chromedriver-78.0.3904.108-lp150.257.1<>,d]^a/=„M*UQJsIROe0? ^eJgPﯡ4DRaV_~ÖLJUx>j/ /WF}4{3Ѵ!-r+~[2>.[Kj݊OW+% XW2Qd yxֵ(RnK|3|e:2[B #@ƹ5ۗqDU]hX60 B/38 CJ_ @.?Gnpj^T>>?|d ) N  $*48 : < @  WDWW(89:+xF{2G{HH{LI{PX{TY{\\{]{^{b{c|_d|e|f|l|u}v}w}x}y}Rz,06xCchromedriver78.0.3904.108lp150.257.1WebDriver for Google Chrome/ChromiumWebDriver is an open source tool for automated testing of webapps across many browsers. It provides capabilities for navigating to web pages, user input, JavaScript execution, and more. ChromeDriver is a standalone server which implements WebDriver's wire protocol for Chromium. It is being developed by members of the Chromium and WebDriver teams.]^asheep812-openSUSE Leap 15.0openSUSEBSD-3-Clausehttp://bugs.opensuse.orgUnspecifiedhttps://www.chromium.org/linuxx86_642-]\ca70321be7d47974bbd51770a6fda9534169042bbdfadce2cf084b8bd4ac6f9frootrootchromium-78.0.3904.108-lp150.257.1.src.rpmchromedriverchromedriver(x86-64)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    chromiumld-linux-x86-64.so.2()(64bit)ld-linux-x86-64.so.2(GLIBC_2.2.5)(64bit)ld-linux-x86-64.so.2(GLIBC_2.3)(64bit)libX11.so.6()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.10)(64bit)libc.so.6(GLIBC_2.11)(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.16)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.6)(64bit)libc.so.6(GLIBC_2.7)(64bit)libc.so.6(GLIBC_2.9)(64bit)libdbus-1.so.3()(64bit)libdbus-1.so.3(LIBDBUS_1_3)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libfontconfig.so.1()(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libgcc_s.so.1(GCC_3.4)(64bit)libgio-2.0.so.0()(64bit)libglib-2.0.so.0()(64bit)libgobject-2.0.so.0()(64bit)libjpeg.so.8()(64bit)libjpeg.so.8(LIBJPEG_8.0)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.2.5)(64bit)libminizip.so.1()(64bit)libnspr4.so()(64bit)libnss3.so()(64bit)libnss3.so(NSS_3.10)(64bit)libnss3.so(NSS_3.11)(64bit)libnss3.so(NSS_3.11.1)(64bit)libnss3.so(NSS_3.12)(64bit)libnss3.so(NSS_3.12.3)(64bit)libnss3.so(NSS_3.12.4)(64bit)libnss3.so(NSS_3.2)(64bit)libnss3.so(NSS_3.3)(64bit)libnss3.so(NSS_3.4)(64bit)libnss3.so(NSS_3.5)(64bit)libnss3.so(NSS_3.6)(64bit)libnss3.so(NSS_3.7)(64bit)libnss3.so(NSS_3.8)(64bit)libnss3.so(NSS_3.9.2)(64bit)libnssutil3.so()(64bit)libnssutil3.so(NSSUTIL_3.12)(64bit)libnssutil3.so(NSSUTIL_3.12.3)(64bit)libpng16.so.16()(64bit)libpng16.so.16(PNG16_0)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libpthread.so.0(GLIBC_2.3.2)(64bit)libpthread.so.0(GLIBC_2.3.3)(64bit)libre2.so.0()(64bit)librt.so.1()(64bit)librt.so.1(GLIBC_2.2.5)(64bit)libstdc++.so.6()(64bit)libstdc++.so.6(CXXABI_1.3)(64bit)libstdc++.so.6(CXXABI_1.3.5)(64bit)libstdc++.so.6(GLIBCXX_3.4)(64bit)libstdc++.so.6(GLIBCXX_3.4.11)(64bit)libstdc++.so.6(GLIBCXX_3.4.14)(64bit)libstdc++.so.6(GLIBCXX_3.4.15)(64bit)libstdc++.so.6(GLIBCXX_3.4.17)(64bit)libstdc++.so.6(GLIBCXX_3.4.18)(64bit)libstdc++.so.6(GLIBCXX_3.4.19)(64bit)libstdc++.so.6(GLIBCXX_3.4.20)(64bit)libstdc++.so.6(GLIBCXX_3.4.21)(64bit)libstdc++.so.6(GLIBCXX_3.4.22)(64bit)libstdc++.so.6(GLIBCXX_3.4.5)(64bit)libstdc++.so.6(GLIBCXX_3.4.9)(64bit)libwebp.so.6()(64bit)libwebpdemux.so.2()(64bit)libwebpmux.so.2()(64bit)libz.so.1()(64bit)libz.so.1(ZLIB_1.2.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)78.0.3904.1083.0.4-14.6.0-14.0-15.2-14.14.1]*]҇]X]µ]]]@]{@]]@]@]@]n]m]@]y@]y@]z3@]z3@]nU]Z@]QT]L]D%]@1@]@1@]/ ]-@]G@]G@] #]@\\@\Q\"\E@\s@\8\C@\\\|\\}@\zp@\s\mA@\ac\ac\Q\,\@\I\ `\ @\ @[H[@[ݍ[Ѱ@[ͻ[@[@[$@[[[[[[[[j@[a[Xf@[Xf@[Xf@[Xf@[D[#@[!@[@[5@[@[ L@[ L@Z@ZZZK@ZZ3@Z@Za@ZI@ZZZZw@Z%ZSZ$ZtRZtRZo Zo Zk@ZiZiZN@Z3@Z)-@ZfZ ,@Z@YZ@YYY@Y@Y|YY@Y@YzYY@Y@Y@Yx@Yu@YS@YMYC@Y9<@Y6@Y5GYY X:@X@X@X @XrX~@X•@XBXe@Xe@XpX@XX|@XXZnXZnXOXJXEVXBX'@X lX@X @Ww@WSW W0@Wڍ@W;W֘WW@W@WW@W@WW@W@W@Wm Wk@Wc@WV@WPWF@W5W#LW@W@W@VVV@V޾VxVVVVwVVV@V@VVVV$@VVv@Vn@Vii@VbV^@VC-V*!@V$@VCV@VBUYU@UU@Uz@U4@UK@UUJ@Ua@UzUeU\w@U@U>$U.RU/@U ]@UTT\@T@T!T~TOTT@T7TT5T{TuTl@TeTO@T>aTomáš Chvátal Guillaume GARDET Andreas Stieger Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Martin Liška Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Stasiek Michalski Tomáš Chvátal Jan Ritzerfeld Andreas Stieger Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Jan Ritzerfeld Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Martin Liška Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Andreas Stieger Guillaume GARDET Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Simon Lees Tomáš Chvátal Tomáš Chvátal Guillaume GARDET Tomáš Chvátal Guillaume GARDET Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Yunhe Guo Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal astieger@suse.comTomáš Chvátal Tomáš Chvátal Tomáš Chvátal astieger@suse.comtchvatal@suse.comtchvatal@suse.comTomáš Chvátal Tomáš Chvátal tchvatal@suse.comtchvatal@suse.comguillaume.gardet@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comsecurity@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comguillaume.gardet@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comdimstar@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comidonmez@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comidonmez@suse.comtchvatal@suse.comqvoheagbfovvhubzdxfx@posteo.nettchvatal@suse.comqvoheagbfovvhubzdxfx@posteo.netqvoheagbfovvhubzdxfx@posteo.nettchvatal@suse.comqvoheagbfovvhubzdxfx@posteo.netastieger@suse.comtchvatal@suse.comidonmez@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comdimstar@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comNick_Levinson@yahoo.comtittiatcoke@gmail.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comastieger@suse.comastieger@suse.comjslaby@suse.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtchvatal@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comstefan.bruens@rwth-aachen.destefan.bruens@rwth-aachen.deastieger@suse.comjimmy@boombatower.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.commeissner@suse.commeissner@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comLed tittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.com- Update to 78.0.3904.108 bsc#1157269: * CVE-2019-13723: Use-after-free in Bluetooth * CVE-2019-13724: Out-of-bounds access in Bluetooth * Various fixes from internal audits, fuzzing and other initiatives- Fix build on aarch64 with: * chromium-79-icu-65.patch- Update to 78.0.3904.97 boo#1156172: * Various security fixes from internal audits, fuzzing and other initiatives- Keep just one conditional for vaapi enablement- Add more magic for zlib handling for SLE12 build- Add patch trying to build on SLE12: * chromium-old-glibc-noexcept.patch- Update to 78.0.3904.87 bsc#1155643: * CVE-2019-13721: Use-after-free in PDFium * CVE-2019-13720: Use-after-free in audio- Enable LTO again with disabled parallel LTO WPA streaming.- Disable LTO for now as it consumes ~20GB of RAM, we will reenable the feature later when some memory consumption fixes land in GCC- Adjust LDFLAGS settings for LTO to take memory-constraints into consideration- Update to 78.0.3904.70 bsc#1154806: * CVE-2019-13699: Use-after-free in media * CVE-2019-13700: Buffer overrun in Blink * CVE-2019-13701: URL spoof in navigation * CVE-2019-13702: Privilege elevation in Installer * CVE-2019-13703: URL bar spoofing * CVE-2019-13704: CSP bypass * CVE-2019-13705: Extension permission bypass * CVE-2019-13706: Out-of-bounds read in PDFium * CVE-2019-13707: File storage disclosure * CVE-2019-13708: HTTP authentication spoof * CVE-2019-13709: File download protection bypass * CVE-2019-13710: File download protection bypass * CVE-2019-13711: Cross-context information leak * CVE-2019-15903: Buffer overflow in expat * CVE-2019-13713: Cross-origin data leak * CVE-2019-13714: CSS injection * CVE-2019-13715: Address bar spoofing * CVE-2019-13716: Service worker state error * CVE-2019-13717: Notification obscured * CVE-2019-13718: IDN spoof * CVE-2019-13719: Notification obscured * Various fixes from internal audits, fuzzing and other initiatives - Add patches: * chromium-78-gcc-enum-range.patch * chromium-78-gcc-noexcept.patch * chromium-78-gcc-std-vector.patch * chromium-78-icon.patch * chromium-78-include.patch * chromium-78-noexcept.patch * chromium-78-pm-crash.patch * chromium-78-protobuf-export.patch - Remove patches: * chromium-77-blink-include.patch * chromium-77-fix-gn-gen.patch * chromium-77-gcc-abstract.patch * chromium-77-gcc-include.patch * chromium-77-gcc-no-opt-safe-math.patch * chromium-77-no-cups.patch * chromium-77-std-string.patch * chromium-77-system-hb.patch * chromium-77.0.3865.120.tar.xz * chromium-77.0.3865.75-certificate-transparency.patch - Rebase patches: * chromium-system-icu.patch * chromium-unbundle-zlib.patch * chromium-vaapi-fix.patch * chromium-vaapi.patch * old-libva.patch At revision 0ad55cb9e188d5926db26003b443eec9.- Use internal resources for icon and appdata- Update to 77.0.3865.120 bsc#1153660: * CVE-2019-13693: Use-after-free in IndexedDB * CVE-2019-13694: Use-after-free in WebRTC * CVE-2019-13695: Use-after-free in audio * CVE-2019-13696: Use-after-free in V8 * CVE-2019-13697: Cross-origin size leak. * Various fixes from internal audits, fuzzing and other initiatives- Added patch chromium-vaapi-fix.patch again to fix boo#1146219- update to chromium 77.0.3865.90 boo#1151229: * CVE-2019-13685: Use-after-free in UI * CVE-2019-13688: Use-after-free in media * CVE-2019-13687: Use-after-free in media * CVE-2019-13686: Use-after-free in offline pages- Add patch from Fedora for cert transparency: * chromium-77.0.3865.75-certificate-transparency.patch- Add patches from gentoo: * chromium-77-clang.patch * chromium-77-gcc-no-opt-safe-math.patch * chromium-77-no-cups.patch * chromium-77-std-string.patch- Update patch old-libva.patch to build on openSUSE Leap 15.0- Update to chromium 77.0.3865.75 bsc#1150425: * CVE-2019-5870: Use-after-free in media * CVE-2019-5871: Heap overflow in Skia * CVE-2019-5872: Use-after-free in Mojo * CVE-2019-5874: External URIs may trigger other browsers * CVE-2019-5875: URL bar spoof via download redirect * CVE-2019-5876: Use-after-free in media * CVE-2019-5877: Out-of-bounds access in V8 * CVE-2019-5878: Use-after-free in V8 * CVE-2019-5879: Extension can bypass same origin policy * CVE-2019-5880: SameSite cookie bypass * CVE-2019-5881: Arbitrary read in SwiftShader * CVE-2019-13659: URL spoof * CVE-2019-13660: Full screen notification overlap * CVE-2019-13661: Full screen notification spoof * CVE-2019-13662: CSP bypass * CVE-2019-13663: IDN spoof * CVE-2019-13664: CSRF bypass * CVE-2019-13665: Multiple file download protection bypass * CVE-2019-13666: Side channel using storage size estimate * CVE-2019-13667: URI bar spoof when using external app URIs * CVE-2019-13668: Global window leak via console * CVE-2019-13669: HTTP authentication spoof * CVE-2019-13670: V8 memory corruption in regex * CVE-2019-13671: Dialog box fails to show origin * CVE-2019-13673: Cross-origin information leak using devtools * CVE-2019-13674: IDN spoofing * CVE-2019-13675: Extensions can be disabled by trailing slash * CVE-2019-13676: Google URI shown for certificate warning * CVE-2019-13677: Chrome web store origin needs to be isolated * CVE-2019-13678: Download dialog spoofing * CVE-2019-13679: User gesture needed for printing * CVE-2019-13680: IP address spoofing to servers * CVE-2019-13681: Bypass on download restrictions * CVE-2019-13682: Site isolation bypass * CVE-2019-13683: Exceptions leaked by devtools - Added patches: * chromium-77-blink-include.patch * chromium-77-fix-gn-gen.patch * chromium-77-gcc-abstract.patch * chromium-77-gcc-include.patch * chromium-77-system-hb.patch * chromium-unbundle-zlib.patch - Removed merged patches: * chromium-76-gcc-ambiguous-nodestructor.patch * chromium-76-gcc-blink-constexpr.patch * chromium-76-gcc-blink-namespace1.patch * chromium-76-gcc-blink-namespace2.patch * chromium-76-gcc-gl-init.patch * chromium-76-gcc-include.patch * chromium-76-gcc-noexcept.patch * chromium-76-gcc-private.patch * chromium-76-gcc-pure-virtual.patch * chromium-76-gcc-uint32.patch * chromium-76-gcc-vulkan.patch * chromium-76-quiche.patch * chromium-angle-inline.patch * chromium-fix-char_traits.patch * chromium-skia-aarch64-buildfix.patch * chromium-vaapi-fix.patch * gcc-lto-rsp-clobber.patch - Refreshed patches: * chromium-prop-codecs.patch * chromium-system-icu.patch * chromium-vaapi.patch * old-libva.patch- Update to 76.0.3809.132 bsc#1149143 CVE-2019-5869: * CVE-2019-5869: Use-after-free in Blink * Various fixes from internal audits, fuzzing and other initiatives - Refresh patch chromium-76-gcc-ambiguous-nodestructor.patch- Added patch chromium-vaapi-fix.patch to fix boo#1146219- Update to 76.0.3809.100 bsc#1145242: * CVE-2019-5868: Use-after-free in PDFium ExecuteFieldAction * CVE-2019-5867: Out-of-bounds read in V8- Add patches to fix few compilation issues: * chromium-angle-inline.patch * chromium-fix-char_traits.patch bsc#1144625 - Remove not properly applying old-glibc patch: * chromium-old-glibc.patch - Disable various gcc warnings as upstream does not care and it just bloats the buildlog (from debian)- Update to 76.0.3809.87 bsc#1143492: * CVE-2019-5850: Use-after-free in offline page fetcher * CVE-2019-5860: Use-after-free in PDFium * CVE-2019-5853: Memory corruption in regexp length check * CVE-2019-5851: Use-after-poison in offline audio context * CVE-2019-5859: res: URIs can load alternative browsers * CVE-2019-5856: Insufficient checks on filesystem: URI permissions * CVE-2019-5855: Integer overflow in PDFium * CVE-2019-5865: Site isolation bypass from compromised renderer * CVE-2019-5858: Insufficient filtering of Open URL service parameters * CVE-2019-5864: Insufficient port filtering in CORS for extensions * CVE-2019-5862: AppCache not robust to compromised renderers * CVE-2019-5861: Click location incorrectly checked * CVE-2019-5857: Comparison of -0 and null yields crash * CVE-2019-5854: Integer overflow in PDFium text rendering * CVE-2019-5852: Object leak of utility functions * Various fixes from internal audits, fuzzing and other initiatives * Not affected: + CVE-2019-5863: Use-after-free in WebUSB on Windows - Added patches: * chromium-76-gcc-ambiguous-nodestructor.patch * chromium-76-gcc-blink-constexpr.patch * chromium-76-gcc-blink-namespace1.patch * chromium-76-gcc-blink-namespace2.patch * chromium-76-gcc-gl-init.patch * chromium-76-gcc-include.patch * chromium-76-gcc-noexcept.patch * chromium-76-gcc-private.patch * chromium-76-gcc-pure-virtual.patch * chromium-76-gcc-uint32.patch * chromium-76-gcc-vulkan.patch * chromium-76-quiche.patch - Removed patches: * chromium-non-void-return.patch * chromium-75.0.3770.80-SIOCGSTAMP.patch * chromium-75.0.3770.80-pure-virtual-crash-fix.patch * chromium-gcc.patch * chromium-renderprocess-crash.patch * chromium-skia-system-fontconfig.patch - Refreshed patches: * chromium-dma-buf.patch * chromium-drm.patch * chromium-libusb_interrupt_event_handler.patch * chromium-skia-aarch64-buildfix.patch * chromium-system-icu.patch * chromium-vaapi.patch * old-libva.patch- Do not use lto flags from prjconf, we need to set them using gn buildsystem- Drop patch chromium-non-void-return.patch and just pass a cxxflags disabler for the check- Update gcc-enable-lto.patch to work on systems without the lto- Update to 75.0.3770.142 bsc#1141649: * CVE-2019-5847: V8 sealed/frozen elements cause crash * CVE-2019-5848: Font sizes may expose sensitive information - Add patch chromium-renderprocess-crash.patch to hopefully fix bsc#1141102- Enable LTO for x86_64 - add gcc-enable-lto.patch and gcc-lto-rsp-clobber.patch patches.- Install manpage- Update to 75.0.3770.100: * This is just feature fixes update- Update to 75.0.3770.90 bsc#1137332 bsc#1138287: * CVE-2019-5842: Use-after-free in Blink.