libtiff-devel-4.0.9-43.1>t  DH`p\`/=„$>6WkDڞU)'Hң뮖6Kİ`u@Wor,ka.f)gJ1/e8p;:2b)>8&k1zNy{VT(@ITf!e2)?IR52!uѳRaiRy+vd-LV2K#Ńñ K_ϴ]SޣMyUSN%$L(hkh?tjΦ"bb351b4a38d4fd9f52a39354f1f603a994ce23b4\`/=„]O`]yFODJ*|X\;6jJB) sDD-PKa KŜmyAV)g^~6[Q;,VRzElXiS#gkxoktlَH? ;2I~h#8Y\F`}=ckӟPֱNh*aDvk~^Զ2 +;5)jqԽRc`>1܏mhPZ9q+dk tk>: ?d  ] (- Ff4l4 4 <4  4  4  4 4 4  4z(8>9>:>FG4H4Id4XY\4]4^b<cdkepfulwu4v\wX4x(4yzClibtiff-devel4.0.943.1Development Tools for Programs which will use the libtiff LibraryThis package contains the header files and static libraries for developing programs which will manipulate TIFF format image files using the libtiff library.\`lamb58KopenSUSE Leap 42.3openSUSEHPNDhttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.simplesystems.org/libtiff/linuxx86_64 eZ^s\*% d| c" R5 Ng ptF  gL\`~\`~\`~\`~\`~\`~\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`\`a004665da7eb2508ea39df1dc3e28ec41b8351b54c901e9cf4bc1d2219eeb010d102d3da29526c44ef3d93e50449e4cbcdbd71cb9ba53ef1f73ade13a102a5dc0fa5ac6fa32bac11d96659b62409a1e3db77f5a7cb0458a8fb5a67dbe09ad8d5aecd104076091f12b49c4fbafd991528ff9324eb200b2d93ec55313b9b41eeec52528a45352044d8e0251946cdf47ec2fb6b9b50677622b076b4a1972d53dbaaf2767722db29a0f1e6a8303fe0612cc17473bce6a3f40b6484f2284e7c0f506d0f71523fd7e54458f94a8f66c7b5150961a5742aa1bbeb32d254f0f5909804fc30fdfd001737d586014a8b5d75adc8f1967701a79be4f530f3b1c2e56925d5b6d699533a82073db40a74b132abaf20a96f64d1392a2e78d933319f550f3fbb9a07d33e208c667155b4afdde403586601ef91c42549f64c3e287bc8d49c79bd20379f816a7e5aad5006aa701f70d1acddb5e80ac33d61f5ec231333c79ba6762a191e7861dd0546699070817b3ec5ab46f64131fa44192470eff9ca9fb472167ba20736352efb32bc20d2e94a060902cee8bdbfb6de9a7bacef769d9f58cfe97e24514a57dbd11e491ab6ef771df98a65b98cd3bfd5787b56f4ee894dad4099042316eb91d3e39aeae1cdf41ed63b5e19f0c04951172b413fa7a9572d40c128d6439f0443e7a033a7582f34300b8f9ac575ddb0cd68c2d72f72baf89a5922d49f541924888f4ea5384f8e381832770d5feb94f0b4bffd79f5c501a257685f05422b70790be0f32e2a4f190d2a63aab27e3d040ad0310ef6a96b3b6f58b89adb8f377b2cb1db8bd78a6a0f2d43e68bf8b2ddb7cab7f4ab5815837db71f3251d8ae71f9fae3ca9cbbb7999e5a2a9e1338a32a42daa94fc59cd487f0b0815e95d3d090f19b0b11e18fe07b3aa1a623d8f202680f568b49a644bca0e3302b2c8888d3d64560c0c935368a51a20836198e1717f686aba28ecd1c763fcfae31b6ab665a7cc78408a62b395df2f99473d5c1f92f7cae927aaf617e50fcc636a5cf7e6b4579d7d443723c97079c944d84a16b41989a7bd2bca5c8a8416ad953f345370acdb583ef30f28002019b66ede78d87ebd1b536176b21503bba991af917dd25badalibtiff.so.5.3.0libtiffxx.so.5.3.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootroottiff-4.0.9-43.1.src.rpmlibtiff-devellibtiff-devel(x86-64)pkgconfig(libtiff-4)@   /usr/bin/pkg-configglibc-devellibstdc++-devellibtiff5rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)4.0.93.0.4-14.0-14.4.6-14.11.2[[[k@[$@[[t[)Z@ZZZ Z;@Z@YI@XۡX@Xx@XWXWXIK@X=mWPetr Gajdos Petr Gajdos Petr Gajdos pgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.commvetter@suse.comdimstar@opensuse.orgfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comjengelh@inai.deidonmez@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comkstreitova@suse.comp.drouand@gmail.comkstreitova@suse.compgajdos@suse.compgajdos@suse.commeissner@suse.compgajdos@suse.compgajdos@suse.compgajdos@suse.comidonmez@suse.compgajdos@suse.compgajdos@suse.commeissner@suse.compgajdos@suse.combrian@aljex.comidonmez@suse.comi@marguerite.sui@marguerite.sucfarrell@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcoolo@suse.comcrrodriguez@opensuse.orgpgajdos@suse.czpgajdos@suse.czpgajdos@suse.czpgajdos@suse.czpgajdos@suse.czpgajdos@suse.czpgajdos@suse.czpgajdos@suse.czpgajdos@suse.czjengelh@medozas.depgajdos@suse.cznadvornik@suse.cz- security update * CVE-2018-19210 [bsc#1115717] + tiff-CVE-2018-19210.patch- asan_build: build ASAN included - debug_build: build more suitable for debugging- security update * CVE-2018-18661 [bsc#1113672] + tiff-CVE-2018-18661.patch * CVE-2018-18557 [bsc#1113094] + tiff-CVE-2018-18557.patch * CVE-2018-12900 [bsc#1099257] + tiff-CVE-2018-12900.patch- security update * CVE-2018-17100 [bsc#1108637] + tiff-CVE-2018-17100.patch * CVE-2018-17101 [bsc#1108627] + tiff-CVE-2018-17101.patch * CVE-2018-17795 [bsc#1110358] % tiff-CVE-2017-9935,17973.patch renamed to tiff-CVE-2017-9935,17973,CVE-2018-17795.patch * CVE-2018-16335 [bsc#1106853] % tiff-CVE-2017-11613.patch renamed to tiff-CVE-2017-11613,CVE-2018-16335,15209.patch- security update * CVE-2017-17942 [bsc#1074186], CVE-2016-5319 [bsc#983440] + tiff-CVE-2017-17942,CVE-2016-5319.patch- security update * CVE-2018-10779 [bsc#1092480] + tiff-CVE-2018-10779.patch- security update * CVE-2018-7456 [bsc#1082825] + tiff-CVE-2018-7456.patch * CVE-2017-11613 [bsc#1082332] + tiff-CVE-2017-11613.patch * CVE-2018-8905 [bsc#1086408] + tiff-CVE-2018-8905.patch- security update * CVE-2017-18013 [bsc#1074317] + tiff-CVE-2017-18013.patch- security update * CVE-2018-10963 [bsc#1092949] + tiff-CVE-2018-10963.patch- security update * CVE-2017-9935 [bsc#1046077], CVE-2017-17973 [bsc#1074318] + tiff-CVE-2017-9935,17973.patch- bsc#1081690: Add tiff-4.0.9-CVE-2018-5784.patch Fix uncontrolled resource consumption in TIFFSetDirectory- Fix check section: + Make sure to get back to the right directory after chdir to 'tools', or we can't run the 2nd test suite. + Fix typo: the tests are located in a directory called 'test', not 'tests'.- Upgrade to upstream release 4.0.9 * Changes in the software configuration: + test/Makefile.am: Add some tests for tiff2bw. + .appveyor.yml, .travis.yml, build/travis-ci: apply patches 0001-ci-Travis-script-improvements.patch and 0002-ci-Invoke-helper-script-via-shell.patch by Roger Leigh + .travis.yml, build/travis-ci: new files from 0001-ci-Add-Travis-support-for-Linux-builds-with-Autoconf.patch by Roger Leigh. This patch adds support for the Travis-CI service. + .appveyor.yml: new file from 0002-ci-Add-AppVeyor-support.patch by Roger Leigh (sent to mailing list on 2017-06-08) This patch adds a .appveyor.yml file to the top-level. This allows one to opt in to having a branch built on Windows with Cygwin, MinGW and MSVC automatically when a branch is pushed to GitHub, GitLab, BitBucket or any other supported git hosting service. + CMakeLists.txt, test/CMakeLists.txt, test/TiffTestCommon.cmake: apply patch 0001-cmake-Improve-Cygwin-and-MingGW-test-support.patch from Roger Leigh. This patch makes the CMake build system support running the tests with MinGW or Cygwin. + test/tiffcp-lzw-compat.sh, test/images/quad-lzw-compat.tiff: new files to test old-style LZW decompression + test/common.sh, Makefile.am, CMakeList.txt: updated with above + test/Makefile.am: add missing reference to images/quad-lzw-compat.tiff to fix "make distcheck". Patch by Roger Leigh + nmake.opt: support a DEBUG=1 option, so as to adjust OPTFLAGS and use /MDd runtime in debug mode. * Changes in libtiff: + libtiff/tif_color.c: TIFFYCbCrToRGBInit(): stricter clamping to avoid int32 overflow in TIFFYCbCrtoRGB(). Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1844 + libtiff/tif_getimage.c: initYCbCrConversion(): stricter validation for refBlackWhite coefficients values. To avoid invalid float->int32 conversion (when refBlackWhite[0] == 2147483648.f) Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1907 + libtiff/tif_dirinfo.c, tif_dirread.c: add _TIFFCheckFieldIsValidForCodec(), and use it in TIFFReadDirectory() so as to ignore fields whose tag is a codec-specified tag but this codec is not enabled. This avoids TIFFGetField() to behave differently depending on whether the codec is enabled or not, and thus can avoid stack based buffer overflows in a number of TIFF utilities such as tiffsplit, tiffcmp, thumbnail, etc. Patch derived from 0063-Handle-properly-CODEC-specific-tags.patch (http://bugzilla.maptools.org/show_bug.cgi?id=2580) by Raphaël Hertzog. Fixes: http://bugzilla.maptools.org/show_bug.cgi?id=2580 http://bugzilla.maptools.org/show_bug.cgi?id=2693 http://bugzilla.maptools.org/show_bug.cgi?id=2625 (CVE-2016-10095, bsc#1017690) http://bugzilla.maptools.org/show_bug.cgi?id=2564 (CVE-2015-7554, bsc#960341) http://bugzilla.maptools.org/show_bug.cgi?id=2561 (CVE-2016-5318, bsc#983436) http://bugzilla.maptools.org/show_bug.cgi?id=2499 (CVE-2014-8128, bsc#969783) http://bugzilla.maptools.org/show_bug.cgi?id=2441 http://bugzilla.maptools.org/show_bug.cgi?id=2433 + libtiff/tif_swab.c: if DISABLE_CHECK_TIFFSWABMACROS is defined, do not do the #ifdef TIFFSwabXXX checks. Make it easier for GDAL to rename the symbols of its internal libtiff copy. + libtiff/tif_dirread.c: fix regression of libtiff 4.0.8 in ChopUpSingleUncompressedStrip() regarding update of newly single-strip uncompressed files whose bytecount is 0. Before the change of 2016-12-03, the condition bytecount==0 used to trigger an early exit/disabling of strip chop. Re-introduce that in update mode. Otherwise this cause later incorrect setting for the value of StripByCounts/StripOffsets. (https://trac.osgeo.org/gdal/ticket/6924) + libtiff/tif_dirread.c: TIFFFetchStripThing(): limit the number of items read in StripOffsets/StripByteCounts tags to the number of strips to avoid excessive memory allocation. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2215 + libtiff/tif_getimage.c: avoid many (harmless) unsigned int overflows. + libtiff/tif_fax3.c: avoid unsigned int overflow in Fax3Encode2DRow(). Could potentially be a bug with huge rows. + libtiff/tif_jpeg.c: avoid (harmless) unsigned int overflow on tiled images. + libtiff/tif_dirread.c: avoid unsigned int overflow in EstimateStripByteCounts() and BYTECOUNTLOOKSBAD when file is too short. + libtiff/tif_predict.c: decorate legitimate functions where unsigned int overflow occur with TIFF_NOSANITIZE_UNSIGNED_INT_OVERFLOW + libtiff/tif_dirread.c: avoid unsigned int overflow in EstimateStripByteCounts() + libtiff/tiffiop.h: add TIFF_NOSANITIZE_UNSIGNED_INT_OVERFLOW macro to disable CLang warnings raised by - fsanitize=undefined,unsigned-integer-overflow + libtiff/tif_jpeg.c: add anti-denial of service measure to avoid excessive CPU consumption on progressive JPEGs with a huge number of scans. See http://www.libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththeJPEGStandard.pdf Note: only affects libtiff since 2014-12-29 where support of non-baseline JPEG was added. + libtiff/tif_jpeg.c: error out at decoding time if anticipated libjpeg memory allocation is above 100 MB. libjpeg in case of multiple scans, which is allowed even in baseline JPEG, if components are spread over several scans and not interleavedin a single one, needs to allocate memory (or backing store) for the whole strip/tile. See http://www.libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththeJPEGStandard.pdf This limitation may be overriden by setting the LIBTIFF_ALLOW_LARGE_LIBJPEG_MEM_ALLOC environment variable, or recompiling libtiff with a custom value of TIFF_LIBJPEG_LARGEST_MEM_ALLOC macro. + libtiff/tif_jbig.c: fix memory leak in error code path of JBIGDecode() Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2706 (CVE-2017-9936, bsc#1046073) + libtiff/tif_dirread.c: in TIFFReadDirEntryFloat(), check that a double value can fit in a float before casting. + libtiff/tiffiop.h, libtiff/tif_jpeg.c, libtiff/tif_jpeg_12.c, libtiff/tif_read.c: make TIFFReadScanline() works in CHUNKY_STRIP_READ_SUPPORT mode with JPEG stream with multiple scans. Also make configurable through a LIBTIFF_JPEG_MAX_ALLOWED_SCAN_NUMBER environment variable the maximum number of scans allowed. Defaults to 100. + libtiff/tif_read.c: TIFFFillTile(): add limitation to the number of bytes read in case td_stripbytecount[strip] is bigger than reasonable, so as to avoid excessive memory allocation (similarly to what was done for TIFFFileStrip() on 2017-05-10) + libtiff/tif_getimage.c: use _TIFFReadEncodedStripAndAllocBuffer(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2708 and https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2433 + libtiff/tif_read.c, tiffiop.h: add a _TIFFReadEncodedStripAndAllocBuffer() function, variant of TIFFReadEncodedStrip() that allocates the decoded buffer only after a first successful TIFFFillStrip(). This avoids excessive memory allocation on corrupted files. + libtiff/tif_dirwrite.c: in TIFFWriteDirectoryTagCheckedXXXX() functions associated with LONG8/SLONG8 data type, replace assertion that the file is BigTIFF, by a non-fatal error. