seamonkey-translations-other-2.0.14-0.2.1<>,xUMʔ/=„< &09_;&|O_Kl`/{A)vB} LI,*hBDF[G>ԔXjPyp?`:o9';M_aFG'&R˃&+PI ޝQvSRѣ*O3PTfWA?U^ҡ.L*ScH޷pmr=ڻ&+Yx TA{ dSխa+ uꌹ+AW۱Vˡ퐟s؉>5:?:d& , M AGL |        h  t   < la(89:F8 G8 H8L I8| X8Y8\8 ]8 ^9Rb9mc9d:\e:af:fl:hz:xCseamonkey-translations-other2.0.140.2.1Extra translations for SeaMonkeyThis package contains several optional languages for the user interface of SeaMonkey.Mbuild27ڭopenSUSE 11.4openSUSEMPLv1.1 or GPLv2+ or LGPLv2.1+http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.org/projects/seamonkeylinuxi586!+c"Ec,Qc&c"tc!cM\M\MMMMMMMMMMb37aaa5b009c3cb724f51601f0644d5a325c92aebc951e8d5abe4b1a2981a214913571b518a5d5483994ef929aba7d48c7a8b5931a0e96f309c33be14cd508a9e1a5931c52145908b2337d188ab50c619179957fc35407b407d9059e5cb3d313d6ff0571782d0c93acbcd95374121e616469c8920cf2c2a4a9d4f9b8f4522c252d8bceb9e47ad14c70601bb1af160ef87d04341f201fabe8a607b1fab9ec1445ddfe40ea29685cda15d6dee23a471e13c4ef43f9f4f0da72624d9018c9e5ca6drootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootseamonkey-2.0.14-0.2.1.src.rpmlocale(seamonkey:be;gl;ka;lt;sk;tr)seamonkey-translations-otherseamonkey-translations-other(x86-32)    rpmlib(VersionedDependencies)seamonkeyrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-12.0.144.0-13.0.4-14.4.6-14.8.0MmM@MM=iM*LOL@L@L@LvW@L@IKK@KK{@KTM@KC)K JTJ@J0@J:Jn@JeJUJ8I@I3pcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgvuntz@opensuse.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- fixed hunspell patch- security update to version 2.0.14 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- security update to version 2.0.13 (bnc#680771) * MFSA 2011-11 (bmo#642395) Update HTTPS certificate blacklist- security update to version 2.0.12 (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- add x-scheme-handlers to desktop files as needed by newer Gnome environment- security update to version 2.0.11 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to version 2.0.10 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to version 2.0.9 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753, bnc#642502) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange * removed upstreamed mozilla-helper-app.patch - require mozilla-nss >= 3.12.8- update to 2.0.8 * fixing startup topcrash (bmo#594699) * add "face" to the list of white-listed attributes (bmo#592601) - added Cairo LCD filter patch to enable subpixel hinting where supported (bnc#638186) (mozilla-cairo-lcd.patch)- security upate to 2.0.7 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-60/CVE-2010-2763 (bmo#585284) XSS