proftpd-sqlite-debuginfo-1.3.8b-bp155.2.3.1 4>$  ApeQI%z B+ˢ 0y*pW:(73\[EK̰ٜ-V_Hf`$m?x\{h*ډ m`&?o6RvGk;F/pAp ;T  Py~D;hiR13|@Sʛ%sl]l4biJw 9x#7G(qGф0o8E~MÙ+&NiU6f- QsS0ya`NxcW!O_ɬ?"a11^]1ih=IB->]Xֵ\)5Fcf!$NBfmmQJ\LYwBS<4PͮMT6(>gN`,up|"p@8?8   , Y  9BS l~    L 0X|~(8$9D$:$F2G3H3$I3DX3LY3X\3]3^4ob4c5d6Fe6Kf6Nl6Pu6dv6w74x7Ty7tz7x7777778proftpd-sqlite-debuginfo1.3.8bbp155.2.3.1Debug information for package proftpd-sqliteThis package provides debug information for package proftpd-sqlite. Debug information is useful when developing applications that use this package or when debugging this package.ePs390zl23SUSE Linux Enterprise 15openSUSEGPL-2.0-or-laterhttp://bugs.opensuse.orgDevelopment/Debughttp://www.proftpd.org/linuxs390x2_AAAAA큤ePePePePePePePeP2a893fc18abce87cc5b6c10037f88b65d6278da1b747c7d8c98a4b285c53603c../../../../../usr/lib64/proftpd/mod_sql_sqlite.so../../../../../usr/lib/debug/usr/lib64/proftpd/mod_sql_sqlite.so-1.3.8b-bp155.2.3.1.s390x.debugrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootproftpd-1.3.8b-bp155.2.3.1.src.rpmdebuginfo(build-id)proftpd-sqlite-debuginfoproftpd-sqlite-debuginfo(s390-64)    proftpd-debuginfo(s390-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.3.8b-bp155.2.3.13.0.4-14.6.0-14.0-15.2-14.14.3eeC@cc<@cbL@b@Qb?@b ap_^@^3^S^5h@^C]@]o]@]D%]\@\+@[E@[DYqYC@X@XӸXO@XX~@X{d@WW/*@W/*@Ujchris@computersalat.dechris@computersalat.dechris@computersalat.deStefan Schubert chris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.deJohannes Segitz Dominique Leuenberger chris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.deMartin Hauke Bernhard Wiedemann chris@computersalat.dechris@computersalat.deJan Engelhardt Jan Engelhardt chris@computersalat.dechris@computersalat.debwiedemann@suse.comnmoudra@suse.comchris@computersalat.dejengelh@inai.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dechris@computersalat.dejengelh@inai.dechris@computersalat.dechris@computersalat.de- 1.3.8a - Released 19-Dec-2023 * http://proftpd.org/docs/NEWS-1.3.8b * Implemented mitigations for "Terrapin" SSH attack (CVE-2023-48795). - rebase patch * proftpd-no_BuildDate.patch- 1.3.8a - Released 08-Oct-2023 * http://proftpd.org/docs/NEWS-1.3.8a * Fixed builds when using OpenSSL 3.x- 1.3.7f - Released 04-Dec-2022 * Issue 1533 - mod_tls module unexpectedly allows TLS handshake after authentication in some configurations. * Bug 4491 - unable to verify signed data: signature type 'rsa-sha2-512' does not match publickey algorithm 'ssh-rsa'.- Migration of PAM settings to /usr/lib/pam.d.