mozilla-xulrunner192-gnome-1.9.2.26-3.3> A AlpA?O/HkGvmL~fiчz<,OLJ0{MT {s2b537feca3b6d8403b1dd35fb9adb463b12f1e6aXÜ" f8{fޭ?O/HkGvmž jVΘT8uftCCCV @sm|+B/j>6IK?I;d& * VLPX\t  4 > H \  8L x(G8P,9,: ,>FFFGGHGIG0XG8YGX\Gx]G^GbH"cHdIeIfIlIzI+Cmozilla-xulrunner192-gnome1.9.2.263.3XULRunner components depending on gnome-vfsThis subpackage contains the Necko Gnome-VFS and Gnome components which rely on the gnome-vfs subsystem to be installed. They are recommended for full desktop integration but not mandatory for small disk footprint KDE installations for example.O/ubuild16~mozilla / openSUSE_11.2obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+ or LGPL-2.1+Productivity/Otherhttp://www.mozilla.orglinuxi586touch /usr/lib/xulrunner-1.9.2.26/.autoreg exit 00A큤AO/O/O/O/O/d41d8cd98f00b204e9800998ecf8427e3226318ef28bf3e5283cd0787783fe05a0d2a9434969c33d2dd9be37335e9243@rootrootrootrootrootrootrootrootrootrootmozilla-xulrunner192-1.9.2.26-3.3.src.rpmlibmozgnome.solibmozgnome.so(EXPORTED)libmozgnome.so(libmozgnome.so)libnkgnomevfs.solibnkgnomevfs.so(EXPORTED)libnkgnomevfs.so(libnkgnomevfs.so)mozilla-xulrunner192-gnomemozilla-xulrunner192-gnome(x86-32)  @@@@@@@@@@@@@@@@ mozilla-xulrunner192coreutils/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgconf-2.so.4libglib-2.0.so.0libgnomevfs-2.so.0libgobject-2.0.so.0libnotify.so.1libnspr4.solibplc4.solibstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.sorpmlib(PayloadIsLzma)1.9.2.26-3.34.0-13.0.4-14.4.6-14.7.1ON@N@NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L @K @KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgpcerny@suse.compcerny@suse.comwr@rosenauer.orgwr@rosenauer.orgcgiboudeaux@gmx.comwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgpcerny@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgcoolo@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to 1.9.2.26 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-02/CVE-2011-3670 (bmo#504014) * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets- security update to 1.9.2.25 (bnc#737533) * MFSA 2011-59/CVE-2011-3666 (bmo#704622) .jar not treated as executable in Firefox 3.6 on Mac- security