permissions-debuginfo-20181224-lp152.14.3.1 4>$  Ap_rH/=„2 Bk S kx" 'R: CA* K:*XlJ%kwkMw2D" *A8#W&2)`kAt? ; M@6 \OKpHq SbŒ`$?t܀Vh 蘈kÙ/rgZDxdg؜V?oz#ktP(Q3&grOfɭ²h&;ޖkSp$n{'oe S~>z|UyW ff|:м!T-/W:ΐŽҧ]R;/N ;\(sap\>pA6x?6hd! . X /8A Zl    L  4`?([8d3903: q3F1-G1DH1dI1X1Y1\1]2^2b3(c3d4le4qf4tl4vu4v4w5x5y5z5556666"6dCpermissions-debuginfo20181224lp152.14.3.1Debug information for package permissionsThis package provides debug information for package permissions. Debug information is useful when developing applications that use this package or when debugging this package._r;obs-arm-1openSUSE Leap 15.2openSUSEGPL-2.0+http://bugs.opensuse.orgDevelopment/Debughttp://github.com/openSUSE/permissionslinuxaarch64PAAAAA큤_r6_r:_r:_r:_r:_r6_r6_r698b112e542a26cc58662537c6c025ac45b60c2aee9eb6a8328f9d0593bd9d312../../../../../usr/bin/chkstat../../../../../usr/lib/debug/usr/bin/chkstat-20181224-lp152.14.3.1.aarch64.debugrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootpermissions-20181224-lp152.14.3.1.src.rpmdebuginfo(build-id)permissions-debuginfopermissions-debuginfo(aarch-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1_i^?@^ϧ^>@^^y@^\@^Y^;^:@^4]@]@]@]@]:\8\b@[@[z@ZiZ\Z%8ZZ@Z@Z@ZNY|Y@Y˒Y@YY@Y7Y2Y1S@W"W@W@WBWBVV@VV2 @V +V +UuT~@TZ@matthias.gerstner@suse.commatthias.gerstner@suse.commalte.kraus@suse.comjsegitz@suse.comjsegitz@suse.comjsegitz@suse.commalte.kraus@suse.commalte.kraus@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.comMalte Kraus Malte Kraus Malte Kraus Malte Kraus Johannes Segitz Malte Kraus jsegitz@suse.comjsegitz@suse.comopensuse-packaging@opensuse.orgmatthias.gerstner@suse.commeissner@suse.comkrahmer@suse.comkukuk@suse.commpluskal@suse.comastieger@suse.comrbrown@suse.comkrahmer@suse.comeeich@suse.comjsegitz@suse.comastieger@suse.compgajdos@suse.comastieger@suse.comastieger@suse.comopensuse-packaging@opensuse.orgdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.comdimstar@opensuse.orgmeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.comkrahmer@suse.commeissner@suse.com- Update to version 20181224: * fix paths of ksysguard whitelisting * whitelist ksysguard network helper (bsc#1151190) * pcp: remove no longer needed / conflicting entries- Update to version 20181224: * profiles: add entries for enlightenment (bsc#1171686)- whitelist texlive public binary (bsc#1171686)- Remove setuid bit for newgidmap and newuidmap in paranoid profile (bsc#1171173)- correct spelling of icinga group (icingagmd -> icingacmd, bsc#1168364)- whitelist s390-tools setgid bit on log directory (bsc#1167163)- run testsuite during package build - Update to version 20181224: * testsuite: adapt expected