a1111c4f2235fd13441d33d9187ded4483069368217a156363460936ef0bb81203652edff0ff569a082cbcc482a29bc751a98b7467310859957f9ac05da670de7e89c3f7de673d9c33d4446e07be8bef6d7618cc5fe4611ab300b199318b950b7ed24087189e4b266ff0c0533c18e4985ff63e711699b70912238215f4fb3296d828d127d725d9fe9f06d66cd7193c01832320be1a9bfd46d6a92d53ab29421660499b9aef086b8cd1ad3a89e2686111287e64d2d228de17794d59d3a06a2c1bdc78ee8cbca5b47417bedc9d9f4270eeeb947569d5b6683c35b8b5959c1f07af32b88ec156527b5b9a32862e5f5b8dd4469614d4497cc40b8adcff2cc6f0e0ec403e95edfe86bf1a00dff373c4eeb18c5663e2ee36174c1dc131806e9b657c7c9bfb64c4e60d27a4f4294adca275e06395b2e08c8962dc87eaff6398345b149117d7b73694c9eeaf127508f92923cc9823abe932cd2fecabc6b86f08ff25a129669eb2a19938e06b72f148c047eb873bf44743b6301d9703d8a870f5d638afe278d02e5e906fea0ad3367d049387aedffa54419f8d9c70c85b62984163d73c7605836d63fe37d19ad53ba8995afbfee254b199d3ee9bbdefbe7dcd8de7c72f2724ecbd1bb95f199bc2cc86f1fcae3684b7f70996d4d45b4d918014d92a238e706d3c26e215f31cd24b23ea1b18758b842dc3549e4018ec4d78d36fc92fc59bec651b5af3066d28fa7a14998829c453441995ea909241ad841bae6325b91d2ffb1125553a8426bee76b7a0e0a78cf0d79e85a1d35f03a0f7432e2edfba98bce50011a13c02116beb6d7609baa71dbebdb0d8f3832f89962f64f3de0d43e7a55c9065f93b3489c038822fcb1e3a25403289befd8458197303708dd8625bb623a6bbdeda99028669a8253c7906176168cb8e64bbd1f45e4dbdb679690f838557d52a44476e23f8e9e88a6c873e0d8c3c869144f7401dd1a3f739eb1834baa142d79628b4bf3ca95a8c24376e5019f61775401467a4209f457f2ad2f1d6bd56dd0cf1c3a5e362591de3dbb4a4e070977278dd571800b729fbd99eaeea261069779dfb2894c6e917ff207df206df33bfbdfb8941625c9fd47f277f18df0e493a399e9eb092ebb263ef77f17fa050a4d86ed24dd75ec8e2fbd98075aaa9f1ea5358ec7ee8e6d1ac1e1e7bdf99f34754e6819e