update to 1.9.2.24 (bnc#728520) * MFSA 2011-46/CVE-2011-3647 (bmo#680880) loadSubScript unwraps XPCNativeWrapper scope parameter * MFSA 2011-47/CVE-2011-3648 (bmo#690225) Potential XSS against sites using Shift-JIS * MFSA 2011-49/CVE-2011-3650 (bmo#674776) Memory corruption while profiling using Firebug- security update to 1.9.2.23 (bnc#720264) * MFSA 2011-36/CVE-2011-2996 (bmo#555018) Miscellaneous memory safety hazards * MFSA 2011-37/CVE-2011-2998 (bmo#684815) Integer underflow when using JavaScript RegExp * MFSA 2011-38/CVE-2011-2999 (bmo#665548) XSS via plugins and shadowed window.location object * MFSA 2011-39/CVE-2011-3000 (bmo#655389) Defense against multiple Location headers due to CRLF Injection * MFSA 2011-40/CVE-2011-2372/CVE-2011-3001 Code installation through holding down Enter - bring KDE's dialog.xml in sync with original widget- add dbus-1-glib-devel to BuildRequires (not pulled in automatically with 12.1)- security update to 1.9.2.22 (bnc#714931) * Complete blocking of certificates issued by DigiNotar (bmo#683449)- security update to 1.9.2.21 (bnc#714931) * MFSA 2011-34 Protection against fraudulent DigiNotar certificates (bmo#682927)- security update to 1.9.2.20 (bnc#712224) fixed security issues MFSA 2011-30 * CVE-2011-2982 Miscellaneous memory safety hazards * CVE-2011-0084 (bmo#648094) Crash in SVGTextElement.getCharNumAtPosition() * CVE-2011-2981 Privilege escalation using event handlers * CVE-2011-2378 (bmo#572129) Privilege escalation dropping a tab element in content area * CVE-2011-2980 (bmo#642469) Binary planting vulnerability in ThinkPadSensor::Startup * CVE-2011-2983 (bmo#626297) Private data leakage using RegExp.input - added mozilla-implicit-declarations.patch to fix rpmlint/gcc checks - added mozilla-curl.patch to remove obsolete header dependency - added mozilla-linux3.patch to make python symbol dumper aware of the "linux3" platform- security update to 1.9.2.18 (bnc#701296) * MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364 CVE-2011-2365 Miscellaneous memory safety hazards * MFSA 2011-20/CVE-2011-2373 (bmo#617247) Use-after-free vulnerability when viewing XUL document with