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2712 + libtiff/tif_read.c: TIFFStartTile(): set tif_rawcc to tif_rawdataloaded when it is set. Similarly to TIFFStartStrip(). This issue was revealed by the change of 2017-06-30 in TIFFFileTile(), limiting the number of bytes read. But it could probably have been hit too in CHUNKY_STRIP_READ_SUPPORT mode previously. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2454 + libtiff/tif_error.c, tif_warning.c: correctly use va_list when both an old-style and new-style warning/error handlers are installed. Patch by Paavo Helde (sent on the mailing list) + libtiff/tif_getimage.c: use _TIFFReadTileAndAllocBuffer(). Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2470 + libtiff/tif_read.c, tiffiop.h: add a _TIFFReadEncodedTileAndAllocBuffer() and _TIFFReadTileAndAllocBuffer() variants of TIFFReadEncodedTile() and TIFFReadTile() that allocates the decoded buffer only after a first successful TIFFFillTile(). This avoids excessive memory allocation on corrupted files. + libtiff/tif_pixarlog.c: avoid excessive memory allocation on decoding when RowsPerStrip tag is not defined (and thus td_rowsperstrip == UINT_MAX) Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2554 + libtiff/tif_lzw.c: fix 4.0.8 regression in the decoding of old-style LZW compressed files. + libtiff/tif_lzw.c: fix potential out-of-buffer read on 1-byte LZW strips. Crashing issue only on memory mapped files, where the strip offset is the last byte of the file, and the file size is a multiple of one page size on the CPU architecture (typically 4096) + libtiff/tif_dir.c: avoid potential null pointer dereference in _TIFFVGetField() on corrupted TIFFTAG_NUMBEROFINKS tag instance. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2713 + tools/tiff2pdf.c: prevent heap buffer overflow write in "Raw" mode on PlanarConfig=Contig input images. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2715 + libtiff/tif_read.c: TIFFFillStrip() / TIFFFillTile(). Complementary fix for http://bugzilla.maptools.org/show_bug.cgi?id=2708 in the isMapped() case, so as to avoid excessive memory allocation when we need a temporary buffer but the file is truncated. + libtiff/tif_read.c: in TIFFFetchStripThing(), only grow the arrays that hold StripOffsets/StripByteCounts, when they are smaller than the expected number of striles, up to 1 million striles, and error out beyond. Can be tweaked by setting the environment variable LIBTIFF_STRILE_ARRAY_MAX_RESIZE_COUNT. This partially goes against a change added on 2002-12-17 to accept those arrays of wrong sizes, but is needed to avoid denial of services. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2350 + libtiff/tif_read.c: add protection against excessive memory allocation attempts in TIFFReadDirEntryArray() on short files. Effective for mmap'ed case. And non-mmap'ed case, but restricted to 64bit builds. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2675 (CVE-2017-12944, bsc#1054594) + libtiff/tif_luv.c: LogLuvInitState(): avoid excessive memory allocation when RowsPerStrip tag is missing. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2683 + libtiff/tif_getimage.c: gtTileContig() and gtTileSeparate(): properly break from loops on error when stoponerr is set, instead of going on iterating on row based loop. + libtiff/tif_getimage.c: fix fromskew computation when to-be-skipped pixel number is not a multiple of the horizontal subsampling, and also in some other cases. Impact putcontig8bitYCbCr44tile, putcontig8bitYCbCr42tile, putcontig8bitYCbCr41tile, putcontig8bitYCbCr21tile and putcontig8bitYCbCr12tile Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2637 and https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2691 + libtiff/tif_luv.c: further reduce memory requirements for temporary buffer when RowsPerStrip >= image_length in LogLuvInitState() and LogL16InitState(). Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2700 + libtiff/tif_dirwrite.c: replace assertion related to not finding the SubIFD tag by runtime check (in TIFFWriteDirectorySec()) Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2727 + libtiff/tif_dirwrite.c: replace assertion to tag value not fitting on uint32 when selecting the value of SubIFD tag by runtime check (in TIFFWriteDirectoryTagSubifd()). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2728 + libtiff/tif_jpeg.c: accept reading the last strip of a JPEG compressed file if the codestream height is larger than the truncated height of the strip. Emit a warning in this situation since this is non compliant. + libtiff/tiffiop.h, tif_aux.c: redirect SeekOK() macro to a _TIFFSeekoK() function that checks if the offset is not bigger than INT64_MAX, so as to avoid a -1 error return code of TIFFSeekFile() to match a required seek to UINT64_MAX/-1. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2726 + libtiff/tif_dirread.c: add NULL check to avoid likely false positive null-pointer dereference warning by CLang Static Analyzer. + libtiff/libtiff.def: add TIFFReadRGBAStripExt and TIFFReadRGBATileExt Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2735 + libtiff/tif_jpeg.c: add compatibility with libjpeg-turbo 1.5.2 that honours max_memory_to_use > 0. Cf https://github.com/libjpeg-turbo/libjpeg-turbo/issues/162 + libtiff/tif_getimage.c: avoid floating point division by zero in initCIELabConversion() Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3733 * Changes in the tools: + tools/tiff2pdf.c: prevent heap buffer overflow write in "Raw" mode on PlanarConfig=Contig input images. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2715 + tools/tiffset.c: fix setting a single value for the ExtraSamples tag (and other tags with variable number of values). So 'tiffset -s ExtraSamples 1 X'. This only worked when setting 2 or more values, but not just one. + tools/fax2tiff.c (_FAX_Client_Data): Pass FAX_Client_Data as the client data. This client data is not used at all at the moment, but it makes the most sense. Issue that the value of client_data.fd was passed where a pointer is expected. + tools/tiff2pdf.c (t2p_sample_realize_palette): Fix possible arithmetic overflow in bounds checking code and eliminate comparison between signed and unsigned type. + tools/tiff2bw.c (main): Free memory allocated in the tiff2bw program. This is in response to the report associated with CVE-2017-16232, bsc#1069213 but does not solve the extremely high memory usage with the associated POC file. * CVE-2016-10092, CVE-2016-10093, CVE-2016-10094 [bsc#1017693]- Upgrade to upstream release 4.0.8 * libtiff/tif_getimage.c, libtiff/tif_open.c + add parenthesis to fix cppcheck clarifyCalculation warnings * libtiff/tif_predict.c, libtiff/tif_print.c + fix printf unsigned vs signed formatting (cppcheck invalidPrintfArgType_uint warnings) * libtiff/tif_read.c, libtiff/tiffiop.h + fix uint32 overflow in TIFFReadEncodedStrip() that caused an integer division by zero. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2596 * libtiff/tif_pixarlog.c, libtiff/tif_luv.c + fix heap-based buffer overflow on generation of PixarLog / LUV compressed files, with ColorMap, TransferFunction attached and nasty plays with bitspersample. The fix for LUV has not been tested, but suffers from the same kind of issue of PixarLog. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2604 * libtiff/tif_strip.c + revert the change in TIFFNumberOfStrips() done for http://bugzilla.maptools.org/show_bug.cgi?id=2587 / CVE-2016-9273 since the above change is a better fix that makes it unnecessary. * libtiff/tif_dirread.c + modify ChopUpSingleUncompressedStrip() to instanciate compute ntrips as TIFFhowmany_32(td->td_imagelength, rowsperstrip), instead of a logic based on the total size of data. Which is faulty is the total size of data is not sufficient to fill the whole image, and thus results in reading outside of the StripByCounts/StripOffsets arrays when using TIFFReadScanline(). Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2608. * libtiff/tif_ojpeg.c + make OJPEGDecode() early exit in case of failure in OJPEGPreDecode(). This will avoid a divide by zero, and potential other issues. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2611 * libtiff/tif_write.c + fix misleading indentation as warned by GCC. * libtiff/tif_fax3.h + revert change done on 2016-01-09 that made Param member of TIFFFaxTabEnt structure a uint16 to reduce size of the binary. It happens that the Hylafax software uses the tables that follow this typedef (TIFFFaxMainTable, TIFFFaxWhiteTable, TIFFFaxBlackTable), although they are not in a public libtiff header. Raised by Lee Howard. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2636 * libtiff/tiffio.h, libtiff/tif_getimage.c + add TIFFReadRGBAStripExt() and TIFFReadRGBATileExt() variants of the functions without ext, with an extra argument to control the stop_on_error behaviour. * libtiff/tif_getimage.c + fix potential memory leaks in error code path of TIFFRGBAImageBegin(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2627 * libtiff/tif_jpeg.c + increase libjpeg max memory usable to 10 MB instead of libjpeg 1MB default. This helps when creating files with "big" tile, without using libjpeg temporary files. Related to https://trac.osgeo.org/gdal/ticket/6757 * libtiff/tif_jpeg.c + avoid integer division by zero in JPEGSetupEncode() when horizontal or vertical sampling is set to 0. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2653, bsc#1033127, CVE-2017-7595 * libtiff/tif_dirwrite.c + in TIFFWriteDirectoryTagCheckedRational, replace assertion by runtime check to error out if passed value is strictly negative. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2535, bsc#1038438, CVE-2016-10371 * libtiff/tif_dirread.c + avoid division by floating point 0 in TIFFReadDirEntryCheckedRational() and TIFFReadDirEntryCheckedSrational(), and return 0 in that case (instead of infinity as before presumably) Apparently some sanitizers do not like those divisions by zero. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2644, bsc#1033118, CVE-2017-7598 * libtiff/tif_dir.c, tif_dirread.c, tif_dirwrite.c + implement various clampings of double to other data types to avoid undefined behaviour if the output range isn't big enough to hold the input value. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2643 http://bugzilla.maptools.org/show_bug.cgi?id=2642 http://bugzilla.maptools.org/show_bug.cgi?id=2646 http://bugzilla.maptools.org/show_bug.cgi?id=2647, bsc#1033126, CVE-2017-7596, bsc#1033120, CVE-2017-7597, bsc#1033113, CVE-2017-7599, bsc#1033112, CVE-2017-7600, * libtiff/tif_jpeg.c + validate BitsPerSample in JPEGSetupEncode() to avoid undefined behaviour caused by invalid shift exponent. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2648, bsc#1033111, CVE-2017-7601 * libtiff/tif_read.c + avoid potential undefined behaviour on signed integer addition in TIFFReadRawStrip1() in isMapped() case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2650, bsc#1033109, CVE-2017-7602 * libtiff/tif_getimage.c + add explicit uint32 cast in putagreytile to avoid UndefinedBehaviorSanitizer warning. Patch by Nicolas Pena. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2658, bsc#1033131, CVE-2017-7592 * libtiff/tif_read.c + TIFFReadBufferSetup(): use _TIFFcalloc() to zero initialize tif_rawdata. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2651, bsc#1033129, CVE-2017-7593 * libtiff/tiffio.h, tif_unix.c, tif_win32.c, tif_vms.c + add _TIFFcalloc() * libtiff/tif_luv.c, tif_lzw.c, tif_packbits.c + return 0 in Encode functions instead of -1 when TIFFFlushData1() fails. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2130 * libtiff/tif_ojpeg.c + fix leak in OJPEGReadHeaderInfoSecTablesQTable, OJPEGReadHeaderInfoSecTablesDcTable and OJPEGReadHeaderInfoSecTablesAcTable when read fails. Patch by Nicolas Pena. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2659, bsc#1033128, CVE-2017-7594 * libtiff/tif_jpeg.c + only run JPEGFixupTagsSubsampling() if the YCbCrSubsampling tag is not explicitly present. This helps a bit to reduce the I/O amount when the tag is present (especially on cloud hosted files). * libtiff/tif_lzw.c + in LZWPostEncode(), increase, if necessary, the code bit-width after flushing the remaining code and before emitting the EOI code. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=1982 * libtiff/tif_pixarlog.c + fix memory leak in error code path of PixarLogSetupDecode(). Patch by Nicolas Pena. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2665 * libtiff/tif_fax3.c, tif_predict.c, tif_getimage.c + fix GCC 7 -Wimplicit-fallthrough warnings. * libtiff/tif_dirread.c + fix memory leak in non DEFER_STRILE_LOAD mode (ie default) when there is both a StripOffsets and TileOffsets tag, or a StripByteCounts and TileByteCounts Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2689, bsc#1042805, CVE-2017-9403) * libtiff/tif_ojpeg.c + fix potential memory leak in OJPEGReadHeaderInfoSecTablesQTable, OJPEGReadHeaderInfoSecTablesDcTable and OJPEGReadHeaderInfoSecTablesAcTable Patch by Nicolas Pena. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2670 * libtiff/tif_fax3.c + avoid crash in Fax3Close() on empty file. Patch by Alan Coopersmith + complement by myself. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2673 * libtiff/tif_read.c + TIFFFillStrip(): add limitation to the number of bytes read in case td_stripbytecount[strip] is bigger than reasonable, so as to avoid excessive memory allocation. * libtiff/tif_zip.c, tif_pixarlog.c, tif_predict.c + fix memory leak when the underlying codec (ZIP, PixarLog) succeeds its setupdecode() method, but PredictorSetup fails. Credit to OSS-Fuzz (locally run, on GDAL) * libtiff/tif_read.c + TIFFFillStrip() and TIFFFillTile(): avoid excessive memory allocation in case of shorten files. Only effective on 64 bit builds and non-mapped cases. Credit to OSS-Fuzz (locally run, on GDAL) * libtiff/tif_read.c + TIFFFillStripPartial() / TIFFSeek(), avoid potential integer overflows with read_ahead in CHUNKY_STRIP_READ_SUPPORT mode. Should especially occur on 32 bit platforms. * libtiff/tif_read.c + TIFFFillStripPartial() + avoid excessive memory allocation in case of shorten files. Only effective on 64 bit builds. Credit to OSS-Fuzz (locally run, on GDAL) * libtiff/tif_read.c + update tif_rawcc in CHUNKY_STRIP_READ_SUPPORT mode with tif_rawdataloaded when calling TIFFStartStrip() or TIFFFillStripPartial(). This avoids reading beyond tif_rawdata when bytecount > tif_rawdatasize. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1545. Credit to OSS-Fuzz * libtiff/tif_color.c + avoid potential int32 overflow in TIFFYCbCrToRGBInit() Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1533 Credit to OSS-Fuzz * libtiff/tif_pixarlog.c, tif_luv.c + avoid potential int32 overflows in multiply_ms() and add_ms(). Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1558 Credit to OSS-Fuzz * libtiff/tif_packbits.c + fix out-of-buffer read in PackBitsDecode() Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1563 Credit to OSS-Fuzz * libtiff/tif_luv.c + LogL16InitState(): avoid excessive memory allocation when RowsPerStrip tag is missing. Credit to OSS-Fuzz (locally run, on GDAL) * libtiff/tif_lzw.c + update dec_bitsleft at beginning of LZWDecode(), and update tif_rawcc at end of LZWDecode(). This is needed to properly work with the latest chnges in tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode. * libtiff/tif_pixarlog.c + PixarLogDecode(): resync tif_rawcp with next_in and tif_rawcc with avail_in at beginning and end of function, similarly to what is done in LZWDecode(). Likely needed so that it works properly with latest chnges in tif_read.c in CHUNKY_STRIP_READ_SUPPORT mode. But untested... * libtiff/tif_getimage.c + initYCbCrConversion(): add basic validation of luma and refBlackWhite coefficients (just check they are not NaN for now), to avoid potential float to int overflows. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1663 Credit to OSS Fuzz * libtiff/tif_read.c + _TIFFVSetField(): fix outside range cast of double to float. Credit to Google Autofuzz project * libtiff/tif_getimage.c + initYCbCrConversion(): check luma[1] is not zero to avoid division by zero. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665 Credit to OSS Fuzz * libtiff/tif_read.c + _TIFFVSetField(): fix outside range cast of double to float. Credit to Google Autofuzz project * libtiff/tif_getimage.c + initYCbCrConversion(): check luma[1] is not zero to avoid division by zero. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1665 Credit to OSS Fuzz * libtiff/tif_getimage.c + initYCbCrConversion(): stricter validation for refBlackWhite coefficients values. To avoid invalid float->int32 conversion. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1718 Credit to OSS Fuzz * tools/fax2tiff.c (main) + Applied patch by Joerg Ahrens to fix passing client data for Win32 builds using tif_win32.c (USE_WIN32_FILEIO defined) for file I/O. Patch was provided via email on November 20, 2016. * tools/tiffcp.c + avoid uint32 underflow in cpDecodedStrips that can cause various issues, such as buffer overflows in the library. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2598 * tools/tiffcrop.c + fix readContigStripsIntoBuffer() in -i (ignore) mode so that the output buffer is correctly incremented to avoid write outside bounds. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2620 * tools/tiffcrop.c + add 3 extra bytes at end of strip buffer in readSeparateStripsIntoBuffer() to avoid read outside of heap allocated buffer. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2621 * tools/tiffcrop.c + fix integer division by zero when BitsPerSample is missing. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2619 * tools/tiffinfo.c + fix null pointer dereference in -r mode when the image has no StripByteCount tag. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2594 * tools/tiffcp.c + avoid potential division by zero is BitsPerSamples tag is missing. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2597 * tools/tif_dir.c + when TIFFGetField(, TIFFTAG_NUMBEROFINKS, ) is called, limit the return number of inks to SamplesPerPixel, so that code that parses ink names doesn't go past the end of the buffer. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2599 * tools/tiffcp.c + avoid potential division by zero is BitsPerSamples tag is missing. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2607 * tools/tiffcp.c + fix uint32 underflow/overflow that can cause heap-based buffer overflow. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2610 * tools/tiffcp.c + replace assert( (bps % 8) == 0 ) by a non assert check. Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2605 * tools/tiff2ps.c + fix 2 heap-based buffer overflows (in PSDataBW and PSDataColorContig). Reported by Agostino Sarubbo. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2633 and http://bugzilla.maptools.org/show_bug.cgi?id=2634. * tools/tiff2pdf.c + prevent heap-based buffer overflow in -j mode on a paletted image. Note: this fix errors out before the overflow happens. There could probably be a better fix. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2635 * tools/tiff2pdf.c + fix wrong usage of memcpy() that can trigger unspecified behaviour. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2638 * tools/tiff2pdf.c + avoid potential invalid memory read in t2p_writeproc. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2639 * tools/tiff2pdf.c + avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640 * tools/tiffcrop.c + remove extraneous TIFFClose() in error code path, that caused double free. Related to http://bugzilla.maptools.org/show_bug.cgi?id=2535 * tools/tiffcp.c + error out cleanly in cpContig2SeparateByRow and cpSeparate2ContigByRow if BitsPerSample != 8 to avoid heap based overflow. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2656 and http://bugzilla.maptools.org/show_bug.cgi?id=2657 * tools/raw2tiff.c + avoid integer division by zero. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2631 * tools/tiff2ps.c + call TIFFClose() in error code paths. * tools/fax2tiff.c + emit appropriate message if the input file is empty. Patch by Alan Coopersmith. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2672 * tools/tiff2bw.c + close TIFF handle in error code path. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2677 * Other issues fixed: + bsc#1042804, CVE-2017-9404 - Removed patches: * tiff-4.0.7-CVE-2015-7554.patch * tiff-4.0.7-CVE-2017-5225.patch * tiff-4.0.7-TIFFTAG_FAXRECVPARAMS.patch * tiff-CVE-2016-10266.patch * tiff-CVE-2016-10267.patch * tiff-CVE-2016-10268.patch * tiff-CVE-2016-10269.patch * tiff-CVE-2016-10270.patch * tiff-CVE-2016-10271.patch * tiff-CVE-2016-10272.patch + Fixed upstream - Modified patch: * ras2tiff-comeback.patch + rediff to changed context - we found (bug 1007276 comment 3) it fixes also: * CVE-2016-8331 [bsc#1007276] * CVE-2016-3632 [bsc#974621]- Added patches: * tiff-CVE-2016-10266.patch + Upstream fix for CVE-2016-10266, LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image (bsc#1031263) * tiff-CVE-2016-10267.patch + Upstream fix for CVE-2016-10267, LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image (bsc#1031262) * tiff-CVE-2016-10268.patch + Upstream fix for CVE-2016-10268, LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image (bsc#1031255) * tiff-CVE-2016-10269.patch + Upstream fix for CVE-2016-10269, LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image (bsc#1031254) * tiff-CVE-2016-10270.patch + Upstream fix for CVE-2016-10270, LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image (bsc#1031250) * tiff-CVE-2016-10271.patch + Upstream fix for CVE-2016-10271, LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image (bsc#1031249) * tiff-CVE-2016-10272.patch + Upstream fix for CVE-2016-10272, LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image (bsc#1031247)- Added patch: * tiff-4.0.7-TIFFTAG_FAXRECVPARAMS.patch - Fix a regression introduced in 4.0.7 (bsc#1022103) - http://bugzilla.maptools.org/show_bug.cgi?id=2636- Added patch: * tiff-4.0.7-CVE-2017-5225.patch - Upstream fix for CVE-2017-5225, bsc#1019611: heap buffer overflow in tools/tiffcp via a crafted BitsPerSample value- Drop --with-pic, this is only for static libs (which are not built) - Update descriptions- Update homepage- Bring back the bmp2tiff, gif2tiff, ras2tiff, thumbnail and rgb2ycbcr tools- Upgrade to upstream release 4.0.7 * libtiff/tif_aux.c + Fix crash in TIFFVGetFieldDefaulted() when requesting Predictor tag and that the zip/lzw codec is not configured. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2591 * libtiff/tif_compress.c + Make TIFFNoDecode() return 0 to indicate an error and make upper level read routines treat it accordingly. (linked to the test case of http://bugzilla.maptools.org/show_bug.cgi?id=2517) * libtiff/tif_dir.c + Discard values of SMinSampleValue and SMaxSampleValue when they have been read and the value of SamplesPerPixel is changed afterwards (like when reading a OJPEG compressed image with a missing SamplesPerPixel tag, and whose photometric is RGB or YCbCr, forcing SamplesPerPixel being 3). Otherwise when rewriting the directory (for example with tiffset, we will expect 3 values whereas the array had been allocated with just one), thus causing a out of bound read access. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2500 (CVE-2014-8127, bsc#914890, duplicate: CVE-2016-3658, bsc#974840) * libtiff/tif_dirread.c + In TIFFFetchNormalTag(), do not dereference NULL pointer when values of tags with TIFF_SETGET_C16_ASCII/TIFF_SETGET_C32_ASCII access are 0-byte arrays. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2593 (regression introduced by previous fix done on 2016-11-11 for CVE-2016-9297, bsc#1010161). Assigned as CVE-2016-9448, bsc#1011103 + In TIFFFetchNormalTag(), make sure that values of tags with TIFF_SETGET_C16_ASCII/TIFF_SETGET_C32_ASCII access are null terminated, to avoid potential read outside buffer in _TIFFPrintField(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2590 (CVE-2016-9297, bsc#1010161) + Initialize doubledata at line 3693 to NULL to please MSVC 2013 + Prevent reading ColorMap or TransferFunction if BitsPerPixel > 24, so as to avoid huge memory allocation and file read attempts + Reject images with OJPEG compression that have no TileOffsets/StripOffsets tag, when OJPEG compression is disabled. Prevent null pointer dereference in TIFFReadRawStrip1() and other functions that expect td_stripbytecount to be non NULL. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2585 + When compiled with DEFER_STRILE_LOAD, fix regression, when reading a one-strip file without a StripByteCounts tag. + Workaround false positive warning of Clang Static Analyzer about null pointer dereference in TIFFCheckDirOffset(). * libtiff/tif_dirwrite.c + Avoid null pointer dereference on td_stripoffset when writing directory, if FIELD_STRIPOFFSETS was artificially set for a hack case in OJPEG case. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2500 (CVE-2014-8127, bsc#914890, duplicate: CVE-2016-3658, bsc#974840) + Fix truncation to 32 bit of file offsets in TIFFLinkDirectory() and TIFFWriteDirectorySec() when aligning directory offsets on an even offset (affects BigTIFF). * libtiff/tif_dumpmode.c + DumpModeEncode() should return 0 in case of failure so that the above mentionned functions detect the error. * libtiff/tif_fax3.c + remove dead assignment in Fax3PutEOLgdal(). * libtiff/tif_fax3.h + make Param member of TIFFFaxTabEnt structure a uint16 to reduce size of the binary. * libtiff/tif_getimage.c + Fix out-of-bound reads in TIFFRGBAImage interface in case of unsupported values of SamplesPerPixel/ExtraSamples for LogLUV/CIELab. Add explicit call to TIFFRGBAImageOK() in TIFFRGBAImageBegin(). Fix CVE-2015-8665 and CVE-2015-8683. + Fix some benign warnings which appear in 64-bit compilation under Microsoft Visual Studio of the form "Arithmetic overflow: 32-bit value is shifted, then cast to 64-bit value. Results might not be an expected value." + TIFFRGBAImageOK: Reject attempts to read floating point images. * libtiff/tif_luv.c + Fix potential out-of-bound writes in decode functions in non debug builds by replacing assert()s by regular if checks (http://bugzilla.maptools.org/show_bug.cgi?id=2522). Fix potential out-of-bound reads in case of short input data. + Validate that for COMPRESSION_SGILOG and PHOTOMETRIC_LOGL, there is only one sample per pixel. Avoid potential invalid memory write on corrupted/unexpected images when using the TIFFRGBAImageBegin() interface * libtiff/tif_next.c + Fix potential out-of-bound write in NeXTDecode() (http://bugzilla.maptools.org/show_bug.cgi?id=2508) * libtiff/tif_pixarlog.c + Avoid zlib error messages to pass a NULL string to %s formatter, which is undefined behaviour in sprintf(). + Fix out-of-bounds write vulnerabilities in heap allocated buffers. Reported as MSVR 35094. + Fix potential buffer write overrun in PixarLogDecode() on corrupted/unexpected images (CVE-2016-5875, bsc#987351) + Fix write buffer overflow in PixarLogEncode if more input samples are provided than expected by PixarLogSetupEncode. Idea based on libtiff-CVE-2016-3990.patch from libtiff-4.0.3-25.el7_2.src.rpm, but with different and simpler check. (http://bugzilla.maptools.org/show_bug.cgi?id=2544, bsc#975069) * libtiff/tif_predict.c + PredictorSetup: Enforce bits-per-sample requirements of floating point predictor (3). Fixes CVE-2016-3622 "Divide By Zero in the tiff2rgba tool." (bsc#974449) * libtiff/tif_predict.h, libtiff/tif_predict.c + Replace assertions by runtime checks to avoid assertions in debug mode, or buffer overflows in release mode. Can happen when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105. * libtiff/tif_read.c + Fix out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1() when stripoffset is beyond tmsize_t max value (bsc#990460, CVE-20167-6223) + Make TIFFReadEncodedStrip() and TIFFReadEncodedTile() directly use user provided buffer when no compression (and other conditions) to save a memcpy(). * libtiff/tif_strip.c + Make TIFFNumberOfStrips() return the td->td_nstrips value when it is non-zero, instead of recomputing it. This is needed in TIFF_STRIPCHOP mode where td_nstrips is modified. Fixes a read outsize of array in tiffsplit (or other utilities using TIFFNumberOfStrips()). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2587 (CVE-2016-9273, bsc#1010163) * libtiff/tif_write.c + Fix issue in error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. I'm not completely sure if that could happen in practice outside of the odd behaviour of t2p_seekproc() of tiff2pdf). The report points that a better fix could be to check the return value of TIFFFlushData1() in places where it isn't done currently, but it seems this patch is enough. Reported as MSVR 35095. + Make TIFFWriteEncodedStrip() and TIFFWriteEncodedTile() directly use user provided buffer when no compression to save a memcpy(). + TIFFWriteEncodedStrip() and TIFFWriteEncodedTile() should return -1 in case of failure of tif_encodestrip() as documented * tools/fax2tiff.D c + Fix segfault when specifying -r without argument. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2572 * tools/Makefile.am + The libtiff tools bmp2tiff, gif2tiff, ras2tiff, sgi2tiff, sgisv, and ycbcr are completely removed from the distribution. The libtiff tools rgb2ycbcr and thumbnail are only built in the build tree for testing. Old files are put in new 'archive' subdirectory of the source repository, but not in distribution archives. These changes are made in order to lessen the maintenance burden. * tools/rgb2ycbcr.c + Validate values of -v and -h parameters to avoid potential divide by zero. Fixes CVE-2016-3623, bsc#974618 (http://bugzilla.maptools.org/show_bug.cgi?id=2569) * tools/tiff2bw.c + Fix weight computation that could result of color value overflow (no security implication). Fix http://bugzilla.maptools.org/show_bug.cgi?id=2550. * tools/tiff2pdf.c + Avoid undefined behaviour related to overlapping of source and destination buffer in memcpy() call in t2p_sample_rgbaa_to_rgb() Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2577 + Fix out-of-bounds write vulnerabilities in heap allocate buffer in t2p_process_jpeg_strip(). Reported as MSVR 35098. + Fix potential integer overflows on 32 bit builds in t2p_read_tiff_size() Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2576 + Fix read -largely- outsize of buffer in t2p_readwrite_pdf_image_tile(), causing crash, when reading a JPEG compressed image with TIFFTAG_JPEGTABLES length being one. Reported as MSVR 35101. CVE-2016-9453, bsc#1011107 + Fix write buffer overflow of 2 bytes on JPEG compressed images. Reported as TALOS-CAN-0187, CVE-2016-5652, bsc#1007280. Also prevents writing 2 extra uninitialized bytes to the file stream. * tools/tiff2rgba.c + Fix integer overflow in size of allocated buffer, when -b mode is enabled, that could result in out-of-bounds write. Based initially on patch tiff-CVE-2016-3945.patch from libtiff-4.0.3-25.el7_2.src.rpm, with correction for invalid tests that rejected valid files. (http://bugzilla.maptools.org/show_bug.cgi?id=2545, bsc#974614) * tools/tiffcp.c + Fix out-of-bounds write on tiled images with odd tile width vs image width. Reported as MSVR 35103. (bsc#1011841, CVE-2016-9538) + Fix read of undefined variable in case of missing required tags. Found on test case of MSVR 35100. * tools/tiffcrop.c + Avoid access outside of stack allocated array on a tiled separate TIFF with more than 8 samples per pixel. (CVE-2016-5321, CVE-2016-5323, http://bugzilla.maptools.org/show_bug.cgi?id=2558, http://bugzilla.maptools.org/show_bug.cgi?id=2559, bsc#984813, bsc#984815) + Fix memory leak in (recent) error code path. Fixes Coverity 1394415. + Fix multiple uint32 overflows in writeBufferToSeparateStrips(), writeBufferToContigTiles() and writeBufferToSeparateTiles() that could cause heap buffer overflows. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2592 + Fix out-of-bound read of up to 3 bytes in readContigTilesIntoBuffer(). Reported as MSVR 35092. + Fix out-of-bounds write in loadImage(). From patch libtiff-CVE-2016-3991.patch from libtiff-4.0.3-25.el7_2.src.rpm (http://bugzilla.maptools.org/show_bug.cgi?id=2543, bsc#975070) + Fix read of undefined buffer in readContigStripsIntoBuffer() due to uint16 overflow. Reported as MSVR 35100. (bsc#1011841, CVE-2016-9538) + Fix various out-of-bounds write vulnerabilities in heap or stack allocated buffers. Reported as MSVR 35093, MSVR 35096 and MSVR 35097. + readContigTilesIntoBuffer: Fix signed/unsigned comparison warning. * tools/tiffdump.c + Fix a few misaligned 64-bit reads warned by -fsanitize + ReadDirectory: Remove uint32 cast to_TIFFmalloc() argument which resulted in Coverity report. Added more mutiplication overflow checks * tools/tiffinfo.c + Fix out-of-bound read on some tiled images. (http://bugzilla.maptools.org/show_bug.cgi?id=2517) + TIFFReadContigTileData: Fix signed/unsigned comparison warning. + TIFFReadSeparateTileData: Fix signed/unsigned comparison warning. - Removed patches: * tiff-4.0.4-uninitialized_mem_NeXTDecode.patch * tiff-4.0.6-CVE-2015-8782.patch * tiff-4.0.6-CVE-2016-3186.patch * tiff-4.0.6-CVE-2016-3623.patch * tiff-4.0.6-CVE-2016-3945.patch * tiff-4.0.6-CVE-2016-3990.patch * tiff-4.0.6-CVE-2016-3991.patch * tiff-4.0.6-libtiff-tif_getimage.c-TIFFRGBAImageOK-Reject-attemp.patch * tiff-4.0.6-libtiff-tif_luv.c-validate-that-for-COMPRESSION_SGIL.patch * tiff-4.0.6-libtiff-tif_pixarlog.c-fix-potential-buffer-write-ov.patch * tiff-4.0.6-libtiff-tif_read.c-make-TIFFReadEncodedStrip-and.patch * tiff-4.0.6-tools-tiffcrop.c-fix-various-out-of-bounds-write-vul.patch - Fixed in the upsteam release - Changed patch: * tiff-4.0.6-CVE-2015-7554.patch -> tiff-4.0.7-CVE-2015-7554.patch - Rediffed to the changed context- Added patches: * tiff-4.0.6-tools-tiffcrop.c-fix-various-out-of-bounds-write-vul.patch - Upstream fixes for MSVR 35093, MSVR 35094, MSVR 35095, MSVR 35096, MSVR 35097, MSVR 35098. * tiff-4.0.6-libtiff-tif_getimage.c-TIFFRGBAImageOK-Reject-attemp.patch - Enforce bits-per-sample requirements of floating point predictor. Fixes CVE-2016-3622 [bsc#974449]- Added patches: * tiff-4.0.6-CVE-2016-3623.patch * tiff-4.0.6-CVE-2016-3945.patch * tiff-4.0.6-CVE-2016-3990.patch * tiff-4.0.6-CVE-2016-3991.patch - Upstream commits to fix CVE-2016-3623 [bsc#974618], CVE-2016-3945 [bsc#974614], CVE-2016-3990 [bsc#975069], CVE-2016-3991 [bsc#975070]- Added patches: * tiff-4.0.6-libtiff-tif_luv.c-validate-that-for-COMPRESSION_SGIL.patch * tiff-4.0.6-libtiff-tif_pixarlog.c-fix-potential-buffer-write-ov.patch * tiff-4.0.6-libtiff-tif_read.c-make-TIFFReadEncodedStrip-and.patch - Upstream commits to fix CVE-2016-5314 [bsc#984831], CVE-2016-5316 [bsc#984837], CVE-2016-5317 [bsc#984842], CVE-2016-5320 [bsc#984808] and CVE-2016-5875 [bsc#987351]- Added patch: * tiff-4.0.6-CVE-2016-3186.patch - fix CVE-2016-3186: buffer overflow in gif2tiff [bsc#973340]- Added patch: * tiff-4.0.6-CVE-2015-8782.patch - fix CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (upstream bug #2522) [bsc#964225]- Added patch: * tiff-4.0.6-CVE-2015-7554.patch - fix CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (upsteam bug #2499) [bsc#960341]- Added patch: * tiff-4.0.4-uninitialized_mem_NeXTDecode.patch - fix uninitialized memory in NeXTDecode (upstream bug #2508) [bsc#942690]- Update to version 4.0.6 * Supports CMake 2.8.9 and later. * Add missing file which wasn't being distributed, causing unit tests to fail. * Make shared/static library building configurable. * CMake reads all version information directly from configure.ac to avoid duplication of values. * CMake builds are now included in 'distcheck' target. * Autotools 'make distcheck' now tests the CMake-based build if CMake is available. * Fixes to avoid undefined behaviour of signed types (C standard compliance). * Fixes to avoid possible isses when casting to unsigned char. * Fixes to avoid undefined behaviour with shifts. * Fix generation of output with 16 bit or 32 bit integer, when byte swapping is needed, in horizontal predictor (#2521). * Fix decoding when there is a single pixel to decode (unlikely case...) and byte swapping is involved. * Add add explicit masking with 0xff before casting to uchar in floating-point horizontal differencing and accumulation routines. * Eliminate requirement for and use of 64-bit constant values. * tiffgt : Silence glut API deprecation warnings on MacOS X. * fax2ps : Detect failure to write to temporary file. - Changes from version 4.0.5 * Support for configure/build using CMake. * Support for large (> 2GB) files under Microsoft Windows. * Configuration and building using CMake is now supported under Microsoft Windows and on Unix-type systems. * Test for and use fseeko() if it is available. This allows supporting large files on Unix-type systems with a 32-bit 'long' type and a 64-bit 'off_t' type. * tiffiop.h: Macros added to use 64-bit equivalents for all standard I/O and POSIX APIs used by libtiff and its tools which are limited to 2GB in Windows builds. Note that these 64-bit equivalents were introduced by the CRT provided with Visual Studio 2005 and if the necessary CRT is not installed on the target computer, the program will not run. The wrapper macros will not be activated unless the definition _MSC_VER is at least 1400 or __MSVCRT_VERSION__ is at least 0x800. * tif_unix.c: Updated to support large files under Microsoft Windows. This makes tif_unix.c a completely viable candidate for use under Windows (in spite of its name) if the CRT is modern enough. Please note that tif_win32.c already supported large files, but only 'tiffinfo' and 'tiffdump' made any provision to support large files under Windows. * _tiffReadProc() and _tiffWriteProc() are modified to chunk I/O to a maximum size of 2GB for extremely large I/O requests. This surmounts limitations in the Microsoft Windows read() and write() APIs (which are limited to the range of a 32-bit 'int'), and may avoid poor behavior with extremely large I/O requests on other systems. * Updated to use I/O wrapper macros from tiffiop.h in order to support large files under Microsoft Windows.- use spec-cleaner- update to 4.0.4 D tiff-4.0.3-double-free.patch D tiff-handle-TIFFTAG_CONSECUTIVEBADFAXLINES.patch D tiff-4.0.3-CVE-2013-1961.patch D erouault.2862.patch D bfriesen.2805.patch D tiff-4.0.3-CVE-2013-4232.patch D tiff-4.0.3-CVE-2013-4244.patch D erouault.2861.patch D erouault.2857.patch D erouault.2856.patch D erouault.2859.patch D tiff-4.0.3-CVE-2012-4564.patch D tiff-4.0.3-tiff2pdf-colors.patch D erouault.2876.patch D erouault.2860.patch D tiff-dither-malloc-check.patch D tiff-4.0.3-CVE-2013-1960.patch D erouault.2858.patch D tiff-handle-TIFFTAG_PREDICTOR.patch D tiff-4.0.3-CVE-2013-4231.patch D tiff-4.0.3-CVE-2013-4243.patch D erouault.2863.patch D tiff-4.0.3-test-jpeg-turbo.patch- security update: CVE-2014-9655, CVE-2014-8127, CVE-2014-8128, CVE-2014-8129, CVE-2014-8130, CVE-2015-1547 bnc#914890, bnc#916925, bnc#916927 + erouault.2856.patch + erouault.2857.patch + erouault.2858.patch + erouault.2859.patch + erouault.2860.patch + erouault.2861.patch + erouault.2862.patch + erouault.2863.patch + erouault.2876.patch + bfriesen.2805.patch + tiff-handle-TIFFTAG_CONSECUTIVEBADFAXLINES.patch + tiff-handle-TIFFTAG_PREDICTOR.patch + tiff-dither-malloc-check.patch- build with PIE- security update * CVE-2013-4232.patch [bnc#834477] * CVE-2013-4231.patch [bnc#834477] * CVE-2013-4244.patch [bnc#834788] * CVE-2013-4243.patch [bnc#834779]- tiff2pdf: introduced warning when the compression isn't lzw or none [bnc#819142] - tiff2pdf: fixed crash [bnc#821872]- security update * CVE-2013-1961.patch [bnc#818117] * CVE-2013-1960.patch [bnc#817573]- Add Source URL, see https://en.opensuse.org/SourceUrls- updated to 4.0.3: * Add some TIFF/FX support in libtiff. * Fix bug rewriting image tiles in a compressed file. * Fix read past end of data buffer. * etc., see ChangeLog - removed upstreamed patches: * bigendian.patch * dont-fancy-upsampling.patch * CVE-2012-3401.patch - new patch: * test-jpeg-turbo.patch * CVE-2012-4564.patch [bnc#787892]- fixed CVE-2012-3401 [bnc#770816]- RGBA is packed in host order, use the right macros to unpack and verify in raw_decode test.- updated to 4.0.2: [bnc#767852] [bnc#767854] tif_getimage.c: added support for _SEPARATED CMYK images. tif_getimage.c: Added support for greyscale + alpha. Added TIFFCreateCustomDirectory() and TIFFCreateEXIFDirectory() functions. tif_print.c: Lots of fixes around printing corrupt or hostile input. Improve handling of corrupt ycbcrsubsampling values. tif_unix.c: use strerror to get meaningful error messages. tif_jpeg.c: fix serious bugs in JPEGDecodeRaw(). tif_jpeg.c: Fix size overflow (zdi-can-1221,CVE-2012-1173). tiff2pdf: Defend against integer overflows while calculating required buffer sizes (CVE-2012-2113).- Fix building on older targets from SUSE 10.0 to current. - Add jbig support- Add lzma support - Implement %check - Drop visibility patch because it breaks compilation- change package name libtiff4 to libtiff5. library number is 5 actually.- Update to 4.0.1 * configure.ac - Add libtiff private dependency on -llzma for pkg-config - Add support for using library symbol versioning on ELF systems with the GNU linker. * libtiff/tif_win32.c: Eliminate some minor 64-bit warnings in tif_win32.c * libtiff/tif_jpeg.c: Extra caution for case where sp is NULL. * libtiff/tif_dir.c, libtiff/tif_dirread.c: Extra caution around assumption tag fetching is always successful. * libtiff/tiffio.h: Use double-underbar syntax in GCC printf attribute specification to lessen the risk of accidental macro substitution. * Update automake used to 1.11.3.- license update: HPND tiff license most akin to spdx recognised http://www.spdx.org/licenses/HPND- remove libjpeg-devel and zlib-devel from libtiff-devel requires as they are _not_ required to use the library. Now, this _will_ break packages with wrong buildrequires for good.