- Update proftpd-basic.conf.patch * remove obsolete config option, LoginPasswordPrompt - rework proftpd-dist.patch- 1.3.7e - Released 23-Jul-2022 * Issue 1448 - Ensure that mod_sftp algorithms work properly with OpenSSL 3.x. - 1.3.7d - Released 23-Apr-2022 * Issue 1321 - Crash with long lines in AuthGroupFile due to large realloc(3). * Issue 1325 - NLST does not behave consistently for relative paths. * Issue 1346 - Implement AllowForeignAddress class matching for passive data transfers. * Bug 4467 - DeleteAbortedStores removes successfully transferred files unexpectedly. * Issue 1401 - Keepalive socket options should be set using IPPROTO_TCP, not SOL_SOCKET. * Issue 1402 - TCP keepalive SocketOptions should apply to control as well as data connection. * Issue 1396 - ProFTPD always uses the same PassivePorts port for first transfer. * Issue 1369 - Name-based virtual hosts not working as expected after upgrade from 1.3.7a to 1.3.7b. - rebase proftpd-no_BuildDate.patch- fix deps for SLES- remove configure --disable-static- Update to version 1.3.7c: * http://proftpd.org/docs/NEWS-1.3.7c * http://proftpd.org/docs/RELEASE_NOTES-1.3.7c - Update patches * harden_proftpd.service.patch * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch * proftpd.spec * proftpd_env-script-interpreter.patch- Added hardening to systemd service(s) (bsc#1181400). Added patch(es): * harden_proftpd.service.patch Modified: * proftpd.service- Update to version 1.3.6e: + Invalid SCP command leads to null pointer dereference. - Do not limit to openSSL < 1.1: proftpd has had support for openSSL 1.1 sice version 1.3.6a. - Rebase proftpd-no_BuildDate.patch.- update to 1.3.6d * Issue 857 - Fixed regression in the handling of `%{env:...}` configuration variables when the environment variable is not present. * Issue 940 - Second LIST of the same symlink shows different results. * Issue 959 - FTPS uploads using TLSv1.3 are likely to fail unexpectedly. * Issue 980 - mod_sftp sends broken response when CREATETIME attribute is requested. * Bug 4398 - Handle zero-length SFTP WRITE requests without error. * Issue 1018 - PidFile should not be world-writable. * Issue 1014 - TLSv1.3 handshake fails due to missing session ticket key on some systems. * Issue 1023 - Lowercased FTP commands not properly identified. - rebase proftpd-no_BuildDate.patch- fix for boo#1164572 (CVE-2020-9272, gh#902) - fix for boo#1164574 (CVE-2020-9273, gh#903) - update to 1.3.6c * Fixed regression in directory listing