script disabled * MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303) Memory corruption due to multipart/x-mixed-replace images * MFSA 2011-22/CVE-2011-2371 (bmo#664009) Integer overflow and arbitrary code execution in Array.reduceRight() * MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363 Multiple dangling pointer vulnerabilities * MFSA 2011-24/CVE-2011-2362 (bmo#616264) Cookie isolation error - speedier find-external-requires.sh - do not build dump_syms static as it is not needed for us - > fixes build for 12.1 and above- Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6- security update to 1.9.2.17 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards * MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073 Multiple dangling pointer vulnerabilities * MFSA 2011-14/CVE-2011-0067 (bmo#527935) Information stealing via form history * MFSA 2011-18/CVE-2011-1202 (bmo#640339) XSLT generate-id() function heap address leak- fix 'save as' with KDE integration (bnc#557598)- security update to 1.9.2.16 (bnc#680771) * MFSA 2011-11 Update HTTPS certificate blacklist (bmo#642395)- update to 1.9.2.15 * fix a regression introduced with previous update affecting Java applet integration (bmo#629030)- use full path to the ntlm_auth binary (bmo#634334) (mozilla-ntlm-full-path.patch)- security update to 1.9.2.14 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- security update to 1.9.2.13 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to 1.9.2.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion - ignore empty LANGUAGE environment variable (bnc#648854)- security update to 1.9.2.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange - removed upstreamed patches: * mozilla-esd.patch * mozilla-helper-app.patch - build and runtime requirement is NSS 3.12.8- update to 1.9.2.10 * fixing startup topcrash (bmo#594699)- security update to 1.9.2.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - honor LANGUAGE environment variable for UI locale (bmo#583793) - fixed compilation against NSPR < 4.8.6 (mozilla-prlog.patch) (bmo#567620)- fixed build with latest Gnome in Factory (mozilla-gdk-pixbuf.patch- fixed sound notifications through libesd (bmo#579877) - updated libproxy implementation after upstream review (bmo#517655) - added lcd filter patch for internal cairo- disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x.- security update to 1.9.2.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 1.9.2.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 1.9.2.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated. - require exact matching version of mozilla-js192- update to final 1.9.2.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 1.9.2.4(build6)- security update to 1.9.2.4 (Lorentz) * enable crashreporter also for x86-64 * provide mozilla-runtime to host NPAPI out of process plugins - removed libproxy debug message (bnc#604711)- point alternatives link to the stable version to improve robustness (bnc#589037)- buildrequire pkg-config to fix provides- security update to 1.9.2.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to 1.9.2.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - general.useragent.locale in profile overrides intl.locale.matchOS (bmo#542999) - split mozilla-js192 package which contains libmozjs only to allow its installation w/o all GUI dependencies- update to 1.9.2rc2 - add update-alternatives %ghost file to filelist starting with 11.2 (%ghost files are conflicting in earlier versions) - fixed mozilla-plugin.pc (remove obsolete stable reference)- update to 1.9.2rc1 * removed obsolete mozilla-breakpad.patch - expand -translations-* and -gnome filelists to clean up the filesystem for upgrades and removals correctly - enable crashreporter and create breakpad buildsymbols package for mozilla crashreporter (for ix86) - drop PreReq usage by cleaning up the different Requires tags- update to 1.9.2b5 - removed upstreamed mozilla-abi.patch - integrated mozilla-kde.patch - use .autoreg file for autoregistration when needed (bnc#440872) - enable libproxy support from 11.2 on - renamed -gnomevfs subpackage to -gnome - readded lockdown patches and preferences - fix baselibs.conf- update to 1.9.2b2 - merge from xulrunner191 package- update to 1.9.2b1 - use newer internal cairo for 11.1 and