8997c12578d4d0b67e7d1226623906223c3c78d982d629dad352e29fb98628353824d3cd5577d4c77023356856a3fca5691def796950d8350ea46a978ec7055c9fca29e0342e1bcb11a478fc222ea934b8eaea5bf9275f86a699f7014064fe43127e2aeb54ff779eec06aa099221a47f9e9b91aeed4720b0f05cefd1e816446781a7b77d1936b35400ad94060d459617804f5ef82f72c9077d2028580653ad56801f61fb3ea3753df64ae64e4f87ffa1767f56558565cb78b9982401f28c95b02586f9cb19e91b1e191b640d039076844785d27e549a6b3630b82e0a2rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.25-0.2.1.src.rpmlocale(mozilla-xulrunner192:af;as;be;bg;bn_BD;bn_IN;cy;el;eo;es_MX;et;eu;fa;fy_NL;ga_IE;gl;gu_IN;he;hi_IN;hr;id;is;ka;kk;kn;ku;lt;lv;mk;ml;mr;nn_NO;oc;or;pa_IN;rm;ro;si;sk;sl;sq;sr;ta;ta_LK;te;th;tr;uk;vi)mozilla-xulrunner192-translations-othermozilla-xulrunner192-translations-other(x86-32)    mozilla-xulrunner192rpmlib(VersionedDependencies)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)1.9.2.253.0.3-14.0-13.0.4-14.4.6-14.8.0N@N@NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2mozilla-xulrunner192-translationsbuild02 1324491816wxD    !&'$%()*+,-./011.9.2.25-0.2.11.9.2.25-0.2.11.9.2.25-0.2.1xulrunner-1.9.2.25chromeaf.jaraf.manifestas.jaras.manifestast.jarast.manifestbe.jarbe.manifestbg.jarbg.manifestbn-BD.jarbn-BD.manifestbn-IN.jarbn-IN.manifestcy.jarcy.manifestel.jarel.manifesteo.jareo.manifestes-MX.jares-MX.manifestet.jaret.manifesteu.jareu.manifestfa.jarfa.manifestfy-NL.jarfy-NL.manifestga-IE.jarga-IE.manifestgd.jargd.manifestgl.jargl.manifestgu-IN.jargu-IN.manifesthe.jarhe.manifesthi-IN.jarhi-IN.manifesthr.jarhr.manifestid.jarid.manifestis.jaris.manifestka.jarka.manifestkk.jarkk.manifestkn.jarkn.manifestku.jarku.manifestlt.jarlt.manifestlv.jarlv.manifestmk.jarmk.manifestml.jarml.manifestmr.jarmr.manifestnn-NO.jarnn-NO.manifestoc.jaroc.manifestor.jaror.manifestpa-IN.jarpa-IN.manifestrm.jarrm.manifestro.jarro.manifestsi.jarsi.manifestsk.jarsk.manifestsl.jarsl.manifestsq.jarsq.manifestsr.jarsr.manifestta-LK.jarta-LK.manifestta.jarta.manifestte.jarte.manifestth.jarth.manifesttr.jartr.manifestuk.jaruk.manifestvi.jarvi.manifest/usr/lib//usr/lib/xulrunner-1.9.2.25//usr/lib/xulrunner-1.9.2.25/chrome/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/592da497be5cae8c8a214bdd90d238bc-mozilla-xulrunner192drpmlzma5i586-suse-linuxQ t)CZVc]?]"k%R^rjae E,z5e Y!˗c]k[~>ʋo󨔑TpvxXBzLT|ܡt:ǔzaz cU8 /f^yHDmdg W|Sg=&@-'("v(||>9lvƧ LLdsT.Kb1}7S6vv ,?Wަi-凗oo^G#ұWܛ]> F.|z˾K|e{Wu&Il9==!v5 [v=8v"˞}/DsUmk>Au>"9:1$ةlT!9MxVțB(ptq1i>:׳CS1dDHVOn-_xOjE:@H':pt_*lCA+|"4!|E#ً͎ڭ< ^U`0b-U Mi|<) E48ݹ&"^lp#$ٙ݋D~ =UG@;^IMtlLG@۩׍j Kx> &r2øBA} aG;0&D!-A䥞foR&==z;N{g-pW~myBI?h̊'xaq*m+#i#\I7م:񖱖DG֏ M3_1Ǭ `X-mc)FK  T8b6`oL^Wra9}7΃"~I0$_ `ٝ{[m[fSwQpȕz%"Y_bۼJW !x'j|+ UlJ= 7Ua[!=/z\ oFM5MiI5f?o+x(ݮ1UgD|Zh"WizI4r6$%m(DY!Pg $B!gLP^[d0?yܻn!dAS번BJ\mI2~mCw/.;\(7~.#Y{N[V_V Wu`2arL"$܊"ό ﻰ67#!@4lE2h,SmIAxTk}n¨50o%3N "{Io2ٻ;QH<xS Ytx뜭ƹfbBj"w5X1hإ0>TMo]7 w=xߊ1X~~.#G~{pglf6IVD ސ?wo<)s2m29} q LlU6Wp'/,L#}%b kP ~LFm6w u=e;=0f?7u1>BUh3oGzñ[i(xՀ\.PDp#ӱ1!r"z^о{X']в“rچLP&yhE !kJ2F)U ۶7 ,bk5&(0!UYHװ>!WQ"IHXiw Dr(,Uu̓F02<ځ) -B# Hw5Un϶-ܢ/KwHܭU&XF; F=V'=|Vxڍa_#.1tg),pp61DK(dHkeX>t#ߨ c>ɨn%b@o:W7 * CMXpU<>xmykU)GRpmϺGuA=:^YD61 gȰd^3)R;xipdL4SɉⲈ fb^bj\ 62yЁ[vK^?-evq՚Z/I@y5@+#I0öPq|Tu5?@Ĵ y:J2.h|6R1${_x PHR'l3 %hn|[d9cP4t}ա jpӌ+b јF2rsNK57^=x?U1D΋fgp N~Q%F (с n"fǒaciنaPafz]9y5®,^lpz-@$΅2Jd| ȗxVY)u_'8n V(F oTm@8IWY_Ƀ*T˃ cr,H56I!