latency (Issue #863). * Detect OpenSSH-specific formatted SFTPHostKeys, and log hint for converting them to supported format. * Fixed use-after-free vulnerability during data transfers (Issue #903). * Fixed out-of-bounds read in mod_cap by updating the bundled libcap (Issue #902). - remove obsolete proftpd-tls-crls-issue859.patch - rebase patches * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch * proftpd_env-script-interpreter.patch- cleanup tls.template * remove deprecated NoCertRequest from TLSOptions- fix changes file * add missing info about boo#1155834 * add missing info about boo#1154600 - fix for boo#1156210 * GeoIP has been discontinued by Maxmind * remove module build for geoip see https://support.maxmind.com/geolite-legacy-discontinuation-notice/ - fix for boo#1157803 (CVE-2019-19269), boo#1157798 (CVE-2019-19270) * add upstream patch proftpd-tls-crls-issue859.patch- fix for boo#1154600 (CVE-2019-18217, gh#846) - update to 1.3.6b * Fixed pre-authentication remote denial-of-service issue (Issue #846). * Backported fix for building mod_sql_mysql using MySQL 8 (Issue #824). - update to 1.3.6a * Fixed symlink navigation (Bug#4332). * Fixed building of mod_sftp using OpenSSL 1.1.x releases (Issue#674). * Fixed SITE COPY honoring of restrictions (Bug#4372). * Fixed segfault on login when using mod_sftp + mod_sftp_pam (Issue#656). * Fixed restarts when using mod_facl as a static module - remove obsolete proftpd-CVE-2019-12815.patch * included in 1.3.6a (Bug#4372) - add proftpd_env-script-interpreter.patch * RPMLINT fix for env-script-interpreter (Badness: 9)- fix for boo#1155834 * Add missing Requires(pre): group(ftp) for Leap 15 and Tumbleweed * Add missing Requires(pre): user(ftp) for Leap 15 and Tumbleweed- Update proftpd-dist.patch to use pam_keyinit.so (boo#1144056)- fix for boo#1142281 (CVE-2019-12815, bpo#4372) arbitrary file copy in mod_copy allows for remote code execution and information disclosure without authentication - add patch * proftpd-CVE-2019-12815.patch taken from: - http://bugs.proftpd.org/show_bug.cgi?id=4372 - https://github.com/proftpd/proftpd/commit/a73dbfe3b61459e7c2806d5162b12f0957990cb3- update changes file * add missing info about bugzilla 1113041- Fix the Factory build: select the appropriate OpenSSL version to build with. (fix for boo#1113041)- Reduce hard dependency on systemd to only that which is necessary for building and installation. - Modernize RPM macro use (%make_install, %tmpfiles_create). - Strip emphasis from description and trim other platform mentions.