older- reworked PreReq list- update to snapshot 1.9.2b2pre (20091015) (entering beta phase)- BuildRequire libiw-devel instead of wireless-tools from 11.2 on- new snapshot (20090916)- first alpha package of XULRunner 1.9.2/bin/shbuild16 1328519285EFEccc1.9.2.26-3.31.9.2.26-3.3xulrunner-1.9.2.26.autoregcomponentslibmozgnome.solibnkgnomevfs.so/usr/lib//usr/lib/xulrunner-1.9.2.26//usr/lib/xulrunner-1.9.2.26/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/mozilla/openSUSE_11.2/112cf1cd9f2e217af8207b1dea3b5a06-mozilla-xulrunner192cpiolzma2i586-suse-linux1 p4@ w?] b2s?xT퇃omh7Ͼ$Q@>R$+R mBhf);оىx18 Ҧa( [gT ["8(yJ@ev- %@8ma~{`pMX^*SuG?WLFWяxɔsi_U׻. AP,b(m|^(-BSGaVjiXl^s D1k9dtw˂ٝ ,ޑ3u= ~$3."HdC{rc,'msID6۝aU<G;AQBxO?:zposJ5t GgcóctCvdlv:5ͨ\Lע~YL_#R.vܣNjJ$I"+O9?\&ٍ{iK,%?jh ArM@hu|AHQ 1fTi!+nVP2- n }ӭھ94 [ՃT'6; aR@/Ms=,Z.$,f?A(ܻťJZ)b{YIˢoL9J0Gy7ԆHn(RheD@Kks8B+F ZU= -dДWr8[Zu}~8rFŠC,ؙ[hcdzfUbQ.Zf^ЋR Ude؍!&t 0v'v.R#$zFvA4K Oar(9zwRfpe<`H.:jYl m> i =ҙ3,bedp(y/{L%R=/pز|9ꑴBMlm܃uŶ1odRĺttQ!|+( Yסhr V#p^%W/6{Hif)UPibF\Z%B`&%-cS\LǕ0M paU;! 5icG^AVB0VSW$Fznf}5Q,RJg=dj̅\!'!E}6 <%+^QGCL 9T "WWe1NwȌm \p5)A%oa%{`{E5a.٣0=[Pw: ձmWt[0)n\ HU4_@EU֯e-]wf!߹3lޘ`iDřq_:z4W|^j ӂ2ASTYe9T{,P`;U)͸V~q/E y2J\`28@I ^17I2Z}UnBq*.< Uyz.VZϝin{}[A7 FBhUY!ΧLBKM8 w-ޑ"hy{Sz 4wyϨhMmA/r"kw?]#60\xNN#PtDO9b-[6j֦ZBCv&~u+V}=GKe!.~CV߿KyR{`OrGP4bs;,9IBb#𼸣ڥY)_enBl>v9ioE,HtaH !'-T@8tH7f%^NJ5o\Okܔ1^l 8z +)2lVF-\8yӚ*>9F⤃gVo=c-t_KV;%bYG"[T;"x&Vqk/`oqGgS%^t;#9j eݵvJ8$ۭ"ֹ#E}2L,2!_>O M6m)&.ԿB73[{~H. z*Rp{2.Cw=nPvp0o)NCj |ט.9&'+MBg3yq~Ga]Akr4(´mرУ"j5vxEn UΣKn8 D 00͍弽={ݎ~aNGF$z[ F3(f2hN?@&_LNQm2;畤]DcF򊝯N:ZGϖaoUxȋGnĒ`:"[bJ9u׹%Lt]bzWp6(S wH*2bϯ|u5.I>YEU1A7>thh&N&BSh;X:L@6y+]lk|' .bEqƓnɆ낹⊎Tg H)`,]JA2$EdA3$}r$DOlc Gy9eݕuoF Ȋ4}aGj@ݤ25,uGKQ`A_p`kxzz$)nP4CRSl͋pnQVz8-kvINj4˷j^5&{.&׉aK;8*=吱0H;cd3tx ܾ5QZ!]V1efb$rpiz;|z m* `JQ7|M]s4yl٧~XP#3'nl_3YKUS×1~ No)iG@x7'M7QbĤ) xQƲiB"F=2nMk셠a5_bzP$}ib!Ѣ}|jʟ|14ԙ]@&%bߧ:o0`w{YT75 E|oH'糨;3Bک^\t N/c$X}ݠB)A=]P'bna$)ljFz8Pɔ1Wzsxݭ4fSc#LB @|Kbǥul d* I'/cqҢ\ M$jRCV!kdѺצ!iG[:6B:YQjf1)2V?l+e"0t EFM/,2B8^C!(z_td(c2ƅ1lZrF%rrWP~mDH`L X:Y1q4];Ha[$R j&^. m*f ނ ;pM)!hmwP)B(B[vj>0D`]q"%,D[ GVD(̀-It DZTW5Ԙ< KkY'VEPW"# U,F#*[z=L$dHrT0'RꠈQG!WA}I($S*OqzTkQZWu㜺9OUW^RQ ^=[ܳ5COshlכ":1rfY}:}.IajHA/j|OaYk|KBaW9sa.5(1!rou[]rXmRrMGq8x}N~{E~9``~͟_z7+6K1M |XIa2F)ىjtph9HA-^3 %ݦ.