behavior to legacy branches * adjust testsuite to post CVE-2020-8013 link handling * testsuite: add option to not mount /proc * do not follow symlinks that are the final path element: CVE-2020-8013, bsc#1163922 * add a test for symlinked directories * fix relative symlink handling * regtest: fix the static PATH list which was missing /usr/bin * regtest: also unshare the PID namespace to support /proc mounting * Makefile: force remove upon clean target to prevent bogus errors * regtest: by default automatically (re)build chkstat before testing * regtest: add test for symlink targets * regtest: make capability setting tests optional * regtest: fix capability assertion helper logic * regtests: add another test case that catches set*id or caps in world-writable sub-trees * regtest: add another test that catches when privilege bits are set for special files * regtest: add test case for user owned symlinks * regtest: employ subuid and subgid feature in user namespace * regtest: add another test case that covers unknown user/group config * regtest: add another test that checks rejection of insecure mixed-owner paths * regtest: add test that checks for rejection of world-writable paths * regtest: add test for detection of unexpected parent directory ownership * regtest: add further helper functions, allow access to main instance * regtest: introduce some basic coloring support to improve readability * regtest: sort imports, another piece of rationale * regtest: add capability test case * regtest: improve error flagging of test cases and introduce warnings * regtest: support caps * regtest: add a couple of command line parameter test cases * regtest: add another test that checks whether the default profile works * regtests: add tests for correct application of local profiles * regtest: add further test cases that test correct profile application * regtest: simplify test implementation and readability * regtest: add helpers for permissions.d per package profiles * regtest: support read-only bind mounts, also bind-mount permissions repo * tests: introduce a regression test suite for chkstat- Update to version 20181224: * whitelist WMP (bsc#1161335) * Makefile: allow to build test version programmatically * chkstat: handle symlinks in final path elements correctly * add .gitignore for chkstat binary * faxq-helper: correct "secure" permission for trusted group (bsc#1157498) * fix syntax of paranoid profile- Update to version 20181224: * mariadb: settings for new auth_pam_tool (bsc#1160285) * chkstat: capability handling fixes (bsc#1161779) * chkstat: fix regression where chkstat breaks without /proc available (bsc#1160764, bsc#1160594) * dumpcap: remove 'other' executable bit because of capabilities (boo#1148788, CVE-2019-3687)Sync upstream SLE-15-SP1 branch with our SLE-15-SP1:Update package. Therefore remove all of the following patches which are now included in the tarball: - 0001-whitelisting-update-virtualbox.patch - 0002-consistency-between-profiles.patch 0003-var-run-postgresql.patch - 0004-var-cache-man.patch - 0005-singularity-starter-suid.patch - 0006-bsc1110797_amanda.patch - 0007-chkstat-fix-privesc-CVE-2019-3690.patch - 0008-squid-pinger-owner-fix-CVE-2019-3688.patch - 0009-chkstat-handle-missing-proc.patch - 0010-chkstat-capabilities-implicit-changes.patch Because of inconsistencies between the upstream branch and the package state the following previously missing changes are introduced by this update: - Update to version 20181117: * removed old entry for rmtab * Fixed typo in icinga2 whitelist entry- fix regression where chkstat breaks without /proc available (bsc#1160764, bsc#1160594, 0009-chkstat-handle-missing-proc.patch) - fix capability handling when doing multiple permission changes at once (bsc#1161779, 0010-chkstat-capabilities-implicit-changes.patch)- fix invalid free() when permfiles points to argv (bsc#1157198, changed 0007-chkstat-fix-privesc-CVE-2019-3690.patch)- fix /usr/sbin/pinger ownership to root:squid (bsc#1093414, CVE-2019-3688, 0008-squid-pinger-owner-fix-CVE-2019-3688.patch)- fix privilege escalation through untrusted symlinks (bsc#1150734, CVE-2019-3690, 0007-chkstat-fix-privesc-CVE-2019-3690.patch)- Updated permissons for amanda, added 0006-bsc1110797_amanda.patch (bsc#1110797)- Added ./0005-singularity-starter-suid.patch (bsc#1128598) New whitelisting for /usr/lib/singularity/bin/starter-suid- Added 0004-var-cache-man.patch. Removed entry for /var/cache/man. Conflicts with packaging and man:man is the better setting anyway (bsc#1133678)- Added 0001-whitelisting-update-virtualbox.patch (bsc#1120650) New whitelisting for /usr/lib/virtualbox/VirtualBoxVM and removed stale entries for VirtualBox - Added 0002-consistency-between-profiles.patch Ensure consistency of entries, otherwise switching between settings becomes problematic - Added 0003-var-run-postgresql.patch (bsc#1123886) Whitelist for postgresql. Currently the checker doesn't complain because the directories aren't packaged, but that might change and/or our checkers might improve- Update to version 20181116: * zypper-plugin: new plugin to fix bsc#1114383 * singularity: remove dropped -suid binaries (bsc#1028304) * capability whitelisting: allow cap_net_bind_service for ns-slapd from 389-ds * setuid whitelisting: add