- Fix build with kernel 5.2 and avoid runtime crash due to pure virtual declaration: * chromium-75.0.3770.80-SIOCGSTAMP.patch * chromium-75.0.3770.80-pure-virtual-crash-fix.patch- Update old-libva.patch to make sure we build on Leap 42.3- Update to 75.0.3770.80 bsc#1137332: * CVE-2019-5828: Use after free in ServiceWorker * CVE-2019-5829: Use after free in Download Manager * CVE-2019-5830: Incorrectly credentialed requests in CORS * CVE-2019-5831: Incorrect map processing in V8 * CVE-2019-5832: Incorrect CORS handling in XHR * CVE-2019-5833: Inconsistent security UI placemen * CVE-2019-5835: Out of bounds read in Swiftshader * CVE-2019-5836: Heap buffer overflow in Angle * CVE-2019-5837: Cross-origin resources size disclosure in Appcache * CVE-2019-5838: Overly permissive tab access in Extensions * CVE-2019-5839: Incorrect handling of certain code points in Blink * CVE-2019-5840: Popup blocker bypass * Various fixes from internal audits, fuzzing and other initiatives * CVE-2019-5834: URL spoof in Omnibox on iOS - Remove merged patchsets: * 00-basevalue.patch * 01-basevalue.patch * 02-basevalue.patch * 03-basevalue.patch * 04-basevalue.patch * 05-basevalue.patch * 06-basevalue.patch * chromium-fix-crc32-for-aarch64.patch * quic.patch - Update patches: * chromium-gcc.patch * chromium-non-void-return.patch * chromium-vaapi.patch * old-libva.patch- Update to 74.0.3729.169: * Feature fixes update only- Update to 74.0.3729.157: * Various security fixes from internal audits, fuzzing and other initiatives - includes security fixes from 74.0.3729.131 (boo#1134218): * CVE-2019-5827: Out-of-bounds access in SQLite * CVE-2019-5824: Parameter passing error in media player- Add patch to fix build on aarch64: * chromium-fix-crc32-for-aarch64.patch- Update to 74.0.3729.108 bsc#1133313: * CVE-2019-5805: Use after free in PDFium * CVE-2019-5806: Integer overflow in Angle * CVE-2019-5807: Memory corruption in V8 * CVE-2019-5808: Use after free in Blink * CVE-2019-5809: Use after free in Blink * CVE-2019-5810: User information disclosure in Autofill * CVE-2019-5811: CORS bypass in Blink * CVE-2019-5813: Out of bounds read in V8 * CVE-2019-5814: CORS bypass in Blink * CVE-2019-5815: Heap buffer overflow in Blink * CVE-2019-5818: Uninitialized value in media reader * CVE-2019-5819: Incorrect escaping in developer tools * CVE-2019-5820: Integer overflow in PDFium * CVE-2019-5821: Integer overflow in PDFium * CVE-2019-5822: CORS bypass in download manager * CVE-2019-5823: Forced navigation from service worker * CVE-2019-5812: URL spoof in Omnibox on iOS * CVE-2019-5816: Exploit persistence extension on Android * CVE-2019-5817: Heap buffer overflow in Angle on Windows - Add patches: * 00-basevalue.patch * 01-basevalue.patch * 02-basevalue.patch * 03-basevalue.patch * 04-basevalue.patch * 05-basevalue.patch * 06-basevalue.patch * old-libva.patch * quic.patch - Remove patches: * chromium-73.0.3683.75-pipewire-cstring-fix.patch * chromium-fix_crashpad.patch * chromium-fix_swiftshader.patch * chromium-old-libva.patch - Rebase patches: * chromium-gcc.patch * chromium-non-void-return.patch * chromium-old-glibc.patch- Update to 73.0.3686.103: * Various feature fixes- Add patch for pipewire build: * chromium-73.0.3683.75-pipewire-cstring-fix.patch- Update to 73.0.3683.86: * Just feature fixes around - Refresh patch: * chromium-non-void-return.patch- Update conditions to use system harfbuzz on TW+ - Require java during build - Enable using pipewire when available - Rebase chromium-vaapi.patch to match up the Fedora one- Update to 73.0.3683.75 bsc#1129059: * CVE-2019-5787: Use after free in Canvas. * CVE-2019-5788: Use after free in FileAPI. * CVE-2019-5789: Use after free in WebMIDI. * CVE-2019-5790: Heap buffer overflow in V8. * CVE-2019-5791: Type confusion in V8. * CVE-2019-5792: Integer overflow in PDFium. * CVE-2019-5793: Excessive permissions for private API in Extensions. * CVE-2019-5794: Security UI spoofing. * CVE-2019-5795: Integer overflow in PDFium. * CVE-2019-5796: Race condition in Extensions. * CVE-2019-5797: Race condition in DOMStorage. * CVE-2019-5798: Out of bounds read in Skia. * CVE-2019-5799: CSP bypass with blob URL. * CVE-2019-5800: CSP bypass with blob URL. * CVE-2019-5801: Incorrect Omnibox display on iOS. * CVE-2019-5802: Security UI spoofing. * CVE-2019-5803: CSP bypass with Javascript URLs'. * CVE-2019-5804: Command line command injection on Windows. - Update patches: * chromium-buildname.patch * chromium-non-void-return.patch * chromium-old-glibc.patch * chromium-old-libva.patch * chromium-vaapi.patch - Removed patches: * chromium-crashpad-fix_aarch64.patch * chromium-webrtc-includes.patch - Added patches: * chromium-gcc.patch * chromium-fix_crashpad.patch- Drop direct dependency on libgsm, we just need the devel- Update to 72.0.3626.121: * fixes bsc#1127602 CVE-2019-5786- Update to 72.0.3626.119: * Feature fixes update only- Update to 72.0.3626.109 bsc#1120892 CVE-2018-20073: * This is just feature fixes update- Update to 72.0.3626.96 bsc#1124936: * CVE-2019-5784: Inappropriate implementation in V8- Provide web_browser so chromium can be installed instead of firefox.- Update to 72.0.3626.81 bsc#1123641: * CVE-2019-5754: Inappropriate implementation in QUIC Networking. Reported by Klzgrad on 2018-12-12 * CVE-2019-5782: Inappropriate implementation in V8. Reported by Qixun Zhao of Qihoo 360 Vulcan Team via Tianfu Cup on 2018-11-16 * CVE-2019-5755: Inappropriate implementation in V8. Reported by Jay Bosamiya on 2018-12-10 * CVE-2019-5756: Use after free in PDFium. Reported by Anonymous on 2018-10-14 * CVE-2019-5757: Type Confusion in SVG. Reported by Alexandru Pitis, Microsoft Browser Vulnerability Research on 2018-12-15 * CVE-2019-5758: Use after free in Blink. Reported by Zhe Jin(金哲),Luyao Liu(刘路遥) from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd on 2018-12-11 * CVE-2019-5759: Use after free in HTML select elements. Reported by Almog Benin on 2018-12-05 * CVE-2019-5760: Use after free in WebRTC. Reported by Zhe Jin(金哲),Luyao Liu(刘路遥) from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd on 2018-12-05 * CVE-2019-5761: Use after free in SwiftShader. Reported by Zhe Jin(金哲),Luyao Liu(刘路遥) from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd on 2018-11-13 * CVE-2019-5762: Use after free in PDFium. Reported by Anonymous on 2018-10-31 * CVE-2019-5763: Insufficient validation of untrusted input in V8. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2018-12-13 * CVE-2019-5764: Use after free in WebRTC. Reported by Eyal Itkin from Check Point Software Technologies on 2018-12-09 * CVE-2019-5765: Insufficient policy enforcement in the browser. Reported by Sergey Toshin (@bagipro) on 2019-01-16 * CVE-2019-5766: Insufficient policy enforcement in Canvas. Reported by David Erceg on 2018-11-20 * CVE-2019-5767: Incorrect security UI in WebAPKs. Reported by Haoran Lu, Yifan Zhang, Luyi Xing, and Xiaojing Liao from Indiana University Bloomington on 2018-11-06 * CVE-2019-5768: Insufficient policy enforcement in DevTools. Reported by Rob Wu on 2018-01-24 * CVE-2019-5769: Insufficient validation of untrusted input in Blink. Reported by Guy Eshel on 2018-12-11 * CVE-2019-5770: Heap buffer overflow in WebGL. Reported by hemidallt@ on 2018-11-27 * CVE-2019-5771: Heap buffer overflow in SwiftShader. Reported by Zhe Jin(金哲),Luyao Liu(刘路遥) from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd on 2018-11-12 * CVE-2019-5772: Use after free in PDFium. Reported by Zhen Zhou of NSFOCUS Security Team on 2018-11-26 * CVE-2019-5773: Insufficient data validation in IndexedDB. Reported by Yongke Wang of Tencent's Xuanwu Lab (xlab.tencent.com) on 2018-12-24 * CVE-2019-5774: Insufficient validation of untrusted input in SafeBrowsing. Reported by Junghwan Kang (ultract) and Juno Im on 2018-11-11 * CVE-2019-5775: Insufficient policy enforcement in Omnibox. Reported by evi1m0 of Bilibili Security Team on 2018-10-18 * CVE-2019-5776: Insufficient policy enforcement in Omnibox. Reported by Lnyas Zhang on 2018-07-14 * CVE-2019-5777: Insufficient policy enforcement in Omnibox. Reported by Khalil Zhani on 2018-06-04 * CVE-2019-5778: Insufficient policy enforcement in Extensions. Reported by David Erceg on 2019-01-02 * CVE-2019-5779: Insufficient policy enforcement in ServiceWorker. Reported by David Erceg on 2018-11-11 * CVE-2019-5780: Insufficient policy enforcement. Reported by Andreas Hegenberg (folivora.AI GmbH) on 2018-10-03 * CVE-2019-5781: Insufficient policy enforcement in Omnibox. Reported by evi1m0 of Bilibili Security Team on 2018-10-18 - Added patches: * chromium-crashpad-fix_aarch64.patch * chromium-fix_swiftshader.patch * chromium-webrtc-includes.patch - Obsoleted patches: * chromium-gcc8-alignof.patch * chromium-initialize-list.patch - Updated patches: * chromium-dma-buf.patch * chromium-non-void-return.patch * chromium-skia-system-fontconfig.patch * chromium-system-icu.patch * chromium-vaapi.patch - Try to reduce constraints to avoid being so much just in scheduled state- Tweak fix_building_widevinecdm_with_chromium.patch to make it work again bsc#1120429- Update %arm build, but keep it disabled for now, as ld requires lots of RAM- Version update to 71.0.3578.98 bsc#1119364: * CVE-2018-17481: Use after free in PDFium - Redo chromium-old-libva.patch- Increase %limit_build value to avoid OOM- Add patch to build on Leap 42.x: * chromium-old-libva.patch- Version update to 71.0.3578.80 bsc#1118529: - CVE-2018-17480: Out of bounds write in V8 - CVE-2018-17481: Use after frees in PDFium - CVE-2018-18335: Heap buffer overflow in Skia - CVE-2018-18336: Use after free in PDFium - CVE-2018-18337: Use after free in Blink - CVE-2018-18338: Heap buffer overflow in Canvas - CVE-2018-18339: Use after free in WebAudio - CVE-2018-18340: Use after free in MediaRecorder - CVE-2018-18341: Heap buffer overflow in Blink - CVE-2018-18342: Out of bounds write in V8 - CVE-2018-18343: Use after free in Skia - CVE-2018-18344: Inappropriate implementation in Extensions - Multiple issues in SQLite via WebSQL - CVE-2018-18345: Inappropriate implementation in Site Isolation - CVE-2018-18346: Incorrect security UI in Blink - CVE-2018-18347: Inappropriate implementation in Navigation - CVE-2018-18348: Inappropriate implementation in Omnibox - CVE-2018-18349: Insufficient policy enforcement in Blink - CVE-2018-18350: Insufficient policy enforcement in Blink - CVE-2018-18351: Insufficient policy enforcement in Navigation - CVE-2018-18352: Inappropriate implementation in Media - CVE-2018-18353: Inappropriate implementation in Network Authentication - CVE-2018-18354: Insufficient data validation in Shell Integration - CVE-2018-18355: Insufficient policy enforcement in URL Formatter - CVE-2018-18356: Use after free in Skia - CVE-2018-18357: Insufficient policy enforcement in URL Formatter - CVE-2018-18358: Insufficient policy enforcement in Proxy. - CVE-2018-18359: Out of bounds read in V8 - Inappropriate implementation in PDFium - Use after free in Extensions - Inappropriate implementation in Navigation - Insufficient policy enforcement in Navigation - Insufficient policy enforcement in URL Formatter - Various fixes from internal audits, fuzzing and other initiatives - Updated/refreshed patches: * fix_building_widevinecdm_with_chromium.patch * chromium-vaapi.patch * chromium-skia-aarch64-buildfix.patch * chromium-prop-codecs.patch * chromium-non-void-return.patch - Removed patches: * chromium-gcc8-constexpr.patch * chromium-libva1.patch * chromium-pdfium-include.patch * chromium-warnings.patch - Added patches: * chromium-initialize-list.patch- Version update to 70.0.3538.110 bsc#1116608: * CVE-2018-17479: Use-after-free in GPU- Version update to 70.0.3538.102 bsc#1115537 CVE-2018-17478 * CVE-2018-17478: Out of bounds memory access in V8- Remove noto-emoji-fonts recommends. noto-emoji-fonts has been inactive for a long time. noto-coloremoji-fonts is the current recommended emoji fonts from noto. And noto-emoji-fonts (monochrome) disables noto-coloremoji-fonts (colorful).- Update to 70.0.3538.77: * Few feature fixes only - Do not meintion armv6 and armv7 in the constraints - Update patch chromium-non-void-return.patch- Add patch trying to get the pkg to build with libva 1.x releases: * chromium-libva1.patch - Update chromium-old-glibc.patch to contain more tweaked locations- Add back chromium-old-glibc.patch to make sure we build on 42.3 - Reduce the merge number on jumbo files to reduce memory usage bit- remove trigger word from spec that trips up legal-auto- Update to 70.0.3538.67 bsc#1112111: * CVE-2018-17462: Sandbox escape in AppCache * CVE-2018-17463: Remote code execution in V8 * CVE to be assigned: Heap buffer overflow in Little CMS in PDFium * CVE-2018-17464: URL spoof in Omnibox * CVE-2018-17465: Use after free in V8 * CVE-2018-17466: Memory corruption in Angle * CVE-2018-17467: URL spoof in Omnibox * CVE-2018-17468: Cross-origin URL disclosure in Blink * CVE-2018-17469: Heap buffer overflow in PDFium * CVE-2018-17470: Memory corruption in GPU Internals * CVE-2018-17471: Security UI occlusion in full screen mode * CVE-2018-17472: iframe sandbox escape on iOS * CVE-2018-17473: URL spoof in Omnibox * CVE-2018-17474: Use after free in Blink * CVE-2018-17475: URL spoof in Omnibox * CVE-2018-17476: Security UI occlusion in full screen mode * CVE-2018-5179: Lack of limits on update() in ServiceWorker * CVE-2018-17477: UI spoof in Extensions - Added patches: * chromium-gcc8-constexpr.patch * chromium-libusb_interrupt_event_handler.patch * chromium-pdfium-include.patch * chromium-system-libusb.patch - Removed patches: * chromium-old-glibc.patch * chromium-vpx-aarch64.patch - Updated patches: * chromium-gcc8-alignof.patch * chromium-non-void-return.patch * chromium-prop-codecs.patch * chromium-sandbox-pie.patch * chromium-skia-system-fontconfig.patch * chromium-vaapi.patch - Redo the vaapi patch to be default on as there are no reports of issues with it - Use system libusb-1.0 - Use jumbo build to speed things up - Use bundled harfbuzz because we need newer than latest release - Disable gnome-keyring as it crashes the chromium quite often- Keep blank line after autopatch to make SLE12 rpm macros happy- Update to 69.0.3497.100 bsc#1108774 * Fixes from internal audits, fuzzing and other initiatives- Chromium 69.0.3497.92 (boo#1108114), containing 2 security fixes: * Function signature mismatch in WebAssembly * URL Spoofing in Omnibox - the rpm should not provide swiftshader libs boo#1108175 - make jumbo build configurable, default off- Enable jumbo build to speed things up - Enable vulkan integration- Add patch to fix mojo build on 32bit: * chromium-gcc8-alignof.patch- Split out the gn from this package, obsoletes patches: * fix-gn-bootstrap.patch * chromium-last-commit-position-r0.patch- Version update to 69.0.3497.81 bsc#1107235: * CVE-2018-16065: Out of bounds write in V8 * CVE-2018-16066:Out of bounds read in Blink * CVE-2018-16067: Out of bounds read in WebAudio * CVE-2018-16068: Out of bounds write in Mojo * CVE-2018-16069:Out of bounds read in SwiftShader * CVE-2018-16070: Integer overflow in Skia * CVE-2018-16071: Use after free in WebRTC * CVE-2018-16073: Site Isolation bypass after tab restore * CVE-2018-16074: Site Isolation bypass using Blob URLS * Out of bounds read in Little-CMS * CVE-2018-16075: Local file access in Blink * CVE-2018-16076: Out of bounds read in PDFium * CVE-2018-16077: Content security policy bypass in Blink * CVE-2018-16078: Credit card information leak in Autofill * CVE-2018-16079: URL spoof in permission dialogs * CVE-2018-16080: URL spoof in full screen mode * CVE-2018-16081: Local file access in DevTools * CVE-2018-16082: Stack buffer overflow in SwiftShader * CVE-2018-16083: Out of bounds read in WebRTC * CVE-2018-16084: User confirmation bypass in external protocol handling * CVE-2018-16085: Use after free in Memory Instrumentation * CVE-2018-16086: Script injection in New Tab Page. * CVE-2018-16087: Multiple download restriction bypass. * CVE-2018-16088: User gesture requirement bypass. - Added patches: * chromium-old-glibc.patch * chromium-system-icu.patch * chromium-warnings.patch - Removed patches: * chromium-cors-string.patch * chromium-crashpad-aarch64-fix.patch * chromium-ffmpeg.patch * chromium-gcc.patch * chromium-gcc7.patch * chromium-libjpeg.patch * chromium-libwebp-shim.patch - Rebased patches: * chromium-last-commit-position-r0.patch * chromium-non-void-return.patch * chromium-sandbox-pie.patch * chromium-skia-system-fontconfig.patch * chromium-vaapi.patch- Update to chromium-68.0.3440.106: * Various feature fixes- Version update to 68.0.3440.84: * Various small feature fixes only- Add patch to fix aarch64 build: * chromium-vpx-aarch64.patch- Add patch trying to build chromium on Leap 42.3: * chromium-gcc7.patch- Raise libvpx requirement to match what we really need- Version update to 68.0.3440.75 bsc#1102530: * CVE-2018-6153: Stack buffer overflow in Skia. * CVE-2018-6154: Heap buffer overflow in WebGL. * CVE-2018-6155: Use after free in WebRTC. * CVE-2018-6156: Heap buffer overflow in WebRTC. * CVE-2018-6157: Type confusion in WebRTC. * CVE-2018-6158: Use after free in Blink. * CVE-2018-6159: Same origin policy bypass in ServiceWorker. * CVE-2018-6160: URL spoof in Chrome on iOS. * CVE-2018-6161: Same origin policy bypass in WebAudio. * CVE-2018-6162: Heap buffer overflow in WebGL. * CVE-2018-6163: URL spoof in Omnibox. * CVE-2018-6164: Same origin policy bypass in ServiceWorker. * CVE-2018-6165: URL spoof in Omnibox. * CVE-2018-6166: URL spoof in Omnibox. * CVE-2018-6167: URL spoof in Omnibox. * CVE-2018-6168: CORS bypass in Blink. * CVE-2018-6169: Permissions bypass in extension installation. * CVE-2018-6170: Type confusion in PDFium. * CVE-2018-6171: Use after free in WebBluetooth. * CVE-2018-6172: URL spoof in Omnibox. * CVE-2018-6173: URL spoof in Omnibox. * CVE-2018-6174: Integer overflow in SwiftShader. * CVE-2018-6175: URL spoof in Omnibox. * CVE-2018-6176: Local user privilege escalation in Extensions. * CVE-2018-6177: Cross origin information leak in Blink. * CVE-2018-6178: UI spoof in Extensions. * CVE-2018-6179: Local file information leak in Extensions. * CVE-2018-6044: Request privilege escalation in Extensions. * CVE-2018-4117: Cross origin information leak