׊F7JxsagiUwNJl|%(ƑNxpL)j0(dƜICrL=u{:՞8ރD[2U/y>ɳ8PoXmzvGJ u.0?2}F?K\ (hx#+&'G"}jXeQ&aď]>=z|Jn/Q=~kNGe qxM anQ#(jD ''o',n~GJ52y"ZB@mUvup;0 lxm]cMIuf̼h_o0ku`z >3 N<%PkD0}}->q2 C5y6@W'˸Y"5\@*(IE@MSK̮-ɭ)8j2h7K}]pөԝގR\ zPS{rʡ[rQe($7+ :嘼#{tb(mbYW1XfX@^dZ'xpF= s5XJkaRY^;M²4 뚌[zûܲ;)=e`}Op[lWsچ?-j 5LsU u+&p<,AsOEfy!oCwak^qqx;D0![~4YrVhi~P*5)NuhU5zspZ2c/$JLeQ#1}گW9I d͗]nα5Qѹ_5&+6n~z.uunEy%؀=Lf__Q ]86Dϓ5m 6Zdy]ɶ9HK6h!͑!h{HpُDJ6XD88=B8 ! {4馥jEQAKq7 ]$zpȄ$RV;n.m4oR$Vϩ]󄴎3*!S\+&]N`;O2tC1Tlarf'lvY[ₚݦQbD0WQ-ʫR>EQ gV>ǀ\m!ԋ^KAp9X'9@[ k=~m9:mPHa7ͧ'6gT pT=Ȁ9z4/<}2巼v@7㬏5,y^ ޳ݨ0f ҸQ.+|y'eN@JjK t:j@e]:B4ZJ*T~գQz=Z{GcbxfõA!AuˌW-?8d!xA&"^glf/k5Vy7G0Ȥ9,%rDyo1-^59@=Q_!s3~m܅7c>*)M:IS{:>mױ%Xv~U0.amz,a],fؔ|ΛYZߡaݘk) H> =h.* 3S:_}wbn&V-N(\btpX2'oG'BWIdL,^9A޾EM=* lJѬGj^g詡̯bJ_+<Fgn*lՂ]ƙo<;hQFLv6YX`2\YsYň$d7G/)eG/S((+/e.~gplc=\Wp zzLӑ(HnFu+qSU^;gơɩC.iCoXx gjᏐ8FϾjЪ`U!kM?z>#I!j)ꍪElRx_,9ŕ x;α}\(A:U 9.N( nIkJ,<٭X(}7:z>|Om %~Ϣ!\gzR,cFR[BZamK7?Z 1^•id-7ꟳfjܖU@n;'`aV7EP俪C/NWas#ůan"1sZV y(Mz c*N5r"<@('HXqYb#& 59O[  .0# Sv{%$=S~7Esu3k=G!&є*o‐jw{jډZq7{0Tڿ'vCG,dAT%*F˙$W5<\us,ie#ǭY Ҹsx`'AM7@qH<*ք0V{w[E7%<[u G̭6 1ri^ \ض:ͻH~,dMj1:A0T~z:9o~9Ru9VA$QX8k+ab3)^ ƢYa nsnWWx=Ќ}V}H2 Sy3DS2Bxi0(BNJ[ݭ{Ck0xή'[`4Z.qK"#3ڪF^t"`Ra_XPYߑS`-G@$5"zCɞSL2 WsA$K(&v $γLI5 ݠTj̧ׯO{WEVH|b Ұ5J%Glö΂DPfP+w0iՆ;=Aj_S'ȪڶblZ5MR}~Átg9Nx q㒕/qsett*);k}iN)4 (#?ReSSW%N^.DolCqSoyR3g6qj]F'c s>;+qry.SX:힊2{n3 TMHPiPMb~|dinhH]j:]ȑf9UL+GP72^-#EAk.jKݯH5jД6=`I:V>:NOBfz<\> hwk">_|[ JT pmƋʯ?%_m⿤OBPh(*y;K- W c7L FL@,@@ }H;8i戻#y+i~" @V t$JLʼn`ks6r`Q'͎Ī i^d%VXDu" nT|̣Xl8GҌyc.'suTU\gx("qG/? qJ5;9IR>a; f|Hkr<0%,m_<\/*6Pg'dGLr2 ֑hŸ~+Ń~Ծe)؁ yL+_7^+:DȄ]9ˁςqt]fG6{y̡jxds|% rj$gC9CɻX eX<Ɯf'H9κo0+g~4JJX47]kﷵPChV 2u]jƀM<%w%GĞq'ąBY|^Yb%ӝ0*Bu \3$V{di qς *?Sܑ"ԦY-FQ5F=(zH݅lMd=yz߇"C#m{~ i5*sk #R/kR+@6p srY7ۡ9۳/T.pkK0.}|dRZ̗PIW41xš0,eqS/a|;1C#Y|K$c6oZ*{Q(C/7SŰ(?HB U[nq<~T'!G ϓX\#ovZj3r`n 9+ȻX)4զ@&Nob'cô^3:>P}=6(y;{R:? '4!2ălW%<>eYGѹ`%#(?T*r K%î8cwkc7.V8nP-FFAhu0 ʑBB *k›p|3`7{Y֐eE9vOr#>Œ}N8Ia"pt@m[va׾c#ga{ *cbqb!A_G\v#xcmF [ +FY)-=zt8m2E!b ZꬃrAC&Hܛ,j( uJkFK|>%YUj\5v̮m9n6Ѱ \%^⣙-<5fd C+-TOD"nU"e~Rw`OQ(u8IwtCZ@'? qa{b+^ |ʇM~aM.jdnE K{#m%r!iޅi0žTz=i |$2MƠhIp NX\9;0x;'<د@GM&zdJ/09ޥk*4g>3"d{h\lKF,ˎ D)-$1*?oF`[ͽaBQ, 7+O׻ l}'8EcLC+t~e$P>ک4 _&pY0*h FH-5.