fusermount3 (bsc#1111230) * setuid whitelisting: add authbind binary (bsc#1111251) * setuid whitelisting: add firejail binary (bsc#1059013) * setuid whitelisting: add lxc-user-nic (bsc#988348) * whitelisting: add smc-tools LD_PRELOAD library (bsc#1102956) * whitelisting: add spice-gtk usb helper setuid binary (bnc#1101420) * Fix wrong file path in help string * Capabilities for usage of Wireshark for non-root - remove 0001-whitelisting-add-spice-gtk-usb-helper-setuid-binary-.patch: is now contained in tarball.- 0001-whitelisting-add-spice-gtk-usb-helper-setuid-binary-.patch: add whitelisting for the spice-gtk setuid binary (bsc#1101420) for improved usability.- Update to version 20180125: * the eror should be reported for permfiles[i], not argv[i], as these are not the same files. (bsc#1047247) * make btmp root:utmp (bsc#1050467)- Update to version 20180115: * - polkit-default-privs: usbauth (bsc#1066877)- fillup is required for post, not pre installation- Cleanup spec file with spec-cleaner - Drop conditions/definitions related to old distros- Update to version 20171129: * permissions: adding gvfs (bsc#1065864) * Allow setgid incingacmd on directory /run/icinga2/cmd bsc#1069410 * Allow fping cap_net_raw (bsc#1047921)- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Update to version 20171121: * - permissions: adding kwayland (bsc#1062182)- Update to version 20171106: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20171025: * Stricter permissions on cron directories (paranoid) and stricter permissions on sshd_config (secure/paranoid)- Update to version 20170928: * Fix invalid syntax bsc#1048645 bsc#1060738- Update to version 20170927: * fix typos in manpages- Update to version 20170922: * Allow setuid root for singularity (group only) bsc#1028304- Update to version 20170913: * Allow setuid for shadow newuidmap, newgidmap bsc#979282, bsc#1048645)- Update to version 20170906: * permissions - copy dbus-daemon-launch-helper from / to /usr - bsc#1056764 * permissions: Adding suid bit for VBoxNetNAT (bsc#1033425)- BuildIgnore group(trusted): we don't really care for this group in the buildroot and do not want to get system-users into the bootstrap cycle as we can avoid it.- Require: group(trusted), as we are handing it out to some unsuspecting binaries and it is no longer default. (bsc#1041159 for fuse, also cronie, etc)- Update to version 20170602: * make /etc/ppp owned by root:root. The group dialout usage is no longer used- Update to version 20160807: * suexec2 is a symlink, no need for permissions handling- Update to version 20160802: * list the newuidmap and newgidmap, currently 0755 until review is done (bsc#979282) * root:shadow 0755 for newuidmap/newgidmap- adding qemu-bridge-helper mode 04750 (bsc#988279)- Introduce _service to easier update the package. For simplicity, change the version from yyyy.mm.dd to yyyymmdd (which is eactly %cd in the _service defintion). Upgrading is no problem.