@TOߓXU+ XF.M NV^kαK߅ecʘ d6Gߔ9& r  <-q(Fe\Xxmա)*Y9TLN}Ap+jE^ XlU5 tTB4Mhip)H@/Y6QxФ b@c7)`,% zJ%U{^Q&Θ*ʅ%+I5ugg\T d,]RgX2[,犒Ey]v%d|l.1(7 & uEsgnJ/PbNYDoAEgi˷$'G.I:w2dYTs.Z}^)9oh4hL 0>[xkc=<M%8+BD>VrӢWn+v$\!,8-00ٮnsPUN[ג/'â1c)x1LɘG񧥗-gQC>5$V$w99#|):VX( 9eHFܣI4n-M81 KY JbtGT]]?iq(~=awboo%#W2Yְ- \KPC„!=Cq _nHډh-dA{E07\![?O (hPkoy[E;ZI.U)5{9癪GQv i{EyP.xv2big|pHCݩS+͞|ОetiƚFxčїpk km9 Έ0BԨ^$kHIbjRa NRP,' k3-jo#h.M5q3BSa&Z<`Q:9k&y><Ω$QH,աL bQm?,}1!y njP+9^%g@п',Mñ5K;U5uLEZKD4a$j},z@|oywJb;/UD0fK1w[;,/Mgۓ=1%~_ڼ,U5fwZ"ʝIc.@Eh?OXKj޾ggTǒ: GXkC6@cu}G?.ZLUbeB{WXUZ $@Z/LoƉ8өUrΧ3rʙ=[ubT( M7&W|J:p8W&Av`/͂v,zѮZ)л\jM>%.Z\g +' \8c|3N(aWwl2T7tc:-K)ؒ0N lHÈ[Uǝ+syX\Ăbjo(|LG4=>u`p=5$Jw~N<* ޳}x0AFnT DT.-1!Th꫺i=P* uBVi}WErcpՕ첈 rh PVU: uIu x٠c_$`J-\wW*T'Zك(4(^N"C\v[,2fi\Z:遅] S(- FDl@L=8b > ޘzak KIӭ-eiu9g$^;K32π+@m ^iݒqfk0 PlF{z(gc~^B*BϴV1Kˠ|٪ŗ1-9}?yíu:i9"H,V%4J%OKf-6ډnȦUk$*{̑XX5 v:tszh&0յk5[#F݂- h%ڦx"6T45B״0?a./79c y.nؿ/LޚR{uL .>U\bEѷ77}EG-Kӏ6粌7!|子&P~B 'ͥc79>.pV9XIQfٚJ@ #@z^0<]kjԡdzk报ɘ3Va霧փ0Z~M O($ZhayRd|bw&g7amրj;0 Y뺔 YVZoAgum~~ߜ9~9KΝJ ui_MA 1A6:߮r!)ؙ:tEQ!k,uko^圡dEԩW\( b%>eku2yJ+q] AѲnͯ7ϏR/_L;$ʂB op7k=O =l*Yc3w˙o`W02 ->dXժ'4{W* .oݍgPutQMR(|옟Xh&TAv̟R@dv9M_YvCςCj=b!ii6u!Е[baV?z1{7 ג.}6TwxH-"cF€?0!莯Ӵb٢[Xؙo]&Pۍ6/Fk)٨as ݉;J)3 ZFWJ'wt+ٱ&A7n$MVa0{ @ j4`K nKHケ'QJ!BlҀTil+ͽ t"tPzFsddDojp-Qp\JC<82µ#mͻcN$tP )LC++-]?*(*'/3c=DDr?k߅`?NL&b7Mtfk|d*JU67seK ADu4T?[Dkl J Ó&2ى|3='롭wX[p\l+SJfh[t?h//+ug\xue#N.*q.em6"(bYmh7 Cm:ldrڨ qun2ze6f͚)yI``kq>-NuFY d.8'Xfw$;ۃ'nq**z2ؗ_sz09(RRuKzBlS؃d|V~.ۂiDsd7Z@} YG^"kSƶO"R|l8m H5FaL4Ad$kaƱ˜_(*fL% @Iw&+5$4 (=}/ J[X6Y Q*]z|L=Sc6#5u^i:mq{V84:4- ߭I~pײG"\j&bX!g"<3nAq'3Q8ugb r#h GEӦ:|GW:iR9s^#0jty3ǝ;lH{KT䞅+O$u?q y0`+f/|WxLqGL0fMpQ"i!2ُ/f/rPg7d櫰W] Xwo+s$v2F_SI\yVir3"/U Yv< H ]˻#QXQt} VƘ8LT W43y/dMƵv -gT멄}iDʺ*lKuI4 ܼw5bJ8A0IGnݮdbԞD70rMTK]!Lo+D_cJ!I ;~AA-!wi,CS(+(&׶%4YI5O^oC ( J؂*[rƶ~2^i᧪ xBQ$n>̍>2ivnь: $%wp*꛵GIIW,}v 4YV}e>^L}36j "w$W&tؗDf:j=8 G{,79' `$d/BHH'cf -L[!M_揁p ;J~k@BfH:$,gm.