۞4IŒD1%#d@Q&1v(&KIRUvAiҨr.d^_ pl m7 yjyyuGJGY hUAP4eH\U>%4 jFULq0}^4IyF&Ci{"xTrVmڛmDZw jOf)mz}/mgwL EOc/uP̬ 3 >ѭys6E{ Gۥ2W{~es oTv0wRqJy'(%KƪoXyB4^?N:[a%Vu`5폮**Dk%%B8wyhƂʽ@0CbWa۬-SiHpɺ|ޥ>t'`s\P'eȇ@&vRП<#wHoAbwD=cQ?=<'B  eŽɄ@spGKK.{V۴ ɬq5vXZˉpԢ$gQP<:#N7N PzErU1 Y!ӟdz?h&.fEδorۡ&0R]Z3!Ml_ A#^1?+!BZab!3c[+~Lȑd):ݞyܢ|XVmhIbkxu|6[VPj"4`"tdI\33鶺x!м_(G"ԟfxܡ?B w=%1BP&~rD,2XE*R;xf݁N@L, ֓{?(!({pbS%.}i8+%`tYBDMٽ?`P it0Mx+NwjX<OYS@]yPIIНSwuO]0 jپ~Z6z+>".!zN.Ąu4IkV.ӵ1i;Il fW~}6ەc ʉCm``mW`Oe!c1!>|v36==xBP! KN( hsQ?gU|Kx3[c9l2V='xz`xx[2.ܛ +3Ƌb| 7D]PJu2-sm\˪62MN 17(UTCF F%k635 UpL$Rꉓ%ȭ겻aH^MBLl!vf67[fQs~.J[sR8-+鰛'* 4>nrQzWxr#plAJ7"vIC3eZ&ճp8|K3 ${ז͎d.w? k7}ǁuR4Ō(8Z/[_o]z2ocWwtN=\!.lrzL/%(Դ0n}v $\Ax/4 gi?ٕ"VT6b= /u %BL^b &WG90Whi2 &;˾a";>ppVOd-D*Y{U2qT*y0@OV{Sgkg?A M@EVd8jfP,wxf>̰;Sy`> +ic^dM0HD7M+ysN6+#S?n [ޫ(kdI΄}~PGh7[*J^ K o\0L{}Cwps)]2 5s'}ș0X,tnyLBoXTW ?z-rJ;lČ|eN`,Y޸?غ!.t*:D|u( c@:.>h/|9z'(~4=^@ :!ɂ+.wC_$^޽jU׍R{K4TDFZa>H&ۦciraWɈHCǕEJUbA ֎w1>ոQÝ&إyX5\ƥ C4VFm'٤ml zxlrY \H[<_ }e?vⶵt*ՎM 6i,I|0xY&;zLOIۉUara<.z"7M +>1x}h?FaqRY̺\Eheti _ (dQ:xx-옍pi"PF摳e4/t)9n6h,*Cl1Ik)dْXUȢ lp$|0-Ml.\A#?:(A?aq66 t~52 ETxlvm;oP{tDJ1ϿOL 7EP΀&x)򕚼)yPJFZF jy1w MO<dbA?SkOzhږ Z4mRw.&h?5$BW` ౧ b}5*MG$rC2%K O'S;Fͬ="5]5NQev͢6zz2,GǢDWDWj>9&KƗO8"-y`-1 l ^ͫb,ȢY`D&IdMb$[?ΉF0ΝVSז<2RʁIN)C\tia 2U*/+hL0[ƋۇH'E/%q7{H:!3Uu]w?^)0}x)7 M_=RMVg5a =}y"ʪ4!dڥ6s88W瓧'h-މoD(16)5.,ͦGFxނq,1"~PFtn j_UfVh@Lsv3єЃZǽՒwO'K|#awZh&A-s|JN~_Ĝ8E7ybtPZsr6V POfJ;N]Z{'W86ՏB{UsO#JBQ'.I0T+˟XeLRsU}?`TI=|Zs 2Ghd\"F18`zd a^'իܸHMSCpD nƒ?Z]P^c5O%zfW>Բ4 ^ĢSz'] ]a.0P@Vb=u:Ci+: !קYb=(!4݁.4ԦnЧ^ni'/_2*$C_f{1' i¢5lqu€Q) 1 g $Bֳ,K%50YbOilg$zO?d)Ào/1d2a޺ȵtPwh_{Tj@K14ٕH?n33p"$_Y;nW!h6P&X;01; $=4c{]\ $huAT(7+R"&]zZC(Np9=Ϫ:_תVE_zmOnHwrXP| 0y< *F=/"tVD0xyÔ ̻M0#}B+y69'O3]bc`ereN-cq ޕj_2)*V1n/zl!Y@GtƝG%Wz3$גk<.K୎c*7KӼ/۱ޚXn]}|g$h_M 4׀JbNײ-ب6QɘQy.%/kEO;(׋tn:G9:Vb  Uu$6,Y֊,xU0 aITOLŨFj$C !z ہáL-HMd+^-XR¨&)#8;{OLP1/fo@͸%$na$;zm5>9dI F#у^cFUR~:޾ 2x/*>^|';+LuCC 4{( ʳF/MEXӨ}D< hTUv(_s+8V>CRaxe/[H!BFe ob>ȡ؟9\Eg?Nkhk@}߯wEN.