- Hide private symbols using gcc visibility, this has been applied only to functions that the source code clearly states that are internal to the library. - Run spec cleaner- add libtool as buildrequire to avoid implicit dependency- Do not use -fno-strict-aliasing, no longer needed and will probably slow down the code. - Fix self-obsoletion warning- updated to 3.9.5: * fixed integer overflow CVE-2010-4665 * fixed buffer overflow in ojpeg decoder * upstreamed: - oob-read.patch - CVE-2011-0192.patch - getimage-64bit.patch - CVE-2011-1167.patch - scanlinesize.patch- fixed regression caused by previous update [bnc#682871] * modified CVE-2011-0192.patch - fixed buffer overflow in thunder decoder [bnc#683337] * added CVE-2011-1167.patch- fixed buffer overflow [bnc#672510] * CVE-2011-0192.patch- fixed "Possibly exploitable memory corruption issue in libtiff" (see http://bugzilla.maptools.org/show_bug.cgi?id=2228) [bnc#624215] * scanlinesize.patch - fixed crash while using libjpeg7 and higher * dont-fancy-upsampling.patch- updated to 3.9.4: fixes CVE-2010-2065 -- obsoletes * integer-overflow.patch * NULL-deref.patch - fixes CVE-2010-2067- fixed CVE-2010-2065 * integer-overflow.patch * NULL-deref.patch - fixed out of bounds read * oob-read.patch - fixed CVE-2010-2233 * getimage-64bit.patch - [bnc#612879]- fixed tiff2pdf output [bnc#599475]- fixed typo- updated to 3.9.2: fixed many CVE's and obsoletes almost all our patches (see ChangeLog for details)- add baselibs.conf as a source - enable parallel building- fixed integer overflows [bnc#519796] * CVE-2009-2347.patch- fixed lzw overflow CVE-2009-2285 [bnc#518698]lamb58 1545232518  !"#$%&'()*+,-./012344.0.9-43.14.0.9-43.14.0.9tiff.htiffconf.htiffio.htiffio.hxxtiffvers.hlibtiff.solibtiffxx.solibtiff-4.pcTIFFClose.3tiff.gzTIFFDataWidth.3tiff.gzTIFFError.3tiff.gzTIFFFieldDataType.3tiff.gzTIFFFieldName.3tiff.gzTIFFFieldPassCount.3tiff.gzTIFFFieldReadCount.3tiff.gzTIFFFieldTag.3tiff.gzTIFFFieldWriteCount.3tiff.gzTIFFFlush.3tiff.gzTIFFGetField.3tiff.gzTIFFOpen.3tiff.gzTIFFPrintDirectory.3tiff.gzTIFFRGBAImage.3tiff.gzTIFFReadDirectory.3tiff.gzTIFFReadEncodedStrip.3tiff.gzTIFFReadEncodedTile.3tiff.gzTIFFReadRGBAImage.3tiff.gzTIFFReadRGBAStrip.3tiff.gzTIFFReadRGBATile.3tiff.gzTIFFReadRawStrip.3tiff.gzTIFFReadRawTile.3tiff.gzTIFFReadScanline.3tiff.gzTIFFReadTile.3tiff.gzTIFFSetDirectory.3tiff.gzTIFFSetField.3tiff.gzTIFFWarning.3tiff.gzTIFFWriteDirectory.3tiff.gzTIFFWriteEncodedStrip.3tiff.gzTIFFWriteEncodedTile.3tiff.gzTIFFWriteRawStrip.3tiff.gzTIFFWriteRawTile.3tiff.gzTIFFWriteScanline.3tiff.gzTIFFWriteTile.3tiff.gzTIFFbuffer.3tiff.gzTIFFcodec.3tiff.gzTIFFcolor.3tiff.gzTIFFmemory.3tiff.gzTIFFquery.3tiff.gzTIFFsize.3tiff.gzTIFFstrip.3tiff.gzTIFFswab.3tiff.gzTIFFtile.3tiff.gzlibtiff.3tiff.gz/usr/include//usr/lib64//usr/lib64/pkgconfig//usr/share/man/man3/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9363/openSUSE_Leap_42.3_Update/c62f186d3b809876e93ad71e20961d8b-tiff.openSUSE_Leap_42.3_Updatecpiolzma5x86_64-suse-linuxC source, ASCII textASCII textpkgconfig filetroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)PRPlJ.R?`] crv(vX0}psuZ %ARV7bE25Qu6732 f℅D3MZy Bew$6}\<5R}*_#CiS#f #S8COm#5l-ʂt0;Kۚ߻d-ޜ϶bKz,dͨ:=DMA\e7O&Š,7LzWo#B[\+&;sj = ޹x@}=捲4Wڃb/}xB.яs&=:l?L($߻ زd~ĥ̈́0pX@'iU׏ &Om|\n͋ܫbT@ǘE[[^zd$ 1pzE ynͮnb.@ڸ,TwK2k30caB# /u{nK;]@U=NX+ofk@r=;ӱ] eҲw.ELj Jؠ:Z UzkӚ~Bvo4o}5pZN>*/xڣ9ҟCr1 A5, E1b2۳a8R&H{~llddGx6sL&.I_mޙp%6s& "0"y<`qJW1HX\Ej(ް+Y\R 9Q%Ru9Taf,G-3:/5'$}etQH{"rJ>>W0’dvl2F+W[JnpȊ$ev#I*qxG z)Ʌ# ';ޛ㸛\e] AM<m)T:` }xY2˄o;?̐#q>\wLZ2qJ|~?ǼQiR)J*I iDhMT1~|ԅLa5fk; 8kxo9sf'd{8/.'6&E\XN(԰ /:Gt>Yem&lqj2U`mSC WԈv \+:r LF;ôkl(P u x, ßA+h)kNrz:2_k~^Tnݦj/(5Np$[<ޙ#r9(t[Ni4D R {&k7BP<ȈMSŨpoa]Nlp# )-*ʙnx\4ek\H?Cўaˑ*crim;=cA*1oDntؘ012^QKVJ7Iȑw$gt"ad帨{s7%eV+~ol܎H}66g76.FԴ ߏӺx370}AAAY,`k'"Ґ/_d)W8TT`issni"ghIUG^a.]MrWh+pm2qӬX,ߕaem'ٳ;،} >ʾg*%}Hl!-Y.t*[-J=,}5Ж`C?-zFeh!̫ۄ5z2ƲJKvW.k9n{@Y;Xp/឴}#Tț);\ t4׸7?9yƪnh~wn 48@=~hĮD"ߥ~}4Cc#9-WͪO򴦐z]~:<_!WYce㜒"hbF'xJoiNU1՗ۯ^eؑ?cBS7Lz (?Jpd5A5)Q𫞯iV$ÿyb80sO܂6\(w#3}K+:WhPo]*D xjs5.ևq' Jj3DR1 i6`8vر|g7[p"nOS͎W}l{0q3o8}~${M|J0${"lzs>sNh*jnnBeZ"`ՅW4[.8B C]r:Ab]?0l| s95VS{;}Ӷ b)^k b$a1& bpf@Ԑ(p]@XqȤ\k2)QD2$iFLЌ767R4i;!tS<`kv*>~g ւsT}b8k&q68j\>vU;ER}8h}|BbgMw[ܖ( ƀD'w1ϓc@$p<0F}*|+z=3K 6iD\Ίf*ЩJ.NÞIT- 4μcUM2.W#{+0ʹOyvɾôcU! pMn(dBV=w ? :d Մ*oje m$BSYCO:E#NB^ѡKߴGo ÇK>|<'f|"oV,Q^M:bpVyڏɅ|F>!ҟ`Y g#0ۓPEX k oF۬+ц'|=TEW8dZ8X?"?&A}]P!085YVIJLص'&h(J zLH>*k{J:C=f{,+4y#WŘBr^nόf f+et6rST}G5n"$_9[6 !a ȗr-T,"߸ Fu {<' 5G,+Q8VPLyCP="6SC6V1H2'9CaE!,3O怢ӕ[sG?_4zF["U=&m۹Ċ*>q݀Q=& 1#Wȏp" ^ PX]b KrEVO.{L`X0-`+R9D#2'5.z'=Q҃ o/wUՉk".*QqQ7qGЧRm a(x!d,Ш*UVLۛ$;&@oseذ;P-oꢀ#=Q0,S,Yv'ʹ ny [ n,1e0<Őɜ b@=Q+"lo\,:fO 93 y)O+ŨZ"U%Ё!g-Q/j>wk_%i<Y6jct_se&ԗ-i*/J ͩly!rtQyy! \4RDՌԚJ *ϴCgc(BIb›0-9T("p*C7s0 :.Nv! *){=|Kb"]'Hg_!ͣ%35L{{IOk0J+F4I/ GM"h>4wZUgzx LށCK +~]X,#DӛeL_>(2lEɰ+IfʯasX^Srê= t/B[2}Q%QSGzV [z*!Fmkl,6BKƣz)iJKQkJh": .9̕pFL.4dK0e M\\]lKec1l&]Z9 -I6Ӕ>]>`@Ci~"w ~ / w֩cO3@q]Pˆqfo ο7R|D;>FO]?G84 ׼2h" %B hЕoӮ( :JВb UN°bVm 9CoH0)Lost#)&ڞyʹ-%$|_N!R\޽` | u\vh6w"` :?fqk_9 [EQkqBTSUL'$tsRUc\4Iu!<cL{ah^BGyy~T)@BL@oySL=}D(YO* X 'H}&4baX f@q`=s0j=) $M%OkUlRջ5ؿFЮ%FYpV]l 3kpA0].õN4ߑQH1󿇭痢uMurmX鴛LqO9h1ϸZkJ;1]夆9#rjC[P -D_i7\ xBTUMa )\*{DbEUM*XU|_$LzVvv!Ab֬V7dŹ'h;@]}c?d ^]eРR"uPt@f.Wmc-׿m4\]lR6R?C= yǨ]~ %u P2>2\*LWQt/M]%SP| c 631%wT#YŤ[m$Hk݆ OS$ d\F8;;y{< F UQK΃Ux'V\9ImXIK,nRqfր2my]a`I $1Y6?"[c<>^=PW%AHaASy+w ESE)@/4B\K`\ 0_gh]$ܖ D޵AACP{xנbr4OkxobFs- %~Hn :5خX |uoQ^{!N|Vܗ=IrK}F|z:VQQ3{C2 6Uq52[NuOMjmr{g>'ҷ3h"izt+e@K~?ůp^ 46DI|V/NyBspӀ~u9BU@lɗ_DDK0h;b01dL@!470k3/WеnS{?6ei 6JWꣴX m B b14 D}+ y0opA5Y|QW-۸D>>X%:u:w܏_n(Qju>-5UFFS|zXuD]/#l.+1Fq}3Y;߭& yCR>:HP>+Zfj-,n0?oJ|&ySN_6@٢UTS:`W`cV8͜Nj0*}jd@촥P ]}DhF gf]y:N}h}c8Hjz–i,|[',&r n#:1ȃAHY?Rmk9Ul/ʮ|vl\AHu#B`:>LK>aqE'Z;";sSC暚!^R''dΊ~ۡuGڿ9Ym9oʼn ڶHN븐kp/=,7;aw+~Y1H\CS=M>HGObdL Z4O,jS7U̪2+ ˞\0*'_!ij|.p#Hp HR0b` TSgl?Vq(r>ͽ #hd< .h[j̰ǐgxQ P["lClDjHj l] .w8pA+y]O\>=$>|dE$ٵv$ 21ORmsBߑ)[b,Q /1ʈK5DelHi:H&5I/pn]GoWa6<ʓWOI6/QkJ$KȿUfC;u ^/m-,ʳ^aUD00]Fv_8"`|pƛH +TӔ^ `g }(=(7;|ڬnzhّU t3pq٭^aI˞T>~K0%$VcBs_fJgrLX1q^SɸKUS"_Ɨ5F4m>W !9 1|YCRp'9 {eƍ˳].Ug7]?bF\h96Mwmh*A#ޏ%48j I1{qWkK 0Y9bnu3qo3#ՅD9(nͿɟ"'g =7ʒsb+p7<%TX5ElcXZ [1vB.,f'B71X%ࠍU..@9X>03 ;ߊbG^G+GG p?6&`)@hnQqZ7dȶvqp3谤…,{H|yQw‘4!y0(ډ:i6oi3kHlsچTwr&I!S-A۱YZ\#<]au< ק H"ݤUTEi?A-_vE;mA%9*1'-MJ772 ڙA8ZX2zngW1`TZ/_m6o8iS%#9C ڷ6m|Es.BߕrJ=rHj|}x\-vֽ2W XhNEnDg3HbOrG b{̌1- ;t,޺&FMZws\T^sؓ'"PNqrwU4Fn8ed>4~ܸ߶g$x-_ټr) ʸǜpU3I}״ |]GS*f,E'.v?Xaa8`Dr73Cdo| St8 "w<عp!?loq@&Gt,da0̵9)*HZ:aˣuW,4X`k1Rwd^fh.8Vk7̰VAaܦ֌!륯b<$w`\4nr uO 紀nx5ȌQR/ 3(,$$+Ӛ7鴅WΘITe԰t0nJZ3Py؄LS*F)O,hh4&k]mhyΈ@)me^< J+E8T6Y} 8~ICr1/)+Hgj(P!" ^CS_.u'47FŹXÆq$4e ;ށ>ҷcepCsw_BJr^799:s0e +Xb$DBaIIx,.]VPTnY!v>#H .+kbO͏`/5"z;p.S% $^,~ ;~޸"{$BTnH/Eho93ka}3zm/s%60OE~ȿVDڕMB't=uN-k<pr(>cY Urt D&3 mwn,4vʿ[PA) @"K@w~`buj;L^gBU(t[^PVЈ$3'p+cyN.#mnFSͮufkpL@=^Ɲ;!ClCQ 5 o{eX]Pj9q`E,`N*>#7RR!@S "U Ũ?(ԂI*S-kĽ>ɻz oBdN*dIx;' UeBC(d!fƱ ;9A/;:/̨vH|8bD4cIy_OxO-'V,o@?K%n4H])dRg˦衧r10QS5׫Nf F tznSF]֍z0F;xDyd4w0%p[&:O"|hKd@m:HiEUDuA{G>%+?l WV-eΨA=Z3fхZb ]YaA}W0hjhwk-l 9a,ܐ{/vв8aV3 GxDc'rTH^XL]Uw72'ULu%u :*2ek_uȐ :cgIbfjYudYH/gNEAsS~r98]qHů7;;M>nv2om {&4@aPv?+~VcI#˂yc S'H:Q|??)#=7e EѴ̴Fc)S{M6 77'@w{0Ƈ $K{JizYFjaSw Mϐe 3$e]z74cafsÝ>sC5TI7$6Y^]I>g(j?-"W5bUOd_X..mF>>_ce[#̑鮋3ar quE#}J>kg.YF%,]2tan3PF::ɳQhHI6aܾf)) BsRהHyh*" :Fy"g)j(MW훧8H,o ePW}IP-4[,(g ]lY(ʝ0,zc 'ME;!.̩N03Kc{2!@kj%CBPq^$"OH p 9#«@÷IĮ9=!EVOB)^.BcKKqQkkAq~P @ EL Ǐ[+% U"XGUo4}!NUoIA髣+)0xUX#`E /f]_Fv6l^e8zHlB"dyL,N!N@g8$A&iC@)Z+>`WvC6 CUBg~!:OeC4oAS&޽D=;gXΪc\5f) rBPLa7sطKPy_f,)>[sQżiJA`6H~N|XyHސ9?C8ʠt0]2y M$ͮ|+k*c_I<B?[kyiV fG!W"VXS)&,&b;A "dL;BjFe뇽s3u-KsMS%!aYψ/FJŝ߾A\7^uLV[Xu9[ osΝcNyt9vXxFo)*Upa~~Bnr|jyaujK uoW8[32Sj3$5aN9Zw oRҊ6e[`3j}^c:Ur}Lh@"/8LYW,,ȗ֪MkW[%Wzjd.2=)zEwm)=9~ë&B/Nنn8ב݃H*&O7Έo*p^M^"VC7UVe7`[ǃP7/4Kp sS>DrC8vY4566L\rYJ P 4D-|Qc*mzU.AR+JRu?R̰Emp+BRB/j('ұaMkuRёS /oz-£1Q`H'!噥T@Y۝(Yv>ͳg3o@$hD/uO0$|[2$31Xzk*>>^- 1e#2пtg_PRECXȂzISPXA@<nVG+Bp"7%;0}X<>GӭY\%zrBk~/(,qh~(rAxZ؅r~WvJE< eoޓS(ƨ6MXj%b7Ԥȭ ;9O_2OHAݒ’vZXu"=zomczDG,CD٩%U-0@S,hQ#E Tva1(PP!|:;RI~lakX?s/%yQeqCX(0)TjM֠ltif8œzG_?YHY٪uVf܄ĺMOHM0#*Óܷ낻A +f!l9A̮dB恙|b `a: >a' \{1<0/H-fJZJj5dMץ[DVC< `!*6ZP8&.eaC sk+Z08& Re 12:o<^di BHq0w~v>(6iʡ|G`.@uy/2%rX$tZ:b)q4BAaO9{)*;Ox/^V#6>4uV8?j'ݮzbm{9'C6-q-aS@y=2=[BӒ\UKWp<2< B˓KU!O}=ljk"'yu;6wQigy#DmY6"K3 9k v훈(9Dq?s?hҘeqI;?,0 P&a;s_OK'>74u^s'u5CA2GM]%9LXE6I)w$7frTIƿ$"Tah<=Lĩ NJ$;X"1ؙ;]j? e`2f $n,<{PfRhEH'bzMzK.phE X@}+ΘAo:OuZt xEH='&ra )Rh.Nt%eh|>G$hYu%dzjڀI< DQWYsxXG/I}2ނGWb>*j̣WF1C'|u-x s񱲱mU$EKL@F: lhl$ÅG>|6DIzK'vs״H#n/!V Qw?\-ʠ9vZ/1kS֕(!Jg'fk"”a PS45V,mY0 %7E¼:O:`1pH[TES{Zj5ܘ{Bf$*D/3Pbrt He[O CGD]!Bzs*bK  Q7gvZn]٭NwE4cj}-v%ĿY:gK&$J"sMꮩaGJmvLJ 0ҍ&ȴ.BhY+˔q7KUS2ni#)Dݹ(HDqimS* .˃]ݖN9H#E-޲֞iVhbsӾ@>4vsUUQpa oǣ@[еmDp Ջ"#w^%ũDteӌhD){yg7Sa&>+l6'&CBd'w~R&n9߆|6.>wK@ :'I uV ]jLD\V)͑r=njA=Wt*\/k _|hE={ɭrܽKP+5 s>D]d?'ӱHu=8D8qpS]';64eme*Hޔ٣__]BdVaL{tmut)S7#ˤ)5 4Mڻ۩'bz`f+EМg]n jn2)o!$9a D v) JMy؆bU 2,D.J+h=46 6%AGuoekϲeqf )pرGidtG|tl_vm& % D gL}J-H8w>7Ϧ^NGu[ C>'iT[m{KUݑJn# thN$ 6~XB6p~+yӑRje$/"ݶ!1h8]G-}EK<\8H!˙Jl ,q+*3ʻWI|.dIvznpyý;9%%S>8)<RN]`:KH:)o2t0,3 YŧD5+>4*\Hg/qT`xdλon~ѝc.RgCRH-~W)ȀV@m#8o$H GGSV*}A7Ňڈ`H82$PuK6g}DtvOjǜLhtiB]s&h9VڋcCr XuDPBsbaښ& #WM\f_ (wo-aYh3iT8 WBQUaNNT;t64i=ȭ"&,[DQ<Ou&K9fgG8j^nK BWd)+_M׾8HLӂpoWw |%ڤͪ2-@xLN,ؘiYP6IVn9~>Gcg(y[ ud<=܅;}YH`k|NN'8(GGbΪhh0Aءg4[:̲ٞ"EaBADN,Z_5શ4A0DPrL)+sF,}ٮ>u~(,^ju~34PNKxw˗PeҸtBfjISmDĨ_/~x 'vɗtՌ {78i hD̓{&C \q!?$}L¯=b9zg)I~)ҥ8 Vח; ]Su }AE9 ԲS@]uםk4q m V)d;޺$$<˹_*8xێ;eA3?q@/nnOl5 aɔǗqп^\$MV2 s̟ `]ESNVfYˡYq{ sz!+nɼwl2H,P&d ^&K볕ӂaP&hE*և6x=oP9+.ڭq]3kR % '700{ * x;^ؿ RV :v6ͲxzpEKW~q¼S z0R-?w/Ū_XpPP-WЙ:nl:?m转F:''s͉__^c;k]mZb??v̀dGĵRϾjq'?<Mj\ec*Y*2 %J%s׽M {)Sh`1#Y. 9]U/Rüj?iDK:baC0_LD;Z3[5\iYIʴ S\_*82݋fH͑P4}}IȄ* ֓LC2M~{<!hFT娱0 w%v^7Ve1`qXU~{"(-59N HChW}_1SJq2t4:_#e~lgLhGǦ\1O좌}c BQj0x*KYg@dxj麁"ct.~G 08{XaꊭC Xk<\{pREEucLˉ`_o(/(ol ,dPY.Y#"_"Q~tT4J@`EK7qX+,5TeHi8{p},s7I@B`v]mГB79i)'ǔo&v{#G5 E(MGST֝_ܴ >wu_¾bmbg;V-5<UwgpeVЏIOoYf"su]{u)&N,;趵mi.jSK *0:e :wnM} !^jYX{1lUpC} :' <,I ~%рE" vY.oDNj vp}z"Xne, Uj/iY$kcY8)'Z-=8$v!]?Nc~I٪wZ'iGnc@`FFY^6p$۟z Ax}!+$N o¨rg\dzMB+pC(8]qD \N2U#&ۦB&\|ė5OOR.]u"wSA3KmKKT ׸}͚f9`[j/9z[*ǑO~[鹪zIyj.vj٣]琛< %U \,6QS:kw7 ^/Yf8{x3b ģ~Yy1׫zk葑ǿڞ؞ 87RA0m$1&s2ẓ׹VIu ȇ;T)jCRto$&CʫQ#㛣CHG$LRKd 1# wMLxARHnTm[W ӑ|ɔLNW[xR/qPŷHdL[/W<`h;YeaWhyȴfAr:}]"uK~e׸x6^$*clERҪlzgr=WS/bM_mb>HF7Ve_' BhT/f5j:uj,h}'7z]~}&LiG4J[g6& d.8CgAE@tVSfvJ\^5[GX8jǓ2p?R+-˦MIfJ6!|_ַN cOk=4"ˇ:w oD壡HJ>0SNyY֌t̃{1 Y͝hFr*(jkUS%ܞ|ӲC|~?O&H^2I)b PScN޻3ں.d<2eԹa2¦r+л?C8~Xբ2'+WjV~"SπșFiO[x}5Op^O3ۋ@UTl'|d7Qꗦjyh,rzk{i}eZl5 G/)\ }N^h=cW:u$fǦ. ;3%kVE^9Hʫʯ1s=E*KQ_Q -T |#%tq%j ֟h8G_A<}F~eWJrG`b7$\͹"A l-y(%9CiLk"Tsw/2WݒJYKv\]A˧{&OA=8 0Ic4Pԛ=EѪUߖ߼',G+39q<.@cpvk–(VRudTPN(^ǔ'7 4;g,^{5ҌBL*(܃_%uOO&綵!#갉<$Il\ƅ'+`OA˜@#Cld.VRZd']_jL p$^ a-MGB] RP7+8Q0" Xfeu؈";3@tOA3{2eR6 HgW鞯ϐpGaWETp's S4⨡y.5Nu03 8T"q( z}58}~Zό#*?|@ p*tɉf#/srNlCRkdTf8;s5H){>B\h[ƪxkMIM,G=\6xU sL^l$ނ{[g0:8yiE\*_=KEf^H<+ξ%l!J폙y~M# UI!SbF!U 9"!rT|ǫI]޹]7m+ϝoƍGǪ!VQ"BKwpm8d)t H~Η?ci m HJ o9t2K~甝SWa^t3$E7 Eqf%@$b1t4ے8ҿr[MDh|ݱVBHxR|6}$źD7JˆǞ.N/`FF&cș{3OEl.\[FLJ*!ۚ?p4WB@MF* n-*lllpd] .DEb[ GMUpcjϋGeExk6bDrJ2By)w"-zʶRqABxǥX+`:䰗T4&D2?,o_NEi2-Tfh;3f<Ͻ|;HŎi&7 ; *D"9'?+bzxY!2HuW1| }TqoFMS3哔,_}rI&hF)v )&S"=N.(Gl;5\koc"$$R=gX Q_[W,fʅh{_wT*|CB;Fr`~kn:Ôާ5q1,GFа?r%E>o")ճD %_YSp[{FI mE(kStʊX2b=͎ۛ*<*0O3;K]Zlnݮ2@FGƴ׏X6ݧyнb{Υ"| ժVUbSD{1XygdDAK~_2,<#QBX]"WEB7[; $ڍP&c܊O&Mp &}g*L\ ƼX/մinqdtB;4YO\v zL&gJ Oa9*\Lt7grTxTCd}Rz+A"JdžRK=Z pv B p[12BO4\PJmUhG xaioJM8W5SCϬD,tR5n1B͍΄>'CwެKiZ!ej '|ՅR- 7^h&pgo7˜3ڄ{#/E>CW-WQ f{\N-( b$`;P,я/(ՁC8!