+̈́ڃJKޣ9)X:p)~' w-@ `f {w֧,螧ho=@TEԵ|9 i-o5Z%ev,f]6GK~`n6~܅* (@Ίt%\s$>ExZh<JvӿI,+z[H ^,Bw`hrM`څ[PYfGZZh.PC-834Ub0T-Gت@>Q]^-]r:RV2Y oniYTU!p!:@#}$ ۮj|Av^9Sq?ݐm.e`wzW74?"?[05 z.I+kDJ~4qS QӯFP K ]†CSĔ@Țas}ӾOӏl&z8&E}GOE/{_wu-GJ[8ʥxާMw&ͅm.1 /g;{!c?W|&9LGG"8>u?(^~YR4 5@F=xVgMW^b1SZܙ.A:Cb/<d9/Ng|g׷\)[H2nr˄iړ{Y.zͼqwfJRp!&7f?;"QK{{1Bo %C4)@P%n<[`DvpҧH+N>d/DijESt x.ے:=Id $G-_ez8 5s5q (kfJ}[~If}N]u?ry6ѴP0l) ]`s_KμY׸s18/AQY \"m^U$2c$R:Xf %|W~-rm$Q;Q)]s"g {&i΄i.K J!qn//>rDpJ7 *vmMK&Qc <<$T|c*McF/:le81EҭE9y^zr;}uIue!+q0f@*\T&3Qh$dŽD1( p]EMY EyamP.%p owߦNuLdSbHk?C(1U^\$ vTL t7kEK VQ Ct?{h`WuaJvIB ek["`i$;.1c׵H{ >إoLL O:Ƀ' g<]B`-) PK;s>iRE#WL/썺^ w6{7Kïpgѵ WIeMj;EL3v+ZL^}O |9R,4ǹj2M/Gr+\EV%'y,'a,;g$dFdO <۰$^ȏ_y-AB^5_Mh2OE΄}f|uOt%{XwmxEDN0,9@zz*װ5{L ?5ZPWeOi/nlarOjwٮyN=fdsUqd2jfKji!rM%@_1s#1:{dJ T(Sv&ęCCi`*Lb%1;*F^gQau,u.xszFf kz:Y4PX_UI:#!2©\ |7IK'#ׄ UNUy 3;P )xQ  ,\޶*$7!c_h, ];r zQ?􋀫yuE<ZUcg+$*~ >@-w¥$`$b"?]]Uof5VUC(@p2x]Wg-3  цTGx(Fhgv$ܖs0w'$ }?%(IN8&g!cTqeb??,Zk7gC/)} JA{bH,WG~_\ZZ)?Y1? ?z "Wh\6;]_uaY~UǢJ̦Kz>2dYDm;4}v_| 'P8VϢ SS@GAmCZh)6d(_ fq&K6QnI={ S!_iӜ2v,nRd7ן\ɹo8 $,.|,ZAZΉ4/ġ`m І y+!TTrS1sC1 1FufrAE{,rsC_PNs.J$e&9R"0R 0&iᇠ#<,4y]ۓ5" Wb2@gț55htY@WTFG&њgMx>2Wk答p_*ܙݒأVg+V{r*-OYaq@_k($l^e2FPX?`JB.]_u-Պ9ؖ`^2j6b, *'l&^0D|YA< A8:lBI߫G[y??"}`OA+JR')vqE#Ľ vZs§ ҩnj ʚjdKң>{g;^ Vt̟4"&bX6P Pxm; >]MGwv.f ӞgIJ3X4I \C,cA-p^mGu!.D& '14̥Y3㗝ud SKpBTgB ջsgtGtUfQL8s*C.IO0@|2oTsBtV4[nsz~ZDI;n>@^9ܙqY;w$BQṠTzůrh~@DnxV_, %Dj/gGy8-YKo;3 nM3.~TKP}Z'.*|EFkE$p6pu1[KɃC, l7ڔe1y|-<mFe>;xlx%P̖uƜ6Ӄ'Ki`%q8ߕ:@jԈ,!U˫ Qjo43KMv]RL5e1PB8/x(`5e4dżĿzYV͖"!