- chage only needs read rights to /etc/shadow, so setgid shadow is sufficient (bsc#975352)- permissions: adding gstreamer ptp file caps (bsc#960173)- the apache folks renamed suexec2 to suexec with symlink. adjust both (bsc#962060)- pinger needs to be squid:root, not root:squid (there is no squid group) bsc#961363- add suexec with 0755 to all standard profiles. this can and should be overridden in permissions.local if you need it setuid root. bsc#951765 bsc#263789 - added missing / to the squid specific directories (bsc#950557)- adjusted radosgw to root:www mode 0750 (bsc#943471)- radosgw can get capability cap_bind_net_service (bsc#943471)- remove /usr/bin/get_printing_ticket; (bnc#906336)- Added iouyap capabilities (bnc#904060)- %{_bindir}/get_printing_ticket turned to mode 700, setuid root no longer needed (bnc#685093) - permissions: incorporating squid changes from bnc#891268 - hint that chkstat --system --set needs to be run after editing bnc#895647obs-arm-1 16055301715b6ced58afc2e36d6b3c04d7ded73c4d1e8164f120181224-lp152.14.3.120181224-lp152.14.3.1debug.build-id5b6ced58afc2e36d6b3c04d7ded73c4d1e8164f16ced58afc2e36d6b3c04d7ded73c4d1e8164f1.debugusrbinchkstat-20181224-lp152.14.3.1.aarch64.debug/usr/lib//usr/lib/debug//usr/lib/debug/.build-id//usr/lib/debug/.build-id/5b//usr/lib/debug/usr//usr/lib/debug/usr/bin/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:15002/openSUSE_Leap_15.2_Update_ports/3eb488a46785bebc2ccd039d1c7dafc2-permissions.openSUSE_Leap_15.2_Updatecpioxz5aarch64-suse-linuxdirectoryELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter *empty*, BuildID[sha1]=5b6ced58afc2e36d6b3c04d7ded73c4d1e8164f1, for GNU/Linux 3.7.0, with debug_info, not strippedP#f8:permissions-debugsource(aarch-64)20181224-lp152.14.3.1utf-8fc96e427fb668ef76d85ce3b3fa6b44e212b6667b13a8076bc66dfccf33f5bf0?7zXZ !t/[O] crt:bLL Gc5?ovMS_RfduҠi-!pZ+kxumk(踭= @ٮ 4vȠry2fDzIiG,b!CA62͜(sR Vj%,>HDu )g&ǭpZ`Idt2ᆉN6kH˒|0;djxP)zM_Wy7j\-~d$B,hvNC#8` y՛^v1%7f*1ȹT?fsՅ*.%]2 lR<6lWA:jTAZ`#b;S(4D(|C,2nSX0{?lFw)8pMkRtSWRshđ>UED〦p|ɴYAv:t8u!W;nxd^4輤7`vr4+S-sh7 SѼc[yqf4i:a=99͹ Ec+iDyzgt4vcw)ݯu{ JiJ.\N][}ɭ]*ĸu]Q9pF;ry KR .`|Qe#M`u" Z R|B^O?(vgR3ŋϾ*3etA÷˭~nWgj|Rh^~3S$%!!;}~ݯz>9b`Je$uLcEo΂Wb˘tp_ZY4Qa2 G &\O6 ;. dce,أp+8qb ;_4в(@,HXfwuݏ3}bd:P++J%;WU]^ۯ5f"\ S:*;$ g/!Zk0ꛋ6"ͯ]IB|9>xYZa=#*l.SXj>,D՟*6VXHTSiEN-,?jG-Dƕ* nZ!mִuA6?; [[scQ&Kba ;r@е}Oߡ0Ӌ] |fjJMQ)2O*R ۲[o1AאY22IQ2c]l;nJb~jg[{7s*=jxozp%辉O[ @>E> yI\>l[ v"m%W ]/{n-֣i+jTƏj I :S{Â!U9xS4(HDPL@ի, Y5[gDW إ-eA'ˈtXG{$ZV@ȞFgZP K W-B'[ҟikb@5xfc}#rZ'vsFNe K4Z e!