using SJOW scripted function * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - always use internal cairo (bnc#622375, bnc#626042)- security update to 2.0.6 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- security update to 2.0.5 (bnc#603356) * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.1.10) * MFSA 2010-27/CVE-2010-0183 (bmo#557174) Use-after-free error in nsCycleCollector::MarkRoots() * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- security update to 2.0.4 (bnc#586567) * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-17/CVE-2010-0175 (bmo#540100,375928) Remote code execution with use-after-free in nsTreeSelection * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy- added translation subpackages- security update to 2.0.3 (bnc#576969) * MFSA-2010-01/CVE-2010-0159 Crashes with evidence of memory corruption * MFSA-2010-02/CVE-2010-0160 Web Worker Array Handling Heap Corruption Vulnerability * MFSA-2010-03/CVE-2009-1571 (bmo#526500) Use-after-free crash in HTML parser * MFSA-2010-04/CVE-2009-3988 (bmo#504862) XSS due to window.dialogArguments being readable cross-domain * MFSA-2010-05/CVE-2010-0162 (bmo#455472) XSS hazard using SVG document and binary Content-Type- Remove unneeded orbit-devel BuildRequires.- stability update to 2.0.2 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193)- security update to 2.0.1 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener- update to 2.0rc2 which might become the final 2.0 version * based on final Gecko 1.9.1.4 (build3)- update to 2.0rc1 * based on Gecko 1.9.1.4 * removed upstreamed patches * compatible with enigmail (bnc#544326, bnc#530811) - fixed startup notification (bnc#518603) (mozilla-startup-notification.patch)- update to 2.0b2 * removed obsolete mozilla-jemalloc_deepbind.patch and mozilla-app-launcher.patch - remove obsolete code for protocol handlers (bmo#389732) - allow alternative button order for Gtk filechooser (bnc#527418) - added mozilla-prefer_plugin_pref.patch to introduce a new set of prefs to support preferring certain plugins for mime-types - added mozilla-sysplugin-biarch.patch to use /usr/$LIB/mozilla/plugins as system plugin dir (bmo#496708)- added Provides and Obsoletes for package merge (bnc#532678) - allow alternative button order for Gtk filechooser (bnc#527418)- fixed %exclude usage- update to 2.0b1 - added create-tar.sh to source package - removed enigmail as it's provided as an own package built in Thunderbird now- update to 2.0a3-20090707 snapshot - define MOZ_APP_LAUNCHER for session management (bmo#453689) (mozilla-app-launcher.patch