- update to 1.3.6 * Support for using Redis for caching, logging; see the doc/howto/Redis.html documentation. * Fixed mod_sql_postgres SSL support (Issue #415). * Support building against LibreSSL instead of OpenSSL (Issue #361). * Better support on AIX for login restraictions (Bug #4285). * TimeoutLogin (and other timeouts) were not working properly for SFTP connections (Bug#4299). * Handling of the SIGILL and SIGINT signals, by the daemon process, now causes the child processes to be terminated as well (Issue #461). * RPM .spec file naming changed to conform to Fedora guidelines. * Fix for "AllowChrootSymlinks off" checking each component for symlinks (CVE-2017-7418). - New Modules: * mod_redis, mod_tls_redis, mod_wrap2_redis With Redis now supported as a caching mechanism, similar to Memcache, there are now Redis-using modules: mod_redis (for configuring the Redis connection information), mod_tls_redis (for caching SSL sessions and OCSP information using Redis), and mod_wrap2_redis (for using ACLs stored in Redis). - Changed Modules: * mod_ban The mod_ban module's BanCache directive can now use Redis-based caching; see doc/contrib/mod_ban.html#BanCache. - New Configuration Directives * SQLPasswordArgon2, SQLPasswordScrypt The key lengths for Argon2 and Scrypt-based passwords are now configurable via these new directives; previously, the key length had been hardcoded to be 32 bytes, which is not interoperable with all other implementations (Issue #454). - Changed Configuration Directives * AllowChrootSymlinks When "AllowChrootSymlinks off" was used, only the last portion of the DefaultRoot path would be checked to see if it was a symlink. Now, each component of the DefaultRoot path will be checked to see if it is a symlink when "AllowChrootSymlinks off" is used. * Include The Include directive can now be used within a section, e.g.: Include /path/to/allowed.txt DenyAll - API Changes * A new JSON API has been added, for use by third-party modules. - remove obsolete proftpd_include-in-limit-section.patch - rebase patches * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch- update to 1.3.5e * Fixed SFTP issue with umac-64@openssh.com digest/MAC. * Fixed regression with mod_sftp rekeying. * Backported fix for "AllowChrootSymlinks off" checking each component for symlinks (CVE-2017-7418). - remove obsolete patch * proftpd-AllowChrootSymlinks.patch (now included) - rebase patches * proftpd-dist.patch * proftpd-no_BuildDate.patch * proftpd_include-in-limit-section.patch- Sort SHARED_MODS list to fix build compare (boo#1041090)- Removed xinetd service- fix for boo#1032443 (CVE-2017-7418) * AllowChrootSymlinks not enforced by replacing a path component with a symbolic link * add upstream commit (ecff21e0d0e84f35c299ef91d7fda088e516d4ed) as proftpd-AllowChrootSymlinks.patch - fix proftpd-tls.template * reduce TLS protocols to TLSv1.1 and TLSv1.2 * disable TLSCACertificateFile * add TLSCertificateChainFile- Remove --with-pic, there are no static libs. - Replace %__-type macro indirections. - Replace old $RPM shell vars by macros.- fix and update proftpd-basic.conf.patch - add some sample config and templates for tls * proftpd-tls.template * proftpd-limit.conf * proftpd-ssl.README- backport upstream feature * include-in-limit-section (gh#410) * add proftpd_include-in-limit-section.patch- update to 1.3.5d * gh#4283 - All FTP logins treated as anonymous logins again. This is a regression of gh#3307.- update to 1.3.5c * SSH rekey during authentication can cause issues with clients. * Recursive SCP uploads of multiple directories not handled properly. * LIST returns different results for file, depending on path syntax. * "AuthAliasOnly on" in server config breaks anonymous logins. * CapabilitiesEngine directive not honored for / sections. * Support OpenSSL 1.1.x API. * Memory leak when mod_facl is used. -rebase proftpd-no_BuildDate.patch- fix systemd vs SysVinit- Remove redundant spec sections - Ensure systemd-tmpfiles is called for the provied config file- fix for boo#970890 (CVE-2016-3125) - update to 1.3.5b: http://www.proftpd.org/docs/RELEASE_NOTES-1.3.5b * SSH RSA hostkeys smaller than 2048 bits now work properly. * MLSD response lines are now properly CRLF terminated. * Fixed selection of DH groups from TLSDHParamFile. - rebase proftpd-no_BuildDate.patch- fix for boo#927290 (CVE-2015-3306) - update to 1.3.5a: See http://www.proftpd.org/docs/NEWS-1.3.5a - rebase patches * proftpd-ftpasswd.patch * proftpd-no_BuildDate.patch - remove gpg-offline dependency - fix permissions on passwd file * unable to use world-readable AuthUserFile '.../passwd' (perms 0644): * 0644 -> 0440s390zl23 