$)5xz'^*a=7MnI[6$;)о̣WXoӕX\|E8F)<2rI)_D5)Դ)ڐC~Jew*rl !`߀|+)ۮ&4 ȊBٝ}j9dw()tAz:Q1[Fg~&H^2h.W. NW ? yC^Xo)&D?j;}($TVT%8j\~~cF1/q= Wh͜AuwݦWH@]*pf(D1-Z᥈y0~ƺ oߪ4?m? #¨tAT r="|$<1־d=q{J4"`CJԕ(w[֤yiȦMqZKgEUHvq0Wrnnas҆+=Aa+$bPۢ5byvZ1;׽1?@ٵ vi%x x(t;Qn~~m#Z_97Ekws n/j&(*hvx#\oi M>z#QBy72=*Q_+xqFg~g\^9f׫`&󪫦Tt a*QBWZ 9)`67#*P yA6`d*fYf5q;%Cp:F)R#5H4n+4é>Wt"Mk+vo]^6Eåmd~:XQΌ\8[_g^0kjKYYWhWBHw%VbhS4xSl + q.QFIFe<4Qr:sӯ-T(=M0M0%v 8ɣ_l''qGZd("e0s"5nw8m*Զ\J \鞭W>kwbs:TC`j}Vy۶J8J@tƺ`?56Ne$'~q]_Rض<.h w9Z<5j\K] ֠Vs~DN+r9CZ+AлIgbwhُ+.|;z/Ǘ-"soCU.v+: Oau &PXMv 9R{åG{X"4ɍQyU$٘OlO,eWΪA}g-2mCqբOT-yg;s]5=#[?LLɹ6,M2X6<s 'p^?P_e |}ڕNhN~m!%HUc bIaf [\zqHMp&<:.8>נYK!l 4:_`)D&X$}hNњg3q9D>QIU*tnlHwHkB|̦!Ab!-{BjgUҥVD4p6XE癷 Z}Je(}Yc"iNWE yN1{30j Nc;!pS]-wGaWfy]]IrŬ]{/'#lEk)Yh}1cK\B\f &,i#u-uދȃtWZc @K0o9H߽$GiiO(j|6Ab +V\TV`jqDu1&ٲ HX;rsbd6:-B9ոfH=-_-cLfo6/X'Pz}W@!3P;YqJE.Z>Vpe`htҁqi<&UVSx\f=^qRBQX=I`xΖ8B*޿sxa(GF#tymNKʆ8H[P4.Ml:MG~.C?j(!Ca%6>oj *j~ϦJ+u>r{L;+Fd1/_.)5Xp[Y&Fzj@SϳjYT4gd-Mw/n^Yܧ֊h@Nݙ q DP|WZ?ܸ{:l5vv% %G,j_%"j2pa13 !󛼱Վ[PTsYS{Ɋn: 7EL*eH?<&*ïEw3UP0_FM HY#H< SR7{H7=O߭YlRo}{m\Q-[dxU -NG{:>3O[>P[ž R. 9xşdCLT(dz`> ?S)_|tˣj, |>.Xqr?˪0d(faR@-E!n;g@Κ^.Bbef ҨkrmgcZ=CNO5F.U a\J(J:atn?S˫*/J >c5F X"߂ (!LQ7KHӫgBA0YzɥfYOhj=i笖'ЈbGJ_%rrMw[]sk^(nX$ .[Amo3ѐl.PaL16{.P#*txLM8ol^U?qOX\[`+(ZVrE|DDG"ўoXΗg)VyցLsxQz`Ȅs!a&$x9]DN=={'Nf#x=!# jӔ+ԃ. ">]0a Ej\fn`΅uDU \;PY. ;R2mǬObw .φ+eF̞ĐQGrk9d%79.IOӥڣ0=4&T,e@iڥC6sR:Dm7n#hZ;A;k [ĀA*=|Dv.6-O;Z fRa~! DݼA9;*MHm>@=Ŗ)ĭXL+]Ǫŗ_X܁y՘g5J lWȉ 77q>rn]?XS^j AAYb:409%/7!xjFbm#T_W|Fx!t("l/ͷj6MzGz[%>9#–zʞ. a}hT&cQ|6֐:{j?B"~FPC>K Wy9w*/Reğg#tQD oO0FZ?'#B̩D,a9m+w Jفlޖ~/i[9 pUAl[zzR;pewx:{B8qCͽV!.t$j10w9<[[u<ts8IrI_KWm4\@|LA1RpP,V ToQe.f@V?jM+~2{4/,h 2T >K#ZdXCcsCQLQ-Lm9\ZӿIh:FH  Ǒjmv Pm:Uu[;"DVy )Ugczj&S)q>0<͟W ڬ@?t|'ވ9Œ C\Q̼VT7 ..}iCɯGuzt HY}@ Tqľ 5&r [ Ao]"khOZ/(vD-ikX:M=l:C挒9`4ümŌ{aRK#ùTH)0t,\hf/Ya(s7oZ:geunz0'Q7YE$|l>Pǎ_08EMJ3;u;i`xzo[:?:wS&S',R xKlD~ohqudVGr)\뽅"i3MHF{~$Nc%NyHEx|YyvpD %bi4su43°ɘRXdQ_Y8)tӲJTQh<5ŪS\#N k!V%.8[WHYK\NaX˔t%Չfnf|0p ]gpd;oi$쒣>zmBe`ZApo$ 0O`<.V^̏ :?Q`80^YKFЧ3(tr{c9@q$SJkiq_{aߌ,yI33 Eَ J5lS0'" 4_jŨӤ{pk ]^Szx |%z*rɌTQCk2p%,!A -Q6֯R䜶OAV[տrֵ`Ib1RuʉƿRMQ~ ,}e܄#pt` 'xg_QGU'&FQY3 ߝ-t1p>]':$O&޹VM+ʊO.  mJ2V]|XHhliq;RJ ,l|N _~ xƹ\Lp}\1r$>! :H5ͣdVTQטcqkb`7h5ONm=\nO~wJ4_zȎ208F2!3M`~u1 zۋr:){p\:I)Zob3t=T_z˨% =,Q>9s=wD{BR[ oۊs% K&$Uv9\*_@to3A6gmH{Kgs<$`ł"޹[؇it4|~;W3h.IB\ "'Gy~ $FCy- Ӣ*ն++oF+ oyBFKl( "QVVxfw)_1,9L+YQ{%c !LvJ`X+莟-<< `C6hb\g?Gn?>Q%N6v%Ɩ7|!!IcOU2 NCʍ\ KPcD87ed/FjluXlVU674q5 .1toS/zNGh]o!bNȭ_SDQn~=PPrrT'n 2"jm1X_MiwuZCh4!]]