in Blink. - Rebase patches: * chromium-master-prefs-path.patch * chromium-non-void-return.patch * chromium-vaapi.patch - Add patches: * chromium-cors-string.patch * chromium-gcc.patch * chromium-libjpeg.patch * chromium-libwebp-shim.patch - Remove patches: * chromium-gcc8.patch- Version update to 67.0.3396.99: * Various small feature fixes, no security- Add patch to build under gcc8: * chromium-gcc8.patch- Chromium 67.0.3396.87: * CVE-2018-6149: Out of bounds write in V8 (boo#1097452)- Chromium 67.0.3396.79: * CVE-2018-6148: Incorrect handling of CSP header (boo#1096508)- Require ffmpeg >= 4.0 bsc#1095545- Update to 67.0.3396.62 bsc#1095163 * CVE-2018-6123: Use after free in Blink. * CVE-2018-6124: Type confusion in Blink. * CVE-2018-6125: Overly permissive policy in WebUSB. * CVE-2018-6126: Heap buffer overflow in Skia. * CVE-2018-6127: Use after free in indexedDB. * CVE-2018-6128: uXSS in Chrome on iOS. * CVE-2018-6129: Out of bounds memory access in WebRTC. * CVE-2018-6130: Out of bounds memory access in WebRTC. * CVE-2018-6131: Incorrect mutability protection in WebAssembly. * CVE-2018-6132: Use of uninitialized memory in WebRTC. * CVE-2018-6133: URL spoof in Omnibox. * CVE-2018-6134: Referrer Policy bypass in Blink. * CVE-2018-6135: UI spoofing in Blink. * CVE-2018-6136: Out of bounds memory access in V8. * CVE-2018-6137: Leak of visited status of page in Blink. * CVE-2018-6138: Overly permissive policy in Extensions. * CVE-2018-6139: Restrictions bypass in the debugger extension API. * CVE-2018-6140: Restrictions bypass in the debugger extension API. * CVE-2018-6141: Heap buffer overflow in Skia. * CVE-2018-6142: Out of bounds memory access in V8. * CVE-2018-6143: Out of bounds memory access in V8. * CVE-2018-6144: Out of bounds memory access in PDFium. * CVE-2018-6145: Incorrect escaping of MathML in Blink. * CVE-2018-6147: Password fields not taking advantage of OS protections in Views. - Add patches to build on aarch and remove obsolete one: * chromium-crashpad-aarch64-fix.patch * chromium-skia-aarch64-buildfix.patch * chromium-65.0.3325.162-skia-aarch64-buildfix.patch * chromium-skia-neon.patch - Remove no longer needed gcc patch: * chromium-gcc7.patch - Rebase patches: * chromium-non-void-return.patch * chromium-vaapi.patch * exclude_ymp.patch * fix_building_widevinecdm_with_chromium.patch- on SLE 12 with SUSE PackageHub 12, do not require the SDK for libwebpmux1 (bsc#1070421)- Fix installation issue on SUSE PackageHub 12 with libminizip1 (bsc#1093031)- Chromium 66.0.3359.181: * Autoplay: Force enable on desktop for Web Audio- Chromium 66.0.3359.170 (bsc#1092923): * Chain leading to sandbox escape: CVE-2018-6121: Privilege Escalation in extensions CVE-2018-6122: Type confusion in V8 * CVE-2018-6120: Heap buffer overflow in PDFium * Various fixes from internal audits, fuzzing and other initiatives- Add patch chromium-skia-system-fontconfig.patch to fix bsc#1092272- Enable build on AArch64 - Fix build on AArch64: * set target_cpu to arm64 * disable tcmalloc and swiftshader for aarch64 * Add new patches: - chromium-65.0.3325.162-skia-aarch64-buildfix.patch - chromium-skia-neon.patch- chromium 66.0.3359.139: * CVE-2018-6118: Use after free in Media Cache (bsc#1091288) * drop add-missing-blink-tools.patch, now in tarball again- Version bump to chromium 66.0.3359.117 bsc#1090000: * CVE-2018-6085: Use after free in Disk Cache * CVE-2018-6086: Use after free in Disk Cache * CVE-2018-6087: Use after free in WebAssembly * CVE-2018-6088: Use after free in PDFium * CVE-2018-6089: Same origin policy bypass in Service Worker * CVE-2018-6090: Heap buffer overflow in Skia * CVE-2018-6091: Incorrect handling of plug-ins by Service Worker * CVE-2018-6092: Integer overflow in WebAssembly * CVE-2018-6093: Same origin bypass in Service Worker * CVE-2018-6094: Exploit hardening regression in Oilpan * CVE-2018-6095: Lack of meaningful user interaction requirement before file upload * CVE-2018-6096: Fullscreen UI spoof * CVE-2018-6097: Fullscreen UI spoof * CVE-2018-6098: URL spoof in Omnibox * CVE-2018-6099: CORS bypass in ServiceWorker * CVE-2018-6100: URL spoof in Omnibox * CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools * CVE-2018-6102: URL spoof in Omnibox * CVE-2018-6103: UI spoof in Permissions * CVE-2018-6104: URL spoof in Omnibox * CVE-2018-6105: URL spoof in Omnibox * CVE-2018-6106: Incorrect handling of promises in V8 * CVE-2018-6107: URL spoof in Omnibox * CVE-2018-6108: URL spoof in Omnibox * CVE-2018-6109: Incorrect handling of files by FileAPI * CVE-2018-6110: Incorrect handling of plaintext files via file:// * CVE-2018-6111: Heap-use-after-free in DevTools * CVE-2018-6112: Incorrect URL handling in DevTools * CVE-2018-6113: URL spoof in Navigation * CVE-2018-6114: CSP bypass * CVE-2018-6115: SmartScreen bypass in downloads * CVE-2018-6116: Incorrect low memory handling in WebAssembly * CVE-2018-6117: Confusing autofill settings * Various fixes from internal audits, fuzzing and other initiatives - Remove obsolete patches: * chromium-compiler.patch * chromium-glibc-2.27.patch * chromium-vaapi-init.patch * exclude_ymp.diff * fix-gn-bootstrap.diff * fix_network_api_crash.patch * mojo.patch - Add new patches: * chromium-ffmpeg.patch * chromium-gcc7.patch * exclude_ymp.patch * fix-gn-bootstrap.patch - Rebase patches: * chromium-master-prefs-path.patch * chromium-non-void-return.patch * chromium-sandbox-pie.patch * chromium-vaapi.patch - Add patch to fix missing folder from tarball: * add-missing-blink-tools.patch- Add vaapi patches: * chromium-vaapi-init.patch * chromium-vaapi.patch- Use memory-constraints package to limit threads as needed- Update to Chromium 65.0.3325.181: * Various security relevant fixes from internal audits, fuzzing and other initiatives (boo#1086124)- Use both freetype and harfbuzz either bundled or system- Version update to 65.0.3325.162: * Various stability fixes only- Bundle the harfbuzz on < 15.0 release as we would have to use requires_ge for the library itself later on otherwise- Make sure to require gcc7 - Add patch chromium-drm.patch to make sure to build with Leap 42.3 variant of libdrm- Version update to 65.0.3325.146 bsc#1084296: * High CVE-2017-11215: Use after free in Flash. * High CVE-2017-11225: Use after free in Flash. * High CVE-2018-6060: Use after free in Blink. * High CVE-2018-6061: Race condition in V8. * High CVE-2018-6062: Heap buffer overflow in Skia. * High CVE-2018-6057: Incorrect permissions on shared memory. * High CVE-2018-6063: Incorrect permissions on shared memory. * High CVE-2018-6064: Type confusion in V8. * High CVE-2018-6065: Integer overflow in V8. * Medium CVE-2018-6066: Same Origin Bypass via canvas. * Medium CVE-2018-6067: Buffer overflow in Skia. * Medium CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab. * Medium CVE-2018-6069: Stack buffer overflow in Skia. * Medium CVE-2018-6070: CSP bypass through extensions. * Medium CVE-2018-6071: Heap bufffer overflow in Skia. * Medium CVE-2018-6072: Integer overflow in PDFium. * Medium CVE-2018-6073: Heap bufffer overflow in WebGL. * Medium CVE-2018-6074: Mark-of-the-Web bypass. * Medium CVE-2018-6075: Overly permissive cross origin downloads. * Medium CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink. * Medium CVE-2018-6077: Timing attack using SVG filters. * Medium CVE-2018-6078: URL Spoof in OmniBox. * Medium CVE-2018-6079: Information disclosure via texture data in WebGL. * Medium CVE-2018-6080: Information disclosure in IPC call. * Low CVE-2018-6081: XSS in interstitials. * Low CVE-2018-6082: Circumvention of port blocking. * Low CVE-2018-6083: Incorrect processing of AppManifests. - Add new patches: * chromium-compiler.patch * chromium-glibc-2.27.patch * mojo.patch - Drop patches: * chromium-angle.patch * chromium-memcpy.patch - Update constraints - Refresh patch chromium-non-void-return.patch to include more fixes- Chromium 64.0.3282.186: * Various minor bug fixes- update to 64.0.3282.167 (bsc#1080920): * CVE-2018-6056: Incorrect derived class instantiation in V8- Version update to 64.0.3282.140 bsc#1079021: * Various asan fixes bsc#1078463 CVE-2018-6406- Eliminate build dependency on procps: we only used it to run 'free', in order to find out how much RAM we have available. We can get this information directly from the kernel, from /proc/meminfo.- Fix default page to not point to 404- Install swiftshader objects too as they are needed- Disable ozone stuff conditions for now as the headless mode breaks up runtime bsc#1077722- Switch to gcc7 on Leap builds- Version update to 64.0.3282.119 bsc#1077571: * High CVE-2018-6031: Use after free in PDFium. Reported by Anonymous on 2017-11-01 * High CVE-2018-6032: Same origin bypass in Shared Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-20 * High CVE-2018-6033: Race when opening downloaded files. Reported by Juho Nurminen on 2017-12-09 * Medium CVE-2018-6034: Integer overflow in Blink. Reported by Tobias Klein (www.trapkit.de) on 2017-11-12 * Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23 * Medium CVE-2018-6036: Integer underflow in WebAssembly. Reported by The UK's National Cyber Security Centre (NCSC) on 2017-11-30 * Medium CVE-2018-6037: Insufficient user gesture requirements in autofill. Reported by Paul Stone of Context Information Security on 2017-08-09 * Medium CVE-2018-6038: Heap buffer overflow in WebGL. Reported by cloudfuzzer on 2017-10-12 * Medium CVE-2018-6039: XSS in DevTools. Reported by Juho Nurminen on 2017-10-17 * Medium CVE-2018-6040: Content security policy bypass. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-26 * Medium CVE-2018-6041: URL spoof in Navigation. Reported by Luan Herrera on 2017-08-29 * Medium CVE-2018-6042: URL spoof in OmniBox. Reported by Khalil Zhani on 2017-10-12 * Medium CVE-2018-6043: Insufficient escaping with external URL handlers. Reported by 0x09AL on 2017-11-16 * Medium CVE-2018-6045: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23 * Medium CVE-2018-6046: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-31 * Medium CVE-2018-6047: Cross origin URL leak in WebGL. Reported by Masato Kinugawa on 2018-01-08 * Low CVE-2018-6048: Referrer policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-09-08 * Low CVE-2017-15420: URL spoofing in Omnibox. Reported by Drew Springall (@_aaspring_) on 2017-10-05 * Low CVE-2018-6049: UI spoof in Permissions. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-13 * Low CVE-2018-6050: URL spoof in OmniBox. Reported by Jonathan Kew on 2017-10-15 * Low CVE-2018-6051: Referrer leak in XSS Auditor. Reported by Antonio Sanso (@asanso) on 2014-12-11 * Low CVE-2018-6052: Incomplete no-referrer policy implementation. Reported by Tanner Emek on 2016-05-28 * Low CVE-2018-6053: Leak of page thumbnails in New Tab Page. Reported by Asset Kabdenov on 2017-08-23 * Low CVE-2018-6054: Use after free in WebUI. Reported by Rob Wu on 2017-12-24 - Add patches: * chromium-angle.patch * chromium-memcpy.patch - Drop patch: * chromium-gcc.patch - Change desktop file name to fit bellow the icon on ie KDE desktop- Chromium 63.0.3239.132: * DevTools: do not report raw headers and cookies for protected subresources * Various other fixes and updates- Version update to 63.0.3239.108 bsc#1072976: * CVE-2017-15429: UXSS in V8 * Various fuzzing fixes- Version update to 63.0.3239.84 bsc#1071691: * bsc#1106341 CVE-2017-15430 Unsafe navigation in Chromecast * Critical CVE-2017-15407: Out of bounds write in QUIC. * High CVE-2017-15408: Heap buffer overflow in PDFium. * High CVE-2017-15409: Out of bounds write in Skia. * High CVE-2017-15410: Use after free in PDFium. * High CVE-2017-15411: Use after free in PDFium. * High CVE-2017-15412: Use after free in libXML. * High CVE-2017-15413: Type confusion in WebAssembly. * Medium CVE-2017-15415: Pointer information disclosure in IPC call. * Medium CVE-2017-15416: Out of bounds read in Blink. * Medium CVE-2017-15417: Cross origin information disclosure in Skia. * Medium CVE-2017-15418: Use of uninitialized value in Skia. * Medium CVE-2017-15419: Cross origin leak of redirect URL in Blink. * Medium CVE-2017-15420: URL spoofing in Omnibox. * Medium CVE-2017-15422: Integer overflow in ICU. * Low CVE-2017-15423: Issue with SPAKE implementation in BoringSSL. * Low CVE-2017-15424: URL Spoof in Omnibox. * Low CVE-2017-15425: URL Spoof in Omnibox. * Low CVE-2017-15426: URL Spoof in Omnibox. * Low CVE-2017-15427: Insufficient blocking of JavaScript in Omnibox. - Rebase fix-gn-bootstrap.diff - Drop merged patches: * chromium-gcc5.patch * chromium-60.0.3112.113-breakpad-ucontext.patch * chromium-62.0.3202.62-correct-cplusplus-check.patch - Add new patches: * chromium-non-void-return.patch * chromium-gcc.patch- BuildRequire nodejs8 instead of nodejs6 for suse_version >= 1330- Update to 62.0.3202.94: * multiple minor rendering related fixes - fix rebuilds in same chroot- Version update to 62.0.3202.89 bsc#1066851: * CVE-2017-15398: Stack buffer overflow in QUIC * CVE-2017-15399: Use after free in V8 - Drop upstream merged chromium-sandbox.patch- Restrict the version on jpeg to not waste build power- Add patch to fix sandbox crashes wrt bsc#1064298 * chromium-sandbox.patch- Version update to 62.0.3202.75 bsc#1065405 CVE-2017-15396 * CVE-2017-15396: Stack overflow in V8- BuildRequire nodejs6 required for polymer-bundler.js- Try to export properly CXX/CC variable to fix leap builds- Apply patch to fix building crc32 with gcc7: * chromium-62.0.3202.62-correct-cplusplus-check.patch- Update to 62.0.3202.62 bsc#1064066: * CVE-2017-5124: UXSS with MHTML. * CVE-2017-5125: Heap overflow in Skia. * CVE-2017-5126: Use after free in PDFium. * CVE-2017-5127: Use after free in PDFium. * CVE-2017-5128: Heap overflow in WebGL. * CVE-2017-5129: Use after free in WebAudio. * CVE-2017-5132: Incorrect stack manipulation in WebAssembly. * CVE-2017-5130: Heap overflow in libxml2. * CVE-2017-5131: Out of bounds write in Skia. * CVE-2017-5133: Out of bounds write in Skia. * CVE-2017-15386: UI spoofing in Blink. * CVE-2017-15387: Content security bypass. * CVE-2017-15388: Out of bounds read in Skia. * CVE-2017-15389: URL spoofing in OmniBox. * CVE-2017-15390: URL spoofing in OmniBox. * CVE-2017-15391: Extension limitation bypass in Extensions. * CVE-2017-15392: Incorrect registry key handling in PlatformIntegration. * CVE-2017-15393: Referrer leak in Devtools. * CVE-2017-15394: URL spoofing in extensions UI. * CVE-2017-15395: Null pointer dereference in ImageCapture. - Drop unused patches: * arm-webrtc-fix.patch * arm_use_right_compiler.patch * chromium-46.0.2490.71-fix-missing-i18n_process_css_test.patch * chromium-atk.patch * chromium-mojo-dep.patch * gcc60-fixes.diff - Refresh patches: * chromium-gcc5.patch * chromium-prop-codecs.patch * exclude_ymp.diff * fix-gn-bootstrap.diff- Update to 61.0.3163.100 (boo#1060019): * CVE-2017-5121: Out-of-bounds access in V8 * CVE-2017-5122: Out-of-bounds access in V8 * Various fixes from internal audits, fuzzing and other initiatives- Update to 61.0.3163.91: * Various bugfixes- Update to 61.0.3163.79 bsc#1057364: * CVE-2017-5111: Use after free in PDFium. * CVE-2017-5112: Heap buffer overflow in WebGL. * CVE-2017-5113: Heap buffer overflow in Skia. * CVE-2017-5114: Memory lifecycle issue in PDFium. * CVE-2017-5115: Type confusion in V8. * CVE-2017-5116: Type confusion in V8. * CVE-2017-5117: Use of uninitialized value in Skia. * CVE-2017-5118: Bypass of Content Security Policy in Blink. * CVE-2017-5119: Use of uninitialized value in Skia. * CVE-2017-5120: Potential HTTPS downgrade during redirect navigation. - Rebase patch: * fix-gn-bootstrap.diff - Remove patches: * chromium-gcc7.patch * chromium-override.patch - Add new patches: * chromium-atk.patch * chromium-gcc5.patch * chromium-mojo-dep.patch - Gtk3 is hard required from now on - Version some of the required dependencies- fix build with Factory glibc: add chromium-60.0.3112.113-breakpad-ucontext.patch- Version update to 60.0.3112.113: * Various bugfixes- Version update to 60.0.3112.101: * various usability bugfixes- Version update to 60.0.3112.90: * Various usability bugfixes- Version update to 60.0.3112.78 bsc#1050537: * CVE-2017-5091: Use after free in IndexedDB * CVE-2017-5092: Use after free in PPAPI * CVE-2017-5093: UI spoofing in Blink * CVE-2017-5094: Type confusion in extensions * CVE-2017-5095: Out-of-bounds write in PDFium * CVE-2017-5096: User information leak via Android intents * CVE-2017-5097: Out-of-bounds read in Skia * CVE-2017-5098: Use after free in V8 * CVE-2017-5099: Out-of-bounds write in PPAPI * CVE-2017-5100: Use after free in Chrome Apps * CVE-2017-5101: URL spoofing in OmniBox * CVE-2017-5102: Uninitialized use in Skia * CVE-2017-5103: Uninitialized use in Skia * CVE-2017-5104: UI spoofing in browser * CVE-2017-7000: Pointer disclosure in SQLite * CVE-2017-5105: URL spoofing in OmniBox * CVE-2017-5106: URL spoofing in OmniBox * CVE-2017-5107: User information leak via SVG * CVE-2017-5108: Type confusion in PDFium * CVE-2017-5109: UI spoofing in browser * CVE-2017-5110: UI spoofing in payments dialog * Various fixes from internal audits, fuzzing and other initiatives - Add patch chromium-override.patch - Remove patches chromium-fpermissive.patch chromium-system-ffmpeg-r3.patch - Rebase patches: * chromium-dma-buf.patch * chromium-gcc7.patch * chromium-last-commit-position-r0.patch * fix-gn-bootstrap.diff- Recommend emoji fonts to make sure major web chats do not show questionmarks- Update to 59.0.3071.115: * Various small fixes all around- Update to 59.0.3071.109: * ozone/drm: Only reuse ScanoutBuffers with compatible modifiers * Fixing mouse focus on WebView * Remove gtk dependency from gles tests * Set build flag when using own FreeType * Revert of [scheduler] Move some task types to suspendable task runner * Fix an incorrect method name on the chrome://site-engagement WebUI page * Linux/Windows: Removing Guest menu item for supervised profile- Update to 59.0.3071.104 (bsc#1044690): * CVE-2017-5087: Sandbox Escape in IndexedDB * CVE-2017-5088: Out of bounds read in V8 * CVE-2017-5089: Domain spoofing in Omnibox * Various fixes from internal audits, fuzzing and other initiatives- Add patch chromium-buildname.patch bsc#1043420- Update to 59.0.3071.86 bsc#1042833: * CVE-2017-5070: Type confusion in V8. Reported by Zhao Qixun(@S0rryMybad) of Qihoo 360 Vulcan Team on 2017-05-16 * CVE-2017-5071: Out of bounds read in V8. Reported by Choongwoo Han on 2017-04-26 * CVE-2017-5072: Address spoofing in Omnibox. Reported by Rayyan Bijoora on 2017-04-07 * CVE-2017-5073: Use after free in print preview. Reported by Khalil Zhani on 2017-04-28 * CVE-2017-5074: Use after free in Apps Bluetooth. Reported by anonymous on 2017-03-09 * CVE-2017-5075: Information leak in CSP reporting. Reported by Emmanuel Gil Peyrot on 2017-01-05 * CVE-2017-5086: Address spoofing in Omnibox. Reported by Rayyan Bijoora on 2017-05-16 * CVE-2017-5076: Address spoofing in Omnibox. Reported by Samuel Erb on 2017-05-06 * CVE-2017-5077: Heap buffer overflow in Skia. Reported by Sweetchip on 2017-04-28 * CVE-2017-5078: Possible command injection in mailto handling. Reported by Jose Carlos Exposito Bueno on 2017-04-12 * CVE-2017-5079: UI spoofing in Blink. Reported by Khalil Zhani on 2017-04-20 * CVE-2017-5080: Use after free in credit card autofill. Reported by Khalil Zhani on 2017-04-05 * CVE-2017-5081: Extension verification bypass. Reported by Andrey Kovalev (@L1kvID) Yandex Security Team on 2016-12-07 * CVE-2017-5082: Insufficient hardening in credit card editor. Reported by Nightwatch Cybersecurity Research on 2017-05-11 * CVE-2017-5083: UI spoofing in Blink. Reported by Khalil Zhani on 2017-04-24 * CVE-2017-5085: Inappropriate javascript execution on WebUI pages. Reported by Zhiyang Zeng of Tencent security platform department on 2017-02-15 - Add patch to fix build with system dma: * chromium-dma-buf.patch - Drop no longer needed patches: * chromium-linker-memory.patch * chromium-system-jinja-r13.patch - Refresh patches: * chromium-gcc7.patch * chromium-system-ffmpeg-r3.patch * fix-gn-bootstrap.diff - Use bundled libxml * Upstream unfortunately uses git snapshot that is not api/abi compatible- Add patch to build with gcc7: * chromium-gcc7.patch - Add patch for fpermissive build error: * chromium-fpermissive.patch- Version update to 58.0.3029.110: * Various small bugfixes- Version update to 58.0.3029.96: * Fixes bsc#1037594 CVE-2017-5068- Use bundled jinja2, system one changed in 2.9 too much to work * It is at least used only during build- Version update to 58.0.3029.81 bsc#1035103: * High CVE-2017-5057: Type confusion in PDFium. Credit to Guang Gong of Alpha Team, Qihoo 360 * High CVE-2017-5058: Heap use after free in Print Preview. Credit to Khalil Zhani * High CVE-2017-5059: Type confusion in Blink. Credit to SkyLined working with Trend Micro's Zero Day Initiative * Medium CVE-2017-5060: URL spoofing in Omnibox. Credit to Xudong Zheng * Medium CVE-2017-5061: URL spoofing in Omnibox. Credit to Haosheng Wang (@gnehsoah) * Medium CVE-2017-5062: Use after free in Chrome Apps. Credit to anonymous * Medium CVE-2017-5063: Heap overflow in Skia. Credit to Sweetchip * Medium CVE-2017-5064: Use after free in Blink. Credit to Wadih Matar * Medium CVE-2017-5065: Incorrect UI in Blink. Credit to Khalil Zhani * Medium CVE-2017-5066: Incorrect signature handing in Networking. Credit to chenchu * Medium CVE-2017-5067: URL spoofing in Omnibox. Credit to Khalil Zhani * Low CVE-2017-5069: Cross-origin bypass in Blink. Credit to Michael Reizelman - Refresh patch fix-gn-bootstrap.diff - Refresh patch chromium-system-jinja-r13.patch - Remove obsolete patch chromium-57-gcc4.patch- Version update to 57.0.2987.133 bsc#1031677: * Critical CVE-2017-5055: Use after free in printing. Credit to Wadih Matar * High CVE-2017-5054: Heap buffer overflow in V8. Credit to Nicolas Trippar of Zimperium zLabs * High CVE-2017-5052: Bad cast in Blink. Credit to JeongHoon Shin * High CVE-2017-5056: Use after free in Blink. Credit to anonymous * High CVE-2017-5053: Out of bounds memory access in V8. Credit to Team Sniper (Keen Lab and PC Mgr) reported through ZDI (ZDI-CAN-4587)- Drop the browser(npapi) provide which is not true- Add patch to build with gcc4 * chromium-57-gcc4.patch- Do not use gcc5 and newer as the compat was fixed again - Update to 57.0.2987.110 with various other small tweaks- Version update to 57.0.2987.98 bsc#1028848: CVE-2017-5030 CVE-2017-5031 CVE-2017-5032 CVE-2017-5029 CVE-2017-5034 CVE-2017-5035 CVE-2017-5036 CVE-2017-5037 CVE-2017-5039 CVE-2017-5040 CVE-2017-5041 CVE-2017-5033 CVE-2017-5042 CVE-2017-5038 CVE-2017-5043 CVE-2017-5044 CVE-2017-5045 CVE-2017-5046 - Refresh patches * fix-gn-bootstrap.diff * chromium-linker-memory.patch - Remove obsolete patches: * chromium-sandbox.patch * chromium-54-ffmpeg2compat.patch - Remove vaapi patch which broke rendering on non-intel cards: * chromium-enable-vaapi-on-suse.patch - From this release onwards i586 build is disabled- Also add harfbuzz-ng to keeplibs for SLE- Add condition for system harfbuzz to be disabled on SLE- Fixed a typo in the build requirements for system minizip.- Version update to 56.0.2924.87: * Various small fixes * Disabled option to enable/disable plugins in the chrome://plugins- Added the package 'chromium-privacy' with multiple patches sourced from the release version on https://github.com/ u4qo60z73t1c4hurv3ny/privacy_patches-oS_cr, which, when enabled with the build option 'privacy', builds a version of Chromium with less privacy implications due to Google services integration.- Changed the build requirement of libavformat to library version 57.41.100, as included in ffmpeg 3.1.1, as only this version properly supports the public AVStream API 'codecpar'.- Version update to 56.0.2924.76 bsc#1022049: - CVE-2017-5007: Universal XSS in Blink - CVE-2017-5006: Universal XSS in Blink - CVE-2017-5008: Universal XSS in Blink - CVE-2017-5010: Universal XSS in Blink - CVE-2017-5011: Unauthorised file access in Devtools - CVE-2017-5009: Out of bounds memory access in WebRTC - CVE-2017-5012: Heap overflow in V8 - CVE-2017-5013: Address spoofing in Omnibox - CVE-2017-5014: Heap overflow in Skia - CVE-2017-5015: Address spoofing in Omnibox - CVE-2017-5019: Use after free in Renderer - CVE-2017-5016: UI spoofing in Blink - CVE-2017-5017: Uninitialised memory access in webm video - CVE-2017-5018: Universal XSS in chrome://apps - CVE-2017-5020: Universal XSS in chrome://downloads - CVE-2017-5021: Use after free in Extensions - CVE-2017-5022: Bypass of Content Security Policy in Blink - CVE-2017-5023: Type confusion in metrics - CVE-2017-5024: Heap overflow in FFmpeg - CVE-2017-5025: Heap overflow in FFmpeg - CVE-2017-5026: UI spoofing. Credit to Ronni Skansing - Add conditional to switch between system and bundled icu - Raise dependency on harfbuzz to 1.3.1 - Also refresh patches: chromium-prop-codecs.patch chromium-linker-memory.patch- Added patch chromium-enable-vaapi-on-suse.patch to enable VAAPI hardware accelerated video decoding.- Chromium 55.0.2883.87: * various fixes for crashes and specific wesites * update Google pinned certificates- Disable system icu on Factory, crashes autofill- python-html5lib now depends on six, so preserve that too for SLE builds.- Obsolete ffmpeg and ffmpegsumo package in addition to conflict- record minimum version for harfbuzz, incuding runtime Chromium will crash with harfbuzz < 1.3.0- Chromium 55.0.2883.75 bnc#1013236: CVE-2016-9651 CVE-2016-5208 CVE-2016-5207 CVE-2016-5206 CVE-2016-5205 CVE-2016-5204 CVE-2016-5209 CVE-2016-5203 CVE-2016-5210 CVE-2016-5212 CVE-2016-5211 CVE-2016-5213 CVE-2016-5214 CVE-2016-5216 CVE-2016-5215 CVE-2016-5217 CVE-2016-5218 CVE-2016-5219 CVE-2016-5221 CVE-2016-5220 CVE-2016-5222 CVE-2016-9650 CVE-2016-5223 CVE-2016-5226 CVE-2016-5225 CVE-2016-5224 CVE-2016-9652 - Switch to system libraries: harfbuzz, zlib, ffmpeg, ... - Refreshed patches: * chromium-system-ffmpeg-r3.patch * chromium-system-jinja-r13.patch - Use system ffmpeg unless on 13.2 that didn't include it * chromium-54-ffmpeg2compat.patch * Remove upstreamed chromium-more-codec-aliases.patch - Remove bookmarks override as discussed with artwork simply just set homepage to our openSUSE one and that is all- Chromium 54.0.2840.100: * CVE-2016-5199: Heap corruption in FFmpeg (boo#1009892) * CVE-2016-5200: out of bounds memory access in v8 (boo#1009893) * CVE-2016-5201: info leak in extensions (boo#1009894) * CVE-2016-5202: various fixes from internal audits (boo#1009895)- Add patch chromium-prop-codecs.patch and set properly the codecs variable in main scope to allow ffmpeg passthrough bnc#1008725- Update to 54.0.2840.90: * Few fixes and tweaks * Fixes CVE-2016-5198 bsc#1008274- Update to 54.0.2840.71: * Few fixes around- Version update to 54.0.2840.59 bnc#1004465: - CVE-2016-5181: Universal XSS in Blink (Anonymous) - CVE-2016-5182: Heap overflow in Blink (Giwan Go of STEALIEN) - CVE-2016-5183: Use after free in PDFium (Anonymous) - CVE-2016-5184: Use after free in PDFium (Anonymous) - CVE-2016-5185: Use after free in Blink (cloudfuzzer) - CVE-2016-5187: URL spoofing (Luan Herrera) - CVE-2016-5188: UI spoofing (Luan Herrera) - CVE-2016-5192: Cross-origin bypass in Blink (haojunhou at gmail) - CVE-2016-5189: URL spoofing (xisigr of Tencent's Xuanwu Lab) - CVE-2016-5186: Out of bounds read in DevTools (Abdulrahman Alqabandi) - CVE-2016-5191: Universal XSS in Bookmarks (Gareth Hughes) - CVE-2016-5190: Use after free in Internals (Atte Kettunen of OUSPG) - CVE-2016-5193: Scheme bypass (Yuyang ZHOUmartinzhou96) - packaging changes: * disable build for chromium-beta on %arm. * Make linker use less memory by tweaking its options: chromium-linker-memory.patch * obsolete desktop subpackages * Switch to gold to reduce memory use use during build * fix build on 4.5+ kernels with systemlibs: chromium-sandbox.patch * various compiler and linker flag adjustments * enable gtk3 ui, add patch gtk3-missing-define.patch * switch from some bundled libraries to the system versions chromium-system-ffmpeg-r3.patch chromium-system-jinja-r13.patch fix-gn-bootstrap.diff * remove service file covered by download_files - run time bug fixes: * Add --ui-disable-partial-swap to the launcher bnc#1000019 * Use default chromium values from master_preferences on first run rather than pseudo-duplicating in shellscript - added features: * hangouts extension- Version update to 53.0.2785.143 bnc#1002140: * CVE-2016-5177: Use after free in V8 * CVE-2016-5178: Various fixes from internal audits- Export GDK_BACKEND=x11 before starting chromium, ensuring that it's started as an Xwayland client (boo#1001135).- Apply sandbox patch to fix crashers on tumbleweed bnc#999091 * chromium-sandbox.patch- Version update stable channel 53.0.2785.116 * Just smal bugfixes around- Version update to 53.0.2785.113 bnc#998743: * CVE-2016-5170 Use after free in Blink * CVE-2016-5171 Use after free in Blink * CVE-2016-5172 Arbitrary Memory Read in v8 * CVE-2016-5173 Extension resource access * CVE-2016-5174 Popup not correctly suppressed * CVE-2016-5175 Various fixes from internal audits- Reenable widevine build again bnc#998328- Stable channel update to 53.0.2785.101 * SPDY crasher fixes * Disable NV12 DXGI video on AMD * Forward --password-store switch to os_crypt * Tell the kernel to discard USB requests when they time out.- Update to Chromium 53.0.2785.92: * Revert of support relocatable RPM packages * disallow WKBackForwardListItem navigations for pushState pages * arc: bluetooth: Fix advertised uuid * fix conflicting PendingIntent for stop button and swipe away- Update to Chromium 53.0.2785.89 - Improvements to the GN build system (boo#996032, boo#99606, boo#995932) - Security fixes (boo#996648) * CVE-2016-5147: Universal XSS in Blink. * CVE-2016-5148: Universal XSS in Blink. * CVE-2016-5149: Script injection in extensions. * CVE-2016-5150: Use after free in Blink. * CVE-2016-5151: Use after free in PDFium. * CVE-2016-5152: Heap overflow in PDFium. * CVE-2016-5153: Use after destruction in Blink. * CVE-2016-5154: Heap overflow in PDFium. * CVE-2016-5155: Address bar spoofing. * CVE-2016-5156: Use after free in event bindings. * CVE-2016-5157: Heap overflow in PDFium. * CVE-2016-5158: Heap overflow in PDFium. * CVE-2016-5159: Heap overflow in PDFium. * CVE-2016-5161: Type confusion in Blink. * CVE-2016-5162: Extensions web accessible resources bypass. * CVE-2016-5163: Address bar spoofing. * CVE-2016-5164: Universal XSS using DevTools. * CVE-2016-5165: Script injection in DevTools. * CVE-2016-5166: SMB Relay Attack via Save Page As. * CVE-2016-5160: Extensions web accessible resources bypass. - Drop patches chromium-snapshot-toolchain-r1.patch- Make it build on ARM. * Add build patch arm_use_right_compiler.patch - Drop unnecessary patches: * chromium-arm-r0.patch- Change buildsystem to GN, which is the new upstream default * Make Ninja only use 4 buildprocesses for building Chromium itself * Drop unnecessary patches - chromium-gcc-fixes.patch - adjust-ldflags-no-keep-memory.patch - gcc50-fixes.diff * Add patches to ensure correct build - chromium-last-commit-position-r0.patch - chromium-snapshot-toolchain-r1.patch * Drop unnecessary sourcefiles - courgette.tar.xz - depot_tools.tar.xz - gn-binaries.tar.xz- Use an explicit number of ninja build processes (-j 4), to further reduce the memory used.- Update to Chromium 52.0.2743.116: * Security fixes (boo#992305): + CVE-2016-5141: Address bar spoofing (boo#992314) + CVE-2016-5142: Use-after-free in Blink (boo#992313) + CVE-2016-5139: Heap overflow in pdfium (boo#992311) + CVE-2016-5140: Heap overflow in pdfium (boo#992310) + CVE-2016-5145: Same origin bypass for images in Blink (boo#992320) + CVE-2016-5143: Parameter sanitization failure in DevTools (boo#992319) + CVE-2016-5144: Parameter sanitization failure in DevTools (boo#992315) + CVE-2016-5146: Various fixes from internal audits, fuzzing and other initiatives (boo#992309)- Temporarily disable fix_network_api_crash.patch. Upstream has changed part of their code, so hopefully that resolved the issue- Update to Chromium 52.0.2743.82 * Security fixes (boo#989901): + CVE-2016-1706: Sandbox escape in PPAPI + CVE-2016-1707: URL spoofing on iOS + CVE-2016-1708: Use-after-free in Extensions + CVE-2016-1709: Heap-buffer-overflow in sfntly + CVE-2016-1710: Same-origin bypass in Blink + CVE-2016-1711: Same-origin bypass in Blink + CVE-2016-5127: Use-after-free in Blink + CVE-2016-5128: Same-origin bypass in V8 + CVE-2016-5129: Memory corruption in V8 + CVE-2016-5130: URL spoofing + CVE-2016-5131: Use-after-free in libxml + CVE-2016-5132: Limited same-origin bypass in Service Workers + CVE-2016-5133: Origin confusion in proxy authentication + CVE-2016-5134: URL leakage via PAC script + CVE-2016-5135: Content-Security-Policy bypass + CVE-2016-5136: Use after free in extensions + CVE-2016-5137: History sniffing with HSTS and CSP + CVE-2016-1705: Various fixes from internal audits, fuzzing and other initiatives- Clarification/correction to chromium-desktop-gnome and chromium-desktop-kde software descriptions due to passwords preservation reported by Chromium developer- Update to Chromium 51.0.2704.106 * No changelog indicated- Add gcc60-fixes.diff to resolve the crashes observed with chromium when compiled with GCC6- Update to Chromium 51.0.2704.103 * Security fixes: - CVE-2016-1704: Various fixes from internal audits, fuzzing and other initiatives (boo#985397)- Update to Chromium 51.0.2704.84 * No further changelog- Update to Chromium 51.0.2704.79 [boo#982719] * Security fixes: - CVE-2016-1696: Cross-origin bypass in Extension bindings - CVE-2016-1697: Cross-origin bypass in Blink - CVE-2016-1698: Information leak in Extension bindings - CVE-2016-1699: Parameter sanitization failure in DevTools - CVE-2016-1700: Use-after-free in Extensions - CVE-2016-1701: Use-after-free in Autofill - CVE-2016-1702: Out-of-bounds read in Skia - CVE-2016-1703: Various fixes from internal audits, fuzzing and other initiatives.