and mozilla.sh.in) - move intl.locale.matchOS to distribution specific prefs (removed locale.patch) - moved openSUSE specific prefs from greprefs to app prefs - added mozilla-jemalloc_deepbind.patch to fix various possible crashes (bnc#503151, bmo#493541) - added seamonkey-no-update.patch to hide the update menu item- major update to 2.0a3-20090617 * based on Gecko 1.9.1 * ported to Mozilla's toolkit- security update to 1.1.16 (bnc#488955,489411,492354) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift- update to security release 1.1.15 (bnc#478625) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazards - use nss-shared-helper from 11.1 on which allows migrating to and sharing with other applications using NSS (can be disabled completely exporting MOZ_SM_NO_NSSHELPER=1)build27 1304101535 C D ! !   ! ! ! !2.0.14-0.2.12.0.14-0.2.1be.jarbe.manifestgl.jargl.manifestka.jarka.manifestlt.jarlt.manifestsk.jarsk.manifesttr.jartr.manifest/usr/lib/seamonkey/chrome/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/e75526923680aaa5035d496c22128be3-seamonkeycpiolzma5i586-suse-linuxKs7'a2?] "k%%d: k524 mFdo@<*[N5;R ՅT=؅N(SܬijJd.x`I"7{ul1i& aJ 4-jlf I_[Ɗ_tm+>XSmc[8g gVU tK,- =mbo =e5!b MXfLFeSqxr#`o|-Aw /D\{s&B{ ?E*͗((x,]ψ1Gh {պϯ,llgnw{`ʑv@4o_ozWxӊ&,X,/N޳Kll!г6C^-!9PQ5mH5B'7_H\WMF$x0Tz,yYOqLˑ3pjo4j|kuB׭?gT\~Nxh')'JCNn(BmGzhN2=`z Gp~.Kxy$B _Eџ0b˳( _K,`ȶeJSx2Ť>3tf-i7c<˸*q2_^"D;T‰W]SP_38k~mq_>K3xE>dγ0҂@X&r*{`t*a_5ЈmV&v8h%>&(:І&I9温Bڝ˙OV,Q (A񹓙 lB‰?C3sxl#ģ=ATIˤ/a5KbȾ7{/\]JIU_([4n`:4]`yci`9m) 00Wʹ{|Gcz[b|;o<@ې#_%Qe͎CuʠԚpc1kO3t?ٜ ?Tj j!~gk$;~ReWiD|CkNG1[D!H_BKRq#6u_b92)P~yDӕ]Z`cƤPXʭyGn(~p @Ěy}gI`KofNgCLI[bhڠ`QTR !2tKW/) _:"+඲>) ,fc٣<+<9kGB . +bd)CZ$(idE# tVO7-3&-zQ 1u6`~/> #% x}V{zbgq(4Á5"E'Z.,<e2#~8W2/ TӓOν #!$'b+461= ,&Oh+&5P& ~G"0' uT'|X6x¡UfMytK@ő՟-#GI@JoWi[dħ$pH*?"k: w{LW6o{ #W+.Lsry}6T·ϛO.^w]ZBêNjQp,4p@ &VtJݹYKbck,@]'R45`_xBV:ѲHsQ 3`m7?l6~G7TgWs$0-N#M)xJm+]mȄ?TjUm∡̚K,醰P4G1; _4J͡#^XJ4q&qP\oy+[' 2_(+"Z3MK.ջS\als׿caLj&hFT4^ZvKti†}7 ?LOY=^YU-WTg[w2tM&ẏ8Oô.ёeA< ːv kCu:]"MBK~<sSYB%(QPe>i)_r:m:0_W S0'Ps*%B>!Sl/Wyl=UHw$`3s`S?u8y /i@xS 51 c&yKIe"=ܒM `l,Dea]b'/"eRqˀ%4P_cdnsz{n2 ~g]ux6"G_26);pH sZkRC^)E~ȑw@rN]INBܶ3TC10a,܂6)h#N B 0>74vc"ꌍdg\Qay{IV3ʀ& G#ڏ.e(>FݩcbepV[V8z7MRpYGPS.喾WpDWL,A& ޘ7Rut;?[Zڬ;f|\o&p~Jff'a\8^[/+)Yxt64 ۄ`[OrY&:b #cCM,oS~%E>>Lq}~%أo*fnԅcdR((hIsV)9OJ|W̛7'`0v|QXM6%80fh9p؎kcJy6׽ x_¸,Xj&O}GϦ|t>&"qRcv,\=ghTi_=5CE7tƾ<V~NЊ$Q?ֻ[0Zs;5+H޷~L-cLAZݱu/ OP5E0M-V.- ױT7!]&,R4ʳ4ߔ-:!p ec.r7;8BAW ^9׵ GQhX] ;=B ,BT'͞U,hQK<\%UF3qkq$P[iX߽sfֹ gmn?T< )]!z9)"Ţo U}E$hu}MxݸK 'I4T7=5O&e":= G7LW4`Av# i h1iB"G֡#4u~.$o +\TvN&g#9>C+ Vtyt \Uuo]_ꚙ1ם0O9"/rq@֯kZ*U7>pCM5,u&f/w@*{HBS~` RHy?zDևa/!