+=Ð#x<ÌxÓaCozb^@Hgގ9Y:BO֫]g@-@`KT&d}nȲa=^1-w=#r|M芞VK(2^:&u; _ڹ[ؘ@t-MӾ^J{ؽjр̄-Ӂ,70|H_{eҵ%I<#Q:я˕94uz~ ( ɠ+5涵‰Mӄ6y{Aͦb< ن5ZSQo8wU%Y{>y=XͲR+M/8FpԷCӷ~s L?dg* >^_e)V $"I o@g}zH;ׁ)zjޜ盂|.i¿z>pfYe]3?bO,@fTFtUvb"` %y.vgUOY?:wPSExfSmsҵ3uy 턤OOK9^CLqg,k7f(t$Qz(mSLn-Ss{Z2ݤۓoOΠq,QQr{7lHV(W幃1Wg`}&I?*=@2:*F9EKk8iUuB*$*S\%Dr#NkYDMmzNm)~rq{`Q_BHES<罕ߍme?A(M>$$tKg-S[.x9dm AY}Dh#6{4(*Dl4RݢQxsGh A&SC6)Ǥ2zs%6 EڮD.yH1;Ӥѥ'qed+m Xs#.6oeʄ.b4G~| (L ڍܺ i.cCc{Do =äţd"H`N<4W:vv0= d_]Ր lhֶUրKIE'\Lg{c?y"BnѮtԎ!uI@Tc MNAxT1Pg<) C l68D~Ƙ %;u Dgr}eyI!>?&6Y΅޲tv蕵@G,_+ò$]5۬Un8+<`"(GHg5tC87 `7lb f 5d9aeo.x(H# t*7 tONE*%f"?è9 C! {*_|eQvzao"0ZLD/NK8+ E2t&=sD*1a5m |C",m!eKpvb vS$Vz7Ø[9 vv$z+PDh*ƩW2 nE.7p4SS(U16.4n qSc<LR&L:EE? ep1'# }f2Ik\Ѩ3q1z vW4-6C֘bY-A B%YD3ֱ0ag&>>46|L|C{ TAAtDԍpͱ73\тYn$gvG0rd=,gS[R K5H\Cz4n԰3N!#eypsw0&?II0%6YydU%BsnBݭ.Ҿ!bK| `鈼R#G[?PF]TW>Pa*h:a6\ds2i?-լC5A<9G{9- ԠcuA; Riqz`0y'uk}ni];va=HjBW¦y%+96<ڟ;dêo? z?OQZO?>u#4D-dߏ >_㖧cCK#ǽ05wU;$L-Hr;sK`óBwH\"thO1]ԋTOXzc%i޾oi54B Vׯ=im%b>MNjN-#7IJ͡W='ZJㄽ˭Nw ^lvv`TLXmLbbحhW'0ڙo&odr`WDϥ.? (UUbVb+@~o {f\AŪqXc7ȋ#Iκp_6 ӰbHջJ?6Ɯ)>F85UmQ{x)N(#? aAf&?I91jpOtK2MU|GqJ3vO%/?ėꩳ 5vpwZh9HA eC"St_"IyJ 8;Qwj ˓"d ms7VK47KЧrFv5 ~O{]=ۺVLKy9@mVSQ. d'̓i^P'56Qn78#?0/u }?9MtN_~>R\;d#z 6=Wq"6) *]O?f)HVJ La:R9cY;a~GmX2KB/,H Tj mkf&+i$Fv!E!bg3v]ŧ[5j,aAi1()o;ƇٺH lW"_-- 7[EݏQ9v ]ۓ=.v퀢ɊSC{K&prWF8{q-M3SHzE@6*N,{V9l|"7aZ?G(P&2Ew'YP\B B;?!uuoP^̏-Qt5}?"l >"퇭AL4WnS(HIhQa~>a?eA]=O/DvnKUk[*C蓥4\w7.)v]5FܱL crj*aR'^UHkT&'9 G;Uj(E\[ dd&:iww±u͑͵K;:YumYsTRG ^w(O-0Ic|ztȧ/d΅-A{yf5 '|?sn~h&\-X^s= &C9RDvԝ¯V?#@h8q@4}b \}HףX΅G&%TPROrSto4'QS aJ@ҫ.TlNU;VE.l7rG 砊<&*U:Y?NOě| * /6\k؏X^™b,K'R \}x~aO)6$CM2{e&df­wV||Wp׈-It.H~BOYa5K) IhR "O T?JU:f7uD+VM2``@P op8>j`^T13~џKϻ$8A'`.i.^`fUqfAk ]"@-S|Z\FmEhY"k>,_`Z"H,ܖz6Vai f00<=D e8\E"1mvTaqUk\+ 0=vE&*rm-lYI:xNfjʞm?kT Hoƈ-6ri'^?mH@Rq4y+«`4V9D~ܥ-J(ŐNJ3&&P.5m$@qjܝm+.e"aGOR+#id2`|b>['xk:T?2T}ǜ<* kpM*ߢǮ6"sM OnW=!Ǹ>-`wyb -jHgw[bzq h;Yw}n(OdGq1(nhYI i +r}0.ZLCߒbasj l' r-*!i6ڞm3Ē/-mm*;Z/sQvW,K>EGnaOTYzj T.\$P|;K5\_FXt՜9h}7Kf{yTz u~ E}Zğ5kBۮGI#.h|Q7Ljag?P%z V6}Mġ-";g]HƖu2?o|(}( ru`U"wֵd8&ndvb HmROvh -}PFl3w81}jr*)8}%y}x.K0B.7 hTů{Q:p6,SdjgJi?թGJ|Og3ьxQi=5h,EPcw Łuސb[u2xYn JASU\Ä&N˸psԓ,P67DXX Pה2߃,[@{=_OϠR]⽵jި[%݁qKXJIBD3jq!RtG㷈ҷE|0˪TS#Pi`Շ^+GzKU 9Csv5 6[A].k3hN!K%x)tO dJ <&:ONBp/ WHxK^bǐGn5XynxA)ЖjWb>f)EihS~)XNʺ~+qfǐCHO/JT{nRnԪDG