(/XVO+ foQ1?@C.b.EGOk+D[WmPJ>|Z-OK$KMV6PzݣܒsַSް}pC/5'!~ͥ0@ 6'E5tY`Tt(h5>lgf 2MQٵH]Ќ6~+hcb6v"0l+Lk/O0c+[t Q!a o_މ&%P@a:{ .UP?06YDkGkJDE,uyv EN $mB1 :qt55rɊ7vAg6$oB!WWz=> bc2Mmg`GhS4%I'H/I_,uI}6 8S}o}ds <ǜ[,T 6vo:a؊#^cO.')MT\ G_$OugTFRi6Q]:Z{\jbs٦؏qQH;UU[\< Ed@J@V4nzSUV@T8@~/4MUMJ],B3)y#I0)'[X wZ$hOf#2wI̝ r̷ǖޑ踙vO~  "4a2M4 0oC"j*D՛h<_OF 8IaG!e 1Y 0ၢZXHp`9Smi6W:[|,THp[J6E&\2z'`ƌVIw9[(Y6"1Ifn;#EHB-0D ([ΧHi:0 f|)13RGXQuT O[ހN`@/YL΍ⵊ@oP:3~̨RwsU,"$ޗG519DaQV-`2$m͝] MoVUl-W0Kt_ oԤm/mSAIJ}q,yEl^!4,3Of˿_0sщLNۯ/dS]SH:S4K*S0Zff:ɩr]6U/40.貂aq}WlQe{;WYiYggLSJԓ2߼d\sX$oRX'R2 VdXY|FIŠ7 dZ7e bt䷯^HLs^j冃.$RwGJ{: Q]x( h,Oz_8[׆{"G0ӕaskU|_IA9'%1{S.{j^Ǔ>jd3b (j(H3q5ՆY4 mbl~:kk=NbVhmk1u9gC͍8IȒNok2Ax9.5bm,gLԕmǯʠ`f_0m0X6u@8\C<"@H%)UBD6!~Q,ACh|vB.! ,rll,c3[H5O}<0 5y\/zgԱ:ߡ3W%O4օ4ٯB^}>X"|FCR2eI<](&q 2A:̼A3irH Z((?x3VFԇ6} \I'xx@:"FI*ۑ 4 \ N )u0 Hd( bь e9O*BEjV|{6ÜbҩAz# _' ^Aη<֡.6}/Hfɑqlߚ_z>j%jI_{{$" gV58HXU?Wgnki 6Hk@f KSZ 8ߥU~yM׶ I a=v.N=dV^9#GN<H22 EU*ܲџ_ʍ7z'bu)?z4-aт']O橓K"Ъgt#d= c A GTPlc z(I5#IZ^c&(_`'Z z|'.cy tFJ !zLaX+Ȋ>nNo#;Kj&$ͨ5%:_K-g5g^eNXpbMڝ%o&eɖ71쐝T_}]iu0X4kډ4HE$dlLw,i Ty;N'.XHeQc[2⡋ mϥ}A!I#ihI XJԜB-d34{m}rEwg ~  B` H۸3WP̸):dK}KM`RN9Xm P4$LwK!@}9:GSce3Wqyr]֨i>%ӮWc'I!9{bSo@أ; I`<[!ɟA`w갫%K0ά^gfF*8T1qڮLSsKkj924nrDnhl]f9ryi+ g58wSX܆ L1ɫYB2i\C 1oez-NW=a"m?~>.E󈭤jG6Źt.oVLt-Sznݤ]aUPd#A^%Mk@8=6Rmd{NUqJˍ-(@QAbqmӷ`Taݻ vի{Q03eDO'yد$籼r&#} -݈ݝ]d",m\d_֯9P" (ڍ쑓&T[wUU`#Az}]NB:ŐroW~[0oCG5oz]=de,ěEq&>ɱ aA "=~93KDR(m:369Z=5%VVPk,ߚvx}ڙ`?J(x@_offcE0}h?AK/\yL. =R ł蝞`+;Zƶ|M4v=Hq Ë)p9Kq BmL3x |iZryWZ! A=p52g DМU$WX$@0l GC,w1Ug8 WHsQڰS+M[I(GO Fp\)Ƣ tϺmD .i2&%4tiZ#_(Q"ʲP'`gy4-gG=|`ToK ?p]*SX6Ngc 2m:z~,tqVGՓ-ɦKeZ*] QEa2S#̹%Ϫ?V)W ``2@4|O8rHZSpR\9 F(]d-;LYD۫q\oG n X;ca%- +E.p>?CVz8!Sl$YϫC S2CFJ.ըt E !n0!}n[A_|ɨJNE8瞎5#0LQX=xe(A^Iub7\6f\ᓧXxK P_>.ΙړDxt{_㦭 ΍MEW6$+9=eö́;+^i h2gr(l@[X*{f u.+D54-a؎fٛhϭdRBFAA^lؠ]PSdxen|/dMBeAJN]- rjNAT--|I8XiJVpZɴJrn-~x~$JEf#A?ظbA.(8 <鳻"p#c?;uYf]x_L<Mw5g̩? ^ro]Đ*&V⎠Tq# !QD~e(򰇏bòݯEm鴬B1h4og\Bd8!ߤZ@~K_5D3XӝW=VSQ0p-o8 lZƆf|#{e׮doTrWBukr>lcf"R S/mϰ@$<.xS9aQxT>!NGT#6_(b2`O*ȍ~&ڱHq~Ln)_.Gt?14dkD=WQ 4Jるs|X[ TsAt2LB(U꠹S]͔F!=4Uޱ"EpŒ;~C*EPY ŗ_b#2v<R:̺\%lYYJ"4hù)LdVo>fTI"MVUR\qE< xSzYrC QILLVԭZx+]Z;ksYU?38n^x/6<({FS<?~#9p±;@z?9b.;$2؄4\(!10^bא'e2+/%u,ݖ->+ qE !NU؞PT E-+%qJ3ŔսQKw#xnl0"S)"ҖZp'yސ"0]ZD SadyHu'C["4JszMaڌlEu&<>[ lR8_%{DN ˛v^?Hdy6]J lmhtHtw ~D01t0/@/5m.?7|A.FmA|~AҷH 8Jm,88?ܛ&1Êg ,FI) Ȍ/&Qpu"$rVec*lqQ >JR!kKѼO-VeHmKH9q4smh-tmpGT+F\L\k_-cl^7J/w$%̈́[h2"Jg@ozVe=7MY(r:M܏T&9`PoͦhQp 5B\]r@lTf0F< _c5N0j إ#vMu u[AYGqy۪wSy25-]8t_#*u4Lu xOm{ ~KXl/~ q8t.P!R~އGaHڢ ƱmFK l `K55@e!~gk "Mx6h?d< o#h.ҰS_ZbTb 8'8^Z4d0E6:Gl6Vo($ #SPt!fst`D>#\㐧[ os|4]tˌx5kk4KŪ/eȸ`=.|.i^n6j>I‡kc~0鈗Ӗ#UY %FMvaZ3l;KʵPg6 dɀsBPs>)\B5Sȟ#t>5[Y _"3mH5Ͷ4`rފ0_qws$GNr=YiNs&t}d̡Qq8YQrF)0rPm \Mnu[e}(Dto/`_ȭX8o7'| Kyȋ cSt6jHQ,=e~ Hv6r#GN!ٟ ! `fq8`%WԮ$_T!oֶKCJ z5>=̬4+u*FvV/ABƃ2̎zbYTQ %=rSni|Aպ/w2 ٝ6?d5ے;-[{;FVZfbnpMrIBfsMDqMy]Bݭ`0ɴ#ciF\ѿt/MZ z.8_?KFyu~M<.aiy"zلEr뜮$Q^7Qҩo w4^lmWy.ץt~ vjE*N ??Y1U1 *r˘leb|2D]xy<$Jbw ɘ&6"Ő`qmlā$W`g"y?Q+3[ORsp!>׶ Ba.P!VuQ?VEu?^u e>U"+D@1ԅ (m@g 1)s |hz|$>BN4+ O-\Vxˬ;Mg[!0&l㧅EHU8$+HdücR2n>|l.3NPqPILwkn!צׯ|+Yz(-ҁ#ֶTW"{}g/'@)DPD[o(pkK]`_UvuQ?5$c= LZs_(،aY1bJtq:]:.H⺰Wı\wEdro8"vXLzo{%>U DJW m'b3S-}f-쮑$) 쁾63^%E`zČk;-d/Ǩ*P{|H >bsTc(I+'KBbI{)ZXM>O ՙ7r:> >x@;wY~'EABX!*"=Cdgrx oS{o^)SwAeRim*>2djv\qzDZ8͓̆0=Z\be}@Yh~삼lz'+~3py?wm{MJB/B=^sfZJ!6yikUFT? Pb}Ke9*a?  QUT ,Rs"|`xzP(PöW_蔕c=֦$P2,zW碝xws 0"ϻB]h+ws~%?i \ *tyxt ~YiCĂMZC2T{^8}Γi~\4oxqىGӜ +zpG 5ZN9 %e ZuLcfQ=ʊS秈١w{5U IMg>.6yΛʯ&^e¬`/ NB ›RI _EvQ_bmߺau[1+p#iϘx_Dm\ăp8vo*A5Å0"t/'J|&[OhDz)#ܱ$'龎eWDg}"+}$ytaSy@Gzj-ŢpjY:)$zd0aJ$ggU"*TGtQj]d["!,פ#|[t}8:KsO8SʀU}3RFߨX\m&vok3LDM;a<ݲ3;s\ <@ D]K^)Bg]a;NIv: ;P}73JzeFŦ'`Ճc1@v6T;C,b 2q! bu(ozl,,v5[`QG[oՏ[\OJsbЯdagG*t'?7#X8С4Lѣ84iӖI$#My;(l0BW#ehnJt<;Gx_/[*1B:G̝Mixj8xJ4%`ӛ]ճQ(fF\iܿh{PXx@_VeoJ]p+KUIaNE,7j()0ˆ$B vלV`=*%N{61[蓆;O1m&W{#?h!>|_,P) Z\7.$ {AX|{eTdOKE gsfs B:27jKE<%@ &è%᥅&NM 9x9@YH=)EHJӤEqLA%&qm1|sm_YIrm [AZ#q_4._˄-mٹC,\b3Xmr5,ȼ݇Dѣx9y^1 #(Ep!@w7, w+hC0u4jȐWhJYjL< [hTDԡqEЏ,N j@w)ZTKcweհJp`|?a̽™<ָJF<6]FpYCu85, Ui>dDP1 hw俽o #]t&4IHbة_JGEAܧ,{Rn_\ya %%_r'mѢOѼNzM[ehNZm%.N wth3/Śxnu9̄ Cm:J?=M:@qeRI.uzSDYm`_;W 2(:1hyz}Ƕn9=6;bBCM;/BڐNJd>w@# ֹKIaCs,dj鴌j~ 7U"j4^aϭ6{H)9Ja<%*gnXS#!D=ʥ+cgEO̢^ʙIMUPwVHXs0(r?6 Cem$V*zT ܪ6~G?ͿaeʴrzQYeX/Y5_*>G!31yHꎎ)x뀍( )FILM326]q5DʼP?"ϞO)H >ѐ$]* o s/*o+o@g81^8O$w)]J]-jMqp;!١f08 K>u۴q{G 8\ΎK(Qx+1M4T Y>E)tԏ cո`=7CR߄R{/BNX6 *AoWgj|pe?tw9'!dj;]xt/"f!fC/@EV_?[@I)B/*v0f4?YzJp~Y+<_$6βp8?MoԚ=q$7dDqۻNbG;ĭ6Lڎz$[kI^ 8AN;g hCe[I*k8 + ҍyq;?Gb \34y1[CHmTô>Cݣ~DFTsf2q)|$(SwAKyYQ-ZZOF+n"zRqM"!Ը/)Φ0(:OG˅z;uM5+=xZ-958$ c1xi;tS9ȷ*19KS!F.Tdc=[?b|\E&Kns L(O|yS{R}Hºj!BHAZ,Y[ez =i)6ᩌ27de҅+D8گuQ_[$J^\'Qx4Z&s Õ6P4Q>GnRZᢍƧļ$~RjCƞ.QRf20tbagu%@Y;AlqWu?VdHc{`n0{H#FP]3ϠirBZY;kN8ધhK(zM) Q*jU]+;Z ŦZaaƒ5XI S -jJɄQiYshu%B>* ݝy <+zz`*8tyGF)/&62D)=Ā`PQjx[2rc| bJ-DDuܩcAT5xJhl5V~{+Atulxe9 (/BFqzb 5Ca&_@K(\9FqzC"g؃8gVߏ2Ǩۻ *Fqބ p^pw]77ۢn Sra0&wrG 䀟 &^aޗVh>zc~-^+ˤw'VV~lTZ剟tp,! uGzjnEUGy 6!=JT{ɝ9nK1jo;~)⎠zOX𾠰M''1<5ȄHߧ_Z#T7@uj$KkAPPW 0q^ߪ 98OJj(bY"_vNW;i`åP_05~ŁrD{ptɴ0J.Z$:IWbsC'NYTߙf"-/Y_#sF2쒟*aݱB4P=0o`&Te İQIOtQ ;@[C:t!M c 1[\&EN`/#ٲKWˏ^r.'4t*Tbê r9T"f3&5YkBGx#V(6A]౨+DIq͔賂&Un\*?*||(>ȶH4v>&^Hʁ>P 0d>jP׻r)/)wMȳ]UP3EUYx7M  [qk>BUnX[ y bE%*)am~G%ޚ4;Dz7MX byt ZK v aiy5.*G(1 ;ٸ.> йA?ۨB<"-k*t>bjtЪH褧 ё ʉ G#?ڭAeƗ;5Dc ,O->~yėLă/޳Ըo(q*ub]j?8! Һy-]8LɍnDBLʄ.5{ u{4ت2!45+UDRT90me:RWIQ0O=%BFm{;G!n?=-[[>u3%9opATAuH+%Bp@EZƒt:)27Lld][32d{εa麂Ž3Zza_\ pIښ `϶𯒚l6[CT&cAj t/Rm1xz)P }snK޹w !DYr!kiWO/7&.UdT]? %3uxN"#1yq<=uVGt!g'_:EbX2 ;<Y/qԂ*BV|0h~Nu_!'>:1 ޥ$TPuoqeFn ٔel%>iM,_$c_Qrc! 5p>>^z+HD[sI`x-cwӛ6Jg=Nd 51.|M6 q]f!/L~+K^Z:Zbu7g kjJ}sʰu,~wcIBӍۑK3n+n`<ĢE #\8`H"1^ϰMRwn?$7|4U1RlaLuɥ+ +|010P؊.X-{%"tޥTCuzPNɜQvYiNVrUh3d!*x p0TgH~/xTXQ7}4B N$M}sC,U)0O݄=@>ɯ|jg?P1:SmJA~ CER]hG dQM GI Yj؜<CJՌ6m.<ے+х˜yWSe` 2ud-F I{J0K T$qo9QsANvV揂)!JJS^F"SaT7R ,'@:xpe7^\4|ZGmI7MHCV}2kI|gN;.|"tOӱG &5֗cvL݈ >_};'IS_RyM_֤`|] gVF苗d͔: Wsi} 'Ӳڞ_!=97fv \P; mp^vsx|(E2pWC /'O?Q nkLcG aO6 H-zdԏ{a6"6a!.O<>)9bzX1KN8q'<ezTi@!yLF "MikQJgo=OFpx, ;M0gAji頖}v#?$KEx5^vBJ$#-pSͷ[ MP!55f)U]8Y7+u [ie^rdĮ&nMLw Kb?rVWaVyw|kO{ͪ/ `^VզIZ>j:dh`YCU[C^)?^̫`2 hLH54PVwpRZJ%c"/٭CID*NivR/pDڞ;mţ?dl ZDC+<0o\HV2a/y#B1QIZ" Httk%O4&9'ΆHV{Ly&F|^~azUrj YyX: LC֏sM\g%Uq1=uʛ9D9SNJ0 ~TޜR.ӻW ,&*N@[(ȼ!#L߫tz1~+hH' D_9$ʳy%rRx `-BГbᦩY?uW vdd^,ۼ8a2SX/ ›bf*lmGlBԠ&M_Ƣ$a!$8ݙI*SU?DŐq粍TQY\&kG4>scB0D_/QIfŮ sWX/D[|pJ 2Ԥ"%شz\R,j2nInVpRJ~y^zU,(OCq~xR94mScNr%~Wg?ї$mtDU AӈgEf7,!St цB{.0-0 !\nZ&G[/' IY(axsh ]zh6m0=D@g,=~?N`:Ja_ FYU3-`ڥp|Fb s-aYgUW y{ _]!miU34Bka}0^CJԒYNE^@A$ $2@C|!T#8o(_xDUm[ه ok4owG"4j(/נ( 43FkZ AV&H {~#=)^+WSkqۇ_ߚ`%Q)ُIk jU`>Xi\H5wXn)gg~^pCKnQ (`b@@!m5i﹵/xPOPszz,ȹnـjֳdX 93 3W"cp3Gb -^`Y3Jb5}A)Z@?1x΂ϩ;YYXi'5 $)$_,(e_I|<}X䰼XFM҈* :֣ áD^jZ[xCJJߤMTYg=ϰPyìg]a"mK2z(] Av@3n\cj(B" XO0Jk|o 5,)(BijcF`>GwH rس\^w%ݴْ̣| APҪ" j'@>rb_i o&xo1] @ӴAcG! dxYC>SB/I2an(K\"bgv{#ߩCRSw|`%cq͋ʆ6@:kgWDI ӿw?˭Wx!8[Հ\9Ԑvy3tf?x%o}Ҷ5s$Uxq1gR `*Ʈog!I@$Lkö_mŸ=r ڧ{Œg}h 1\9 -0Z M GTLIyT2=|o5ȼ6S #/{ZG$r(&E9R<0c]I?Wqwe>= C04D4^J$:j={{ `W?-?Sk[1 ,TFړU DHuչEr D5Ը`}`0֟ud)yMCH@ATexycѕTUޕYA01\QUq?Fǥ0 rE'/,a>c{Jv,p]>QQ=7V2ZJ9C,A8g] 7J9l%PcZS U B:ۛM>Q9Z@,ypmbZE3ۉl-!$A2Jj8Ʀ6~\`k=–$?\^C:jKTgӦ* w#٨>~~:&INE 9{V-DRI9Ⱥ1 x~&^CHR ǨVl72*y|@(R:*ғznpv7'7$ ?ccl݉'[f,,&-gB07$@ P+jp5^Bi'^(hN9+}gF҃P.ĸ DdPkX 4{y^>Y %l9B*FvBU6v^;W^/k2-`'ہ.t3QI$w@X>ݴEHnl)l)vc$c/ҵi,|R#} 2PA/6UZ81\j'!%o\^ʨJ NE#%;5_?+Ѓ-l?qy5ShF'+pޓwhiwjE@zJ=$ OhX\fMo8U>d #.(1tnTz.ʏ7U mgmmDlGrvT? ܺ!PqF(5檒ڿ{w ξ$*1X%~[,]=5DȽ;U#٬Cij]r7FCOy/"U ~B=]uy ]oQ<;Z^"/52iN_"J SPX@WeH{cCtM)4 1]1Tޫ_,0z΃;N C3DzꐾVqyj#U{rΌK2suMŎ9yej""o1H6G*֯'_&V !Hrl[{Im7txT{;5qGV14z ώxSDI#]ӵvEQ$R/N;=HUA^+A}O!SHqF,jH(cpIVc-]}>hP'?@PKhILǭ==+i/tv$wY_c/ 5\_x㊸ zLs3*ūZW~-P2%䈼NFRJHhmBeƸ~(*&jYU%\_+- G-O#mWٻԩ^*5KŗZ2|a#?a,7ؕY KI"RHO>CKx$ A#G˧%GA-s" 2 ?怎V0 rX.(>A&ə!cWĽ຦XnIAZ#87)[ѕ[D4ǰIXXvZ)΢!\:c Ԑ-5F)d~ih.n"nnnS^ ك$UTUW,(}6 >`Eڞ 2M֞@|A^hqHE}c02rGיHVL|@]EL)^WAW?8nok{@0Nq` KEA‘T9,4?H^rϊDx&_{(Pިm؜v'onɑĜClT4jWb? )sp.N >{4&gBݟV$@0N̅>yo8R1ROpͧW걶KYUj"d1ۭRgxcW$Jpm?|g8U7%o&G؊dowhcg Q>YL@AuA^fsQR+Uf+8bpr(;e(Gm}:1l|C7rkmwǝ*%lRJtj6C F$Cƒ#,I?% J.ߡ֬ =C :&\ {UvmΐkhK}X%B `7MojTP0Iie@3nM#MNGqQh6 k ^PeXSTWV]m45JHUC) nJcjQE#y sr>ɽ&Du_L]q4mS)p,/*&U{KiȔ:Bc_-_ 0,kwlѸ6S*eAEvEQ 99ͱ: >xh͑WOAZ}}(a ;޽X*؄Q>(R0:HO&ՠJej .gUgar$V6Lwΰ?djFmwM;+'w]8>`"ױ\H$seP>Dsx QsUTEPt׾ J >ϴJOEg}NHx;"jdJwLct|#Z䂂hs4 X0_0|oI0 Rֹdj (c׏?x}# D"E<6s3QpP!0GA0KC;w _bzQ[Pε k_[^i@%rH<^KhS8,4K>ߕsvfw,8\n1;[#ӝkZ_BLU_r$]jj*G) ^I)R8rPiމIëAeP^~%1!@? #xm&!2Y+toH[7)N1ԒI"GsG0AqB6> +F =zqT7j uNNtQ3Pe懐do`v0~gWA 5cqi^.( E[hZc6e6xe>(*F54~ cu#w?^-z]՛ 6(z'砇R:휨5V#hPS?À)7sN, ieb7GA1:jKe}D*8DoN=iq+.U3nn' lz( ,1J3܋PC9MקVk4v%Vcȵ1]чAl [}hdi4Mw6bOxqʛt`@gfl2X\ ;lL+LXv*KJ`tѪW-Q%ĊhQ٥[nd=( ZwdWFn-a~]zaLხP!9집 gϊ H>Aڠ=6N#E}HWCH3߯B d-dh2 p5a̖.Ĥ2g[Ā2.Co쪊FK.|%.hVrD`"h СGX!2O=||.Y?cHs0e7Kkɗ.u< E4 zjUNiН?phLm3 "Go5峴 \@ӯ@O/0iG@.M.Ɛr$* .Ah Tjg, l'Y5#a׈DmFk*DZK,y~s_?/5w=<'rؾ0ԨSɆ'ZqXoaemX oH_5 `5kn&4/Uqx&;r"i>Xh'b;oJ5tIlrGSTćCvhVu5ɲX[Md"R1R?#j3.$˕E 7ލ `51Pϳәꗷ+ L8 %|W+x]4V*UUjҳgĿkH5<;ZP8lF[TQOSQL}״M^gܘ//WH:G W+.3֊Z>S>Vcdضw""T 'ůM` m*{RO<8].c;, f#&j͕p,pW0W Sw;\t֟6$o%[5"Ҟ͇7 .;u,^PJ \*)0Gc' .?Ou4:H%u=?]|{rzU 0A2:5h  -~4dd''fWT.ŧI*g} 9A/EkRWЋ$5*uRDLp o?x noD_h+C&<מƻ6,K14:@%ˠGl{Хm% -^}:f#EWuFM]-j ђ "D: dR+d^w(Wu)Dpp*|RCJ˅fXd$i=0d*c㴆:pPӾ8.QOY+39 *g0(ୃ'<:VU jdapX%fjG&5~ bUᬢ爺aTxr e_mp#e2(cb taꮽ0T:'mЏV87 8:lV<9_ITɰZz[mu<F#Yۢuk1Z\FviAjk$MGȁE3tARaGhm4%EbEBD>A|΅`$*.JP,[;H: &bna,=G#A^4^G ҦB f6 0"#߫ts.wHt9HQHV71_K_0yE6CgCܮނkS(#L~694+r=YA T|q염. B^&I3O[\YI\r }d'4gU:#Zs߯.ԛ(Ef[KA$iMɵ܁iY7EZ]7{%,&pMǵ@, pFU*m]D7acH8B<e"hYQ莞9ﴡW.tslZhT3 3r ~8g|&PO3F#eI}'M?CWNC+m:Bvv*!Vp>>%>uJO;38H>Ok\wQF0 q9rs2Ё2 l;صN/6L 2WvsmMu54k Rݰ ryOSrצ]NvT:3Y籰nh{U-r@}aHmlPu*%7ǏQ~%hMCYYOy _? #鑬Iݾ1|mj0|X<(;? C<}L۞a:ќ}jbgN&CsH6`<S#S]_M8sz63A>(T6'Vh:kJH\bG.TG=6"j{BXGIG;-63}1FϹVYh(>q@d_n3]/yaढ़rK c{JC93Kt<ȦspЫƋz.E@НC_ȳ"Wl>곏rrU8RUs րSZM;}(<)\RNH@_>+{ŐtY&Dy#A 09=2JpP  UAx4]wߪ~^-&7CMԛnlH]k['>0, M1yC^<+ŚчdB244XQM2^hRSK ZemA˚eCu`|#O4xWR[f@%:wD[gUA4(_@+X룴yK>|9aڍ.;gN]qxKr9fk{2FfYdg({LZ {o?fx>t+ِ-0{=Ǔsgzd 9 hdf_`x}ٱL]wބT+}/}yB[Vs߷,\8#Sq1S~FW&&Yuᇞ&7?d!}uPI+,2C̕P?-߫o I`g \9LO2?rv%.@f{ 4!RrJrG/ÇGLX\1*Ar91/P'*YZwH/1M3A.96FSF m[aUp4N c8UW+0rXlmC?s$8OU3)LYbكz} X)!._H҂N;Ju2hd T'jd⮯ECr]H#f7Do.Ar8P^4SnT8-!p|f%.;mAe,񓖗 ])[F0PS&@H( vD5^Y1 ?H^5MKY\R5eٽ+3V{ ib#@ned`HwQq_(MN&u/.)9QeG.6& RGI ?^c XS74QgPn{h) c%(˜ ?tv\†pY2#VB_7EtO݇`fB  }!z~Vs¹i?*_v;6l+;SqJŀ󀨪|32è#'Q]y@3&IwWEroGU(cg0)bbIqꌱzBdlqlT[~zwHK]wP^hbI3bz1b۝gN8=+D53Q?D&zgΕX7YEw`[3)E28NB8b`Z쩐qLg ?7mCdmG˹Hd`wRXtq/,m}Wg# /( g*'1wk@KOpTlDb컓1)ɾGSY' zB°ۚ@WKw!k嗶}(Q>Q]l \@k*@53a\침{BccstkwGzDy8XŽ-6\ÎJ<@%\4t4%p!.DfF4S%R7Z3fv7Rs6=ޚ4 x3. wc#eEn1098)9nc#i♰z ~ "QiA؆\pKnO?62a>) D2&yԏJW9A'U{54Cx&ǯ{oOzz#Q7ݡ<3yG<opp6G~6~3[Tfܳ¥C=Do*>w>! ILzsS̗1eYT3WffcU9M|`,+^Me cD/#1 Pg?~26]nRnGaX{tb d&\LQ٠H*bNVp Gu[J&ֻC-CnsڀMAhyQ0&*}#a `R-uc2G:'CȻBf|^^j)7y&0%10뼜 T}Eg#R*ľO8V05umIVbTe!mz6"$) jl&dR/̹q'PbRAˋ2qRp6el3/#Z^4`>Sԉ jpRc/؟wfFGCN+yup`{+:r$rʅ')>'L '|aɢtUyWH7iG"% ]U8,`%ۍe 72,`wP'by:(d4J;4~;DS]Eu*/Q*ѫzw$ OW$3Q83 w|MiO-r~S&\iY7ݼ9򨈗ϫ}N #Ym%գx_>cd-A#IlV ո驻i>űa"?&BNQh? 3!tҲ܎&ư_Un(g<'D 1\,={(쟤IHjZk^$T7>=4#TZ <ftݶ=k.3ړko?,o8@gulX` B36 i욌=Z,fXoPIй1R٘#RQˆ` dZ Eg5X ~qc'4.<2 М~њ]n2EG(: r/:H'ɺK}*5 b-&(r] ;Nyӛ]Rg3(~JkiO:DˑPZʩ6yl!U"˿o+ y\ց;";\KtYlr7M˃3ܐ?WTs gf8[~jzYNG\rVXlaj R4[>p}$e>ޢ?"ȗg7X-/_|Y(Gc9t&CNtEүLrMQK)5.4ή=*P`,uxWJtJdƪ)\@[tæl Q-w5HWITuQ$JFTWZ&*6ˆٚ.x䋥=MTNTvo_b_Ͳ߹g_{< vu![ D#=MLe!QrӝXݡ*~~7)bWٓz%И"7^htоqv pYxX`H{]!owSGpreHJGqWJ'=?U+?P<34x}=GFE0i ؁cǭz@>Un$-EpQi^*qj>RY").IE7X4wVLӲ{ ~)Em6VyT+It.