- Update to Chromium 51.0.2704.63 [boo#981886] * Security fixes: - CVE-2016-1672: Cross-origin bypass in extension bindings - CVE-2016-1673: Cross-origin bypass in Blink - CVE-2016-1674: Cross-origin bypass in extensions - CVE-2016-1675: Cross-origin bypass in Blink - CVE-2016-1676: Cross-origin bypass in extension bindings - CVE-2016-1677: Type confusion in V8 - CVE-2016-1678: Heap overflow in V8 - CVE-2016-1679: Heap use-after-free in V8 bindings - CVE-2016-1680: Heap use-after-free in Skia - CVE-2016-1681: Heap overflow in PDFium - CVE-2016-1682: CSP bypass for ServiceWorker - CVE-2016-1683: Out-of-bounds access in libxslt - CVE-2016-1684: Integer overflow in libxslt - CVE-2016-1685: Out-of-bounds read in PDFium - CVE-2016-1686: Out-of-bounds read in PDFium - CVE-2016-1687: Information leak in extensions - CVE-2016-1688: Out-of-bounds read in V8 - CVE-2016-1689: Heap buffer overflow in media - CVE-2016-1690: Heap use-after-free in Autofill - CVE-2016-1691: Heap buffer-overflow in Skia - CVE-2016-1692: Limited cross-origin bypass in ServiceWorker - CVE-2016-1693: HTTP Download of Software Removal Tool - CVE-2016-1694: HPKP pins removed on cache clearance - CVE-2016-1695: Various fixes from internal audits, fuzzing and other initiatives - drop chromium-50.0.2661.75-export_blink_Platform_symbols_in_shared_library_builds.patch now upstream- Update to Chromium 50.0.2661.102 (boo#979859) * Security fixes: - CVE-2016-1667: Same origin bypass in DOM - CVE-2016-1668: Same origin bypass in Blink V8 bindings - CVE-2016-1669: Buffer overflow in V8 - CVE-2016-1670: Race condition in loader- Update to Chromium 50.0.2661.94 (boo#977830) * Security fixes: - CVE-2016-1660: Out-of-bounds write in Blink - CVE-2016-1661: Memory corruption in cross-process frames - CVE-2016-1662: Use-after-free in extensions - CVE-2016-1663: Use-after-free in Blink’s V8 bindings - CVE-2016-1664: Address bar spoofing - CVE-2016-1665: Information leak in V8 - CVE-2016-1666: Various fixes from internal audits, fuzzing and other initiatives- _constraints: increase memory. It takes 1.2G to build some .o, and with -j4 this results in OOM.- Update to Chromium 50.0.2661.75 (boo#975572) * Security Fixes: - CVE-2016-1652: Universal XSS in extension bindings - CVE-2016-1653: Out-of-bounds write in V8 - CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding - CVE-2016-1654: Uninitialized memory read in media - CVE-2016-1655: Use-after-free related to extensions - CVE-2016-1656: Android downloaded file path restriction bypass - CVE-2016-1657: Address bar spoofing - CVE-2016-1658: Potential leak of sensitive information to malicious extensions - CVE-2016-1659: Various fixes from internal audits, fuzzing and other initiatives - add patch to fix GCC builds with component=shared_library: chromium-50.0.2661.75-export_blink_Platform_symbols_in_shared_library_builds.patch- Update to Chromium 49.0.2623.112 * Block user removal when login attempt is in progress * Add the SuppressUnsupportedOSWarning policy setting * Fix how Save-Page-As responds to web requests blocked by extensions * Fix preferred width calculation for 8bit ltr runs in rtl blocks- Update to Chromium 49.0.2623.110 * No changelog available- Update to Chromium 49.0.2623.108 * Security fixes (boo#972834): - CVE-2016-1646: Out-of-bounds read in V8 - CVE-2016-1647: Use-after-free in Navigation - CVE-2016-1648: Use-after-free in Extensions - CVE-2016-1649: Buffer overflow in libANGLE - CVE-2016-1650: Various fixes from internal audits, fuzzing and other initiatives - CVE-2016-3679: Multiple vulnerabilities in V8 fixed at the tip of the 4.9 branch (currently 4.9.385.33).- Update to Chromium 49.0.2623.87 * Security fixes: - CVE-2016-1643: Type confusion in Blink (boo#970514) - CVE-2016-1644: Use-after-free in Blink (boo#970509) - CVE-2016-1645: Out-of-bounds write in PDFium (boo#970511)- Change the build method used on Packman. * Drop patch no-clang-on-packman.diff . This is no longer required as that ninja is respecting the build flags correctly. - Drop unused patch skia.patch- Update to Chromium 49.0.2623.75 * 26 security fixes, with the most important ones being: - CVE-2016-1630: Same-origin bypass in Blink - CVE-2016-1631: Same-origin bypass in Pepper Plugin - CVE-2016-1632: Bad cast in Extensions - CVE-2016-1633: Use-after-free in Blink - CVE-2016-1634: Use-after-free in Blink - CVE-2016-1635: Use-after-free in Blink - CVE-2016-1636: SRI Validation Bypass - CVE-2015-8126: Out-of-bounds access in libpng - CVE-2016-1637: Information Leak in Skia - CVE-2016-1638: WebAPI Bypass - CVE-2016-1639: Use-after-free in WebRTC - CVE-2016-1640: Origin confusion in Extensions UI - CVE-2016-1641: Use-after-free in Favicon - CVE-2016-1642: Various fixes from internal audits, fuzzing and other initiatives - Multiple vulnerabilities in V8 fixed at the tip of the 4.9 branch (currently 4.9.385.26) (boo#969333)- Update to Chromium 48.0.2564.116 * Fixes a critical security flaw: - CVE-2016-1629: Same-origin bypass in Blink and Sandbox escape in Chrome. (boo#967376)- Update to Chromium 48.0.2564.109 * Security fixes (boo#965999) - CVE-2016-1622: Same-origin bypass in Extensions - CVE-2016-1623: Same-origin bypass in DOM - CVE-2016-1624: Buffer overflow in Brotli - CVE-2016-1625: Navigation bypass in Chrome Instant - CVE-2016-1626: Out-of-bounds read in PDFium - CVE-2016-1627: Various fixes from internal audits, fuzzing and other initiatives- Drop the libva support completely. It seems that this is causing more issues than it actually resolves. (boo#965566) * Drop chromium-enable-vaapi.patch- Don't build with libva support for openSUSE 13.2 and lower (boo#966082)- Drop completely the option to build with system libraries. This could lead to issues (boo#965738)- Update to Chromium 48.0.2564.103 * No chnagelog available- Build against the in-source libjpeg to prevent graphical issues- Use spec-cleaner - Remove buildenv check that is moot for the update-alternatives script - Build against the latest libjpeg rather than jpeg6 - Use update-alternatives as is required by the specification- Update to Chromium 48.0.2564.97 * No changelog available - Update the desktop-kde package so that on Leap and TW, the kwallet5 becomes the default. desktop-kde/gnome packages are no longer recommended as that the default is to automatically detect the password store. Only for those users that want to change this, they can select a different setup.- Update to Chromium 48.0.2564.82 * Security fixes: - CVE-2016-1612: Bad cast in V8 (boo#963184) - CVE-2016-1613: Use-after-free in PDFium (boo#963185) - CVE-2016-1614: Information leak in Blink (boo#963186) - CVE-2016-1615: Origin confusion in Omnibox (boo#963187) - CVE-2016-1616: URL Spoofing (boo#963188) - CVE-2016-1617: History sniffing with HSTS and CSP (boo#963189) - CVE-2016-1618: Weak random number generator in Blink (boo#963190) - CVE-2016-1619: Out-of-bounds read in PDFium (boo#963191) - CVE-2016-1620 chromium-browser: various fixes (boo#963192)- Update to Chromium 47.0.2526.111. * No changelog available- Enable SSE2 on x86_64- Fix crash when trying to enable chromecast extension * Add patch: fix_network_api_crash.patch Fix https://code.google.com/p/chromium/issues/detail?id=572539- Update to Chromium 47.0.2525.106, fixing the following security issue: * CVE-2015-6792: Fixes from internal audits and fuzzing. [boo#959458]- Enable VA-API hardware acceleration in Linux. * chromium-enable-vaapi.patch- Update to Chromium 47.0.2526.80 [boo#958481] * Security fixes - CVE-2015-6788: Type confusion in extensions - CVE-2015-6789: Use-after-free in Blink - CVE-2015-6790: Escaping issue in saved pages - CVE-2015-6791: Various fixes from internal audits, fuzzing and other initiatives - Drop unused patch fix-clang.diff.- Enable the possibility to utilize the Widevine plugin within chromium. (boo#954103) * Add patch: fix_building_widevinecdm_with_chromium.patch- Update to Chromium 47.0.2526.73 * Security fixes (boo#957519) - CVE-2015-6765: Use-after-free in AppCache - CVE-2015-6766: Use-after-free in AppCache - CVE-2015-6767: Use-after-free in AppCache - CVE-2015-6768: Cross-origin bypass in DOM - CVE-2015-6769: Cross-origin bypass in core - CVE-2015-6770: Cross-origin bypass in DOM - CVE-2015-6771: Out of bounds access in v8 - CVE-2015-6772: Cross-origin bypass in DOM - CVE-2015-6764: Out of bounds access in v8 - CVE-2015-6773: Out of bounds access in Skia - CVE-2015-6774: Use-after-free in Extensions - CVE-2015-6775: Type confusion in PDFium - CVE-2015-6776: Out of bounds access in PDFium - CVE-2015-6777: Use-after-free in DOM - CVE-2015-6778: Out of bounds access in PDFium - CVE-2015-6779: Scheme bypass in PDFium - CVE-2015-6780: Use-after-free in Infobars - CVE-2015-6781: Integer overflow in Sfntly - CVE-2015-6782: Content spoofing in Omnibox - CVE-2015-6783: Signature validation issue in Android Crazy Linker. - CVE-2015-6784: Escaping issue in saved pages - CVE-2015-6785: Wildcard matching issue in CSP - CVE-2015-6786: Scheme bypass in CSP - CVE-2015-6787: Various fixes from internal audits, fuzzing and other initiatives. - Multiple vulnerabilities in V8 fixed at the tip of the 4.7 branch (currently 4.7.80.23)- Update to Chromium 46.0.2490.86 * Security fixes (boo#954579): - CVE-2015-1302: Information leak in PDF viewer- Update to Chromium 46.0.2490.80 * No changelog available- Change the default homepage based on the new landingpage for the openSUSE Project. (boo#950957)- Update to Chromium 46.0.2490.71 * Security fixes (boo#950290) - CVE-2015-6755: Cross-origin bypass in Blink - CVE-2015-6756: Use-after-free in PDFium - CVE-2015-6757: Use-after-free in ServiceWorker - CVE-2015-6758: Bad-cast in PDFium - CVE-2015-6759: Information leakage in LocalStorage - CVE-2015-6760: Improper error handling in libANGLE - CVE-2015-6761: Memory corruption in FFMpeg - CVE-2015-6762: CORS bypass via CSS fonts - CVE-2015-6763: Various fixes from internal audits, fuzzing and other initiatives - Multiple vulnerabilities in V8 fixed at the tip of the 4.6 branch (currently 4.6.85.23) CVE-2015-7834 - drop upstreamed correct-blacklist.diff - add chromium-46.0.2490.71-fix-missing-i18n_process_css_test.patch to fix build - remove remoting_locales from spec- Update to Chromium 45.0.2454.101 * Security fixes: - CVE-2015-1303: Cross-origin bypass in DOM [boo#947504] - CVE-2015-1304: Cross-origin bypass in V8 [boo#947507]- Update to Chromium 45.0.2454.99 - No changelog available - Add upstream patch correct-blacklist.diff * This should restore the correct behavior of the option - -ignore-gpu-blacklist. https://code.google.com/p/chromium/issues/detail?id=509336- Update to Chromium 45.0.2454.93 - No changelog available- Update to Chromium 45.0.2454.85 Security fixes: * CVE-2015-1291: Cross-origin bypass in DOM * CVE-2015-1292: Cross-origin bypass in ServiceWorker * CVE-2015-1293: Cross-origin bypass in DOM * CVE-2015-1294: Use-after-free in Skia * CVE-2015-1295: Use-after-free in Printing * CVE-2015-1296: Character spoofing in omnibox * CVE-2015-1297: Permission scoping error in WebRequest * CVE-2015-1298: URL validation error in extensions * CVE-2015-1299: Use-after-free in Blink * CVE-2015-1300: Information leak in Blink * CVE-2015-1301: Various fixes from internal audits, fuzzing and other initiatives.- Update to Chromium 44.0.2403.130 * No changelog available- Update to Chromium 44.0.2403.125 * No changelog available - The chromium-ffmpeg package (on Packman) now requires the same version for the main chromium package. This should prevent the issues arised from the libffmpeg switch that Google did recently- Update to Chromium 44.0.2403.107 * No changelog available- Update to Chromium 44.0.2403.89 * A number of new apps/extension APIs * Lots of under the hood changes for stability and performance * Security fixes: - CVE-2015-1271: Heap-buffer-overflow in pdfium - CVE-2015-1273: Heap-buffer-overflow in pdfium - CVE-2015-1274: Settings allowed executable files to run immediately after download - CVE-2015-1275: UXSS in Chrome for Android - CVE-2015-1276: Use-after-free in IndexedDB - CVE-2015-1279: Heap-buffer-overflow in pdfium - CVE-2015-1280: Memory corruption in skia - CVE-2015-1281: CSP bypass - CVE-2015-1282: Use-after-free in pdfium - CVE-2015-1283: Heap-buffer-overflow in expat - CVE-2015-1284: Use-after-free in blink - CVE-2015-1286: UXSS in blink - CVE-2015-1287: SOP bypass with CSS - CVE-2015-1270: Uninitialized memory read in ICU - CVE-2015-1272: Use-after-free related to unexpected GPU process termination - CVE-2015-1277: Use-after-free in accessibility - CVE-2015-1278: URL spoofing using pdf files - CVE-2015-1285: Information leak in XSS auditor - CVE-2015-1288: Spell checking dictionaries fetched over HTTP - CVE-2015-1289: Various fixes from internal audits, fuzzing and other initiatives- Update to Chromium 43.0.2357.134 Update of the Pepper Flash plugin to 18.0.0.209- Update to Chromium 43.0.2357.132 No changelog available- Update to Chromium 43.0.2357.130 - Security fixes (boo#935723) * CVE-2015-1266: Scheme validation error in WebUI * CVE-2015-1268: Cross-origin bypass in Blink * CVE-2015-1267: Cross-origin bypass in Blink * CVE-2015-1269: Normalization error in HSTS/HPKP preload list- Add the buildflag enable_hotwording=0 to prevent that Chromium downloads a binary blob for speechrecognition (boo#935022) - Add patch gcc50-fixes.diff to enable building against GCC 5. The patch fixes the python regular expression and ensures to return a two digit value for the GCC version- Update to Chromium 43.0.2357.125 * Bug-fixes: - esolved browser font magnification/scaling issue.- Update to Chromium 43.0.2357.81 * Bug-fixes: - Fixed an issue where sometimes a blank page would print - Icons not displaying properly on Linux- Update to Chromium 43.0.2357.65 * Security fixes: - CVE-2015-1252: Sandbox escape in Chrome - CVE-2015-1253: Cross-origin bypass in DOM - CVE-2015-1254: Cross-origin bypass in Editing - CVE-2015-1255: Use-after-free in WebAudio - CVE-2015-1256: Use-after-free in SVG - CVE-2015-1251: Use-after-free in Speech - CVE-2015-1257: Container-overflow in SVG - CVE-2015-1258: Negative-size parameter in Libvpx - CVE-2015-1259: Uninitialized value in PDFium - CVE-2015-1260: Use-after-free in WebRTC - CVE-2015-1261: URL bar spoofing - CVE-2015-1262: Uninitialized value in Blink - CVE-2015-1263: Insecure download of spellcheck dictionary - CVE-2015-1264: Cross-site scripting in bookmarks - CVE-2015-1265: Various fixes from internal audits, fuzzing and other initiatives - Multiple vulnerabilities in V8 fixed at the tip of the 4.3 branch (currently 4.3.61.21)- Update to Chromium 42.0.2311.135 * Security fixes: - CVE-2015-1243: Use-after-free in DOM - CVE-2015-1250: Various fixes from internal audits, fuzzing and other initiatives and 3 more security fixes.- Fix for missing Chromium icon in the taskbar.