1703760086a21d5cea153b19bd1cec492deafbe6f12db3d3ac1.3.8b-bp155.2.3.11.3.8b-bp155.2.3.1debug.build-id1d5cea153b19bd1cec492deafbe6f12db3d3ac1d5cea153b19bd1cec492deafbe6f12db3d3ac.debugusrlib64proftpdmod_sql_sqlite.so-1.3.8b-bp155.2.3.1.s390x.debug/usr/lib//usr/lib/debug//usr/lib/debug/.build-id/a2//usr/lib/debug/usr//usr/lib/debug/usr/lib64//usr/lib/debug/usr/lib64/proftpd/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:18243/openSUSE_Backports_SLE-15-SP5_Update/7f3a8967768b043f1801ea1fcee63ec4-proftpd.openSUSE_Backports_SLE-15-SP5_Updatecpioxz5s390x-suse-linuxdirectoryELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=a21d5cea153b19bd1cec492deafbe6f12db3d3ac, with debug_info, not strippedPE?Dz<proftpd-debugsource(s390-64)1.3.8b-bp155.2.3.1utf-85aa8f6cf83932fcda94296cf864baca84702e87bd0e7f4c85c479e30c2d72049?7zXZ !t/೓8] crt:bLL uS7"W2O֢}sJ0Iš^,%2n MDfz~fB]VHOo 23I *=]u=3U[_4 f!-"]14pMZyz-i@$%}ub766Auz;+-!8|{A8Vhs$jxB6G'A)džl?_P 9.Yx^n2-w)#^j1)UbQ-iL"GrΪq}*Y/DDJҜPJ6Ӌcc?ӯ`H3gkjIKU^ʟgj.3lIxD%IϬܔc{B'ƒZ3> Ԗʤf? eȥzF蜥6bШ 4R숳)V!~Aq!Ǟ :v@/BK2$SG_%- 3Q'6XǧCpӟFW؇VmQr`HG B83PsDiDCRr rYɘy˹z#r8|M]3nmN{@OY?)$Ӫ[``)+a}ؙSBZi$'rZ)cP9ЁևAߛz; cl'@s{tR0pߖ:7`yZ=Z$h"L `x 0#SC:9_*ZɧJb*k1&Vǽ9q(lIv}`⣞DjgiXZiƂLu)̋ R±T }H nnR弪~K4=Aؾv_F܊~!5.\܍1ղS;VQx&2f>6yDE6]7' d:zTۿ\B}MNgڰ· [j36o;۫ !:r8GL:YB]=o,gpҀr3} pЌܭ@O.k#2hGVh@\\`#+h<3dC*@(/RM)7|z pO.GO]5V,vsvRGe16LOIZx!.XZp@EQqQh-=g!Do9[9l @ ǝp0GVDA]/P8 ?*joRK*YlMZ/9mտg9r+N6=Iox %F"jNA{GaI%0D[!էH -nCvL k<]6mW/{:q81?9s&]Y6M2|ݵ,sA+] >"Zc zB(p3;JqWCgHR(Bb:(goalzoƺr%$ D~߳1NlҨ:acz?A/;_z!^8FDѲ`q ::sc%]`wh0޵SϑE"D,oeҫ w,h =[3 *sD>\٩xrUm&t*a+CgĜ ϱP>[`fs8dR"xE>CnWʚ)mdN&$j7 Z}MOV)Xk?74?{8gjnA2ZHr]`vf λUrY'f"AL3<1@wj,IMP!B ޓZ#[q$UBe2ɥ0B`SeRm:Dpj>A޶/̴c+Ω4{kЧ{vT Wu*Unn(atI9355b ?t,wS:A `Di4qD MG]^( ͳ+HtF崓 O+!3<2MDqHSO_<8ӌBr۳׃"3;aB,:2:Ј;"!8Υ%]E9SRA HIvfKыnN9j_/m-v@T0=4DͿ k lX+GK24j8H0tk({術^y@׌|Y3>ؗ˓]%QmIkX ZՂy`l2 8e.[p2zK;nQ!] ն'azRmKXtuJGd1|&-r;-e#ݱ> Pg^7:tZd,0.U3@μM|劙B"'~vsZ;#F5])%W?pv$nتT)a:z o yc̼"DDž\rNZG \]*HmC;*j?!wG9M!.v]vShNOkACvmDȋ. 3u~QCD仭Mޝ\$IW,=6V`_`YJOzRud8p*Wo%[d,~QXO 4P% Q$ueԎ֋!vs,E  6&*g,PXp50B}Lq觶 nǃCQm;>!k95 1<ܔkUl&G亢޼$ڔYXn Q_ +UL*RJr 1O4QqRcecA?%sxY$l,w+/+_tJhރ_Ta |41wt!^Q-~trT,v,*h>z0Ͱ'cs)# ITN{);P74:`t*-[NaMv@0GdK K'&ob<}ȏrk:q/ IxH?ݎ< {F`K[dSOngk 1eQ_gR[pI,A+&L>.fܴ>1 Q3/(E Ha屓PYDFFX+gӓA%w.Fn}Ԉ>z|X]fI:g%a&0 T9Ij+91Lc/TNX\25:JirY k`Z'1tHw*)O\zq$WGS)nS9ހfy:D#`s zkt=&Ckޕ7+#/aaOau'iPj;<dLŻ/<'AmyHoOтelen#o`b" $)cdža{3Cy4'O?þua.8gB]YM\@ "J)ﱄ~aK..%3PV({lcg%OT޳apA&{0*-9nye6R`[6=+ZB=R@ Ӽ@эЏ0E>s [YUH(2dbǭ5/7dW2d#kuև+ A[Hԅ^eq12BXn>JH+gq79ښ+xVRwmo3 Cs|,:8ݹx;TZPז\m M\s,JxǨ-3ʼnײ-sQfE*oe(y )rcdêr&̺A EnnZTDy{L}VM@wK2!UB}]:(&kرyák<8J֟eA&)G&kIM|'}Z6ٸηS;pt!*arLq(ZH5V۳ |Ʉz2X|"6QH䷘GJ3 ;zZH߫ikBw8M'JӃn# c3dN!rk`U{?bKYRCTLRHhߨO`;:KԶ`2t7x\}%|Q8ɮ|逨$5NXE0K*" LAaE!~Ϻ>d5[ .W548\*! 