=+ NF4m{Ճ6oW363%+Tva {kz˂0 B{+Ic&XA@&9uujac, g7"Qb~0Mv.5(9Ӂ-eL)0܇ƱKP`#Qjw ѫ_+o[V˞]~hsr$1& :q)y(-Hzi\,c:8 HMrWqJ") X@\^Ecdos@p77;Pcn{'7R'b{<<Hxp@Fcn`X-c3k4\StCv ahԕCO?MN^'*UٿJ[M^wL߲O; >_I:!\ìq &H~sASjC2etvjC}{4: fu<"&qcnz|9L,K]Νʶ l?jET$mN^3ݍ&CAzЍFx8='ewa^Oߦ*Y =<se%m 8 X v;.p v)C+2`ہHy{ғl.<aOjyr+7ù_cNI~2~cC~I {!5T#) +|5ѲIl43։{#] \&&YS 4h^ {O~Yڒ$bi)Su<Bj Y3&w}5s Tpy5Nc `Q g`Z6Z ,$H3@i<⤌\wss7gzlv)2#AH!GcM"oM榎o : döR%yTmPWI"xDfgtj;"tf.qNpoKr/=aD=.L8,İBMHr5Y;9?@Wv3Ge7ۣDK$^{"KV!PsՉV+PŰ_֘JhU:9㋿h{`vZ-[8n[b.^UnF3vd Fc.;gb'|lM=8-DsZ$gSSkW1V(Iz) 2{τG{xV@?-:?Po!f6J`rs \zcFߝ[ תbyrhj'ʑwu9|ѵRYЯI tF?;w!{#ݳd(i h}DhhQmcxY17ޒ7=`IAc@v'OD71wE 5?N0QhDD ֩IWH@Jwͬ7zkHq4cFrthyNk+SkfJ|oWb gZKw90bX抂K!jVzVZ#1fCep}2TϧTM ԲE,3)ШI,iw,iPr ` Hߴq:ծ8=z®*ѥڠdSz{Ls;1 @5狱$7.d8d TNl↺`vWdߘ>NT1 rf`i&98S$q{V-XŎ -j[0^CW7xK^XgnaA-UͿ_{ӨtQQNUQ PA~.!!@d;1/` o`.w>SM҂Sx? iuYB(5 &QUlZ$ X/ 0m`?iqHe{+J'MGhGt-I )=ȶf 2Qȅ+4&6dƴTo*`\xpiB XaK T-K,4Kڄn% S8.&mݦGwAA9D=}l`+4,i{փz`7RP4&7aEBBbrW95o񺼧l0rn5~euqr ϔ%|+ 0Eup@;h3K*q?9z+ŞQ˲fUFl& c#3k[d50άp!%prNeE[l;&{Vؓ ־56tF)Zm`'h SvzsymׯحL3yǻ/Gl>X}{o:M=__OnO$•VwyM=tj+6;n59C.p[(FI78Ӝ@lC·?%PW2v2ͣuBPgHcv{:yt7`"_pti.{uB%BfTS{KFV G5؊+ގt,x ɰw"Hû s6WbF.*fB9Ț<Lgwo4bdDX0 H4xvxV*$ـOtJRl*we?81s }ѣIcG=vvX'u?^^vz*ndL碿nt -ӝ")x1tT%h^B,>X`*cȓAw/S)R/ǃyrRMAi:%)/aFz)_>GKS*Ap8Ul֦@zp%6beTDoeی]O,mc\\j6k昣MNuvkow @ )B[s%lZ6pyC uH',*g%KVC.UX;KK[GL7ƚ9OT?9 BSugO|lBV1B+)| f촽u97AۤNخ VfX};+Un\2ꔖ _,iy.M:dGcbH'<:A Ksһ4 v%gȘ0Љ ?EP a}mӟoRe’Cs_Πn`Ӻ*\(kgh488\Ξ2\gIFcɍcmw9-fSm t~h8P_Ӿ>8骭 ;?PVEx ƺgԎ#8]sukɎ%OM,.DawP ߪCΗNmOȟ0dE*=NzN !tƋ p:{[SDrȎ%Mx>H*Z[a¬0s,hƃFؓo1{69=&^B3$a4Q [&N=D'RѿA Է8!J1)[ߢ\*|VO:djK#ڈe)+NXGUgcOjIuqEtO.2,WCXFo)N?VP{JVxzI>&vXz68(/G)Qg4hntgQg_+Nbq4HĕvZ:<.a{ k>'(ԩJĶ 07%2s?6sdΤ]rKq %ˋ}E4e_9m'ӄ.97x + d )^@ss0Ǜ%@0&cXcj`Xnn7 ]R9j ʤȶu19C"褉T= gK/ûkݠsCд':pDl:L{H w9lζJXĮhB~0v =r?Xu[\W'nfe&.~iAr &V%Ug)Giܮ`P*OX]7/U5] }] / !\7QHT,?LϑLH'oP^zrB-_ ~QೞHֆn_,1ʿ4u\┝sߪ%WJ+05o,sCQ,6[v< &XL(Q4J*,0 $=bH(Hw2Tڪ\Lr|agNh!_e''GiA˭ ϚoxA8ʣ$%[L!,,P.,t#_C>8ۗ(4C!Ḙ @`5=U"Àr()>-i^]?Mf4ABZߕ(A䦻2)m5n}1u8"mӰ (_BMw@hĠd^ϥHVQt) %NH4|ۛ26/{eLZn^ \*˓ lvnmI,B`o;W1Tq`DLIܮ=0!\U<ܹFg .{?4#aUZ:kqsRhzcM(vBї7eEC[yZU30ЀK eӷ>x}F0ݣ]r]g/X-=Z"8+Xa,Kufp#Q>nݻЇr(|7l8鍷`h9r!gOnf NORg'$Ԡ ֖xkch]a'aCi^-?"4bԺtB׳fz:F.WVkG4@xȯ-7(ҴNMmАov=Ip.ǓoFoqXvȻmB]Kᙕ#O[qƵ|N^e-ߘ8 VE^1JYeHud|  R&>Eтt2feIn @~jmCj1Dԑ+L&6aFdG=~(/6#I$DGt%Fogwi-GEEE%.M̐Z,waM ޛL +|szcܙe١!"!RyK;/ |a 񚡉i3u'r)^&T%."3GJIӛJ_B5oᷧ8*/L`폕+z-YWqԃF ;YNL!7䢛]_ղ6pw' ]pGKd\/5%/¸/?y0 @A9wi;vfPڱzrdlsNpz\ i2v܍܎H7ECs L^ Sd n 4O^*7^d_3MGQ/{QF Mg~ۊ%Z [ߜ;$aݽY0@r5}XBQH:\OdsI[7 m  YZ~!S7߅gRD%79A*[0[C(QqlB>OEAjb 4%(x CME KJ;oq^H6aX3D;xGmۙ ?qɡH A9S}khͬ8M#N ew:1{h9Ea8EwRL^XMa(Npnwp,!%&N)m#XfB2ID GNkBVM eo8S (d׉)үA5ʻ ѝDe^ 猱'sjK~W6Wki :"A-;-˽$\-[[~S9;/n[cahlsgźϝX̕y? eΰlB M{߾ѽA>1T].x! z@ `)ۿft&IF½}WN:!x]wBjsd!=-"VeG1ızs'IA>7nz!k7"Kѷ73,l2m~UY3BCo28yeOc5`[:[)tBv#5zQkp+US !=$/88{D8 ;}%"}j!Eʍht /w7$ iR0`(+AihFqp y;3 MX.=5Q-; # * SPA@DSl+xUЗ"u!<5HC9'j=|# 9z薵GiI52{ʏ#u?vcC5ܩP_9i/*jׁ_!{yXKےl]I V\;ȷHg+\.L~05(jla׺?zd?-A+) 6I+ܲסN7_EBHyཻ*]έdx΀ 碱N0Ҭ]yD1-" aqyg\5$/ V-5[Upza'j2O}$DQMN3nuEsU&+ak}c(oN?h˹\3r6Y,P08ڛpUz?ݦ ҩ6D'0f0ŕ3 ]6t_sʏ[u9z7c(<cŭlFᾊZT PZ bD%'?_ꊁW#ot/DX!}JbM8]L]k8[ȷH@$- Ka yu[ ٞ*6!UƓH;51;Uwtwx;Y {wC_$V߉Nͣ8FשBTޕg /\i#ϲ/WrXclW@(";Ԧ$b07]j@inH8=ٯ:qBy sȏpxUIrQ/4d)ޞgMe5etM]̠M"ޢUȷ's^C;?dj}պ=y]zfr)B K[|jH6?hiyd(]ƜYXa,/lCe,V&fS}8.tn9]APu1VajmjX% $]}A3+"nbw[& YV AsH5s|a@z "KL L< H}JSb`yߝOvuBTrӏe@[f nGh{̉k݊mi2x{omRniF<1S3<$9Z%CQC󮼕-g|Lw!uGWVtR.R݂fa'3BQJAY7\ 26/&^4Mڕ;Xw sɯD(-N"<j1~ aϟ-P-e?WWn`Z{ ٍyEK˃QEj:rH!,/BW S@(q~"^Eֵ7I{C :[C%jpy=1R*I/24h- FO@iݦ?Gzlca,Q&4Gd9[2*<sA |.LAj|?D5B`6=#&v,-W~x&m&Tcv$OhG &9X.D~&Ϸ[qPŦWszo4/paS]Jۈ%h67ֆrr%u3psQzƃ`-N4* jovjzN6jOiG, k>Fp()qѤD>HsƦX˲˓J#lHmIag֖TL y ,q 6s 5 hS"fso-  +->˾S &V4#+I?!=| r2sr/.K?NCqE.#ºcȆp  `>@o G!,DB Vs7D`%p}/  yQd`;T]Z޵]`12~ACjRkh[}ׅo"OCMkwrfn8pP 7>1*383Dڭ$=W`D!_|~?Aב 0z^ y[ֱ癄Q7:i9*!u梒qh88s?l$}mNBo+jO qvTZb8&ӋCab=n۽ 4ȿjIRdz  VS'vrt&51l>DkNky&K NJ(a#A?F߁)'̉2hJ?vX6mћT~^viESUrcw2=%Rxq9 ;XE,rK4$Sut^H ,xTdAt*ff(Xk|-ϏL\AooJA`ϰR#@f Y5|l +$#?O }V*RETa ʁo d٪fOZZBv>rZtjBN.3ETlՇ9EƑ~)lФ@a`hu 1E;bڔyC-ɱpGPH$[RD/6I1~`Iy;^.97^P =TkOnT_8(n%W_W-kNJrVg+m2A=9R)*k[Y,-,U0H-?`9yAtBC<Ó} m0yکqt틀jǺ6R9":Hy,0D;M|Яi\6In5S!uFPT0B ߅f%۞<۸NRD !IH1\E-fdW҅lB wE~L*)Trzp)sUK%hWrԝ #l( W,-;aU*%}P(Х /gJ|uK5X6%`+#i< 넛 8mxX̞ ߶e9~ɁIU/M0lB1-}4OZJH#jH7L;cB8Xy)6+ aUNٸ3 ?ʝqsl"ROEo){ m\ưh;9wS^)| pI;З6+M(|g("7iPд{Vu)$TW 'ϱhFOiW8R§tO>&07O5< )2DָgWhO<~y#%~9q syTaeb{El@d2ч.:Tqԩ?BW`t̎[-Gɋ7~وCUBv|Q 3B 8PfU:Xl.!-T,*?ru ua lHY{dZp5(+hKzx" WP&86~f.&군UFt@m\3gnkt3HUp}6 (d8Rs_74撽#9nw-oG kX" 7k)3`jIo nTu292 "w#᫢5PKy${-ENRzH鹔}oq; Q#>)uPJ[ Bt+ ܹZOav1w8q'"'#S&7}VP양c8F sZ7 ?\CCc x%}gm yvr !_ڌd̾i5\Oő/bG ':Kҋe-%8Ҍ8H%fUQ4Z_p)JXQX>-Kr%\AVwu#̭cU `D#:I0kVI7^٤-ɣ^X]nny3 mYI=\Y;"W׻saID-SHE3uֱѠy%Lt\x`Mx+ӻ cN&"UI!>;qg%8WAٜj:7]i%jZJ OkBzr$ITߩqX)Do14honLBAFǺ'9 s~ D2{SӺaM&v S`*L<Ҋږ(^=FX|]D"գ=AB%l[9"zGGAѹ]z@}w ڸ)Cyߟm$cH o+[boyPV~2ښeI K5|\rBcRϯ&d 3 C7T6G~ɥ UdH8 wU1V+g8B{AA/bbBw Nx4 !Q"R=i3>Xit=n.wu^Z տt9w/&XDZ&k$݉ifaW.C*V3gO@m0Kz\)mE3="a;>!mePľ;Jb(rrWFo$dRv9GJߩUpVn=F-P9~0'VOU+ԇD]qH?nN;FRORXG#4w]HwAb3 < 25/ S8A' ErWaĭJl:~K`m< Jn` j~t l4jAF4Rp'WJ뭃kS2T#GH H> 04mxYµ|X/L%ZMz^6`S I;[Ḏk~帳h+OQʎt7Tq/v"--oHzųqhgZ(I@Xlܻ'uIS1/\^?:I Isu_05Act$3Zm_k[f\٪<$Q|ˏc湮̑'BV*Nt4G'})V'C`cWwX@ޔjoC&+Q:f 7]U{+p6sƩx|͊C^B,SaR]r%(k $=ZHfU}\2;;.^3+IH4wtP|q1#!$u^~3}Xgvyg ƂeuVqvlyc hŐ`~bONۘ>W}=nMN^b_9\4b,ʤƊsޟq~|.AzO!lńbܞC>Im' دhʔ=(c(v+ЅSX(dڝd!T0@.Hr,F NZtEl"w,n/VU1O,*n)rwIvNRlVX h='k+S*H%bW$p$,Fiz B/X+4Nmq9r!=}prFK֣DfɄDՋmFzuB#wW?Y]- Iv?<&L_…*@>^jJBP-(2/E1QZh&9z|Un]Жi-ϖ|6ƾF'[uMl,ϰ}9@}V{Y^#*%osZZ,L̨:"da<޾==7r&xvpӽC}kGhR=9I\kpK6^k>Nn֎£YTlzuݘyZAd)g)֊Nbݠ {K vC+U$"%NChcƗ_ݕ.ED8Y2W~j a tH' 5{p%cdAbƶ/c:/:Hx">d'WF b#A*/~lƿoxml_SM`O]aA9a%p$ڊЇŃV9z:% I ΔK?Y4<8}J$k6p`YL!BlA" KƵDA S(d lDO Pt\b|nC~HK]:0x[<,bm+Yc!+)4gG(bB`n{ it՝;3)`HwW%y 6 mcg-Gu* 7CGKoLtTg3d@2h9]-ǯ&^[b"wl63e7*Ð߾! (2QsQ(#m.He2Xy,>=dGRїh+,HEKy}PL҄i.4 M^d&c/Ӊ6][ަ ku3um>9J+R!çFbiw }$+23t!TB(3߯GSFkW6㨳݈F&h#}Z>)4 }F@Dfȟ՞$]s;$l\Nռy"^@Q8:LXDzꌶ:gKŦZ|._@\*5%&[( ?鼱 @Ȍ\^E%AgW֘c*:\zRqNi#ao:7m#LJU&'#lNs5] 7E)=\JeV3ZA]ftypsJ2zt- yK.v9}BD.5LqEݝ̳^*7twx;7#m`Ps+K=zXoQtoCN-6<.uݨ(Sf.ig瑍r]8:arax{F`Rw&8:SK2`ʼoO1,DrH79] xL};V=6F$# V1R,}ZgѢ*HNB޾|8񕰩"6Bs v%U=dYXh. !2&X>9(M*r™=k`{tQ 8cgWGqj = ^6-'s$[_N"9,͓B-r`?1tmEd>;(PjF?S>ߓECW;#fd 9I:pCZ+1 k&јDfFH;ǭjb$tN`-jƘ0$]̘ S8C H RqA0sxwi0ʓ)u⃇{B@ \7FzܟL.Z πУc yR gvRexPǶl @}m8GޮY& o{g{ c>)&4HW%xQ`^{x-alncj~j5\]̱3Goܔ6gZPncj[bd7gZiMl&gݙ.AˀsDFcl,%ZZxa h)@Z.c% e#^`]-"5l( "VA]>إzrÿ$VdR>PTɚ=/Ees|itySr;~os Xhޛј>໏cΕ߇JSF#Q͉_wЛH~$᩺sǑ=^896!t}ݲX4P.DlcR'Dłk}9rc9P*\x6&MŇ!g:"6,):A:-9ChwD5rPs_(0H} fiQ}!hkv0#C̢ǪQZ7'bVNeʴ$0Z]*{ʊT=|i>q>uJW1xp0Y >7wKgds/})YY{vjG$565Q2́lxl!ѱ%_:'۔T58_Ҽ)k+_vE"#Sε7Uyo[OjZp5BzY0ypnbh&:ӜܲcjQh)js@-vrX.2ҒHtNQb0])iP&ℑa W[(sQ{0:WvQ}ܚZkR.eY07gN[n!d*ð~bF$;& ?8ȄR~o:ֱp(fVv6c}7`8T x:NVP|*qֈqU嬒Э0A^6Z0CjlDŗ]~\Q/ssQ#h~TEΏ-_\mk :+'韥:ʙl nHj%'Np1r߶UOX7AӾE^n([-5?ŕwsɽ;-XvGe0X%\߿ȅT/K`KҀvAd sCۙB_7]WZˇ#xCj5 fK1Qכ ni-;k1L0;GDVb~N4Oss݌(A4H*ɋ*?1g.R:EM(7EEg; LU:|Nkva 淗X$9=*3xO4b/C^=/Q7)sdeQ۷Rث4`,Ȃ}b+~0ɲ$t@/b֌ESى 5θN83eVê:J ܦh?ky;E%G ?dm/>~-P!B$ o4V0D?'iVn{< tU%^}ȿkӈ4ت2vd 7H N\u2j+m.OtֻH6V:&׀atx_eO}VLM۞ͷH (q p(g%J1rټI%-Gcmd )'^ʀ>SF$G >{X WI~Vy8Q#u,ߟ]b<NN&2˜EϟmF¤qN3]> _5r#4<_=R5ꋱrk쎒F日/@_(T،iՉ2dB|k%N_E+[Sg9=Oڰ\6P9:3^7Io&N)nWj83Ȏ憸[@M:` 9D[iu wjt6E%Y80g7 7(DeD!gm![.&]e$Sz2]-s+ 7Q{+6)(a(UhV^#}m]8*Vy4᧰hNm2|v (q$zUfAy>5x\QrgH? sf7.&;y{#YfDlc{s+JJ51^Ki|-yh_gh$î[t2koōGނ`so~5\JY+ ╛J.!?^dً}$z~>7#oҁgGR#7`i>')RjhDEXA_B0X-W [g8OƖB!7<-rS6eq/+@V* Z7ۿ+, *ḹ{@@3^7zZu6Z3̪f֑8s^x1]Yc̜8-MG_V$`=˔><\h 2Δ"T>B s=WPʩ*ڙB8hmW:\sA?+ܿ^?Dl?C*{D! ^a;U?̣ Kx&hl&$)n\%`u[P^xI*LwdVP^ wy) }0#WȼcLG,80.ϧ.=*o":YPBuiA8k rtd$LGugb> 65)|SJZ,G5^ܑk; 8rb^qFkȶG6$,~QBWqbΤ-|hj>Ig^TjeWmb'W1&`QXZ|^z0/2 連8 7|=khP[1F7St Ddj pB6n 1-<'Q ?|aXP9ik #vtoM]lk6Fw MtlyuI D׻tEr)gf)kMVf꺴6%Ϛuwls6ln͂ FEZPjz^\=sp][o N ^t:T}i*(&fM|>-Pc ZrL&W@b{}<+Ԟ?un)YU"R?&=<CD†>T%Х b݃HVTWCaDX $Oqw 33ɣ%S2H0bEZ%~|tXD4 mmPIyznM mP9{^]ʜA$#F_eS4ZBdwl\[lBjF3b' }l.t6`F-ފf0by#UW$&y,j4vFٞQ7 H(7i[e #W@߉!=^y)n3CFvBދd6=$eWD'*mif`xh@HNѥ(X>V\52i0*y-nƨ(U La%Le"K 5tf [6H +O:{f]*K]sb&ûIJqGHMZ"q8B.p+Wd9#JD(ؑW<%$(hdx:=vxcR&zd[nUBxo*,x>P% &1RL6]ۏY<aBVP]xin)y rA1Q孹0 ՔACAыO +z˻uɈL*sQ=(fRxozy{zO6,+%p LR~Z}Y|hG wYJsIXbq?ϓNQ$RLqmfDA5KTѰq [~rm;ΓTƃ+Zlj hyٚ ȏRsj #w;n <2y/.ܛ'l2B 6mJ1&:8`~rmAGʏW&56S[xͅFa.x Spv+)U"zlG$Qp"jYc U -} 뢁`WC3$׌h21`h4s{pui*ꆋ,w/ ?`B+Srl`My\/ި4u!.$Y/XOlLV8 3"#&a\fق f9dB;+%<1?MTUDaѾDj~<:BŦ+i4B x/P$(pcs/h$_RAqܩKvI7!P,kQt@-HբSʮ {^USo%PG%VMڒr۟~,řN ɷm$ȴ8Y2Vav+1> # ٖ1x5&+.ϽvqTm,yP_Y l/,C'^Zӫ= J=&3/:ϫ)-[s@ymY J{en؋.I];Ҧ4RfCv> >UN7= ˒W6VR-!T%>d $Hǧ9p0Cgzt֪:קdܑ5?*9<> 6c?gK&=i W2:EqB^YRsU5IO]ӹT|lHaك$PP) |.$ w4մDE96n~4 Il\y CBFv:4o@MtbsۨCg8#pv-  _#|'ӭX/,"5[i]f"$!>tU 麚3 w1= *LܽVE06|A+ߜ ~S v9'Z!8d{à#lh[',9e`BFB=5q2idj;[HY,VfɲE| ?vXJZCz^_nHB|] ]98lΗ:~,L'Ng] '?$d1?jbѲ ./QpN'zL|Ƿ\h 9T;q4KV=at‚g Ԑ9? 蕰J(Mkx!-} ۳W%1\" ܓ,)iXyL`R$2uv k4y0j"wM dNGQcPf2 _>fpnNTO0#pp o񎋤KbBNaR D!P(ynnL""xOv}SfuR_Bt^=c v-ˮ%h MxQ|"^n$:.M%BrhJMV2c Dt\ԭS)ddƨHlvtI pJԧTB/J- 4!" kH㦸{u/Tç6'{A\=G`=*CUkU*9O/3+; -S9W4F 5Ȕ' ERq[8J+PғxE3<@ɖpy3&q|YQJl WK9N2t><3OPI'5_#]l*sXuW~iQ.)T2 8K(C 9p 6u3좎5=X0у0aǧ̐T#)WwſOHٺЃh2R+a&$Bݴ kc`nx5ZCwMT05=:":nOuo20|yn詊c+Pnrx^'WMʤ*va;zfPpfE{\}jHC2ke*[Y)P՞ڝk`Qw"!"el}'*Bܝ&cs04mU&ǘK GeB^d&+r:u;p&|W UR\\*ʡO&Y2.JD6?̀Kd:'duIa!܃o UzA]Ӷ%ƴ6s*!}V ӹdmF;ޫ~▙A[eW;mِȳ$8dωڅRj{}] _(#es#Q*ڃ[ؓB hAJ/-P'pfXKOo?թ@])q#kи{A{A*@ _έ );WǛ{cV5k4"4\$ugl&nM';ÄK?\bel1&p)*XAYJ } 9ⵞx6ȵ䯇[k٧^Ȭof,3aqj6w^O=$Vrs]WhlbG{X ,}*H\%z76K=qY!AR&]GZmGni#Mbz&02LY\bb5=['\TR:(4X8T\C_kV)e$D RϱdO0 6J9ebcc sڊ/䏩FD'>ix nOlT!T@fL!ϻyv> Vn0 :v9h|s ƟI† 2dp}PfdBL&9%=LIU|[SA0S2Y/XBu/(fkoS cϦ~SVyDŠuzZ=P레цdWx?MXViEI,W Jp;mBi5*G;2ղgHT}0Bʒs բ)Ȧs`g_rm ?`W̾N,:_qVeiߕƂ w /y`%hwe ;Iw>Y%Ua]lR<[%T@8,hZʌ 3R_ȵGHUѲvC;mO?Njkꄷe9 |A)Ñ)J:f;VNo$j7X8](Rp7v=ֶ} 2$2.fRl 4ITPYjzn'']NfkWSH*`WFnorRc%¬-,+`'?27Acʲs)u/mda0%72nZ ^JmvVJTs1zʡӃ)c0Dv(#XѨɓfj;4(Z.(V $C(.D5yvc2Mggy{?>N>&kjOU\;> @% / 8!ex-"4|3:"ZE#Z{O]25hh5̝w8 ]>VۉC(ơn!M8}4nk@V(ʽW. rbltج}`` C^԰ 3=8kϾcA,xM5&Eh.bm2GIv N(xo\wymRGS\qi8deo/!zS4ߞ{W>,[GWkUsM)ݮ oc `QBb|6D$'a<ϱ% :g[[tRmfת^҇BVd#$(G;3rOboVt]QBgH~MOԭ ߅{SF9b8#ҮfʭFgkRi˄aeA݄_&آpl3#0rP 5rܔb{ߴ@ ۹Q{*sڥ1D,CT&BLEJwLBƄO5C`Q7\MRpG 0V݂knUC(P-I˺VZ-)'(^|u)5-]y!8dِJFK9Toxr]&7 GI֜1U{fjBDQZ^"L2ꇘ[ꕮRb_2̹sF5ěe&sBlx` ڍv9}h9_h˞S'yB;,b.|?m\@a@-">0N&hVSd!,]=k, cJ_8WaEG!_KO/eOQW%J\Yu>[ GMN/ E†Z$,P'6i*Q2Y(g c,R >'+3H7osQeJ=8L-u3q-NRW!'A])hs puU=l!YW#—'- ᵖMxjSj cD/9%]kspI~t!tVUY+b  ΧI.g@gM6-#K"Ȳ \ە>f3'҈<'#D8h&0۫Wk\_`dYcccX-}e󘤎*rLi3/Q~MŬuiz.k}YS;huXywCt.&6-{pp.yƊi׈wX}9$k} 36U ]P_qjG~ՌTuȗvAPo#ZжuH4Rŭ[t]5)/ 5nqތ?6jV־-݃^iW.6PhdԷ>6¤é;=S{9061xxy3o'ȳs.Tٟ9 )tl-xi8+'_1MTe*|emSo#-EEĭM]~3Ƴc/J_һ`L[:tQՌ01I/liW!1~>XOTa`D)i?Zz+OhSoy}AKaޓh|}\p2jSmvR<C%7<:1Sݛ-M/[LD#]鶸f{-X JL@NX9cM7yٟl1\75 :cx$Hmv~cub0@izƾˎ#?f0슻0`W. j] @~%DHln g[Uῢro5WA CIcb\締]" HS v%S!IQo* td)+,j]ΕlBċ>}:LڤX >-~!ֶ{wxb 5Uݠ)p{a|y䯝΀b Rb]LH H2ڱ0a*(6Xט2&H@aehnj+sjkH9c^]FړMt (ֽwW%h86nūZBp@`6mJPD99}2~b}`hzimbs.GmD`# {pxX2Ov@n T? h}GOiͺ/INޒ*v%4)),VeO% mePP5cγ={?*?x5zL5:Ȝ{ǥ/3AC#S>&BݕD4b)r3+֫{ΌF?'$./#IMg41=c.ͬ(xd_&]`rk(PҿaB[R)lt) AcrļËJw>Kbs%X"IM%e9*H4aI8r85H_K -}+ٟ ˪Jt@LO[ ovD3DDvt 9nsgSU9*:mneAmuu+<^mPp[{f+<Īs^N@GMX8`+9^2Z8_[Km /ubV?+mIá^ճPcg|T!#fZ|X ]`&B0"xGjd37I{b.K֪sj 66$_cAȚ W.u0d& \8MAn,1ް?0$;@a&瀍%6\E'%ϢS{#Ԑ=,jsҶi"Y"emB LesITg(^;UUgyhJN cxICa̶ [r#j))p="'F|qPJb Xħj)mEHS+ARZer6 t =sL- /:JDHږE, !| C*[=]x hf.r⁧ 5e]ҙ(vOdݫ׺[c&ߖVF}Lo}v qVcR,sI@忣/'3%`8%oz O=7cYIrE1#$6T>W"qmRE.b'o<|{