^ևtZ~.mu"W qZADW}H땆 R2 #>fWgYpMcb0f7uUAPx ʨ4DUyEA:u8Y^qe՚1Lj<8i[8? Fq4E/dZf*H)+Gas`cXCwd 5~mܽ'DE/3*FLB:H5kNҞD!9a5\Lʤ.d yBao@}Jt'TMexW'8ՆC,3uHV:P#oO]xAl>h҆p6Rye\ tC.tPLQGWp$ {Far>}}kQmrU-Ao5.%|V%/vOh8ڢy9S"{`!f0î1^997=cY&Rƭuv'ٵ)$ VM _NܹwW_`7U7#h-E7fלߛsFm+Tl?qW olج b .yp!DzdƞLrDg,FyjV1_x2Q`R c9﷎ ma&}7l'Vƽ),'ggJv7Xuy#bDsOC|i/t6bj2mNO[$e6pg=ujz_J"[ie4i{?"轕ty@@Q.Dʎ;l$ϴ~`χo=h7Ia%rxytN`<jMRzM߃ ~?th O4 sG'/0ccѣ;f6%Җr 1O-sB6:y**O6rtuk`a|ݒ3!i?0V>buUdz$bC1N(~(%Šlqb$}ց ~ٹ ʌ5܂G)oh^hctЉ3+$l58@"e#=>3c.rDW{l|JѮ0zYGh,𻢠j~z 5YNcH''MEq|z+h^ؾQZ_^V7)U1yۇ# ja&wȓ"Wnqv UOqDV 'O/8= 41FխvKW9mGzJ8c5!7|wA534 ЂZ+&72_buGd [ QJ|UY. L4ݖu9לX#=x q'$uB+c=;0AƆ@(H] F2PM4Hp 6x-@V* Q #$0@̑Ek{t݆v|Q6JC\6$fУf'ʞ9%;?B+kQkWJz*7C"w'бdU7 $&Zw)+\Q Sb Tc.Uf5E$`GL}oA~X(S8*vWbF[VM2mKޡw eE{2yg9i=T/#ˍ MٺX8YƋN >Md0b,ɂE dcÐ_ϺȊ{}slHڑ^c2 $߃Fԏ؉b8,"s.72H1ܑ@DЦoAʁw,ChsJQ?!Q缽ǼjbBM&vCqb^78uXLgR9_!M+]6nڧ@ z|x^ &77trV$=̀l[i? )Zs&2R*0l:{n 2b{;i$?0%mdė)SҨs4+S cLߎ 2w &diDBaeuzh4dlۤ{우-_J}_5`fŽ* sS=#btQhf WmzA\Ou@32{ޤh|wuz`Q|ð_"( M'kr5z>q!D921}{uij 2̙HpP~1*#G!|_ +AKlSAl6Fof qNyVnʖ͘g?Q*H$aGE aTTh֚%Ұ#UC"ֲmomԌ?r?.ҵ?IYZ_B5˗:6pD8@;6#dfk/6Q"ը(0OJ[t+_Ԥ֠+S C [5k (jb0hƂejABHG@Cȝ?q_e!A'~}Ou3! ׺(r^* _޳iaɦ* 9ęN4.Cždt$hs7cnRd2&Ĺ 6uDF԰ygbn?uЌyE7cno=bb,"лQdQ(]vD/"y|[tҪ> :u[} a56=j$f J8†# d Kà:/B;[1L&MTPDBǼ_YdO?m|R1]@tSLc\kR'D })eyݧo-j~7Pxz_t<Z]Z+PL @-h3QPc܄l%8c V#丫/2y Ltt dH*2>>, U握_zg!~̗ :}J4* ҔeO1jKC[D4w'd,t^k~wKo/Udz5`#fCݤ4:*d ֎nB:r}vBE\>U[aYK26ӇoWGn"[z5Ѳzy Es~x5P7M̖S̺zl522|(|~p֖2 )U&k_GRE䄅4 os^&ZILY_!=.Ƌ \L.R}W{N<%I!tY-? lնy6!5jjgn4yq̑p$nK|V?2gp]lJы>sG7p/!S"/$pWCw/EӖ  xc5LS/$(D-WRsRЉ%gAi""C0{ʃfx\v ໨ࢨRF!8J:!@v ͕N5QH2m:wwz= ?U C:U^hcOkGCdFvH z_=wMf]'Ff&|iM \%xN8.:Hrzّ oi'ګglǺՈ @nЍ) ԏl^0L;T]ֺ{vY1oBu:j:W2 ҖAjAgk@ 8k'2rwYm7gH:dUEz ̺?RN㮴}SD^>tCEp~ *& g Gl U.2ytns &Z_9l:rolN\~>ChZn96LZyrMNc$E9C {pŽЋ؏=>|G+|#Lʎi/<=ц7h*ڒ+#e ü[>zbTyىWsU2<)sDGIgmUzͰ6͑Pw])/:S<@K$B>4ҽoףXUkpCtW;dijN;2g6X=bM$Gp#j 3Dj;i2OJBq/ASW2ʟS% <]hsN<.o~]Y/-|c'rXQP>[ |:4Ÿc/7Ԉǝc5x|TBMZ[MɯSITƠFDp}_d ̺i= ȮRRB@OķuSʍi=&>$㜖,О/tOqeJsܰi Tb$aXOM.X <BZ^f&^%oYRe;㨳Nިr > FhԆ@8!zU)糊t߼P?¤>,e'BϏmA3JUkl[ȐZ{.jzG,ф|jkTk6wHu|H"B a4 hĎ*ܜ#i/~8܂J5g1* 0+S$ &yѡ!R:3w痹N+[v)Yp_> =H !2}'F&<˫6K-‘ȃέ ܬA$3p)záw幙3 Ҽ2, ̉A@Y=)G7:9 6ͩ, $R+tZX_0#9<1r6ڡ([GO2Yڲ ڀS|:[ͽOP=ܝ Tz;qAncor TL똕X "lpM"wm;mw( c^< Lr9l:C-RU_[#av!Y02kYGmЗXUG 3V]<<.y ;F$%xkhVFU{|{T]0wHj&,$إfb;$p8]W%YMo-93c_7}EE1xnPQfdϔKTƗ!sqK\,;9q 8񬙶repb_Yav¤F:plϔ3VU Ab# ⣻n'|"ih $?>dKؼ ;ϟ]F߫>GS'҄›Ɩl@.$'Qi*'|;WG]krExĠmQ_FLΪ@pA р,ߺt|<6w랛Js_$ڿ/OU5Iq3C=|i;YبM9]ē۝dy(xmp\ɷE,ki^1m5Rk$ *ʒ`~Fec&)d Guʵ?X9 Wɛֵ .׎ ijJ8#z[d4:/N OM zv`}%!Pʚ))%L6-FWll5)!ʯђtf΍af$OlG ՍMuIZyrlS. H `ׄ!+%lT=;Ċ9&^R{!>MFz߮mknIto"aG> o,*}4Mr*Σl"%<8`:0ὄJť8s]x 0^ᡚlUn~OB!සg)P ts.ŏuDQ^ǽ5hE|E=#$0JDp}+,/5FiԾpEFgEX>_i]ُk5is%H x עH lA;;WPHsx?%؁S ;)jEc<ʃսU}\>v:{=`'