- Update to Chromium 42.0.2311.90 * A number of new apps, extension and Web Platform APIs (including the Push API!) * Lots of under the hood changes for stability and performance * Security fixes, including: - CVE-2015-1235: Cross-origin-bypass in HTML parser - CVE-2015-1236: Cross-origin-bypass in Blink - CVE-2015-1237: Use-after-free in IPC - CVE-2015-1238: Out-of-bounds write in Skia - CVE-2015-1240: Out-of-bounds read in WebGL - CVE-2015-1241: Tap-Jacking - CVE-2015-1242: Type confusion in V8 - CVE-2015-1244: HSTS bypass in WebSockets - CVE-2015-1245: Use-after-free in PDFium - CVE-2015-1246: Out-of-bounds read in Blink - CVE-2015-1247: Scheme issues in OpenSearch - CVE-2015-1248: SafeBrowsing bypass - CVE-2015-1249: Various fixes from internal audits, fuzzing and other initiatives - Multiple vulnerabilities in V8 fixed- Update to Chromium 41.0.2272.118 Security fixes: * CVE-2015-1233: A combination of V8, Gamepad and IPC bugs that can lead to remote code execution outside of the sandbox * CVE-2015-1234: Buffer overflow via race condition in GPU- Update to Chromium 41.0.2272.101 * Bugfixes- Update to Chromium 41.0.2272.89 * Bugfixes- Update to Chromium 41.0.2272.76 Security fixes: * CVE-2015-1212: Out-of-bounds write in media * CVE-2015-1213: Out-of-bounds write in skia filters * CVE-2015-1214: Out-of-bounds write in skia filters * CVE-2015-1215: Out-of-bounds write in skia filters * CVE-2015-1216: Use-after-free in v8 bindings * CVE-2015-1217: Type confusion in v8 bindings * CVE-2015-1218: Use-after-free in dom * CVE-2015-1219: Integer overflow in webgl * CVE-2015-1220: Use-after-free in gif decoder * CVE-2015-1221: Use-after-free in web databases * CVE-2015-1222: Use-after-free in service workers * CVE-2015-1223: Use-after-free in dom * CVE-2015-1230: Type confusion in v8 * CVE-2015-1224: Out-of-bounds read in vpxdecoder * CVE-2015-1225: Out-of-bounds read in pdfium * CVE-2015-1226: Validation issue in debugger * CVE-2015-1227: Uninitialized value in blink * CVE-2015-1228: Uninitialized value in rendering * CVE-2015-1229: Cookie injection via proxies * CVE-2015-1231: Various fixes from internal audits * Multiple vulnerabilities in V8 fixed at the tip of the 4.1 branch- regular diskusage is more like 20GB+- uses around 5.8GB for building, assign like 6GB in _constraints- Update to Chromium 40.0.2214.115 * Bugfixes- Utilize the _service file to download the chromium tarball- Update to Chromium 40.0.2214.111 * Security Fixes: - CVE-2015-1209: Use-after-free in DOM - CVE-2015-1210: Cross-origin-bypass in V8 bindings - CVE-2015-1211: Privilege escalation using service workers - CVE-2015-1212: Various fixes from internal audits, fuzzing and other initiatives- Update to Chromium 40.0.2214.94 - Bugfixes- Update to Chromium 40.0.2214.93 - Bugfixes- Update to Chromium 40.0.2214.91 * Security Fixes: - CVE-2014-7923: Memory corruption in ICU - CVE-2014-7924: Use-after-free in IndexedDB - CVE-2014-7925: Use-after-free in WebAudio - CVE-2014-7926: Memory corruption in ICU - CVE-2014-7927: Memory corruption in V8 - CVE-2014-7928: Memory corruption in V8 - CVE-2014-7930: Use-after-free in DOM - VE-2014-7931: Memory corruption in V8 - CVE-2014-7929: Use-after-free in DOM - CVE-2014-7932: Use-after-free in DOM - CVE-2014-7933: Use-after-free in FFmpeg - CVE-2014-7934: Use-after-free in DOM - CVE-2014-7935: Use-after-free in Speech - CVE-2014-7936: Use-after-free in Views - CVE-2014-7937: Use-after-free in FFmpeg - CVE-2014-7938: Memory corruption in Fonts - CVE-2014-7939: Same-origin-bypass in V8 - CVE-2014-7940: Uninitialized-value in ICU - CVE-2014-7941: Out-of-bounds read in UI - CVE-2014-7942: Uninitialized-value in Fonts - CVE-2014-7943: Out-of-bounds read in Skia - CVE-2014-7944: Out-of-bounds read in PDFium - CVE-2014-7945: Out-of-bounds read in PDFium - CVE-2014-7946: Out-of-bounds read in Fonts - CVE-2014-7947: Out-of-bounds read in PDFium - CVE-2014-7948: Caching error in AppCache - CVE-2015-1205: Various fixes from internal audits, fuzzing and other initiatives - Multiple vulnerabilities in V8 fixed at the tip of the 3.30 branch- Update to Chromium 39.0.2171.99 * Bugfixes- Update to Chromium 39.0.2171.95 * Bugfixes- fix using 'echo' command in chromium-browser.sh script- Update to Chromium 39.0.2171.71 * Bugfixes- Update to Chromium 39.0.2171.65 * Security fixes: - CVE-2014-7899: Address bar spoofing (boo#906320) - CVE-2014-7900: Use-after-free in pdfium (boo#906317) - CVE-2014-7901: Integer overflow in pdfium (boo#906322) - CVE-2014-7902: Use-after-free in pdfium (boo#906328) - CVE-2014-7903: Buffer overflow in pdfium (boo#906318) - CVE-2014-7904: Buffer overflow in Skia (boo#906321) - CVE-2014-7905: Flaw allowing navigation to intents that do not have the BROWSABLE category (boo#906330) - CVE-2014-7906: Use-after-free in pepper plugins (boo#906319) - CVE-2014-0574: Double-free in Flash - CVE-2014-7907: Use-after-free in blink (boo#906323) - CVE-2014-7908: Integer overflow in media (boo#906324) - CVE-2014-7909: Uninitialized memory read in Skia (boo#906326) - CVE-2014-7910: Various fixes from internal audits, fuzzing and other initiatives (boo#906327)- Update to Chromium 38.0.2125.122 * Several bugfixes- Update to Chromium 38.0.2125.111 * Several bugfixes- Update to Chromium 38.0.2125.104 * Several bugfixes - Updated source url to point to the right locationsheep81 157426441778.0.3904.108-lp150.257.178.0.3904.108-lp150.257.1chromedriver/usr/lib64/chromium/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11549/openSUSE_Leap_15.0_Update/a7985b33adc3c71d97c6a98d829d4a92-chromium.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.2.0, BuildID[sha1]=eb9d9c4f9411b9e17c3e5348ba31ffcc6b72000a, strippedRR R R RRRR RRRRRR RRR!RJRBRKRCRMRFRGRLRER@RDRHRIRAR7RRRR+R)R1R%R,R-R(R2R&R0R.R/R'R*R5R4R9R;R:RR>RRRRR8R=RRR$R3R#RRRQRR"RRR6RORPRNR1ZLz:i]8g&j %3vwM%L3×mȼW3</μ*4-R_.3瀀$p>vN,tj4M9~rê@G u92'Pǰ*ߦ2d}#ZٺvUG-*:N\H=Ênm`n#lFO1:Ŝtx/}`S qʟuKOLM}2BkݍH@Ů ( ҪIS_M[awBXr_iʐTBQR,iT>x0}֤}q$괣+lr/*xҦ+3sByR"ȣ ASbjRTl9KA (l„*92qpPA+*/e֐+fЦQYm>5N5}CDzt!._39:)%cg0֓*by{7Q2sVe*=tW? WsfpQ,I_Y?. ҊuJ :Ŧ$,}[_ʐ*/J"-=.-323 1I4 ?V) 04qY&W毫w5Z/r` HCC-#7P1U D<=EchsO⚒|Ss}fǦ!ڴW=ʚEm1.-]] PwoYͼTQ D^` st>قx*Zf89'K]32Zb fޅ +s, 3^O9r=D^vk$)II/^&k  #0$%ĕjB}kU=%f bF|#.GfdbB>h4ʏ\"d8iā3J50)[S-FZKtX4 >&]xCbdDWAfkAZ5 T_ctTzrg((*jľIRD I!L1}e>VTK{ oeU9wpxg+WÀfg$zq~8P$VH<`5Zjqgm'Nfj'e-9T~EC$pT4f?g? -T2E" PC۸ΘI*Fb+-Xpd;8Wn$E&Ddq'1_-2dž1x.8!j"Y>*6I3A?UocGveGJOB;6 vӌ^ec`k4dnY}@* f,uA=S&Td@3ĮJxqoy_Mq:n£kAqhJ2 2,YQd va=0 xRHP!ktI+IfնGc;)+ƵQվJZ'OEyun uf18'[02ue4wƐ~`{]'Gi,4`1y0^ Km12=[p4m,Ɂu@"b+a/sd&_PU!yYcq"PQUg2j[> Xub lmN'VA*pZ_evC>SjN^CXOl5iT@f)-l2~BL۴fyF^~;۩ozy$/^x^T,2!өX7Ƙ*VfY 0O4k]Y&7<[x!Baxb *xyw2*/RUq00]z8Z  FV]g-*"03$ogu[yϤfd}a#8_}P~ 3hR0®݌'LxZe8r¾{|B?\sFN`o&jϾ Q+&r\API?!! h)TAQ1ҌS⌉٨ĄIJcjvƹCAQԹdↂ2;Gk2R?Oѩ G _fbٌ[mpBN$no$ LF/8L~v-ㆅ-hs\a3[HΤ$37S;{+}Vɭh*is۸T؈S&4j|00FD(]:)׈YO [s]5h| k:^wjǧX؃E~Dj8RA=Mew\ +CZ`4h^N>طR}IK? э>﨩tس#QW(z{P>Y_6lAh6:ę>}=<ӈr6:|g$O ' KoQ`'jq/?,hgy# ?BG7ȤYҗgq`tOy%wV5"Q5wsYY"%/qNhƻl5h:%W9,;$v7@ u0f~jCk,L~ LDl~⼲;WՓHQu ;-Fk:^"ʏ>7K &Y&xܲ-F 5.o溂^追A}FWi#wdG4: HʼngGɫm[0h&taɵuO10i?4،푱OŇF:.FRURS_>16WhXVi)* [q<( n+m}PBRg?|h[lVS: ӧ ?]uJSj.p g!m6O"dU% w:!u~KݖH=z8I/`a)٥c,uq; NF]/3ؖ<>y_4?VoHҎ>y5g] tٹ08|U(>Fۀ2}-\9"ϧ\. XG-pF^Dl4Wrhc=YPPX͡J0"$Qq fL;avqBa*/W3 0#7g y6 P|"e.IuDթ1%@jj e(K)XD |' +܇)IXDx#ʗ$ZPyNbGu ʪzdc?To9m7%ǻ'{N,ţmFq_ nйGy1Kbà -^~iugX['α$+{?ٶ쒼ZG$xfCԪ&j64 X<29F?a>L^hJd`]]xp xRKr틩DO >]NEu96]&^)20__]Xizs`f$e8x>$Bv1aYI#䐼mSJ;ZS"Bmul,J/,І$nD, {5m0E/P3fm2qNFr:|A7#ݪXOaT.IE߾w*閲\.8s -?;R I+2K4lL| Z㭔v$1DGD~3_7"!f˰€g//$Ri-Fi4S;qs[m!Kd&4Xߛ\=P):X5*KDKYU?0DGǷ .h-qR.Ӊb:ud6쀜,˰ @LYs*a%L\N$K yL'[Pk4hwBΧS>?GPYaЫiʧ4vWn| PGڰ,ls> nDIIՁ6.ޛk19[ݓƫy j%esü˚tD`}v`-P":C.W~S$rb7 i8NπJZ{ҷ,GIrfv_Y$``H?QpEиmWHOHI=y;:}Fݣ+4! EOy*[z4 /B@B&9Nh˪3޷m4Y!,JP!r8IxqU:!|ԄlFyE7zk:%heӆlGt@J!î'Ugy#^{ _SeDfN-cRq={ؖ-@K%$v\hh{VIgmpT,թ100Ըd4JeoFx_:OXenk[#Cȕ& خKTb"KY&7^E7~JE*,D(í' d# gmL#Y|_b /Q#Ȥrƞ=n'Rn^j HoXyřM})R^?4v#b!zݗIia@Q.F pkBN53)4 S{HcA'#5԰x*snAEmBStEYl '$:ƂWHծU E?sXU$+^xĈ~]PusV$;ס"nB LMKl뤉`O^?c.Q&]64c/ƏZZQ ~S6 LSKձlmVj[2D>wǧk;]z[ayFeR/>ϬMHuj>CxHq-Dy%ׯ:u՝y_L*$ REK;i Mg1Θ5 W*Ǔh F,%5a,w5g~JiZWyf"iQ2Y8}9p?ٓSƵb#]@(A)ЁB81`o |)M_ќ1xw%ߠ}_ǾI*ϭ fGM ίy]+j)G]m2~WUAm#cLw=|je D #6#sJCb;%%Jی'Pڡ<*8 elw #@59Tb1cAf\\ y3(-b[O2uS_[ǥyQP4 )A`EU  ]ހ h^m[} QqgE%W3y.TA-|1w__>vx/QKsGqܢRz2wq^oqpXqNQDW' c6MPoBșV8cFҫG x&)Hnˮq6>[n.߃2Ms=kFF7S췰y*b3#q2 hb{oi jt9 ؍;){'^`WG~|`hǽTC@;-@ǀ^93z#sVG T!33 ۃ/j͕zLƏqEF;+κ?s\FR??FcWL>DDko 3jo23 <$hPFt :V xm,X|_K<-ڽTh7Z4Ѭ2re0v-Y9Rb)"Wψ-Hy}Ŷe>n$噜=x,5RxbdKi9/[0`\:؆^, k+8Nll$,S\?җ񐅾(]8Obǘ/\$'j캟F^HOpK48!PbmIׂ2nEW|;y['J|.l?nvĂd+RE`kH;`*"MzL6R-<-}<®]B)侻סz9ƓBCJiؒZ έ2J*gz1ۣ'h8o߲P+oMu-$߽"yPnD0C@ 8DZW p)ǀ</#Kik(ׅBGV NZ8#7Z\xgg+Z5BP˸}2Rv]"-6H]2V| ΀+᭲;~wϨn,!Q0 7r?5g ?ܩ:~qJb+sp:b? n$xhjvȷb*İ5#XiTnQVj_%.P:NVwDQF2Zy}Itiok)UO1%> "dko9 PW wzSmup?W i6s'գ7Lhm$dR Oq|ʠElilc0VWMҲ@T\Z آܢpIЀi"Og5HӎpING#`܇u$@[Ӎ Yd.3h~iSWhމGG!88l.6VT4lB^'3s4uxIIl xblb,}L<{?o͑EZvvh{# |CRLO4Cl ة+KڹE&DF((b|g&|bR6Ft̖!.;U3Fd\E |AYD/s}𦞆&X='|pV?@5+䩡mr,|vb _[٢,X'LxTo'諒ټS$rr[ǸP@} c}7>NQ QEJ޴4J@S:#I*aA&|AD=Tiuؐ@%k3y#Sد%RP6-C 7'v4uogoboL{qliP9l)WcR]Jj4>:BP]^ [ʘOe͉zTɚ^Sreof^g[QSWVMC_X3MH%cx#⸑!Ww XVw|̢`3<ăx[laBYW #ƤlU%Y-g`dTq=M+\ -V.J@ f(mDAzKB>(x߻=(ʰIƷ`*@xF^51xRĹLaX&2 ]15Kb@%ܶP}A)?F}Jn)m k4Y~64~ M.ZJ`@9#鎗z949Jʵ8VfہctUss)B:~7m<# T}*v, ~3ӑHr?LsE!.V̋5V-}ݕʲ[jIҿT124N+5U>A5F*“B:ThrI;kegOzKC9X}VjT"oUTB, _1xR4CUBE[R?{iDK0KH(w_Y}Ƭn~ß%Do]̖"q*#_cUH 0fC/GdA +d".h?}GzY cAv6*xqP[;=`B!MDi[4=ib1ԣ`9fDO4K͎=g] *O G3abm8~>L{k_ gZ?[<0L2[5< =xRsLw%?{UuMoxְ'#rL~oomI׭)&my 9_\9Q>`w^' 7FՌhU&K[x^O/ƫHD27ʵ 7Q.#hktHǙUuJ_%;[0PLk pȜ8#_ޢ] .\UJP^$x [M>΋7HІ ؖ^!Zy,՘4K/츔jY?S߁\ӪP@AhwY(_MAz!-¶4Ý A[7FbthAt錒'繲w~O d}˳В)6 ;]ܳ^4Mq"TKK|;OS ia`f֗K6 0j|>@Slb:ߟwfS)ߤuG 3JLJW:rS(3 03U4VS#X{w܈lt!'WPrG竃ε?Nxícdi&e,sLfN8npN(b'Gp{d7IЛLI$`*NDl@aw3 "vx2݅޺w.^PH̀__QXĆ7=6(ŬuA[7V*/)o- @ Tb2e\#Ǘ+ZK5{,WZ݀~oNӔ|Y[+cnx[*DQKt1\ IOJ8mϥzHC^jkX#Md%}0(?oq?/JS$m]@yR7Ee4kR!4΢b!/Xb]9N"<ۄZ50M]il#ԁ`آvŊ/p&IQI<qH?Z2K \>,f.ϕ\"0Bam*V4{D >-bl_uĽWCRe7-=/ a ~9BWƠWUeە -g 4T0@u}wp?ƽ Lf&p/ WlC\嚁ef\ddˋ"{w^ܔ 7F',U¦>x ifg9%ƣ<8Y-X9dEgq 'ZUL S =VtLWfV'(?=9Oh QMJCIMPQ`!L$l9K>ȫ WaQg;2Dr(}yNW~p5Y8{'A*76<@* 9i~9|.8/8m#ĢÌV:'jȱUK… E|*pu@;|+}&Iӂ(S0,U;uR̛QRap̍v=ih\0x'ߤ$vM@Y*r˒dMmU3ޕtnRD+OHEO $xrk|ƎGUEf؊%oۥ#IeC2=n;ոt90HYAb\c+vNۏ4t<'_ϛLZuϑF ϊL!LTn~т-2uÈX ߤ(b@yݞ"|.D*\_mM$nR$5XMi'vPMv]|hß}S#q1g/e{I_stl_´hZSvS'vbl}z/|$qrr乮R=rt-Jb_e1:!Scr~c=W'+Yd,`[6_A}~6W21g;m;K]CrVEW/{rcĹєtܯ3  yjH{90AܩiXPܻ䋔/g-=eo ;xLEGR+)rۋ:ub>2[!!moj|i6mp-S~G28Z4p~OԚYfQ CRg`cY>AoVˆ OGU]԰{ϩF5 |xLDZk)&C_E Nh/ZcJX yYZ??s@Tv HPiL#e[ŭEuύSYR\o5d#z"1 TT=4ʔ05џu˰ t6:bG6091j% P;V<{8AC{vVHa٫j $/G-3T@x68(s13`]oĔO5/)uwɚqwlb ;' V_?ch%ٰS;$Ă y3IlMb# 3mx#и̷Pp.aJڟBD"ϫ>k\瓔 aD1\x:%wE _K;lL'C|85`Kv{`] v%&ۣU wMhbsFbo)=qT)Zj4Afm? 6Ep/ЙPBCPUi]6*h Z'49&07G6jx5`i\S;mƪ`qv!wI7x) $qTWdK@ӌZ|tlRG%㳁V^t08 .g:+ZpIuT/n,j 0"Vo(Ʀs wN'F=h _F7zNOJ -+6{k`h2>~R0iG G8ͪ mJ7amިWʫ )I-[~^C>fMgk4Ƃ(.휟FHn@3^yY+=ej9!}<&/=wh{:HQo"fUcJ:TnMbeVkF=/>Ce_HQ^i8vXaQK ;{ѝ_ˎU♌)Mni%E]9 Ƭv틷[;~~{m7~࿎o;[]qJlϹ7H ˫0F0>ଧhmg*-֩PdVA:p5Z2ֈ:<]|C/A*2]|ن*I3Ay؟/Ċx_8I>=&3Ek1jo׋Sx#}ZTׁU.2/`[ǯ΃?`Aw嫼;V!{X̰9O6h<劾O^Y)zO 5؞UC#핈!]-Ν;6es+U!y}cg{1ò ']t`!"EtgOp{뺓EǾ :`a2_í5/O=c,*$kShYݭ ݖj")_,A3;-_m`uN0kHJJdgm ^)*!-XB[`[aIO~ !@}lHcvaئP1(+2ѫ3q`#!Ö0&pƭKliAꀏ0Ak}o8!˘4;B͉WGPӡQ}g9hmo~y:Uf*$=d<,%͋?IQW6D a- /3(Bu]I>Q cSWwֽ}Tctif#[^E4Ֆ=+[3Sir>R_SjH$Cc t{cn}~f'ZQ &H.`#ޞC|}w\{\͐<Ώ/UwO_™3F|t0*Ĝ_&'Q{3GŽS_`D.y]Tc<ܪ$AYx-a`;jQXRSPJG^Fo%sfvߊHנїg"@Dd_YhFgmkHK]!NsELjy+!#bdG:R? -SߓUev?64inD[B8S`*B, ʂlD9zc9.I֌H\`S4E6±J?0N8sV F:X9~W3l #' IA9Fz4~&Ű-\rPa<9&J^Dm{er7KCWQJ_B^E7'qmr5IJ+{UYGȒó)#}ldžvD&y",~|Y)6@TWͩP/F$vIMl]~FHG5oc7DНw',;}nftǩY-q!G*U{AX4M~(Cp󓦑 g+/Ί)lBdE=f%RVROtj@@cyX0/*݊mKFf%{H5-=B/5r2x(% .J_ nDgKWN|[ųش!v3FRΣiꋖ[5@d`3K_J3-yT:a /~]5dXƗv|F~Zۆ=:dG3z_}<ؐ R$>$~#I\e tK!Sm Uڄt-gW{@8U4]@`.Pڴ>:v:hk aHWǍ~5 yWi<B/րuJkfkؕ K<҅z}Sh9b Re)E;ԚڕGv a nxa_,y胐66[ wʉ( K}%-M NOUll"(H 2<=g:?,Nz.OfM$vM6a='QM& Yhhh6,7`c~`J#}NRb8d.|%kbo+ʟ/\Q~rtPI#`ޢoa@8mdB_6p8wʍc4a0$|qb(lo"ԟ c "׼<Z Ib֧'hJ 3?8LT,A*mVقym&e |J[}.elŔX2~s$(.SEӼh5 SxVP>ch9> $Gvl\k@ ~TI 918}η \/(tA. W$ïzॽwM[ Z>8!55iMh GĿxM[J(Lq/I0 2]OڞSu.ÖJHE'Q`Ӣ6ƄGTI47N>8hG(f~KC 77_&L 11wQ D%7D0n[m'8Ҙ/iM^sj:dXd֧ɇ,HRgBXn<^A-}T*8kdEڅ^4N(>\$/7/HZ6lDwzpb8?\fۧA3$D"8E$ @c?b>_J=S7>[}0*!C(D ޣqj7Sk`~_uD? oAulC]"l!M\ W: Suzf[ (PQW:;w7+97NI9k)<_Bcqśx똑OdCuBza(&ʋi՛m+Cw"'*1ǝrlaASa%4\gC74V/f !ihm#x7~ ms6fb~&, 9FP!f6 u$ zq <οߧH#[5bԶFz- G13 7dkI•QK5U|%7tsZА@ܛy򊐰2QbZ ׾+8hc9+A} K*6JIaYeMa cDn, c!V n ڟ{8y]]s>NɁ&V)4VuNd21TqS%˜YDžYtpۜQVu)V4 o8њG\uReh^cD- N?t`RJ%Is9n}  \H !"yB{܅ʵP"Ky{NԳk\_LwFERF/xFjϭEơ+~Ⲇ ڸ?rW 9Ye6ҏTQ9M #*&=@]1c2aqr)H'j&b];DL̓1T ẁM(ɻ^HOhu^|E[X fe`^."|Z X_NY=2]>?fZ] WWlpsm\>pLN]G pG3JgːQ`@LE))(C+f̆ FcK% 3^J䖫M q`u6h_8b i}w6Be67b yޔuTĭ奁O9u^ V=y֋OrT!1ݷ.T}5 Եxnj*}|rA% :B8y+ٞ"kM;wK$vtQOdKjA>>M0S8F(}DK*~em:?U@77u 1ł[@*oQܻXYz^P8dkQ,@BHsVZz ~Ooc6tc7nX ;s܃ӜSe668Y:gyٺ9Aܯ$$qVԆm#͆F eβ@j1囻S㚮fqmjҲs'R)i21s53G&y|Ϡւi[Z[ "V{+boY!&ntE$nh3.S fһM=axR0VYJW#G\.Bb_[ g*ٚ@(8WPuvvA0\?3ֶ|yPٯFz0ƭ!f~kzM'0ZjG9)\a{dDSY] eעp x;3E PuF4$#O2 ½d_i VBB.1_9rI;Zp|{NڣDnBypk P5NYMxTN{}H*k ҋ w ّ?8w \bg 'qcO27lvULE(w]$ɑD1 <4WI!{0)mm|J'1Zꝛŀc1b(zH&u'x3KEraoaxI`KgWJ4\sozMNa]rn7ZYXZLUHno j9]LQaIE-  zLћscX4]Bf%uQ?D?'MC!?Ǹ2Kk1$'4M[a݋̅Eξװ@S KŻ خHd^d+@ずv >]YcEhC%!v2?X,K>AvpYuصKA}nXh|>p0% <(-齺3^z/ڿS1tQ,LCof11CxYN|YGVѧ*eX=܀G!MIeΦ ]WLW͐X\kEXLcOX}Pb7jb0O!ڌDy:`smw|,I {@kǸHJlЊRv:UB32E8d`${H$P-$ۈ5PeD#>{0e&#(MD~i zHJ{z>﯆UZT#c(1'C=㈛97I QI2v}.Yf\V\%t˰B 0(ږvxAZZx*IeW{QAW]Be~u{,j3s,J%w[z4&% ]W&j&},\3cCw,bq9_}:`Yh,ߡzl[Z#C²DPqB5\2mԙtM8A\*rh"0m+:U1V  ΙkMtAGBb+ +BM3%w^G;" /?"'1MO(o}grf~LzStVqWC\;qF>(ibo7'>lDXdWϒ _Q#+uXSBMsxh5#" ni*P;g[ Fqx/pT(]P-T$H6FfSw_^8@Nd`3E~JY!A۶r/p|yL1@q췡ώ'mS\~@n{C ^r''z_ =K{kl5.%nz ,raSbږ˅zr68]=h²f;SU*XAo}T)W^B74*]i!QzxvP)t>:6Ö/'9LuRBI>1e}A|N{f50rqnm%BStkLKHͯw=XHx[ @^ szWKV5Ubg-[`H]w1ӟsV~VV:,d٨nUښ,[Zߪ/ZU%\ Z!@ .0\SΗj̝§O 쒘MMdC'7 (&[ռnQPi_yrrE{QΨGFnTjRdΈϚGuυ<[7V3kzXOF=Cn%ڕ:}ќ.~:n0]&FvS6Q WXvS/o<$1(`ip}9 Pי(hRv tLB` iX .]j碈dyk"kWд)COmMvVj;%ቈ ;կXUn%'Ndqke66i%ω0x":xP@ڝa8W޼a9TܐgWtzQkjX6md =ϭGG7Q#ڽlT.{z?Vr!(Ĩ@EZ͎+2J%"<)jW >Rb$[wǡo sqhz[>ki/kn]…m `xS3-;kend:'8HVXv;~2KQUy!6i|Zbk"cΆ׻WZ!bP=(i&~N|ѹY1/2 ƖDtH!߁t,;W7L5=Wn?>6}yFͨVZՀZԷbXнrc|/~9>=jsܢ;z؈tR/~h~rIS;TD[S  s9xWDuIڋKKhcͤ 'D]2S d`/TӾle߷g*LxU@Yڟؘn=yj{G^:~q?Þ+݆m,4PVm"ѥ+hBdZ=LoI8o@zq亲QWL]}s$Iw mPg“Ix{v6{S;Y[}P( "Vānf/QUsJ%gz±:=g`زo#Y V7j݆|"γ ]1Qdl)U&O?P8A2N@py ^gZZh 74@j~93㑢TJ`6U%a0 A B2u367΀dHs,1i=x5M @h%/`#u ~H>*_5 ЦͭC] Sꢨ]ֿfo9gҝT Ė#|kad+6gwZ)S  ՀlJ1dm;֌}U*@{] DT LB[%yrSQ!)ƶͰ!J4L5ȑ)J"ǟAd'iaqCS"98iŔ=\[®PHac9G~A3U4HJ}+¸Qs'E%۟>+wǡ^O,d~~NETYm۪ǫ2tccQlޗk4{FU\DZ)p h+6HrΥz%QfNZxxEyI h08il!M1՞UXn߲byKC YtYDEPsK6Ҿo4}d Cpx)paby+~FVߘ?$@^EMOpkykR9xY KiInsN' GW pkm4-P!?w+h;B™rL,Nޣ)LuoWr' !BL1fsA'QT m=-J|Cȴ&v6T|*lnr 2F>g)L31UDFpsѧ!?A:FEB|_2rtO떐|$ySV)@ b/)qBRu$=ϟ{{CRneS`(2_d ScFEťuwLY1_^cH\2ٌI- j*~u 1@(oD%J0ztӼ(Hm(EF[btobCq(aaGT$Tw td]!6"L#kEZԻ>*nkLV"P{ z]Gz ?͎v"3,@QOiI3Mg0> p2c򪝤_NU";WzToXW0cNio狺Qcd򑧷z~2D"XD2bD85Qݜ3D> :fBW۾'?xb䰗cA#:͈S#vAyZ%~LApۢʓ6 L8K4ղquSWֻ9{gN,2=8xxOCn痣R=OeN Q2ʐ/Tm_+@h+1uN}1{s]P&>motNj%PWvO~dqS\?{rTjQi>6<RG斳MA·k٠uPA{Wc+MfMLiZW0h` ms_qUJ>Yq|RC.1pg{Ӏ6\fh'JJ~\_ Sߙꎕ?2XMTOy+ 8YAh "yO'Qe ZݕJlP(niJvp j̦di) |n0ZwVU88ELN#_JG ٷZKJ`谏38P* k#Mц>.4zMԨa`,4x'}kc4M8#TėzW(CE"E)JHRq^m0 SNUݭvF=((r&U&7"P:٬ldzO" O}=Tl/MUuTj43XAX cN0 YC5c-3046Sؽ-&{"/ۡ2;9(P +|nڽabEj7oJ=BʩdW_3!m"IΒh͵ݝE_pM}H됣t f38qgqQ #03.%"N[3Ta^: ˡ^Ļ.CuN=&v͵Jvug1#Ⱥ5( f63Vxo Ru`VU?d %>C$6U.`ө4n_œ' R'W8babJOAՎmQrKDg-Hy9Tzck0Vv1Vz /URsOoA5XgwZ8(7^^ f8#hv8?#cyʱbg5eqkd;aǴ$bVJdᵳv[܀:ZkzYg fZiFEg> h`)*޶搾6XjyХGx(%HW@lan- 'K/vʳo,R 2dK@:׉E(U(u[~(+Z?eg.Tmm\m71d{4)wh^OZ3;tHxB.y -5'w?3[V( /1ž8 [3nwc.}"%g2a(eȩ_GH8b|/op'tV\aB4ɋ?HQ1 %?M5j1k70^g?7oʖ2D)t_!eF݁Y ڮn)qfI8ѨQU6$;yc"h>;V8_I̪q(ܲgu&WIgS]|ĸ-Ӷ;çb%6Cg6) 1zX dEj,N, #(9Vmùѕtyy8K~܋VxM"1G6|@Qҍ PdaW|C}cxQ-@= fy(UZJvw'w>iPYqr~1d&q_緙5ˌnDP#]߂9,jocXtG {1Utw:OU%;b+x't(A0;?UގLʧWIwq􈢰/ 7+hF)JHH!W 9LYF1p6PaJvErEs@#,Y'\2ޥW/*n;ٔ y]ӠR 뗀[z'6ޖ8߈Aĉ(/j{'҅mD֓*X$QV0{(X]|hhMJ-NZgEw)Ԯ\wFZ^CH[TiJ+8v\17ӑݑr9Jm˙ሤgbSEst<ϭ*/SrV!kYLy 49"VS gN]j[1o+T9d: ?m^A-Zlm-7*t)p?<*?KFW{T30 >9D+TYVmNH8h`1.}dLɉ_޴]ͩK&D$اչFv''F 12>gqnOJV n7&&a92@:MȾ4WNwJqȤs<ќOئS>9 ]LۆC~ig&,a4vYD,7=r+“yu+(q]>Wk?wJس _V=#r-[Wq(i[|' bEB3BZ&ǽtvn-2#Y=ZU(\y n2.|L8/m-N0U x]2]kǖQ~ak]dx*qkiưdϠI$}a厢g?}izuS5\4S5`sŽ4-ɖYDwu ĢM`K6$WF .͖R2TЃAlzƒh*$GPmo.yPbޢkv]C`e/A3S({2E[k%Ӡ\x!UEh8-P 1Y 7+ sdɀT%Sҩ-%"2Jm`׆`I7̒(5?pv#^ۓ b/LΧ$גAlu |LRBABZ;m*|C4o0lR?GNL%oFumDoS3\ڟU`fU8!_{v32(F/vt>Am4 'K]%G ˊE-/Y}m+@_|ON&BF{8#s|:F~Bԧ#eA20jXdյfm?Dso *9~ &y2=M`0 pi#r1D{]Rlt`Uj5ֺ/\y[=P*\}}׺D.e1'ʽ{GGBO#-o8Z齶F +bko,q•Uu<"䏙D]܁6ה;K>2 &q & !~t-Rb+Ty5|0CGKd/%((r~fνTIL_k5QY*S0U꼕*=x6{o=.= S[y3_!Fs >L%qU-/2+ס|T6Nد4_UEKkbIO1? rwj42M-8N>1畤!,/px߬s#N)*y3teq~UY#^7o^s\w(6ŏR#ؠPͦLM0D{ҙL*yiD_>s7eQUDx:a*zn}nj*(ڏ^gu/YȊ5пpO&DIfV7`T7Q uGK5_p=14 ȭtuG`/Y /y#lnͮ]d"hFh+ÒLHd(l Dvs֥̎v ZSH!Z1+R"G]UephG>VT{t\ LJc37n!^ ]e c&ߎTVSg em ɣq딚!Meδ Ż"ɍ0=Ԏ+[)AhbF1F/8v aO/+] V P|ʋ@ҋ}1sJ> _V>癵P<)HZՋ,rp\+|C(ᣦd{F\\s^GGڄě񗶰>pyK 3m<&mc<^y A^D~L\!tf`<{H%쩫{u_\b]eZ<.8)`#i0pfNSxrKv[,foEuCKO5TM`o}DSR0\[]=?,<tw2aZ~^~]E1ٲ/I*,5`•v bo`բG2FS/Xv$*4`Ec+/Hu SG+3Rz,dU8՜`U*~;*kUhGUWZ޶ %.*&R+ 8P\mYzb>E7l6/^9܉yNUG`ѸF)d'wÆȋK*jz"Z:(_xt!p0M~2.ꦙ5^co fn%slz]DE~2ʚSy%$"Ths5VxOZK>}CzmtJxMݪ4eNe!FFr޹z\/\Gя 0I!SřSP9l]OŚ;_v'` O+bބ5XGvgtfheUJs뵩%@2܊D qfLOq坬 WP1y_xz~H$31P ɏUjʥgTDGbL(҆;SbIJ 0yd@1_HaA 0+>HZ'4hQ0uwKU"ѽi9N0&aɲNF6OGٽX$[%`0xt{Jy7`?Vxk"H@*ZKA)%d{3v7,p’ V.Z3E V>~k+͋?L?D'4ΞiH_B$,:K(ْ MMz.A6s[[SQE2/hl\1fEa!O)ĺB4_#,a671@v~Ay`fCHiz7WG+1iv&Dq`jwpdp26Z&"M5μjU_|-L dnHb(v{'ؚ b<`gRaKӶg}3锢[ :\Fghs$&…u4@]9Cr΄a=mԩ88:vI/VՐÚ&n1Km ك.PmLY7 Ugf`uo{{ɃӦb>u\YSuF2< *cfRQTB-YT+ɈÓ ō* T 5FX%4Zc+J f) Omϴe@Trpx(TVK- p6:m 0ѻH]%GOh< hc=,sIzR@tu~}=E?y^SU0E>% 8 Sּ܆4%Y2lTcM[wf W"=-oJfO<>Ԡ䣫,jf:r +(Jqt,h1A[:Lr \b/1rn能3NMEOiܡT+.aNж 9} 'o( `xYp?V= f˶-ݏ.>a-UV&T T@ntv~-R_6"dFU +75{x<~ Z\!,&VRօ񛡳 0E}u/~Ikknr "U-ڝS1H49$ϡH5WL;w\Xd\S+6&!nȞ'Og=$A{I 2˜vlPW|[3|~.4Lf:,ÿe'EFiz;/Xƒ6ÆhEUqT%v᳓cwB2xͣ1mG؝$Gu"mʱB1K*r`:6z ꭖlr8V )9xC.xTP3Zscyp2ĮJ41&7]llvS艉;OZ=zuӸJ%f\XQ5٧8b+  c9OWƴA []*(] xG7=Y(eOXk KUu__hޫk*PH*%B ̬ˆ{Af#??,XΈq̑t8r SP|!nv Y{R?؈qp/O ?d~h. X$|{Pxrvf +Cʅr`n) G^ƭ,5}_P/zUi 텿~v\$i-( #;E8~ROCaOoKՃuoE{4,0߿ {!Ai[: TY֣N!f.䜰i+N3oP~m0ky ܀g ɓMr* ˦Is\M?")Ϩ{'Z`iot3?7O%Zڢgвc@Iu 22ǨdBS 9]%sCX5s/ޖzÉZԙP:ke[j1&I6>(%t`FdNRk)Y0q'@OAŁd]Xf ]W}8byQ >tMM_S:N@ۂ# )mky3yX}A/\qy6dM)ϰk01QLKFa!& ,!=[M.rْ.?VྂzK]߲ӓ=+av1x_6=R9J g"Ƽ*Cy 䋘ZⶬuEI=WT{M@OmQl9Pm@nFooC"nJI?oΈ#RD %OTyS<}7jS?@7xG~6t]/͘_zG/_,]FD/"O@B6ɺsYB4:34,!͙p'[)_!ϐ ^s[r۲k;цEmH4Y`em* %+zMlR^$1B>Z݊9 Hf[p} +$;Ij2t #&ֿaX}ɺ a}؉5۱X:.RW%8Ԧ iXM/k{%'N:tx7vJַt]@@ -dgVsXԊWDW$P>8F]BKu c[8=u<$X6o* pg2ӻya"V| T?' axADCl}F J3ԯvjC2^$@f\LW=.c͏Qch|Y0qJY50@r`.&w";l(_[nX.[@:⦥e.,& $#e &nn/p6nl!*k,' '%SmG)s{<K-ݴ}~^&Fm oRe<"G-vݯOӭHY D9C.f%,&ye9xށ 6qJF%c&H UiT!yEI>{eH;]g~Ÿ!VQiNn5+]k8H"eXy's^zou<=&|MAe MґJ˽{4YLلZʇiIg[~MZfB/~1q`.Cu,͌g ƙf٤#."Gr3۪n(+Xpc 5VkKmm1b1(ci ֳ`3o|..',ii |+щXSMPW *%Bn( +~5[@LW> HJ,< ހ4oS~[+`B4MksƆe5㩍B~4×<,I9/:e>䑐|!69pz5NA/L!MfdZA'-^qBKe]r-w02cPxXGH#VqS7[Ӎ" ⛃nj `K"ƚbrDovG'ºUmVwKI $5(f zJ( lHV%o!аU@&V߉ v+Bvc#d31ުe M (J@Jţ>s}T\fL͠qAV6Gu(Vvt V(Yt/k9bnEK4ݪpM̛ aph{`wiEvhBx,s<%<ǪnUYkd3YZmWԷ!R4ʩ[YGŎLUԷ1g=Lc5|?3B7dhGK&#5AntYUy%5y# +/ĕ?ct|&PJ' g] r#gYm*=;TSd_ Y BEJZcxӬQDI *@!] JWLn޵\߀rR)b%D\߯DՊ02",tb"N3Yܧbcc|~Iͼ2)vnroʉ-\RbrCh*eol;k fFRX } $h S LFhOA: f$$TQ(Pej/HY9y,#ro 988 0ʞ)SGƇ@k~2 Ot>O|޿ՌԶHǝG כI΂f<  *%;reTJwaι>'.@;g3 _M4oo F[vТD"HϋF? @3UB莫c%lt> 5ź7I5f1>hE7 9T4}_]B$eNGDiTդ8!7/E#Cё"Q­W/ Yg(,`y}cLU~1sI #{'Ts] ,ç1-\1)"qe$T7_p4 4.TZUvhH (3pzZ5 ;egu7E3A}(QGHk ƨqIC \Yݨ0xowX'Ŕd ŅNHsFEF]8В7ʁf~a-~|ҧ~oX5[/v70wpwކ'CCG7`iw1Xޭ<%5[~k!8%ڠ/; 4;XquuR&lh||dPTfݚ,0?oJM7k)4a 1ϑ \xVj\,lQ6bja1yɮE(` ^OO p]^ 𣇑Bt@֏Z ^:2cc4 PǢZS^}]4pqg (sM 4FD<}&[8UL{!BYpU_YY7#m9NKeMsQgJܫI 1`7-&ss)-<?;naDD=Yr`{\t!J@n; SV1߶QsI/8VKnQCT)3cz Zס wpײyYbR;ڸ#Uk aZ>4Y=)ٽz^inH,Bp F;Ұ?bֶ}gz[ J\LsPP)P vs䄫pkqRryav2Lͪ (m6$Oq3oԑhjj7 =<)>=9xK^uԫ!