+?CtBk+$ 6]MtRg9; g+ZrT9\wzzyުM1eovSGbRX?k8ؘLҳ-AwJ5ڗ$UoqەE%stbúA?rCʱq*a%,d/!#o IޝlHXE-S~"%Gl7ae6d!yQ@eڦ6~{*K.m{{&96.܇A36"@ i&NQ3S1jkz C?Y/&W,~'͵xO鐲IJP$E>Qş_љM+ݐ 5)P9ZHc J\l0Zە_JqDžc_q KOj1*LB#A}B]'R82ReFx-y~M zVw#'ģ DM$%f,i0ミ4pNn-o؂369%ϭ(n*uMm^#e{=ZEO#9 9'% %]MYVG~2rz;T$(_+Wm6 V_I$W}.9Z}9`4g>|o2!6SZ!i^F87zhpa0L,*a'T b3(f溒fcpBóIBr~ְԍp}2W06mjp{(R sc.5.Ϥ͛w`~YΙ.Bh:7l{{oX~j3S`pVRD럏]U>^kz%Bg3mʯǂwpx`C$`@fx::w֋?^FYdC=&{yv86c\uGFxow;&oiΓOcŃHlM#߅j=O1ecѯ8 XI+Gzw:sm\!ƫ!@_%d=^8@yS8]8eax)Aɠq 2EHOOVX3Q$E=v*< "ȣ73x+=<2F{XwZX b4 юOΒAh?4c >q-=)%ݽX9ag`ōaxY s2@mONԍi'3j@ Eϕ7cK4 /Qd'mlV$Mc3#6/7ǮcB>QDۑ9 0q#\r-Ax/7yIR*>L1vnP0pH` " wu};e;f6B)W|*M&H&WU{$0~4jvȯbȱFp!rNRW?rcz$m.y0qt2'#*4A>xZ3 מ9vQJa8irA]4 /Eq#r:Nw6kǘa}8$YrD[+y×#c_т7 yϾV5'p6u? v@Og7Bn;“q Ҡ'8 V6sWd B_JcN|$*RJOW 6% =kgj _Q4{#")N]_9m;j0um>ʍ58=D5ϵv=ٷl'X:H>C.;K/{5J.#h,;1{ew8j[uex\x6}Yn^_ԫ @n2#Nx=ΫXXVbR3)K9ޔHRa{RM[ lރ9`Z㰿ɥoڨfbFǵVhĵrL38͹ꋏ_STM NAHi.w>ApKqRk{DJ(> aשbł\÷pkte!V F*M=?.gb}%CEIfw'1{0 2ǁW!S+RG$*P&S!"V//G6_9fyf7Fܪ|,HT0O|qv-J&ɑ_>v" b ^c$ uAqaAsf1YL_xbY)Jtܛ[$vyOtL9`aV3,ΨRUqw5~Đ>jth3Ri~|*Q/:@^$9@ܰ}q'GzˬbJial~`B-O2eP f Ff{Qjr)} qmd& e8풊@m҈S>{=a͂\Y+.G3F% +Q')beO;f+g0B27nPeiG0hE guODw fEX@L/<Vͺ؟0{H|d`V Ηpԋ8$Ԋ,H(~}h ܄s O^>{N'erӄqlk )6I䝚nxV̞{$ҢM=ɤ~Fer4)|:gp@+ʐ/{%*qR o}~ܴJSP5}US@57sjpt ԟ*⊑Ɯkw/RԭQ*]Q_(ݔI #5Lxe$UĻDG~48f%^W,SӋ ђ-&H+Խ2}FڮGs,.HwӘCMLrb[¥/oeӑ&1#yGf {*7,#>qm=2Iү!snүaLCNn8C cR :auO3>℅ZlBً=ݪ([ /֫_>`Y9`F'UNt(6UBm`}NDyJuXӰZɻer/L6<[m$Ag`(Ob_kL$}",h,I9tt G.Pz[?w@xLVXGG ) ej+Ӫwt Ȓ Dl} o;*c@J™XC,u"31zXub{R>?F.2rNrq)+<ik"ATnw\Z I%Jgq39W߳=6auh h}HzĜj>kP#c}Y0+fX#S͊#-{L';4CD9) %it$M(EcZ20kVSOYuc)_2 SCdNW4}}L@2itCzQ?hrrFD)OūϣQ;`'!`ĐމaCp~GEXhi6XHF;bWGt=Ifp]V&cƠi.]