_"vŌCՍQ?-.}_{ FC.QEυaglǰݱ LdxZb4vcEɚαצ5HjHEkip dN|1i(زsY-cIXcѵ~à ZsJo"iՂau291]KtΕΠ7# qO ˶":8`Bf Jpi:K+ tkA&lNuq A)veN λc-RW Z0Eݖ|jX&c $ƀ8*E=T`X_(l#D#A(j9waHZ m_!FsjoZtviId 1$WJ}~sl *}V4\6ɻbrO|ӌL~^WQkm~# d}SQNl{Cb3n(k|/IZK|`F;FIR- oWp T 7^O )G{qhFXV9 `ܡf3[C0ĺMvE*Vf?Zz&,'4m)lE=6zNvu4m'3S١2N'qƙzx4WgzO~=;R#P0MYm8ud7MͬEMBYkф,yDI!'z-*YcnK Gy@ U2+C^j^Fd5(f YFk1{{F>Yؠa(LCyN vA* h)E3ͳšs B |=gH[hG\GJ KV5ݲ_}봑?(d,]<oV/]QLRÙ?jnlhUy4S=&6~SH6 k\Cؔ]@AUI\6.^AQ Fl-m )p'y ox>`Z$;~ 2O9g$6Uv> :4q8ZnZIPC]ad@vʌOu%ې ؄&/JJ U{n "NퟴрU7Y|*_I$ؠ,3w*<89XHqG!$qqqQ7'-.Rs\e,HXo=EN/煳MC&dpRqFGS'uN*`N_6(gS )]nSBk,^cNsO7m,pB6U z8Ěi6:&c6Nd29 iU" E 07D}u׀D _ zp8zN`bz k e? 7q8zYBsZ]ɕ=cyA7ilg#(1tf.}h V?ר _*V𸴣QɌuk{bDHdȥk/j<1zxh-`E2*U1Hnj>1"^ܹR^U?. O/FɆ jWYۣeUM%'L4v'B0i1>?,5*}R5s8TiA6=;g*][G(zqai'TNqf1Q9/`2 =Z?oIoٿu/>᪀6Z WcM5l 1pK_~cX!݈,ތ7^*3jqb zDIQ FHX6DK,z|Cn @ߪ)4IHJwVDϲVԍ'%* P0R̨lCShL =޳ϒmm b fe{}0[`' I \OMT+vv`_{ C&5klؑ'$orcyNiI.f[V J@ )cqTz[xp,矟]ru5pۜv=+O}*O&?XLg*DS/}0"mx_l_OqFԩ]T4iKD`o">s7@A%Ĝ 'эA0OplÒPT'$Kӄځm{/~k*hxYD(,i"R[Tڃyô%a*g*m€zB$;jKΆ]mΉVА%dkAkk ך(CNm;oͶӼJWsm97Z4/ 0*a9Ξi<#®O5,Umʾr_)F3ƭU\a}v /D3i܉.&93n9"lv'W,/8jYFH-L_aD'_9>iBRBMܜFcs)TFF#2hW3[G2"g].lS#ipU3U`\(`11>>gj(+_ũ1\Ic$P&|@N֬ ~?.뭫YIތ60Aem LgS W,;B=CȓƮ8VEq8nTVP:% ,8X}QJFkB&z ;6*nXA~w?)^l?  {2aw!V,eyUt $cAWzi{FFzid>UQsOzV øh;+2'dv5z7s&o^g7|!JrRAbuyWGc(y`{]Jf1ѦY>^#zOtag]~,:}ȡo^Gʹ~fQ=vJeiL͐8EM^Q;{ )H2?+!N訥}7gk:䂽׈ɏ}~S Ƞ[wF\~4xŪB :UlP#X>f -}mO 񫹚} mc [xpjT;Aք Lxb-O f|hKZ{Kn~5dJ d94pҩyK<>},UㇹIA(!yqWGNlz X@5'q;֕$9zQAM;>WCKvW蘘)*zI?3oG;m=AU[!^k`i|W5 8D><&K WI6D)>I|ޱ@ W:Jk|C)0/&mmJK4$8;?4?V jP ʲ!}X` IC2,@tTkGnÿ?~(RвJxAwE% }U.jS2ڳJgߗU㋶5aJɼC;¢Ku\?5 o>dmd-?~҂7˷>Ҡ&a2U@ h!6EڨT )ਇ`M|8ԑ؝DgG@T$ths󵦝 r u"(+xP75#N1$l:6퓭cA޿`qD(o"%!Rs>MX2"HE cZ- ~} ,.2CZ;%W1(*1E"mƋŠԤnb^4GL4slh{ M2| ^f1y5X!wY)9g#+斊?"I@-)v Im_(ۡE&XULݚGr{=Ϸ 9ˇi3.+zoI3 # =H3L)(*rt# .7^v:`'JWID,Ywa)k*$9נbO5e_c6x+`R0t[}Y[`0̂v|/1JڏGjSn1y=^{f 7xy+y@NjHђH_1*]QTsЦSO(~7֢Ii[!AFzF$6jv NnlqXm@K8Kdp am.=M,Ẁ9%gY&%m}Nc>Olo3Ml aɅ@3dnˡ&+KȬHJ+4$ G߻Lx"Az$g l$,WhEݑGYrZ)NE:X%Cސ=:0TFW͵"v"̰L-O&_YޜIAC>6fu䁙ơC+SdX8Ƣv4 IONc<JQhjIe,aREk3SxQQCܔ ~%"TKd`3]E lst(wjaɫް@noA izᖋG "u6DQ#@B}rH驋1rDF!uZВX6rJ#i.2O١,D$;AN_\П?:ȇšC7׭fAYw"2SbX_ WFA?+8yOƑK; &%x ;1+CwL,#ve(Ht&U`_P J/ԃ=7zo%`$j̕D^"&Ji:t^/3q@3XYBHb Ԑǜ%Z8;;Zui饰'LWWۿD;$AWCp|@Fs n'gMp&h_;p=N3BY(WTOHw'p(]%_̉u`2Λa5A%g1aߐLXʡ@Rv<, /1,AcWF6}T\%`5fawUBeMȚ5'B.=#c#^a22KhY-@7ZRSnRi@'0c n=TeП.~J'^'4DV;1=M/FlUo)ÎY}`oW}I#N^~xm\MMPOQMY^/p"vҿWUkC\j^͜5#,`(ܬ+{Lo7L?@sR0\ft[&@n|39 esBi@h@eK ӎms4 ifh]qaWexҮU"Hz;$ G3}w?]1M .1FiEC%-Cg{zKrX %R5d̕;+[FǛ$hh)qQ<~Dk-.*]sȐΈ2GD/RPR8*ag gs_ џ3Ȏs(@}p2U`F?tk`\v+mDG7xtv^~h7πC!eW[t_͉kd0pOx9-, dfV]q Wj~ͷ S;m:0y+ql:L!31 wC"'%HIڞfء@-s