8_cjXIyP\j- &U߼#2YYh{87YT_pd<_Pnhj4gf}O kIZpmл7- w!d̪mnڰaU3&<`<|BL>ӻs/J'9R^c$D(An%^yZ}liVK $6Rf:|9*5?vk_v %)sLr H~L:Q& &f7tH f (iCbPÿ䁤C @3cP9iYyzUN=;z,H+Ӳhأo!d:P|7ӓEZR(UO*g7U 3fVuDEHcXVqA-@4ce !5Эc ,βpizx.K8yi;1Kz;dwO_P) T\spd`&e"=MS!Kxݢ^T7eQhTd|i~J#wm&uoMsRa8#HV/Ӆ5R{P/#&R}VشZ[aESdXR^dn@aizq\1O*e7TlPy;|Žq4]o#I4@3>*c2bRpZ _׳QmdJ9t\,*(Xi YDip!vkIҒCW#5-xni Y{3g 0$R\" {o{HgV-zt5*k Ub1\|-tb9Xۗc؎O!brY O /|X~((SC(6ZW ~~+ho~ȗ\:jmVH%A+<8I[pwB5nlj\>FU}43_8Y0Lq*da,$ Uf(~ܐL\oS+)V/Ç?P0q {)}ZJ tv&|6z3d_g$pX=KQ7 hm;oK}6O@v8my^Ga=ʗ@]up|!Fd Ɨ} 8l7 S.;ZÏQZ&0g:R 8Bb|.p0/pt$Hˋ~J$cֈtemmbT;ϴEݴ±8Ɗ)(F߬ Smpa&*,M!\^&iR-xHGz{9%rOC;3$;,+ZAC]GgC}D%3xD$>?5֔|6txF(aأ4>8x 208|廣y@q0rJl-\8cԯstpMM흰Ⱦ(7,O /<E KTf:|B#.[{ 㛮M}gb0}&DP^6b37BǨ(rTJ~G8̹rjJ?ǵ!m3# I[sCo}&EyQYq6qmmxxfV\7% VeYHԫiToz*+$>>_., cǥߐ_.⁕}zS[z^ԷvX{Bdu4ޙ6ed$Zj^a򬞾,,GnX׬bK:0YzFޚ,)o@OR3amm>쇣|O[.|,jB&={8CŰ~KQ588p/> x=.ݪ-BXsr?ᾙSl Um_7 8[w~hmΗ*@bAttfPUMJiтUqpj[ݷN{{?Xiyt ~aYEٵ0"SW :q,Gʡ".hRֆ4ľS !khw'8e?ZWh㞉&2ɭIEZCpDkM}䨍~A˕ݬL~κL}c~X*3mѴMMip&;) Y(!B&OOP VW`Eu7F5J Z^-VZubmsddED5r6J0jq<@ ORgF#CDԘ^RWrJќ4fg) un֏dɩv"P.@%s`TO d;n1xGPH Wp:N[7XLCr.X8єyk| Gf2 2pj6:79>a5X ܊߈ !7H(B-r7Fyi8ĎԳ7S1'\Dw2Pׅ`'N{HIrlكw'mH*1y!ss2߻r~@qޞ\pc*.G`DɘV:ʁB/X7PW|dZf(܆N涨)vpnmEW*0"ٴ p ]^9׌.nZ:r[H,/|P4AZzX.K -l%ij>F$[ DŽjA;_dU?tbG7,'Q'1- fQ"DNA, $vxݳg#[v<+ T10mUi?^f8W3[]XLqg@ez`N";aR"I~{o4YV+I.P8r-e|zb;n[JGJ5|G`l;v^it.ٱN !yz3rj`[,EIf / Xԝ8Հ*v3&%[]0҄UyP`;W9b0)jbk3F.o2HeE(%-nM`Ilds 艾]wc.Fp\iNTdz (%VoksKWί=ym<A.K{':.oDAEEwC4g sT(&{mc)3jУuDC[B/`@}IVc \8ѯdι3Eario#u!=9Ժ>&w͖j/LŠuUlҒ q *+ޤ{+]y =#,sɗdk ɧQBJH}b]C9vKԹ`jP;-9jV^3HAl eӅFjwui uN ΄]!R%;fl/!汥fb7wH[~43}n֒5 B*qsǢu=otvws5ڷ5AɅEUPҹK;%̛J,0#vj{%8eld,3wE2~P6]YxR96qa(Szѓ2Cͻ}P? ,Zf+cBd>3؎$"jH&Î5u_ :1py\"X@!OL_eo5c#紭o&;)ة#p6|? _1vtbyeEG|U2 W Fو\5(DG*&"~D}1N+MVG4ٰk\jda-% 'FHaG0)-q^KM2Ρɗ;ϠʡG7'#u1K>^9^19+͵Pm!;;(38ސ %@vsG3$pś'ۖ/V-?๰hrA~A? zşjGT6ꎯ?t~na\5Wu"7~}uᶭq=SQ*- B!2WN\5U02(pm6)y\Hm gysb4G*M]s7_*ؕpި|kCnf4Q B<򱆵ڢ:9_}wq]U_Z"8LwMɵ1yq kT`hh61Ǭ#1:grnݔ$(.}Vb}pdЪ?^O.wM'CmsH<۲`?2m*DoUv8AxevEWvP_0ވu>x/m7a7RJ=KC0&>?'j#YtѢJ1dž3n'fY{;j4@ 8TP-٧.7wɯfSYy'-ˆWуP۫cBzJX6%:*π'+ 78 s]Cm_ASiq,@8l4pʫl*]+>*^U.3 Aue2Jsu>GgIF?4mU 'x&'jp.oC|& )R`|p6 8|W|<~?kX(s)*j[TPP4kDaze:*yoz0l3N,o_+8Pvod2w>*XeB,4elY}ˁ#HzEo @&1|VzY{řmj;W9lN8 MR "-QKǞ+EJhҠى ?8h%6{>#Oy3"#:+Aa_@b.ܣ0 @XC J=s9yMJ+` zrP9`9 4%a[0V1yvc}MOAl$^k&j4^*;ɭ%~J!S$u^-W !~+'I4o:>uv â^ {J=1(ӋI눠&Nuur#@1M( 4x>0ZBr/AR%iuFch , (aSl]058ߘ = lVScdm]T~4G,ʁ&X`]21+IX+IRs~hh=^ACU9n^8imY*p0mSl,ohpt"@9쐛Z[א9g|t?[x"QzE!_GG'P* 7nVի5n5p8s_jQC^O΀yz8MRy-Z| VcK/zj. HVۧ K)r;m4 KXh **dii,Z/k, ȓdb=~՟d_\8d qrPƢR\L*)FEm svGsÅld8\Du1CzNaIJN҄3.\BK|ro~:8rѳ-ٜyX^)mTnUƀ4 N52ĂEb Դf`#U)w40N`cY]ɳЕM9,_yNfW}AW >гG_ j .CII7MIY;~.5KAt[:1::|+mg/@?IU9@JrHsmeg͆"ߔ34 {p