Υ6>PzhFtWREF?T~B, ^-!eAIATE!!g^<%-=Mʋ n^KsZzUێݹId vVZgI)ܽմsC':heԦϦ:mÒ*(_Zx诹1}0%;jTT5(0J# 3VEO?:qs-Td_'d\I=4p_]b-04#5w"Tn_p+Zt}F@{K6DZx. Ģ.l(^+x1Ф 3[W=].U3㋹'+"ڐ*bv+lww?W⛚~MLSq '6V ,~.iٜ\IDnػ^mhWHg%4TzRE +(?Xz 8jQ+2?"I;t^IO? ^q;7̠̀0=zPr h5?X7O$ A6@n h&F8ţ#?>j#]."@Eyge)=`pr'0DL`W_lO) @]p4,ŬQ=/MQQ6M3jWi7/5WQS u Pl橑ʚ݆ӌx|,s ؆LTz=+}[9z$SRtMM$tAAn T̀P-[V 4|ۤNWZzc C& (C ^dPCF^Z&$cw %ei\Q rv }\(C=GzbTV  M݌@Ws[1 uٚf|5e(25`{'6\XIғUמܑJ?:"۝kzyYIJ_lse: A;6{2",iMT ck48u_=w~yK|;R옢wN`Rr,%gĠcVQP4?*s%C>۹cݾ{i* rv0h.Wp\SlPr[_q! kj)iё\Ea5/9FJvOb^aPҨ f #> m1l`H6Cjf!waV}jhPkL! wʬ-/l=P2G箱IyUXz4>D\mQܡ/oDktgd:r36װzb4 !F/`rLmP4ەa~jdBV/gݱTQuKݽկ)dxZu[0 1cg` 3yWI 4K,nrH_K]AZLy_|MA7r8BT]$dSK_/c|T&+[#_ӣcAGњ`y순r0PV޵q z"u^&y7'&fc-|IB˙=du ZZA神i;@ Buq!O(e>FӶ \Ys{W/ F(?nx*T,taL~3w:+N$!:ہ}J#]ݙ|W;vEb{Ō6$w)gʻDX.EC5"_圗m3rADQ<c, cPTQh%dTG~MBq:wlӆa |oi2Χ߳<\]/ S;!ҋ61&мU$20cU2^_cz227ÐHMY&l̼qlD-=/-\S{fBڨu3@_aLԉ?7vlV휕Cn#4 qe% cf7djΌcxl -ct z"d;5^4"^.]pw *T+&"R&8$j|Rj{,i]ZX qs5frR NZQ'/3X-n4ex"zI] $=L*N;e3 yT]G0 f]-wm@1w Q8bwەbrm־lye Cd2BC5[U.+䖕B5=m5g?Z4)E6. c 3\=n[;*㉭$dE Fһfݍ] %3a~R̕ȣ;.,]$q-?C9G11㷋]HH!tFF7×ػ>U#3x^[`Ϊj-a[6؟|\,NtdD\ n1w=5+~5B%i c{i >V'¯*ј7jmo`ĪUev͒:/bTqK/cs'?><.uxQn^_Rw's,jW!H-;]k@uO DCN;ǔEkJ $r=i*qFg?-ِTZW'uو^n_5xs"ɐy4LFĽ.OғUWaj\ՈS:zi|fmu al=x23 mLCVblda+{wƒYиќ>~L席@ÀI\e]Y&6CT UrRpK o{.пYیӁ'弌rdsRSM 67JFgVVT7mw+F:aftP0!onЭDRZsbPfC˖7ݒgplp / $;sne3{]^'d]tVOS9#I)wdi{z{ "g)6GgpG%\Pr6[%! A(5|% j%*qC}1"ta7.Tcڡ+ Vym };}%K3@{чqy\c_k s e6q,'뇫_xXj <+ם ǖ*Ap71Sᘴ#k ,rȐq)ehHm*")O<;]vWẎ.כJ9řS M `z=i\`j,A9u}*8곖iCf0Jĩm3^2a74SpC^IB}_B niM.Xw B,%WW  1#eѨ`hY'͵Rf#$h9V.@:YMRH$(`@׊ey%E,myFZ֢#  ,ty|e^rt1neF!/k=FnCYJbjtO5S쯺8*W0o;b 0$i,#`=m% G)+C7m JR>b*m\mFӼCq_dzM57|ګ * ga1練=D6y% hR:zLXp}n;H]Lwtx'0D=섆L%G;ؙ*3p6K*E8C{ӽ?lU^Bi@C^:v(Dr3 Er͉.蘇~dݿBFyD|3nhXPG9*8jH׺13^@+c^&N>GqT7 {Vc\@;WfgcSoHBvS~p3ɻ vQsr^A[2]AlYZA@.HogY e+MaKH1zcdޕc|