{xDbzM?5,3G\'l[C"ygTY%H.q%CrGJ#$8@M4.<`u i~Bc:> XLu BۮG@ͩ`pslJ#5/9[aㄩ{l(Idv:޼.0Pm62#p]6A̋`ipЁ^pX5a-4E6)ŌзHy-;)—t^,DYCV<+g})ǻ$|W1Y;lWǿW'﹨уv̓i+S^ )y}KW^{WBܖU_J/Ģ9SޞfJcE6mL`2}=V6E ʆhjj %p4>1E62=8W>MVa!8mBnjq-CӘ!Ae͢g c ac׿:v't2RxojY\zc֯My4B9 .@׎8b6ؓ={MTY5=Lr/PO7G4|sFW'9qʜՌCJ'Cc FV;` 2opt }/{]Ne# jc%dxWH*xhƈFZ le-lcKph"$ =C[ 7:-v%)}=?[ jhu6QHM1Lꔭ]';64])eEMDL@&sh޳:?#($l *DKȝ _/nKᗥO_^-De8Ԧ@$y--Zdd\K;B\63C~)NNԀc0uȂH8eDo9/RƣڝAqWF2jj{+h0oPхUo!ʆVЦBS '%o4ޥѝagHaCWp68*M`266$0Bߧy%.z #>sidq^u~IkxٲUGGvpmO+T[oq [ 6t=G/gAj#v!@?*{Qz ' #wyڕ+#U gߦR&73gP2ClXک A028tX %"O1KfcVs!Uy>QeMX3(_͓ej>I!}_ Q5#KIGOLJn iL& 7lE'PF&]XONU+zF"oSWר<@6@|AHf^ӳfԒL]2`qm t=fZlebԈ^Azt? XE@fRBr^+w m1Fp5އg97 ci!HAI(m]ܿWHi*W;?>*>u9aRNdc~ uWLvH .GD#F6$#/2&/%>EIf$ky ude;o[LyE[BT@o^sNpg]`~hb f@6A$dk?.!,x oxUN5P~]yIq">uF:E}SJ߮fpFl2o| X K: -E8CVRD5 (¹[ dW-!o Rv#*a<;,jWtH(êrPZCF]glsN_01=i&>g#"GHg"lF)݀b{itԟ QgAIDPm:qB;[azǵf"d 5M~jjP|8ȸϘ!`{:hpE5"%?,nHO" )^R0dEB:RZ'u^:}łgl.HHlJdDmWOi a1;F32O]"A `l"zu,R{OE^',$ B-)?e EH$]я`t'GҚ"( ɉᕔ.N=a]UՇM’uay 1w b)*M'fDW۰Xf޻my$lPFuVY!6]Ԩ)1~ nN*}0rI[vW$阕T-DzjɎMr޺64[ t'>+>;A-ATt#o'j)0Uv ZlRNQ?ClqrP^-k:)ِ`"RWljIp ;b*N l]Z/q|2uZTlp*9A[t*~ H7E3 ܌uX9״ApRCQI6Q랙M!&t";`a$dXWtiLE n_.iK>D^=S3C^`L^.Nrrw~<{a顔߂uc$=kBWJ pt-…ީتv9#qɆ,:CQEA߸/ݢh8s4c]ܠq4jՍeG-u&aIF%VVt7 89jdRwfuNS,XC+\.f=jkh\DIH~^P S*{vgQqE;4\Iv!hohGےHZ,j#dK( Ȯc.#͜_b8Jȷ4T͎ꙴ?r C?0^*/PSHB$)q4V`e z[ NlsO@W_Ҙ,;[peAqk8[ƫTTGM"3B5/02#VO'N*.],!6vz8jhx=7z_| 73Ā㋒08`&Y!cI_vr4[8HI%̗Hnuo֞S7iC)JaQr-QB-ϥ]ۃC*B4/ L:z|SZ'8"IE&=%ӓ!˿a,cp <𬪬C7;C."Y%P?q5[lM83dd&Z ́x bTp%)7 l OK&_!yn+C=X̨ӵ_:H!֣SŻP `. y,bD)aVbg >Z>/< /H FR `{dafq)yݵY>\j׬-@~!h0\ 4qvgd:S +8j&F|P#i _<ƴ1hRw ^E<0% JUqivBKHwN!ƤX0 -G $6؀s%=AV JtYNdY:aL".,qm4Q .UC_ V+}yrZ>W]]P6bpz?z?WXGo':LZqV ϼG3xi%ŎTmej<ʕ~&+5-Z ܹBԒtVhuяÖA k!ӓU‚Ɯ&ޘ )\y Zbr3r M\$O;M™O?>ƨCC7^}68~䕝=8mgŢ֔Ö3\pg@zv(T 9ޭbZ+"4pڭfsmVF{J[2F7m_Ǜ@2=B(Tcq<>5%ӨSiLtIl%N@`Y!A(-]܃#28q&mb/Mg͙EewsYg _h|irwHlVhL[nиNbj] j#U:C& Zn&&ҊnGfAj}FN=\1.䟝vΘ {E/a!T>z6ΟCyOJ%J͍hfixZ#.~lZ `Vu GN޵6ҚZn$A|N\?PrBU9zd<;ڂlP\(>wpj;PXҗDI3,_7S g @YTgtReoUy:zeS!ET92mtFuM=WU .5f.mBT#CJ,@|TZI籕x-7j8ÀK=/ *b1{UGGȎ̦Sףv gż<25^uezijem:Wtêtom`_uW;7>ml[=&vK A9-vβKy֥NxZ`t+vڱ L ']2&\|ܯ5~u d,LaкspnYeQZYt\BjCed0u[k t?e7's3 TAvEA߫SŢ e^{S fX+<"=TTCJrpyN~2B˞|| N33/ѩq_,Rٔu= ׫=X@G M2}? Φ#.W1B R?{tUffqྠ4C#:{Хٶֽ;~@>jv* x%MV`jOpaY Ѱ9"En ,P-ԣ#H{RX1Iu3T'㙒]/0¿^*s'Em~.=d?J\Ӵ3+I&hfc7}V >R, K ʬ}qe`k/7n9l SE$;#XJ ?C+2>!pYT6|$\U (o'`!>h/X1=1CAnr٧ckGfg zцQ-l6ԑp;N7wt^$__'g1 ~k #'_*¯ 75R0,s7 fDbۜjcc904?Hy /^BBc&Q5vn'&s􈒦hEِ e/M{[IGNc7_2nY3_t!pq SxrI`L]UP~(7"\A +:&V8TUMhT~n%,ظt$rKݒ*/ˬ)(94`r̲q1Qh.@ L'e؈ -&g؇m/0ML"a9nF]cgMؓ"$%,.ݿC̑~Dx-MAIi@! QeRr\[EA aZ`lQ/ST\O여+# =zt2VSbD?gu`X=_9!_nOdX7*ꗁ9 ']zkؽ2ЬvJ ELK99`t&ZҾEb침Pyb6)rj ludaY~hcAӱK5Jz}!C)8]k*VK2)AK@jJm~6L<Κ640'کV6ᗞjON[1Z%ܒ#밅h?ߍ 35ý߉G{zӧk\M) ] N- ]R cm+3I *)$)U:Ӷלi1hQM`Ry?Kw б(#GSάT<9,M _9>{˨>@Y$MQ{Qo_?*mi?칐>dXzD`ҾL"Yo+5-Qؑ5aR]"gR')cMG -%8na>Zbz3UL mppܾlKUI[IN:tDUwI4 5D:i _ cE ,( WΐQ[R,q=I̦Q4 %n:@7+@S :Iu Aq@݂@)m7:{AM|7̴N7Ncr=;4z(u3\7?u/EKGCJ18hMг/Sj~' Wn&Q5>zln= agFꯑ8g!}㥁a=af",uKTO0pP@\XVBr?(=C]oCHtaǫ}߰h bq4uPuj|11S\3v1o`CTȺ/E^!xIts1ŪĒ#:1`}{g|=c.tg6K#Ռnmז =,gΊzgL s (%p{HC}mFhga *̀#ȬcOTu0` 4V=lȬBJ9AOE9tb2|[ܦ%ak% MM7༃xwsp#:=jq{B-o?qyg'w~m.r{oS.:tz&tT>f;$YR%l*D,Dj^a*IR7*p]j$c&'1٧?QAeq(Y%*n̓7,L/S 燻;$},Û6 iw"D:zDWbW:SxJ?RI'ut*'Rk["(d캉XW9lR]X)h"I˥5[?fqcVgA毺%dʶQ+:ҎbZf,`M #F(t+ȕjI f(QIkRFOZlU1  k+J' خyyE2DS?swX[~efe)ge[mi]-*XrIF7ޭE!{ 6R L}cRzT-mw청Hf~'4d[|&hV8&(KW07TEo )S"#كS9=tqXU엤` 9bBǬ{,} hڜqqI+ ݕfG߬eB FƖHbPJA+nf%yՇa7A˪$QeҨ@|V¹ bKN~|C=SiQm,Y@rrM*3IZ ,Μ+Tox>q "!ׯ_xd9p %@75Q)\NAAVԖ0ʕ[P5ƎPJc[WVg;SiL6}w>2p!ҟ$BU_wX8l =]S#햀=u>c7qR%4Pç99QVN amj nDW6YqOo 5At3^ފ'/Slfh >EM_MN@}9ŋ-k$qzF 2qaM=@ÓҮ01WDs/¥LZ[exGNG]Ċկ+'+<Taa-yAC09)[c8R>L9( l_6|9+/m1X v3 UB>#2펺Cˏ8SDaTg=`^] xEIf\T]6ŷX uܫP#fBxk0Llv-(uN7JKVYC-WiPO7~?.UŹhjgwGLqַ1ѿÌ8mL w93:n6F@m`dK<"GnFg~6͑ߟqvi3|BO/{^ApnXpbm0.[fp33,JQ/[[i7l:5PuCBro39O IОkPc͵2brxNYoS(:ZusQ\,SDhEXk0ַaî_/h.c쪳#43;E7S RNͿe^ #]7hp#0%]Ht6f(Qǡ\ Q7ͺ 32@dd)-ZR׃2!Ikҭtj"WnF <1Y8A owJ{Z_l09χ%f?lc QgIce*ybyM*\sdf \(5. c{:S()բeӒ̡ߞy5-Q%OLkfnZY~Nl9/r1F[ePB.NN3 `U]'Vm@ 7Cdddf?ıRCK Qss}U}hxX9vu5΄CR9;?zN6;En|jr3:t-lR u_݇O&4`bς]o#];eUN|QUAF -ovs Ez^82٩CqU/ 1cp)qJ֠$Tݔ%=Y^aOH_tѳ$#xQӨ0GV#&P-ص-{E$QFL>tJ[T,"ڱLgX֨⾦-Q|c[`;@Kڬu&-'+} ėH6'v"`I(}9po5{<L,[-3;X5RQl$\t'X&અ?6u'i[6Ć\Xt]%5rqWs1/)L/r1]cPS)٭m*.R 5p`jra6ȝ?KޏBDzx`Ճx_;R۱Kݮ6"øh܃!06fe_btڝ)r b/ @c0Qc 7 <9,kOd HAP|v/Y> {c'tnAM7\H [a9. Ư}T 8. pgs;2.Sf꣧pɾGHS [E_O ,j.DQӀfx~sݛ=n|<}XV| ށq;] c޻I%2GZ%G1P0,FHfEg8ۦly5uA^<8"@U!WHRmA= ۠J; Etkdt3PS9BF$1 c.?a"z @!nm΍<* vEJKn|rvvCfR]h\נM/ 夀a<(AqEW?@f5::^1mX4vԱ~N. d#a3݃2>e y2M!Jwt =>%FTzpHI{WBz0vfn4)Dv:hpKUmQOe[,oJ_xpU̒ҸOqCH[ i7u}` ycu/%G¤@Wp;ٓk12lPP^b B. 3&`#*>h/[kx),`]7lv`F[c1nCFw45BC) m*KoB!-\'aΤOj[^]lτ6'8-5Mu?igj$h]3$6bS'hSmJ^haaZR$5\ƨł(hnV8&8*Y䈻(FԬgENvP*W0\CP2:^[0߶3L]SSi,:dl܇Pg,ԪvCy$Oi^f|Ӿ1ׄ>wdCTqO'O9LR/D麰B%im 4>Ā/J<R,vF6+ԢDЪQpxUWz0Zq'\Bs ;=! Ce7*ab"cԵכxx}=B뮒^2Kk!F.ohCuH;>DMGsEw=оzIlj* .(-fYry;y2`/w [Ԋ`"2)KUYeәP̐(*OP_J!ŷO;s~9Ñ˅xYFyUrF\}n#@eNnaA,YE2(m,vZyx,\YZ1g) VmuP۲__C];I>H w᷊லv ǰ|q\'z'Pzs=)ìLAp<7LB*gfA-2Ӻ+Jb^d̯ 5~L&-`,؛A=aÒ=CvI /,{<0(* ˛ȏl6p -M w<"ZoRT]I8[_%f6E9fm@Y!B,0'k0im)Vvr=`S=Wİzh>9'BnF*}ȧE.sͣkGKgs/ <$[=ϒ,_AX$~9YN\0,:uH47!roVt/q6p@v⧮d5zPoLeN͂!6+v:CLf-2;*.T@1I.|^v)˵^OK9F{װS]n|!ӂӼgۉn~Ə2_8yy/AG ‰j+b*6 $^[ˋĻ]G"M7,?h'pƛc~;-ߍgxf.6rȔVGlJViøn$ɊX:ѽ)k<*<ӱYQ/#̶$p+j{Ln~({Txr5.H0:??)(T6Np!ܳPtdT/]TsΪ,4DG(2e,|7*G8T OHfbVvnHYu h X+ UXweO}n}wrž7z`+,uPtE[eǯe|D-/},Q隞B"MB 鵂[ qZp<8r6SVjNbըjtpD(:s}T  2xpQC'RWڲ yH~7!f`{);' ĒawDRi︪]8 /Z&D?6F.q ^x;{!'GD& {F,HH C*Y';g&Rރ$: 6E**!cFÞCҚ-SRe$u",~7}QgR\ӹ/AF(WYƠV~Y<&[p^/vD{-]b!uwb> UX s{d&{MY*{g'( |V$[k5sΧ~bnlS>T/r9={|%?9nzͬ ip[*g5r$+KJH`{q*K5v^hڠױ20P`D#|tuDkq9;=o1ٖ n_X'b+WOOyP='^)V{v,Kc@# 7ګ z+h׃)wDhl\wQ]O:7{JNB<][LofCӚvkI5ɛa?W1XtQVm|2bݤ2YL,1(f@ɼhP NiռDTSdau ZKg[eb8l=yN*X 9] 䇖I5NWjq\Xy,olh>+d4L:jv@:^jpÃe +lmH]7ck3Mlχ}^zQ ?"=n30G@.PKpD@7!֭2,O=A~bgfJ0]$\\_1s *H[.H,ZQGL~ Wvt"$ 7^;G &1 w͎,oEQ󎭄&P_zgetl퇼Pck 3!RAg?AM Y9T僥v%•ݤf#C.+:/=5K)W5>x}5y+jѓ ]*n1dg-|$yXRi'}V^oddn'̬rK50 ,=2扩揽;xBs-ܬ{S wyTv wX) (=  CXH ~t+TKЏHB.DspNyc J?vU9l~ zR89.gYd!\! 81:gK~>@.fx[j~`O34?IUA5{<׮A'@׊Cc-, P_k;ӆQ:%i(sn+-}JLiʃoy嶷kE/dKy~ܯ 3I%[ky >@,+d࢖̰m>iFؖx-Wiܷq9٘?6jw11ΗPW";/qWuIԢqX>M4x7]Gzۡ~"QNHE{zs*K%Q(wbHSc"K@7s,\5oH;n9XAgi7VF.y6WC~m@LH.Y3KG$%&j >גerD7x$:XЩfVSSϴêyK_h3b~K\U_# +;nS`@#RCruiYeZDN)~pmD` cY&FR1+Sq[P?Phv# uZ0^xN;\MSeV,v]W,9M3*UcBsPu&>HZNľ)Jɬ^1rf+眕YH3YZͫ]KC)|v 8XeRcL.!@kX.%Xr`7/ zyAPݓ;JsD\ߟ?:v7*w fe=R玩oh[^I1xlLl]NA;N. %W< .z 3aOu?** !Ēi{ej^g\:Yd?ÎZ tW@wN); O/,[A>':ݥkq[g'-Ozג8yr JA]$NOL"@k䁯fFY:D*I^.$5OĆƿob;flas1DҝژT V`l˳?~Ba;\۽lSr't2ټE)DkQDղƾZ+܊fSŲ١S[Ǭ[rxɴlXgCDQE/GUo*:UXWavXPc>B,^>0_*?6Ilg5;)#ʍfwm%uh;tU-;d'˂r[B%i6%^W>3H"kO3vjx4Dwo+ ꮃv<勞.MQv6vl} +.SM\%tVq ^w=avK!gr{k.NC{KK͘*iڔi-C"oCd U5C SL|ũ7ǐ^ `2[2x<A&JFt/Ϧ^Ja(|#ljנ3ri׎!]Fg Tv~ls4}֧H$|?2+SYO31/(lճf05w%łCT:dպo'W+CsF隦ϘLv+p=p?n*D+u^R_.oK=*yǩpB bK6qC5k:(.H-1!:&뽹[:nsbė1w'!@#~m#+d,ľI"Ih˖2 wr㚐9ÜQyrPӨ .u2~q14WvVgRgFW5_,kz@EL:ӱboQ:6Ga0[ E4ObD6lJ熀V$ûY? WHA?b3{·>zA um2#yIu%0šCpTVX'dPx=C_Y)ٻy\_yt#u(a1;꽕6Un : $ށ K UJvc&J5rU?(%bXokOn 7\ w%nzXA|qi3'zEDįؚcѸ ٌhu+˧}˕#!4\,Uو:"SUyW;EYN{S]y s:xGOmѼ>zw mPcB;xqekp!+~/XS[_U )ulR96>/ ҝʮ߹IHC=@!|'a0~yzo_EO%AC p.n7LABdˑnU%#TSD?VԬ^?BQos|-/fRBF+o?X`wշ90/Qy.BMlZt#o2ow ^imvX` Q601_>t&?y%ED_z\*?+iI-i˓59֍9[REpQ:'fPu >"}_ x ;ӊ ?"N9ֿLJ+f%>ǗQ\p*xfqGϕ+oprlIԂMrf3q!6 "nM!ZH{.Zo[_i%4 {9x\ߚ;A W(6GX9 ^.ɐPݲ$BW:* m #(]ݴ}ߝi;v2JHy?9ċM{[`8eͶǯ9DC y_L9*S7Ƒ[<d__'F}[/I' *DWB])tI -ɢɪln3PȓN~罊tŰ1P>~02;Dnmċr7}1BKCߠvI>չ5ͷ#? {" nmnDu1 uH,(wrT;xPEQ<$,"Hx uTiX]8-X(+݄fpQ, j5Xkf硻?۬Qc+M]ojS#4tf% *i ㊧vvƮ5.Ygahvpm!]iY_g#z`g@4o=?2q }}K*e7C'k7w>/)WET9}{@ƕFc "{b DVu{hWTǁ*gDVŽ3"`Ws_$2Rlq IG!4d="%-68_uBH/A`tF_*60ܘ4x[T9H}Ӷ%I{^'J_c;'.ӄ@$'-Ɠ3n`sQοL8A.!Tҝ[[+bu}Eטi>s#N4YDMx9CDݵ M\6m՝Z=!рm1Uf$V' $}+ɺqc-1!5q?nG,k'SN`F8-HFr"&9J|eu$DMq&>iۃR>R7,}ӓv1~p dV&=9|Q\%"uRҝ%Th\կ7(7|i^m|sGtMVYjGD%g(U zRx=LJ=](\ rhG./O^r,q,}"K/;?u/S2/{9HCl+eï<o ΁y@įݰ`U5Q ])mD=A$ h%GlJN?~[(('ηgtla/?!!w/gs7gyd3hT,UHiwD.M sC@ćK -,Kr vb] sWë _U?{wo)J|#WMPQAN\2 R m%t7AKeצ&R?Μ?OMr* ,>oYK"hS&Լ48 mK!Xf`M + vLیm}39Nt1>Qra\j<xk N|vjHƆ >,^'d%)/iŁJlp`O3#KELCnWlHKX]o96{aҾ2D3?gں6~{abv8Ѣ]ΌfҁGOG'uD*:r̪g'j꾇 +Ǚ7Z#~|?s22_o Z 6ˏm3"2V!^S1]ת~xtӞ XKb89*Qv.P$ktV[qER/?,fk /Mp )]dwtܚ> \nhHW/l<XN^2b/і$M;wI *\Ow?zw#NM5]︡:}LJ=aYS_mX ?z~[~ڂGmTV̶ tۢXEK߂»:Gy;Q:AC̛.󏌺"/VMԴP@wڊw9X ı<14j H4: G.:X$i cTU0Qrà_bD7)cq?#tzahp~Bpnq]46RԄs]пkNyZ D9fL~pZX;H|޹kz˜1ٱuӤa>|:]DV]n"dJM ɷ$\u?=GWZؙW={O9/ U/oWЀ_G]Āa0 x(Κw햬]<Fu!nCUci=DH߸XP-e?F&e k*! |ԮЇEmTDDsJxc'?mm)S*mٮoYY-M/I,\}%,{It?Ϩ(m =d~5Gƅх#jAv'K7izh q`_4ߴcfI ڋ_J_RX7 L9 {qY{{Z|US9T|ٷrx CLowiDk;Nxb;_i|OA8Aϱ-J`GwDT'~Q_SλY~ρסOec{<:x^~Coa|nԭq5*x$;ú,F(R dr{(ENP!UкѷmR%p"`ѽ5hprĄzG/J77YkDzEWۗXUOvUKI]ůK*qn홫6\/lRgY{v󓼿:|ܒ`gݐŖiss5y0 aeĽXPSLJJB07<!jҍ:[+k=j+#\>o1ϵ.IL!9g^'*Md*j<6]:ٯH9߶7a%-EߚE V!ɚoC:=AX0Y1ℍlA38l *asSJٹQYq.=.A T)k!2,Y:|norSvd,#7a)yh?ލSbڔO 6 Q [\.;?:%ſ&1;+q`‫g s ~X|NPA,u6+&JkV˥Aq>\5-1V0XX\Qlw:]lw?NϿuu=qe7S[`uU|m >;:Vrdu> 5Z)@l~Ҿӿ hZ%\piC'pC'Q27X)CNWҴ& ɨ)lFy c;_# $_usMi1]Űs_?$}npQf>@$*]ٯv{i8nq(FFbc(JJ&4zۚ/afhS-ԻeRgN -q}okIJ{yg2:= M;/M0F4j=y}xKڠ#m4kT?4xQiu(kqP~jvb_/Wk7 zުZ%I3׿M2ICWܘgA%0;az+;j/4 ( J\^c!IpqlA:.+v?7\2upm(!dc)xT#jL+t (!;oRx=ywʃƤk&ey;7sFd{e=R|R޷vr KSÍ;פ;v,y(pOA)?,^mTiilekl/p1^ `%;,Aed/|,^HӔw]ϭR%Sf⾖EK%y-31qrme[-Kc"ݧCת~ ےN^VӇ/dn$,5]3#!&l˨YяGr#*©.&XcMgWcWYV}_MgJ\)-_ipYgڣje(U(3OTZ)YTWJoƯ]Ur&:^IKLVzTՠ?|!4:ʨ>#.c<3CG*N:<}ԨnG'{AP oWDϒ9o]@/!O>x uj[L 1W [ϣ滎uBa5N6C??o~(] Z̉X=vc=DQַ#B&b_rKIRDCJF rƀ/ oZ)f-9L'd_^%GʪZ[ݓ[@*y HKyY6tCX$oަ~~!qLk,oD3O}UfP&qHlt[qKJXr#bt[G_/߿OT'ܓAk);k0t | ES? ?U>iWn>!,taT+{WR7x\uHcufPjQAtդݦQ#>]7طn+ zE+M1vu;n6#}2Yy,L& ynY;dF=Pm[n8T"hH˂u, nY%]T&wŁ#xp!D])$'G‘|G=x]CͯtҀ]A{EdgVG/jᴤlLDL(~.~t R 0vymz쑀4BV*].n_׭⺾"6s\J}ưߎx%0t ~6[t?>dQC,VvS OQ%Dks:WmT3 P}[7ٗ rJ~gF>K*cYʹ0ؔB\h/lIRbP?_r+{"no;d(BQ9ĺG{>(Υ._Sлj'gRMO_f.xxl}^}~&ԽJ?F:th!j=;~ &R1=!J8N^NB9s<[0ЃE lz ||Iljt*' :a:o8 9.1I? '.4c_N DhcR̰zoEId¾*]1$CzNCޚW>j-l*s&^NzRDz Tr}U"*H_aT]O\v)׵N1D/9CF)Be=y%L:gv>/ j.%W%(-yK+ꌬUvoЛH,[}|gX7^K);"iI;>Ox)Ơ}r8^f7e;}ɋQ#sTAkw6}ɅՈ(tn1t~+z Qne)že04jVȔ>D'(ɑ?boޅ(ߏŧPc3Ӆ @'xP wKQ+go*c}ucxѱ2Y_/2_K^橉(R7N&IB/1Q1gh >O -,?v7Z59.<{/庘RN;٥fɤb tx+܄{ɔϪv2w~!5lw/F5ic`B[yY>VB.̢ױXro{b3-("c*{F?Zcu &.D(n^w:f3Y\㞄X?FBKGaR'ix+nJ4y(TQ{tobeYzs9~$ec\hJ9)FeAE/ԖI2M<{#βC _h;g,H0^w+fgD>5~וUɨ"8ӊ@F&RyY)t!+}S䭴3n)3x8ys%m,mVi iiC٘>+ oI]i{V'-2E#t%c#a3>؅72l`h;Gowkzwka\% kwOp4 6vHν6ЄZ7 6,QGZ![ѧ mZj]Ż01tbPQ^<3&_Q/J&I!4Z(  UkQ\PS9Vm%tcөWjӨs#;IHBr0f5j  ,]2)~oo:~('[cint(pn@_2\7?ETAU(sCR[ Z4oqcRQ$:VaFȋ6[Qpch ~7Do0́[\AɁCSMIfw#h璵|'k= b4Q]HBvV1Cgx6EM|-?''v4~'J@ j8%em>W7r-{JMo#VSjqln~_psd{ 'ޞnoTKk?3h""-@TܒA]/ԏ~-kcg3U_sUqjtm1e|4`<2GӰ5J,j8Ϸ  )dSyjic?Vs>e О]2<)fժXj j9.$aA:BiwI)w{_$lK|?f0h] cgy),n4VXvu5l?٧U?R{Ӭ{ily _jB˭S~-︺U*.." .'tpnMb.rPcܬYC.˻1uyAd.9!Ѽ94oYC$9}uy.oQWRf[c/|5"ǻ&-v Am`EDkcGL7Y$$X:~`R2bۊHg;\èv3-Z(+Lw/CU0۸^5,\'zDžzsCɛ7z43zȔz>$8:t8q)!CvĨQE.(dn^AI(5BA) LhH;2zHmKp޿"_IkU˳A /ċ&4@ SUr)bhNQ73Fc [Ns0FJDC"DkcWi eOAscǁED#ċngQKA.KF }5bxAy-SmW;ЧMTmS ku}5LZ<Ȃ  *S:;rQnīk̤Cнɹ L$ ) Ra)mzSZm֩C9E jvm8׺ʾ ީ ڳ,yK.+5ob-3O.HR3;Ok*Vm)$_N۱@x#ٍY$R3J4@}kUfCx{)n@yYo鴨"GӾBO#,%HӘ e $h$ WRAafԇxˀ<70Q6b*3WU'Jp :t^ΖIrr?M&V.SDO oh~<ׅ}gQG6Dʅւ_#=%!A$-yr!!PwvcVz#un[[r:$8m "ipfno6'.G7z$=6!-a_$4$9St7vkH+cF»ȅ p-%ޫmRv/C |i"摤i5(XsoibQzd ρyOCߝlG*I\Nh{W7~u}"+M-V+HK%m,7CCC[f|ƶuRc 2o"'K`­3UY#Tы03`F!lQF9"Bp="KDtՆsB|N{'㤌$8ds'9Xwy .Jibp n1 YEԜx+>r7VϡB "k)mTa׵6F: vf̨@d<9)Fi^ryPޢOhSmW;j4/~ţPvXe6JT" Pj>DC)AZ若P ܜk,)xJ Bwaz*Wϲ.tvl 5/$D?H"Nk<=מ6~t'xzq"#]Qx^2$;nx8I6*{%Qǻ6 uriN b䎍 sUxC?\E7_@aFw8(ag:ۉelOD C)^ThE~rEh>c~GNؿ\;}k7b(Ɩ_ǚnڹw{Vj"MBpm Jݳ 8f3i~A%:90r 7h0=4[c6"b*;^x1ԦS;ǽ26u L"+Kz۫( =Q3E%aM) c?ڏ & vhUU΂p]qj=/3υ{ Wi<7V- Xw$eYۏ^ʼmA ƪZ{yAi.&dQo zRrœ(@ɣRi)$ 44J9Zbaԧk :— td h%L af] 0@<{$/֕~ul?ږ: mԥ7c^0)$!q> g,I.ejP3A, D6C ZijBP{biG[ssch"ǟ;3kVj;h;MoϨĺZFrƥ@S\BLõI稚Ĩth .*!]i/64,2-eӨI pN{cõy?ơEiԺǙ! ĒŁCUcc8˯|{~0{@wVmP= 777 9Ye ; 9D4/w \y23 NLoXS,UMF/{pE,M$£";PB('Y=5Wx?2Q \׍]rjΤ'Pft"(@>l ()zXh ,&Ǡ7>H`l {Dԝͧrribf33=p0U02c R^i-dMepP9o] EC5N#,tg9S,'*yIAW*Wɶ5q|3KKmcG&+|HV *qWU7sYy"[AX @՞O,$9P`fʓPddq|5HS4y#ό:/]DzeMp(VBݎ+m0#Y$z>8 cFprQF8Uǻ(?u2' KX[Nk"#Vj(w.i)6eqM2@]@w b?Kt@N(VɋMhAwnL%J6xR G!5x4K̺dzn{.5!!@VfG"CNs'D0]3%A\!= a?T#?yN-ƣ!EUXzhx*s۲VR[ͼذmO6d+KDi`zuh`TF+PFZݒYȦ?b X{ 1E羬U?{V@K(d2_,U1NvD/VR9Hcız ʔ|%9 " `XaIG݆yP$@DI}?[?ョ{nf_~K~QMu&{/J=)2 DkRa] utExO[eX[]A T006aK"A#ܷbh;bYgQqyE_W7y* JHhG P쾅;WAt?M"Q DAS C 2mxo+u !nKj;ӧ4T"r<GOOGX_$={Fc.8a[Jrdh@N`:/~;u!n婅i s :$su[,<2`4u)[;J&m08!q7Aa? ˕Qe+" ) #Kv`_n(tVu.Z#?Ϋ_f۠#EXx`ļ@́Ut"6qn;R Go#ӑ[FOFUzQϐ D<,POr=w=v }Nj-57S,j6~T7 A6<~nJٌ-Zi׬X+jnqj6.8f{?[_"7pac:*:zq4i6&iWCg$ʩZ XzD"̣:AhVpIbi —q0"ل7a︂'xnt!n3?}Tdy3{'LʠJ7G_"á49MvNrp`P'7("t OJgmaaˀ[I~6( asKQ@К`d{EV`&(7' tZ)R}'LaF"5ڠ(qn(G%ף a&lZ#|QVk*rXWu{FFS?:u%S)T,Hl}BvˎjlVJh=˓Vp*܉+3N'ɋJ T%ucڹJ ~"ԯ=tنѰ*T0bX܅4[vnLV3'Snõ1u򟍗thUߤ"*I>+TūIR_hʌY`#ɻB<&(E,K$%"}P`kH?6ID҃U^fNـWM;zH6_aiӜu"GG`rl} EȞ #录eA%`|@!F,`*,w =sաG^ZX4SS/CYtpOa+x{_{!qX>7Ix N#cHzGb'l K4vY*'lXP/s;ue_cvo`u  ?>ɶSֈBt]/uͳd-br VfUS[{K8cK\|'F#(A/Y=>d=IR!0WNm6_6bZbDr]{}m[/ .kl'#i3p~wgM367 0~JNU{-#1 \>Y!zs Lcֿ5c| Z_yCS2')gmjՑWѩ$0諪(k]OA/*j@sQ}ol"^H Gʠz,9473nRv>$"P?9,zR)~| tdYT@"FNV ewxP44_k'c]xrpn|5lCK6[evM,SyEKHhH!*n%Un1ގ.ÍHɨ9އl-|eAsiE@%.zK)e+E,j 4n=c >\2=S9ֵ&u`o\vg4#$ H{'8/ctf.hJeAK9Wm' }U|,UɠV8D US$rjFlמ" g$!CǠCL_@PFZE͒$j.bFgR׶Z!Zm@CQET}_[VD-5 l W{Q2z)ݑ~=NMLnS/Iע_67grlo-q}j:ʓ%vtxoJflkKmnj N$ p+bmVhJMID8xsMzD3$ThQϩ+( 2,>v.}edKBR H e,&etmK}f~bxΎHh_RR>EUC~C/ٯDg f ?2uZ8>dž7z+?u\԰P>X.ޫql!D99_u}V>4#y zALq -0D+tXYGL`xVoKr6;_ada8b!e#(kkw zLXBF;Ol 1فq}Hj =5EKٯ H>)I:t}|P70Qxcp7IDɟ9 @@_{[rN(36JsDt#VZq_:& 4R7AxV(|#y>u.MϺrA:pt$k2oА40FD6;1 Qe a+͂nBOLkwsu>Iu\]z?V;}M G6:p{9Y}ǸK*b="b!k!mb\Cd6s~L?qmq=v_  J7OҖI]-1?ӹHwqi_E3vB Keaop($Ve9ͦ8Fksc+8i3MG1萋/[֏dNYvPvny#MҤ R n-[yO&BqI8H MN2vڻnzBl`|&E_NK"Ӊ,Xҕxg3G[1 g,н)9^%-dp0*t8B ݦ.=</K*BgQyX@2c@~3Lt,P :`K Y&9ҌI@wT"L:n/tc]>zHshs8pڤ;5ߣsV]ÚVPVlu Lv/1s!<T|ⴘ>NuAH{~8 y]mS\TPm~뙁JU9/B`3#i1!ăQjV5( 'Q dAU#)-[&O˿.lgX0lCe_f۱X&3,$"->qa Qݠqo9Qo+U#qK ˊ8 VR1 B'R/b| LNNLqE0 _Li{r(Vi~QQkAB_YENgmtU!~5kY:ƕ9;;&< V=aTG;]0 IЦּJOOeRЂgV`E(mnDpf{t'}=5o +'P  9ij CH%f`3K:@o g\xG^35k\vVs<26yhv6:[7w:suC??!AIyyp.*P>HHB,i8>8|KVݕ F85tn0-X xI(k2톕݂7/\S_4ܚ!(E8&El+t;[ەc>vqV3drC7]f1/j;3[dseQ05Bc`*bW'X$&*$:!ss#|ɸ60+ËN?'[)Yzԙe4U?aRb3*x݃M9?"A:U^UG#k^Ox(5Q?T~ׂ];9r= W[ztJ/]mCa= \{=GTj]^q:j6QCˊtDXYLǁڏ6t',1X]u;q20섋 Y~a@)nlY=¡_y}>,3"); 竤]+ϗdc v.K5,}%< Z-X i&>|I0۩YGlwC-D gE!s$e+:IT/uu}~&ŠU݀ӕy"WuEB-,_զ J]o294'BL7KcG)1JӄJ`ƐR;@H Fwgc$YUO*p oGuÔ?]@ɨ> Cg9A#X$׉ԇ:<$d_ֽPL'JUJ•>hC@jr|W0Gs[vVTF#Ֆֲ{nuE~?qM$lIYeg_| !y_^Zb(n]X F= M=E0\:VDWvbSCoN>ﰐAOsW.wŵθ>1}EQwENL/4H(ˢ ~.Ȳ.R'/C`];uCS_v)Wg<ȼZ$z kܔ`4,4[RD=e/L K߈7V ݤ]i@O,R9J(S (l%z O \pm6o!bk /ZoGQ9{9_;x<@Kj9m?.Kπ, n3屇Dz&2)F=޳UG8xNT|H,P\߼ei]?^Ҳ8=&,s>q|L$EnԆv?UMb~r3G<L!m iAQ(8J>aNC8QdviU2Vq]7$>zq}t"ޏa(~o>;v ƀ rT8y`/M+XnZߧgjA-CބCz!̿貰tw fNqK=ǔd={rf!)*9Y;*,!zkwoj %a/!8hU<"xԔ˺F2g?z~!s#-J>rgKnyPWYm43g0[amfKDyoWqV7}]𭪾J5k> s~,1 w,@_bwg4T&"먚9>YnUGm}ȡƠrh`g|<ԓO|JEW=].i ΁u՞N?/$--*fޅ:ye%?gTOFݨW(2[BCvv0(YSUsu(U.}[=IG-z佾wѓ[@]!:h6Umӊ@$~Ň@u&hЁ1-# }f}_wݲ`ƳT9#xwiF'__U"DЫoS T efNvF]OX7}Q1}_nBakr악+/@(:0`7A:!NŴguG zi`_Nu!~nJ3RSg df`4al#=B(xZѼKb{o.td_%>օT͢R~Uiis?zUrUם 2Q 1ԋmt5ur6=PtERivnEMx>xAlak']a+rQI: B5d'}Ǎޡ\ J4\i\W#tcceݕ|rTښ>N7lO&i8li֒m?L֗:V;0@:Y>;ڋJ^Zm7.9A{H!:-)5^fY(}efsw٢i1~P\ܐ *r)nw+Y >}ޚ[k0ՆBX~oVT?.=;'J?RG띬ʺ7F4⺶Nn _1stt+++(>)ڈn?a m&Ӧo:m&^/')'>PHto!^PҰ@y 9'CǗ9_{/gfhFn.>eڰP)|K:g/$pSOkߛ&Z#:G `_!QFyATS7?E}-KoJcG/E뢀@3VL͠6`fV27E?=Oٖ*d嬰f#v&/$ũcsJVu*3`J\ YđEջcf?ȲgCOypК_vv5,.yWGm/AWw~M( 7 d\Z i*o~'8KjI|۠jܻ=U|[GxʯOlab"/e,O l104&\(H S%@0}&ŶgGI+}FZi):P[0]UſvU5F2WUbk1"?yNH0>fFZTzڹ)åއb|e%-R:OWd^ y|!!3ԭ}+>+ _S0 *F WU$X rQGig wLnMI{^lGr%JRǤ,ʚM@SF/MhB׃V„bWg\{V͡86GA^]Dud?k#"KKלRYͷmgEzm ߕ5s"5<>Ӑٲ=ޝJ]hC C@XVHӽ4!:t IJ.]pzP'4+/Y5gb~k2y~ q3"PU3_ 67*buIzNMX+,~Ehuݟi_\,M.;tȮC2:2ͯbx}ϟuwϊk%{?E".Avh  _1/U/rhB#-]:5?Dz%c^tKb8|Uq^ R3\Zvk 'Hw$kW`9q?UhՒQd= 3J3ʳ_[3IL^?fzӴkɏo)1~yP˽wC͞ U2&+]Jsye`~s85|Qq_2RAIk8 -)g21 sAr WT7T.03kj9Nf ojvJ#`sֿ lƲy٩Sp [z |hj%8i|7UM4pT͎T?/7f:gaX9 ޔpb;Rn=j}uֳ4 V*pB-q5yA2HG{Lw w3V9}[{IļO2J@?Rb, kx"~L~c6nn&.~uSV{ߢjƷF`iUWRCa3N; a7GN׭jZ,t ״7hǟˢv?/MffyũR-𥇻Η -zT2^Q{*`9{ '+;~j 氿EW(N~UJlu썿Rt]Lk\L)u2gwVjE#X[XR'%}RqRѯkcPJRKZ:]{);3xCğf;&] Uk w;jRJt *~u9}^t=B1#rb>Z?Y`P VF17-ɻ<-4|:l-uݡESuZAܲn ԴMixL,djd!P T WaL|}|=  ;Z`P}_] vNyS#~6y䟂Ef[/;,)󸇡Ǜʶ;-ģoSSZl\)p:x3f!pœ#ދ^ElX=/7OrÕFEhu=$b;lgφ N{ւ@/{^Ɨf]Zw{ߝU9nmVC'c-y"ݘ0-Vl qO"\%fɝPٝD9ʠsBr gg썭a %m v$7v yq4u 'MGKDMG +BM(>P_I0U⨗FQWd@SNـ>/V_z6>\~ YҨȃN T =X9"i !3z#`9iz .۠Nk}@Q2 VT'!MS="ݑm3/jk=Q͂v}>3 2aoE^`N#BH-Js3F.hQɬ# ?ɦ^~/I޲U]-Tu@+_w|n#S]?xd?sv*5sh@70jL]Ȇgy]ԑQ0- |?bx=*6.B۲# mK?zC`Asqs=~98ߺ:;zB+LB2{]c ?"5M0Ahѡ[D2)2WeG3~@c_t:[w}pc,쿿pS58u{)^hlQ/膫`;VdyƹP6iJncB1(U%"kBǁ)ҢOD4BIsc XnAoZBJ{Mr!:L?HM=cpgI~LhEr:7gBVT()S> j# 0ex9&́cOm|-Ѯa' ClJtAMךB0v.-/c,$LRB8:TÂ_ TL:ZD ĻrrNe?\$4O;W2 hnsLɴ6o=Z9.AY ?lބS/l"̈J#ơȣ$ JHﮭaJr#0X\_1S3N%MMBUH-fܗ\ZGbN3I< G;8!Q{|/j_P#mك6Q}˷d?hA4r0k щ:yǁxc|p᥆g)aXή G'nKmra`w=? zM+o'EZXUk'M]FCK/C]^,tN!I]{"ˠ(HMlOjBKj;OPxJ6,L~[*|?f5Dbon#N4 )aN4WTr:cR8鼶WʵWnGzVrvi!okzjǠeėC]ѲyT3F$Ħ eH$oSa[&aꗚ#Hyܧ%2<&"qWOՓ-}RZT^Mx4/|IFˀ?s"9JAk 1mnЦLMC[~x"S[});}"}#VMݝWĮfVأoJ\LC>#p!A tw}6ج-&UB t qg|ir{u x|**;y'P9vZd*w`R}>7X8J뮭ӳMt<7b]ڹ9E?X v ID?`E(c0~irI]y"]'F~ x_}(ZOҕ GP*8}Wz&VWWX= b IK}P=2GyւQs?&BDC-.a7tzc8#*52j,G{^{kD@ˬ^k{lqCPhc>|R/]*բnyPEL4j=Dɼbg߲r!ohp[i-c( 4B}Q^`/E)8j{ pyI! r"(̣?.TPLOh16p1" 9~?V@"#] gy xOsZhw 7}G| jxGj?MݐY-A$zlG խ%gӣo^Uj>lEWa7:N~:ACoS?Gj>wʼW1~LJXO.4_u_Y8禛_l{#@{n7]`<7*D~@Cd"AP_W0St "9 2YyU +s]CwA\\?/E/h UA@0ϗ^{c=:#2 Ç4p2MjJ[jTGCUTݞu]7 _jo;ͦ2Aoy%d KX}%E'fMk(}3q*XJHlXs<^ͪJ+$?iG@139NNyzjw>+H)DlRMUP-.T|iGo 5UA&KbTq7;bǜդڑTo߿VkĠ(>jk,Sk" OWcA<_ zVGݘI(BVho(1Ϙ/t@yWei <:X e:coݾdXᄴИTymD8;Ω>䠾KGQ_V62q'^kXxg73:Wo "ng px:>uWl|(uޯ: pT2qrڇOLmpXTPvHOB d;чبbqY'[[VLNx0 L`8[ikA[]3D N`UYv՞*}1,P{KeR[Oq}4NaS(}5>\wA,[xY7^qsCulCObMgywuYp,_IK'yCW-ƾ1=A}~[81tcЧPUCz ?4gQ Zz>J[^F?b(!lSOp6p!Dv6I]~juŹ=*>!@p|7\NS㮇j`Z%(ܯ(pN<1a0ߗ'PpG$01q!b07N1CIIMOC9~Z x~lnUu+s2Na7w*t8{_ˆ{7_: $HgYCgS%SMU6Z:]g!zsx?kv8?QPCl KWٮ`c7T A ݯ_cag =YKl]x]v3CÀef Ubu>ߜmzxv= ߸``5%zᾧ ׿}SEQΖ;,/NfAP>y@33w*Slis련Qs'P oi;==3Kcrd(ՒD9afϿ-XQX꿮KV֣sXX:\=kq%׭ڭT_A=2_o@>]қ~2R*$;3YqYzHp^M 2qU}>2ys~\e6'q.0T޸<SUxh]E2" x܉i<:% kɵA"ԸœIpEu[z&VXC^ Sn Ě)h{~AQ?s/(SQNrjtU$=K XcRsXLJRER{v_Сx5s#qy#l[867lWejݴ$tUALҾP<™慏䯩7j=0(!M^u bŃ$v)Z65Yk Řo}aYeRukVw:|eW=!`W̨R5?ԦEn}Wf[5vI FT|VgAܼjX9:nIM<#c}r}&@lvsl`4>=V|Y|NA#&Bkvÿmw#,Յ|9YgRU_ZMxb-shyK\3 ]կ PjD758_PV?{m͢hCquR 9΂EAiofџ,ܺ @82$`p'GJSuXTmbSuMj V[2̘0(-.^=fESiBp1cgU&7ai\ȐQ vڛ8 L:^ Ȗf/I n<? כhrҰD3yW2m{]5IafX5gmi6(1dT&MP a!: M_J>ߟG;<q@Ok K%@@> ~Ud?@ pi+;.LCm ˨-Lr;zꃘi<7io9-A>"5l;.!h8ҥ # E )JlVj1n Ut[S,"DgʨXVur7,-~ #=Sq >gjw5^HY*LIx.1%'TtbJ O ;a#>Cb INf ۻq# M}TRODD@@eEOA4S30  |˅UpQZkٽխjxrAʎd} y0* ""ė[2!haQL"ã1 3kȳR2`}ގfYhZN|+G#vw~G5={=Hzz)V0=1Cvü'eM$XQ Zw)JiDi_haqHgxpU[=GJ4J`Rɘ?ST"{/泼N1l\=[U9? {Э(: d0dFt(ӨKMR;9zmHl7:݋/LĀz0p-AT/sJ1+ZRmJ1WQZ9#k; [k.ȟ~5T^{aeKWڢh cST':_c ~t.[Smp@K PR$*Qw.'@NLjD~G}5VU<>f4, .x M=C MT_m;3Dj 1Y-TԖxx:J?WkNEضl t6W[3.GxR]KYA>:n>t* -x`7NZkUn E@,=1(9 o7Z"?͔x:( n;ŠÃCgOŠ}ZYlv6 kZ輻P-r\P1T<\-m's萮\X GtHsm#A*ɪF2fJ;aITWfA:[(TЛO"UխǩV;GCYה:OYeSW 5n:SVlJYM S 'A!DA$F'N9`MQia/Jqwb|p!i} P5c)=%niػ{"(N2&$V?^5 "z BT ~^='~yʋ=|;{|}}>]F|e +-&M]qԪ&3-%*P `ѐ37E=Ϟ? 4J]_PK-7;4 lM'TԎeNSGŷmܹ .:#~|eX25u)CmS+ȈȤ+v><~UWdF4%"UƚШg?ż6-Iq_O K[k#Ќv!y]N¥;aȰ-/jך3m) ,֏=H0j,Bs oWXdRvZ`hDkXpIv2c$U/gwIr0_ } Rt߃~ٺniQ26581奆Kv-71_@hg2kyùQ!j'%{Oؗio⚞E DlJ Ι8ܵL 4 K7XZc\&`}pnF`+uJ[KpT>e?F7>LCY y osn~4 DV52Xxc\kht,)"~ue6|+1c\ԭKBV Gof̔a<^M}0EomQYȱ=H.AHt e_F!/\yIn2$IKH>.J  k;'y.YHJ!p; ,I:]QU&ʒM5}R#ԇfl:~-izxLVтI:FP@؝^s>cjr?Pmtz*YYƶ[|[H&Pļ J`W{iZ~셥 GE\zkU t>LkLʚEֹ|USZR3'ׅjQ l=t_}<@ I>e>DF\yHKd)3V<|*Qk֡d;P%ҁTS!*8iIT8Z{+Ԝ^cĴ hq4Z!h)L9 Du܌ qNmu:s>! ^z;GUI(]hP|G=G8~1#@51T}Lhc'jiebIE!Q)1TjjݴFU@4"1d<^U5 ɘu|^U{1RVΜڗߩmQ1U!؄zؑ(Y>*+g1ˮV, rY>ƀZH*T:ZJf]sγ Fel5dxp 5.GD"ɇ&?J^u,ن)[ v-$jw@#4ք">g-l{ CN4xe`dI]EiRFv%TCnbQQVL6 0V(M>buc.Fa'{Bp2-K-US$h"G0]'>mLdO SPn'r7dϒӢHǭN"L4vZ"* u%5t'/Pߕ>=ŘEwI2B\:Be{FcupM' F~VR‡- DrIb$*UBe<'\7Kv{meآAI?σcRTFeLxoɟ*s:qT $F{(Q E1sX} Ånwʁ|d^A+V|Wl^<OPǼxG]1dw|<DUM{ʿtz`-F,•.frDL6,緣S5/“MW5(ch4"CtYFTGkq 8/I滤Xe)J?ԪF؃*!EJHʗ%ީ!ku9aL2rW4aW|Ho!fM1ScjPJ'VD.Tb=&%10L)ߙwS^Mh)tIWw\;uO[^_#(h-,dE6(ƲcF`-:1FŊh#lI%FhEEQԖ$eF6ƱlEۛr҂ b"IdP1DlQDY @b#h(XJZ?lWQ4"5FF& m2nc` 6f,0QH1c5" 5&E󦰁F&LQ_.IINbE&-"IFH2D$ iL 4жGi,Q\QFQ'ŌIQ,fEI%$C S*,A"(dm|pl(7ƹbɍd6Y5m&hƣ${Ty9Outl$Q(1VL6JawqHLK1c$b&!"$V-#!&),Dbĉd`hnk$b15AAb[$bH&hHIF6*}>^>Ѭd6{hTY1`L"I1WwXت6TE6! Z(Iw)3d MEZ*A+k,54Q`P1F"> E-cQb1W I a(! i4i`"DV6KQ0(AN-F'R 9.SBHNj~71Qh!BZ JMhcA%0nlla5%$`* j"H 2ĕmhi1$ڊ h-&FuA`#rf&#h#PA$hJr14`d*"74LƂwvCVJ0b$Q cy1` be~J" 4I܀1h#hMsY *">:SI]okP1Rj"*@j@Ѣ-` &4EQM1;@44 IIhfs T+%Ab"D,Y4$ 1FkEj0$)ݿirb( /a%%2XQJ櫐QIآI5ܯwlFBKbKDFƒu,-Ӯb (6bf cDlQ FYML$&"2b ~=v1֓?^\1 1}`WwF1&P;bdb1(4HMIm}P.S}_.+,x󷸅  {:dX?8=z~ӡI^Z+Ns2ĸ^NBi>eLE5؃DAF&S60Qck&lp&*KC$ b Ff4L؊ڈ+%beY QTmhXd2Ŕ446ט$ɋF#b6X! P˝"61cX #E)V$đ(F4_X52(X,kEhƊ [r`R!Aj(2Fl6IflhA!Qhcj)# ؊ɍc[ 1"bMҕQfdmZ1ьZeH;qa(QDLl}΢)IPDT +()""yĆ6"(f"lQE3cEbM}.<5 aLCt۲#1c1hEmC6&bj IQD_QlZ(Ѱb6lj0llb52,c!2$3&b7ӻ͓H Kc${a(6y1(rQF5& 6!IddV XFHEDQ!ED6%lLe)b$%"1Bk Kb"3#j \HFL"Kd0O'Uw¸I;ג/]9vRk2`K~2(v9A1Lĕ>{׷u竲f3rMTi FD P\Ӵ2"G\**hƽ(߅HHh*¹\v3qoW5ڋIn ,`,X3djMAi4V Ph ~#5҈uII*Sl,1b*J4XIݮbſ EjW4hM>w *Knn^\bRc$0XK&ш*4#A(y1! 6Hܹ4h#EbF a1!ECҥ .lDc)k%VL[&1cFF*lclmZ*oh֌AdF1- 9&ؠ4kˉGʼLV&QXIDY4Q6*EX+]ݙN1dN25p4XQ IPQhh1"XѠۚ(Y1n=nIcD6 Ib$eQ!&7Xш&eF16Id11 F!Ԗ ΃i*2kF6!\b$'8%4EJ>;ۯׁNp'nj(+%oviMypHXh(ƘE_~ib0S5&EhܲmkƌlZqflk椂b61XRPRZ(SQ*9IHT^A20(6f1痌f23F"IQFDTcD/ut"+cXB"bQBlң@SNiiwg6E+slMǙ4tYֳ}>D$b 1J`Ѳ\hBr9 0;IuO㨰C:#?_ʥ9$H "|lf%T*7mS]?G[\JT;\**|J[B2ݠnuwK#0Y"DsG7:|+CY?Q@!G#LǟSE%p'i&П(ɲ.DL(݌2 nvXʯu˕9kTcMӻftQDtބD9g"f>Jx;0S"KsaFH!E1<F"@F:-f*-J#[8RG1zF{b/8JWsZ 86/g)we.9c'&f`CkNt}+h_D3퐛1Oo;9q2|n-Rd3zg̀7n}TQ 8> eJlcr_iTу1y?gz7) ̖{(T*K JRCb5хүz?eݮ#]-dAEp Θ`aH&QTe>y݀Epsi-\^eab;G4Ӛ H{նA3yCD ]"S嘒ʋ LJwUJra Z n*u/k^-|)p*Oj{I Y_%TU̱̮Pr;x5, }M`Լj拶b`鷸9"+ ]#A~{vt@ D F#["&m؂L}+ԭá0t5;6Y"gO"Qq(IB]Fq_ƕuG{Ysd"4bR[KYT.K"N/Ih8~cCV@*Ӗr"dD`ǺZ5( ͎ Z^i.ސ€e()VpDsq+nYyju-b[%c[Y5Md+ND.*V|I0,v~ݲzsSJPc9[')acDLÆL-T%|ؘY20f+4:o)h}Kzz+en<_"%cYlt=mn\y7ܬ2cZI3?.UhaRuru]f!YUCHDSFj!iuF*jDl.Ɲ-hl4?u*fC`XxoޘC*UŅrfp$.5S{Kga/˗kO|ʦކ@WK1—QQlP$U "6vst+*2֥LgJV^BU͙mc*}DE s V]cL>SŅe]Ԙi%ªLʩU`Z׮J|S:FMm5ޔ*DL02{`I/˷}s)<3Ii.k .N W8%<\'zīY_z^gc%qFY>LF^ݔUڼU iNQ Pi5Psh\ѹ COz%IpLPrƪ+Y;Xlg)K%tŃpOHjM?q]Xd,IwE@t ~ZTO b`L^=ݜjDThD KS@޵b脴f/BD ZBz^M9Yf%}HMoP=N:yjISAqY҉z} z쎭מxjj'Z/Ρ* i ]h~,LWI-L52Fɡ`m}KMcC#ؖ;öASiDMuWdwd)H*q<Y\ kjaBt?J$TRP]m>}x0744|i,QR8R+`N{T9Kq"VkcGX=FMSZLŭJTC61 ޫUjˁz}I#Sr2Õ*T֗fOYO*~=?Hޞ64 6KZC%[ =9 ENux `{12CD3,T@2 !^a)PChQqh Dci7ea`E hR,r BR 2=#?LOO fΫ~n}YRMt"ҦTi ]g1֝ʖeP R虋VTXNvImcӵdxk9,-Lkp T KjS DNםwbܔ۱RX[E%U`iEpq!-,3JKD5+Y- {*z,RǑدWϬo5R&&Fԍ}i0n]m+}_6)cҟ+d`bG4kwEÓ<0h)XoĸcG4q\BM[fZI-,`cn F6]y>X9D; A#{N &Z "aZcIjYm>mMOޭxP_WjzGp|])en+[uG@nCcq( ؚ#jnAN淰VZkWM nDmzXt bZWoΈ,^7nl89 ׄ,?)6kR/[*Yw|z.=U[~d~F-ɑs59Kc|'YSX'X-l=:mcw`8ӢS[TN误erpz eO)D^6W 5lUUG[l2#ZEA+Wxa1oHdK /PK .\v^u2uk} Mk",i!n *Ѕ}׳Y`]qc@.c1Q|5Ф>k }z;IyH9`|>Flս_oLYӲ@35;&werr@:p ?cKq01Yj![B)iP6mx QM=[kr7[ ,NAjb7ʦMBub:KuLdl^ԡf `?o!Jι^kd&bb<mUԺ SOks_FrBqY+x`1]~/`vG:.::U0B+SDIA AZs$D2zw>e|wǿ>oI݇o DDDs dUZeTȐWrT׮^ar:9) :a#At\t@ CJJa_us*Bx݅E}t =Q RI8r Jɂ`S F-[Y7 c5ggܿu[BV 9G}/<#8Suu^wK`T3_l-SJֳnpC6Z3+[lSa[ @PLs:ӝm3-;.7}`~XuAZ]iinQ^ݞYUtXqZ"]ٍDWҫEP(]Y7?m0ꥵ=u{ִKBeKt*9[⍈ݧVS|;}'if΀8 OYzWz~oO;"Z )*$LA #Ai*#EF@)4A1$$TPhRPj ɌQiHP_5J4ɳ5A4QbcMyIIIXlif)MvI! ouvE 6DlEVM`13bĤL+A|_5c!X Q&BbI& ˤQ1 0IB!F(׻E*iOx};|BQL4Ƣ 2m!%j IkLcPQc*,!L muΣE>:c$A!bHݮruѓ PF1(B*j5$EC bI6JHFEFm$`jEJ # ) idR@mJ;4Z&TdґBAa*ƴEu6Y}z__r C QSRbC`PQ$E`Q*,jDThi6h$"cIcd 4f,ؘlWع6(1dCLRbF)) fI1bk8HL+$R(._t 2bƉ*FlZLbWk]7rh1$`֒ƍdLD*"Rb Ill"`ZbBj#LF6fK+ѷ%DaIRb0+]&]TE.s´D#>R 6) }: d MZEV6}82SZbs1?2퀂,c(F̌P<U(+#@#AD6~YߟhMW>zuEM]>;U!;33Z;aJ}vb"""q ^g/kbg!Z_{BQ{& >U Fdy"-CiwUcWIaRIb&E-/褝Zu(&'^S-m`*J85\Kକj!~junU63zh.Y2OZW9K9e ۨ?:9BXc[3o+~οRCzZKi7|aT珴v#=lKNz39r+Ɋ<YƼJ [V_Uib^y=F50Fgf %uv<50NT7ԳΈ],QFfL.{wi-tm:;9솂]Y$d$ ) h(z+yui]4=n< ^5@idzf+I{q&WS:yLߧVĩ|' r3`"gSkJYu;{V-l=;ӫbsʼnC.2U49QϨ4no=E͖Rb%7NN\J,q*/A%U&`s3fUAȦ>z&jڷs%lI2\-xu.]6" X@:sOpm1jOTD=8m#I[jnd͙a4h*A{?z}_>_g+ 8ɭ*k5CQ]";wc%;(,{97+P66' D hƃLUMp[o Eet*ἑ躽F$7  }k>,`\ S-' e_y*RK^ ` ?~^&&SmvsY^<rHdĎ}ˆLd h0HsRŔX>bs>PF0^Goq7nD8Fek'jf14 aH+s1K"((.7x9[sy "Jj^q_t >uH) '/'߱ (Y0?cwmӨ*:m|O;YeX#C@5}Quo>w+ zB赛.G!'֕X"/n@8@{ ? ;/Y]#cEU]b3:@F@8BE—R uudclNj6*<&/Z'Oģ?SfH&Ej4)p*SAK E~{9*ִ|ȪG,>ܐ]$T,쀳#(Dc$HIF4 v^\#k'78MРcpd(|`mB':A1^(yGa$lTU*Ç *͛1ʫB'.%A\$1bJYiPcEjh^>vBBBmݕ?_v1+?Ie4;(=~F1?[+J8g̯{N[KdE:H6sW{H28mFolzD /-1qc\e>- @0so5ZTr50,_w/췢`;2:ez=+11q+B(N1ҺuN QOݐ$& @llG). :xa{Su}1"Z yIi M8A!Puৰ.|㣁OJY!U9?_fCgv㋺Th8Xze19tGgZJ"D1mM_!ՐXW{Czc@E6oUYsS;+ͩ@}#F3P"]TձgX!zIЇbAa ʱ[~z+6&t\.\ [4,$bL:MY-@ڊ)KW2ܦR֮![f!@[S[;Hs 86izpLb*N#Ѽ vJu}`!u  lڃ`csa6k`xP6H>yڈnGMDL`)xKei Pn₫b* H-p< ^%yx2`X-Zţٽ 7YҤQS5 nZmUwf(KpZ4Z$`ee`9 Q.`…-ARt5iqeU֍YwX%4@RK,"[*j*=BjFMCDA!9n''.BOlP:zvp<zy 1y_ߝ $Ȅ w zb(ig޽yz:Ӎ{NOާFqbp` SP\.I9wyWG>z$Ӂy5eҠ6Xv~LWr>>.w.<<9@HϜcTʐ׹iPs94>4}2yAS&lXBe97BK61~rlB +I Rch`^a%CUg0^FK~`d\(p|JIQq:.LÛ! CҳliDbfOCѹ7c.R&9LheA`n}k!{߻Ue[w;}wLBW0rmz4bط;7盥HTcVx[x0EǣϼbSM{< zd(rհ$baj1 lYZ^>ԝ&hF+"PCd5& I3cP&n3澿VrCGa)x{3sϱaT?T'q wǾ\V<(*U"Դ*k"zQfHy/إ,C H $Vp}{RΉ8/O\wwa{cҘռ %<*2 x'zZ+ }^\J[$bW߄hH64rgF_ ZF*=Uxt^H ˋ\ns6j\CWgelܻ F$YONz\H -zP5ߋ98#zö@ZW,lU:w:͒,͝Z+chxS8xc5H.7<3f3O~PtA?d$HY?\sE8l '0"m6 ntrJ owASܮ&5T7 HWfPgįNm*鴂ҔT&.DG F) 0uBF%M.`峠ĔTBn|+vW=hB[tbklj ǫ7K61oK!Na7[|Qgw'EkO(=nX]t x/ 5tn4i{J x20KdiE^tF, f(]߱Ư~fC#4#qo*N:O2J(;ĐQZ@:<Qwj3pg|V>3 JM@oh:Eq?cN;C(CK;N|pq quԕ`MiQ Z&U>G\rs9zlΜb}|QX>(~gC8cTzܣZ1vq̔WJF& ڸwYv!8G6ts8`6Ð+.ApN>(( 8)(m0/V;&.N 9戢gZΊQ?U$n!D3'_mlfC>p$FRtHllG؆~IxDj5 p3#1y]"`X%\mb|~a [*#t^C,֨s/&miϾ~cu˥1H?g;kxS߈4gG 'A0+XKYfdo'2p-oN^qiGx$>!ɮx?/+WWSxY1yh&l|+v x{x`'zߡYDRۧHT7VSwx`7GV͑e8[l2"(YV~FW//޹wu?y2vULoueUHX-hN`/͒MTy0(UMHZ6`WfdL(c2%-)f0uh"z3^-򐆛uD7{so} V\;Na>o%qP Y54>笝\ՀЬ0Mcg·K.vt]__#yY%9 oݨ?sx ?Fۊ,Xv  Q?6+?~4~)G Gu.݄SlUƨѤ[%&R4Q4 D0Xy1a־K`suWQ" qXWDDCh{ffTʁ ̏'>l%q F/fOGX2o1Z;I2 ")ι/Mi%1oxW攤Mۙ g!#"{)ׇ䱴ıׅQAeq4r cӧFIrGo0+Fղ^R8o w3uI}ԵZcE2k#+ai,\>trA FڰKkJ$&+-E;}-z _ׯtp"r޻kHn"?:,T͔pf_Ej38B9i_`Ѭ뱷3TJrtpbk%Ȱ=xwl93SxQ$DꈅEkG ՗ghA Bvt(3vIyF} gv ~'.!RAjsbO$O'Z `EԢYPWvnx > amWÏ ܁saMt P%9~g=$HrήƝ7)+a`ߏUSbϕ}{PgݻyʀY JɯY$9QBN9R2D|p-9eвg+3_6=k=b{Ľ\%PxIWo@lh^ %58XyMiAu ~+"!_l֊Pp~,wT!'E%>6LPoDܔ=L1:%L)|'~'2YH_Y.*y&%)|.<IDnCmΡF㰖}X>O:@2bF+}=p$ˮZOyŊS^#ny/FˆnUvQ71mxNj?ho\ ЯUT-0x6muhP9 /MqPj@_ ODX|Ss:R9ص_g ֻьW'v9 r>7Āw_!zCͣFyU8Au^&5T8@ާxQr$$k)Xe`SqjqLVTN:xy!=`>.Dvԇ`v?n#G~/]$ Ͻ@RIU6N̓DQjMQ$ [- dk_,&hOy1 mi /u'}=GI/Hm|(Ng\t,`r?CgV&89Cnw9Ȟ"5*cG..->5[+}cj$7;b :6 }"E`I8]D)SzºhC+dN_cטK"kv{߰;t hY"t"Ak5|qE Cu\gf&EUjٲ1mwVK:%u /#w݊b˵]5̜(G{9Vt ]]/#~kGbϬCx*,j>-& U?E).Qm,MKƆ5]1K+dO3%Ja0iRߖD6R-BDڑ^%C$7_eJguCrg>]+;LXrukWQo-LM>#d1EùrcMrú/(]ȏS͖1Wz򋿑P!`ūt^酴>N@%MB"5bUVAKI,5 7(IĈA,[焖D8:SGZ 4Z?rEdL.V;IpvkPnf[ |bJ?'-1΀ۙ(2xr-ZzRk=^ժ(GswifLFK>nE\I[hl}.wBյoߩONP9ꐨ!U<]]@ż>(QH->OS԰U4yB'erw=9+]̐[sڣ-`ݙx2& %`X5&E~Cx"ί&1O"Vxgunb 揳'͏"fǬ5G㕢I>-f+ nhؑTem 3N\@Կ'/^@-Au?JLl05Μa%7ux]N\cڇū׶Ce֧č@H^!un9V\sQ`1NYu}+I h<…GRɻNYz3Z*_7+A&kW/q4sV=5 MB# fWoԅ*j[k%.Ss$tg|z02fƔKyU``J]AĨeRR"W p姜"Ƈ>2D20Al[Rft nBU +slG"4ӈz#߼M9?]?uŰY0'R!=17]; 8'hJگFv3DbI?`]p'n @)Uͭc%,nX.jӒ3߇[b/'uwY901%;ٜ]AZeU{υV_[E*o3`q1)|];\*%(t_oh:Iz^z6I#:`_Ya3Iݩ1)vp| ~yC;` 5\܅7 fM ׯ6m!lxL4pV%.! ،}}顴=o~7! _Hpf58zB,DԧzJ֝Yɿ>P}*DNH./V30)odJcn)e-5ؖlu'LSkcyI? "bt5*i]8n:Hit =|8_=0\lee^,`ECnS1]M{4G3؝')sGʧ'\ ǁEyL.?'yRC@9Z0іcYeR 쌿d3ږ R1CS3sҧO/ti/N1rŷ%Ԝk"L5` W!hXp1}ƺ<]j\!|>"l6MνlɕXXKTuZTmY;^=LsnJbzSzznUǺWzsGp#Czb+$ȋQB'V$ʝ`7U>ai+ ~|wOĽ#sQy1OiS&t\̜⽑p/l#B i\>/|𰓦gbݽ}ypNu{Bʕ1L_xP_j1;M@ u7+ *Gz|SkJct'L.f$G> cygi1oxN.3g3$vt3)]"Sj+62Ufm*""6u8Yh\6d-xc&^kŏC@]T^䤈O)Ω''ƅ:}^ȳa0tVkH3 ɞCS|'=8t\:ƾt5>>SoEBMpɩ$?}-:[o0aꁬBYWKeE6g TjҦ^QSI=w y1 x` GX(ϷJ[`'WpwHiO)ɞ)`D<2ngzM[w% O)xBzhɌ 7D,E,-aW)I3rR%|V3SKU4϶]^ qR pzGwO;N'* ܪ'z Cj(A_Bv-)N$O((ȼb]SH8^!pM=+nGց`BG?6Ц,XdGH>@ɹ?6/ɴ)il^EW5iK։U7W@9-W,o' >*ZDmR[gӍ a7&`ړڌM-"9!5r?"H V|-'C(rW!y[PX.)$8"$"_Хڶ:AbQ[4Q &GRbLwx9B`--CߒEoX]gX6A`:N4ύ4 W:Y󑚐wO6S/ UEo3-TT׿|.*etCN|KK1pȭ #0RqΥ5V5i,Tp"RݧkKwӟ>*L)FJvj BRՄHbjXsא"U:oNzp[3[,[fS!0]***tTK/~UeࡿzjGvyٷ3%›my+STwmHߜwFLeҍ _W_ܑU6!QS p,In,3pj Xh⩿\y$YSNyKi-i{JT^OJ2-E?N"";+#B%?=o̹ =[X}yze="P12{a;ZӮO 3y$@ZS|c3TqIt>*smi0Ĭy'NAu qp^uu<ꪘXu, -AW  mYªHU? gݲF-X*LG)5dGRLW2U1wft ZLƝKL;huߞ'pt!cXx&PEAgPOܡ468'=\IlIc= dO\IB̒z]$4;<R­x)k>}/׫YeKkl}vkU!sUeBB/ >t|5Y,J*`dT@-.Z0y.^Q[SR; &_SvG&﷩YKFޠ;sSR)XЖa+{ܟt"ë?k!&}@ȡly13|7esNzdj;l Pш l.)/S'=,ۦ \Y%|{λѐ𬥹4'vuQ,2~$W$< Zr#VRz[8!0sWͅf/:Aٗq!RFK7VϘV1nݦWQJpij3WcEL4L]c*R)P vڸS hr m Z2 ,(RMF `JB 3ދ|/_D+oUUGi)XIPkD uTmaq6>W d;.XE&#~" MdZl#s5\g̼A!|-] /ߓ=9.O?IIəܿ| ]h!6Vە^˧̪Cp Eʥ]Z txģ3dZHQ:'*ur;(䯐pjwH S XRmOxvh!>!CmMq4JXSrJGYX!>@٘hƠ^Hpm?(< BxB}4zt.EXUxUj VQԁN҅?< GlBYNVTj}M'f%M^h9[/ wՏq8ޠĹ-rנI3nCssK>Жˌo\ WK& `;Pj0}1θ m<,o%.$1%n;W81ވRmLE)#6\QpVҌ@&dĹ̦p,1j;c4 Gy&Iۮ t{#ւ*q(JlJC)իFI Mҳ#ENԵdGKi[`y9ুQ"r'HzK4DlrZɴhk Ku&B7S<ijIk]17 x#L6ojTW?^2WWr l 6g¸B{mLw!>ݱWc#4K7);7sA,c` qH9& Mg#k';M}si ^: ]嚖DI7EVxp,8 ZImm|gvA☎-O۔9ЕX_xҙ@TwWQ!77@C:EePX^^.dQ&FVapOɅ]^caڢSշJ6IwC`|=U fnw]K,֧x~GG K'rI"zWårgz`AeXAu 20rjH$qǙT9 sL=|WHZv55T /kf9FfW+9 t=-qz3/qs3Ta k7n߬Q:{:tޣ:(r9%B_b}0 *Y7%hϟEE[^6 yp3_w"6npWGc묅gm>ӌnNhGˆV k?̛u-[穫N/)CB%4-vBlZ6wV̊0/$YLy3-m[Qq)UK[+~")oRcLHNJ$LR>HLXS,7Jw9"QmӏVe3]1-aH "w֝@ #C`Կ@M)mUyx1& AF\ū(Tbom'*lG6)7_[YSifj۪ xvmԶH7od |\ ]Ф%Mr$K m|eBdf!Yth=?iy7[#FvͿUhamP$-] uS=ƃ8jUW_ES/ p +E\D6UV!%flyU&[MJ~q7+ކՓ6CT6&Ã(<N~|s/& }Rq;0Өrԡ @TO.Ņ@  mUC,P8N%Y+b@|TWT5ym=!T:M:Bn媽4 m^gu&D%nj]BۏZ7XP U\+z̴p:.Y\礃{p+K>g)' o{7EZLK5|X! o1r ք9׽"]WS^ <:<]rˋ֤qWpK-Ix@*ڮt37 [} u;[Bc-seN3[nef[=H \K?|_%7Z J׺=ئ (|{SǫPJ v (JVu`ҖK4e&@bġ6^XYh|7Kvg:}_Y9y#a41W^^dL AįVUw] OLVO jb |Ȅ"k'xpuB/t+2c.V0| :\}dx>s5q%Y%XH 3&zү!@4}C,]U(dQ]4@+n<%8yWO !e>bD9=-Qf{Gh*ʰN|bQ8X}zM434A}ؚOuHػVW32=9o-ޕ|.{G+OV̛ӑGHVIN~6ҠUV.=@L:c=ȝ\BAD>S(16Yv=WX c:ax Řn6_ s^2C?4e04C4?NN8;Cs#ܸ#B u1Rm4쭿|շ5&~Cwts`AT/tFH3̷1Mj)I{Z`0n96UzF~kx gALFxϭV ֟IV&n3g"ݥAGdh/f`X peTYArw&; CI]?D'H܈p gIrE>OJ'lOOaϽdI@;]_x)6~{{svX.Tw?hͤDո h>DĀrsvken>vB2_&\3bt阹sY-zAӂ,F&Qs+Gr:"y-#^՗t@ׄ}KqJA+ *> 5N'!8՝EU 9N!tyؑ+,̢]ء,yZ!uj}v.nr (^:_O^ؗB:42_֎$͙[ۥR_yLDӠk|=i,Eo7f:2] \R40C^WP9ѡ'LR@1&mLznz#R}]"xU Γˇ! xQʭ՚Bd1@K3Xؕmq""֓nY ,Jɖg%,ן8ʾkm U ٨@.RP븽Lqސ n"=zY{ALTjYD D *9ti5=S$HF Wݵ!1\]&djBڶI`=Z#H쵁?b,PF!PmױNpYϑ.p\֪5qzK +n7it33 [/;w (R,dF$)4 V $dÃnpkZ%ՅISi^-0 cbsuP,*XC\˕78L*YdN97D~?y5:wW(d0j/\S&W^8pEVRsdLpgM21eP(MNl_L^םyڷk: 4'-̉{\GrxP͟ 4-Y>bz,]"9p迸<k#3H6f /,z+h2V@M~hJ8,qP(f-#tN$G$2a#h ̡d2}ӖHQNht]ȜK}$5v=US`QowW"#`׊Z_0piB܁['t?״r P(0%=׼IzH~̱YsLߠOU9+o0Rq*W1gɖPbl@J(fpzᩱeRU)1*' Ef Y3'ZMmElU jZP`S` *_8fã1qp< !/;E7*eb +}EeIdXVlysB[_Maֿ|ec@L\C# Ss)EO1eܛ|k c};;~GNy 'd|6{Vt͌.U`-e'u˖ffNYzrFE7a\Cgc/Bkkv CQ ˳B!]Q,~UğK~@R3K\\ vVV XԣPĬV0x2v׌i_2c>3ZǍ͘дCnMCwﺔpxyf,@8O3[k~Ql Y/'豾=JF7~ X?i'G(By+5S"1EQ+=(gOCgK`"%|yם6iLqlRXɽQe%FUW׊ m͒I1&A O߶>-0;|2 P[?ֈVQJfnЛK՛D`FhF wsXY]s7fehpлUF;P]N} "J1ch>fاGsXk1NS֣s^@ y;R'}G@IQ#w5!ϕ/. U2 @#)aVvh]T'Z(+jJ?6PO'!Lu&]JT>?v#SAˁG|{5!gCx}Eiep{O9{7a_Yn2[2>rVS"\]Rh\TVOb/z }r}FC $$NkkDeO%#;%km]K^hlhɵhEI^z !b_mZ[!?@ &ZV9yX! oB9 TyE4>OiPBXhLFҠes`ki_Ώ6+K\'7dݾYJa8{ƹW J-TN&r*<3i L{@<)>+ ɱw ^6$PR2yAoⱽh.Z~0 _oS7 Y5)y4]'֞͹=7;. -n>-0zm>_MÔto;^1Y691U5ɮ; 9`Fz6OLÙ 3ǦdpfJ>pЧT>U(LH3yQ<6'>P9e\#|`j3dHEGTa3N7|cva/*GϙSl]P˺Ӟ-mj3hSxxSX\I' {]ƆѷTd&H|yUwAM{2ClWXN]!D{CajQ|.Mt_M Vu|9'UC]hҷx߃q.\,&쉢 շ3㎸^ݽHiXK3)M{:k_cj+MwĊ砢 ++/{"MILXu* .龭@tn&b.|` <(YC;oD#~ kW 6SXdeű/Gt:I=ǻ n`juY[YWۼR<--G+;"Gڕ7CUM)Q}Ԛ3ԭl7!^!@f\4Y;s w_&[+SUc |ʬ0HDĆ)NdEK訪z=ij&Li΋C=[w@iOL +yL8nN# {&@;Jxn/FlK^R9\g)nT#gRDeoD]* EԗP,4Ȟu+P&G ՜$]V`z7&VlxIFE'w\=O0.js>C53 +)~;7UUؼ*~`pCXo=|nyL-+x5)9V6"f&;=sП瞧OlpΛ}y?J<{ʺHȈ݌b8];݋;Y!AbC`W>kΓׇ{Za%F>/JsZG-b"@9orpN#s:xT&K`^{$< }Z0.zKkyqrW`Rǿ~i`!S7Ma_@M1եo=@?V!R ڙ׏)ٍnG:ZוYp3;^=P 7.>KeYgQfGwm+pNgMEoA'աc C[mpr0+̳ Rc o;h_Fqscab57,UlO`,ۛ_C5\I ;.C;tx4 sZ褔Q xJvL~ ;,S_3A0Q5ʁ8r.@F_)IrWmBfiΧQiΏ$MTw'Vw=f*<g L-Izi6\Kփ+p;&7N2%&p}W Hx*jhh@^Y4Dž=4,]9+bl#U rB_L_+Z5>Qs.z؊YSG@ZNPD+(; o`Ƿ G>~*̒˯x,#|߀A6;@9ӄFܹ_' XJ܆;)怒O@GU3+<[uDqnMO)kjNN$p?%l+Q>Bo*fKylLgTK2tsŞflIֆ Cw0;CTN]Ld)-PV؆z6}!o+k_$\nBc!)1}e9X*9A خ}Vf C&{/k:jAH>z;_;/i*x KJcVbtg AxX6Bħj[e;qUA8+eq{6BD[3wUk8LԮLg?|8iӽ4gB)xH۬?цrn/Rmm6k58&wߴYeTg|e Q{j~/7 c?[TJ3-^fM[ae=P!lrcV>/Vh4l:p$T`6>>b^oHEy$rœ7JcmTH~DSen 5jlOqj&[ڿ$W|yD:QrB<쌞S` BWdфT̛jn[Q9ˏ J߲ rC*S*PEUTӏQYtڞdjYN倽΀_Z}&ݬc;و(u?62Rk>lP^%N҇P?~3×'m7gk}'IOov{@D K+Q4? ٰUgXNb0/Al3O|o,l .TXtK5Au ]:2I OP[4"[唯R6%?b@9k?lH;PR#0/f0.Kר(Fjѐ ;ttYVR| \[^Pr=@^lA^fpL[}[Q~K }6Lj|)[8?O+nVNiӡN +z9LV(mB %R54|wځr;<⛢K8d]:*ٮ.8hL{/ǫ7NaŔ b|} "`Lb|JJ^$_Xr].SR)~ܬHD@@bV%#ͷ0vqBh3 Uȗ>Dl;}IW [lт?TzvI67X1w7uqn1~`A~+["X xqSM&v/o`7zMve/4az8oތ2]ra: ~se!D}{nԊ.X33fm['S_g聐.8 _Z bPmzVracirpiyL84*ūvr[!М$N#-+n2 Q|eM~yacFRD#|/ʗJt nݱzTp⬆:t'UZ_}0k76Y1˻rrcCVN!UN*(T *"BB~@,ֿ7KAH@LIEOMV9( ݘ.]=XYnY]W1iW&S /¢,]z~##Fuj dqTqPꔄ {2_~N0߬*]gDMjE/x\bbHN2ƍH%\oxL ZfsZ 32eY ˍaJNqA2%X.0hpDϺ#hFZĄM A)+=-gBhG3drc~sBjض=Oupt'k4"!zC/F!`4"V2"c'9Dz-#S9z0˰pJ^[cbZ egԑoKtOȔlpB]L#+7*ի= ^(x$˜]/W" DcI릣3K,OLMųJdDyP6fS:v-F,{PY})o¢{ ho]\?5";/U u5vm.~ςW@!c'Xi 'd5'SQ M8rkgй9˹Xp܅<[.Y@hY\o1#Ҟ85[ ;]\Hܰ6*dc9v#7S;5v,T<&ÄI CJM=6pD`̳VOʤFH@Ckw\-f-+e_~uOtay+ԛK8-PŲU#I*ysZU1P'9=ЦuhC*\ !g62UZ/sJE>%ruUx`,yះ .UJA;agt z0xȞTNi[-M0>A{m ÊB[L rje#t&%D>m,.<+";{s'Z7 fZI'ڶƫ U†LTl]TvryLփ\@c#0 Y#7 rGG/8 ю)pFםU] k\5n#L^h&ّXap2Y457 tXP:;k&=1UCyFwM@>RsQt.MT~p+>>*WS.Lh wރF ű |EtB Z[sg$\xO/Q0QT-Ђ 5SS( $Q8J%oU( ?=SGdeUoG*2Y͏⑂Nr Qy3I[4äru(G}Oc[%^a$+ad1 {'d3L obVWK[txN;xy7X>]'h~H 4'UP}E94..>˛p4Y pzzbzR$X.JJaOA `& @ڔN KǢHPڔ\QCȊKTqݑ'.R2eĤ:*۶GI лsܜfs ~%؇YR[K@ zgg +,/Ac1ԛgA~gSU'R rfB`?{[04JJV;ڵGwͺU-sQs@)B>Sl:$)Վ0!.Xr"kH4K]^67^#q|Qɀ.1U32rޒKx.Z'_,Zx Ea+lS"f&K<%CVR/P )*3flDm/ a N9}F|2܌S+P!z?J{ ZLD(LxJd9Ty!%͘"*mJ\-dg0Ů8;enZTv*ΨݦLq o|K9&JRd!:%~Tǃnًcm2 6"M ?Gʽ*7Qo]r\o5< fz%kaLŻJZ&4eFuɍh`mqߧjk,/՛lD|!,Oj:9I'_7bmu>8um=ee )%\q|sqwz_wVh\J__6ۥAvtJwJ,WGQ15*l+0@Ўj.m`XlϴVml,,?K3o/߁[awx#'Ku)"0웨E߱i0:nc$cq9\>Tz4−&Q "}i8>*Jۑ\t oaNYAQ(w|%(IU%A ƀۨi2xI1mc0^H~)E>B_i<;gqsq0 XF}}3G;bV2a"z* .՝Z)﵃Ugc`ZKƹOp wMH'(. qE? ayR7衋T[e8|nREVC(`usOPE?Ć:dʱ戏/aӖA3fB8˄i/YduN9ZU' iZvtёH>Χ{;|v]eL]g YBZs$-8k &iс.P6"u|bVJ|-;;]HSĹqG2p jb<6[՗PTKUk_9Y)g~4P=땳^t򛈓C5Vbmo9oT(8vi쁎Ə0MO< y<- (Qwee͔orezJ} 6љxЭ m>@ax$>HRǹg6ꘗ 2WW;pASSKrX`$q@ǝ\X[lacR\lFucUf<'87[nB)pic^( ASv#""xL>)O#~\>.ԓ,HKI\v)0a~?jjx sf"5ů 1nc(1g);(>Xi_X"l)f't²;ot+@Wf=t'Jf VJLp|ya#Z.sV0"VGCxIvjVY0lhL4tvo"=LгƋ/`6c .7.[hrZP 4E Ƣ'M-<|+,F@Q?#ĆHSQZqP.\Y^9L12܀Q#T􅀊v~JZu _?[]49u~FLXx,ݑt&馒\ Έeq8øXtAam|l㙤pp?֑WE.\(W/'iȆK3RF#L7')K"yp7%8vc1@3`(AV2 ˮ;Fc: ;j ь {-h4wcC%6ub(vpb=SP3 nW~=n( ߫Sordz\l2"%20. [afkډ>A[`hޔ FtOCI pcAan &]cfm\5 pCkI7̺KۇtH|PT`*̘G+ w!%1ɞo5EUy1xw_GXo=uc5NԔtejN5?ͯ`! D Kitʶt#*3Y@&!%>RK|d!$|往! .A39W>N %'_侱R` ؝x6+@&eZ%[tP R/_$ 0/Y2w5LDBf~ A;6/Vt_Z.u^\>OwO Gb/N W@#I"wAo)GbMNNQG!.>&\DԉHhc͵z&S<#`rz㳅I%ZծF.Ckӣ]ZRFqLYCJi%7pG ,~&NA3 ^m?ߙq8GM S E6 閃nDi2x{n:{tt x{3mkx,7l=vOlrfKz4kZ$ _Γ{OR֮Uo4{]C_3!xM.VLAhQd);]{,+pV եO~% l+2~D0|qiku~V=Iمao#-G|zͿlϿ!v8X\Q [UobF PxE<>hQHkfVq:;M%rr h3>$2 k;ꗁju+zrnR?үVj͉1 ^ eX:)6XW1IGŲ! /Lf,w9Pz(;BuxT&#ix?-c-N’j>n▅[ N֣nݙ ztu`QW_@jW_vmH$Qm-RQJ+#R+xo\|4!G},FU7,:9Sp2AMT)c[ha"=P{,57|}:_2$kSEs2/%^nmy(yƓ*DXct]@)~BPzhA׎Ok`C};qfq6T>ḽ;R+jt>X@zr#a!b|}&6'1 d8h~7j\"#!oRV V9k=-y;&N!c@oqH3plc. ;">Tu|6]s~ZZL[!xޏ+c6f5(tWrg<\|/?Kڥ'6ДOr3;3\j.Ki8z;&-c$9-1ƛn / (vLNHy?ڦ.Z3͑7&J9%x5"l̘YqPU:Ԏ\ HZžNGKoq5yLEKmF$zR Z=]6W'wIE*4IԜVnnV;)k8܁5p"(( 䪓sI]VO);-IҀi1Xc#MEYN2q*k"jS~$+;8ښ,*\cxX%A׊3\T& _RBkI$^՘NJEzX _ w4A`-`{WPyP%Ռ5#x5qa`iL#E "3C ̎NP\k޴"ts) u ΠA^QY5ЕqT c+v6DN<ٯ~uMJOЅ,9,s疿)&Dg@SEsiv wDYJ $8#r@ϫ/~)v0-wu+_en39WT+ΛZ~mṕP(ӒLWMDՙ):E2ħn]f+4^eV`5?,pmB|QEf6y?s4Bo~ #R)/!%h*%$}pS+F^l$1/ҌQ"JWWr).]h;t<'o bgjeWg ?ոR-xX cC?S0a2tanSt?q11`&Ok<]겉OOP(Fo6 zy?{h E+e7M0ZY!! q1gұd@ޠkY)>^>)YgPMn̓蜟"-zYJ_RD n&# ;5m>$)i1R4Ų:z#fcYROuEO$$BdK*E/Ջjգ"#t6 23iq[69-HΛєW/) iU)UN0sC>QB˪eFӗ.`.dlo^Fb@t8f۷/bJP;l.5>i74#n6VNkt[F(wi(ǿs@-`'bG+On25991χn cVDS|>n3xoUF_a+2땯r39ńmL)K&su,C<<&3CGϟ2P}iLg65 _k6 YZ