libarchive13-3.7.2-150600.3.9.1<>,r8g!Tp9|c DɼlMD=^:T.|D8" SG% c |@= ʑmq$uHJD9xYhc. 4]HBTdKKI m-HK *]շ$0ש3_c҈J\،FҜnp6i$xq-sx>geNP:6˧)_ ]QJ[CU10!o]V{!KЉ`Aw@€T`2&M=rHq"|q*>@D?Dd " c          : @ H \  f  p    I  P d }    $ $c$(8.9`.:.>@@@!F@0G@DH@XI@lX@tY@\@]@^@bAvcBdBeBfBlBuBvBwCxCyCzD0D@DDDJDClibarchive133.7.2150600.3.9.1Library to work with several different streaming archive formatsLibarchive is a programming library that can create and read several different streaming archive formats, including most popular tar variants and several cpio formats. It can also write shar archives and read ISO-9660 CDROM images. The bsdtar program is an implementation of tar(1) that is built on top of libarchive. It started as a test harness, but has grown and is now the standard system tar for FreeBSD 5 and 6. The libarchive library offers a number of features that make it both very flexible and very powerful. - Automatic format detection: libarchive can automatically determine both the compression and the archive format, regardless of the data source. Most tar implementations do not automatically detect the compression format, few implementation that can correctly do this when reading from stdin or a socket. (The tar program included with Gunnar Ritter's heirloom collection also does full automatic format detection.) - Writes POSIX formats: libarchive writes POSIX-standard formats, including "ustar," "pax interchange format," and the POSIX "cpio" format. - Supports pax interchange format: Pax interchange format (which, despite the name, is really an extended tar format) eliminates almost all limitations of historic tar formats and provides a standard method for incorporating vendor-specific extensions. libarchive exploits this extension mechanism to support ACLs and file flags, for example. (Joerg Schilling's star archiver is another open-source tar program that supports pax interchange format.) - Reads popular formats: libarchive can read GNU tar, ustar, pax interchange format, cpio, and older tar variants. The internal architecture is easily extensible. The only requirement for support is that it be possible to read the format without seeking in the file. (For example, a format that includes a compressed size field before the data cannot be correctly written without seeking.) - High-Level API: the libarchive API makes it fairly simple to build an archive from a list of filenames or to extract the entries from an archive. However, the API also provides extreme flexibility with regards to data sources. For example, there are generic hooks that allow you to write an archive to a socket or read data from an archive entry into a memory buffer. - Extensible. The internal design uses generic interfaces for compression, archive format detection and decoding, and archive data I/O. It should be very easy to add new formats, new compression methods, or new ways of reading/writing archives.g!Ts390zp39 RSUSE Linux Enterprise 15SUSE LLC BSD-2-Clausehttps://www.suse.com/System/Librarieshttps://www.libarchive.org/linuxs390x Gt A큤A큤g!8g!Sdg!SdL4bf569a16b74872009bf655c5bffe5e71d0e7abc1b15721f8772977088b35a4792da5624752a2dd21ae2546428bb2dbf5e833123646d1fe172afa295e8b28a63b2cdf763345de2de34cebf54394df3c61a105c3b71288603c251f2fa638200barootrootrootrootrootrootrootrootrootrootlibarchive-3.7.2-150600.3.9.1.src.rpmlibarchive.so.13()(64bit)libarchive13libarchive13(s390-64)@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibacl.so.1()(64bit)libacl.so.1(ACL_1.0)(64bit)libbz2.so.1()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.2)(64bit)libc.so.6(GLIBC_2.3.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.36)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.6)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)liblz4.so.1()(64bit)liblzma.so.5()(64bit)liblzma.so.5(XZ_5.0)(64bit)liblzma.so.5(XZ_5.2)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.5.0)(64bit)libxml2.so.2(LIBXML2_2.5.2)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.5)(64bit)libz.so.1()(64bit)libzstd.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3g @g @fiee@dgc@c|bP#bN@bs@b!aaaqV@a=_@_0@_V ^^K^C^ ^ ]]Y=] u@]:\Yz\-@[[Y4X9@XAb@XW\@WgWbW0{W,@UN@UUt@TE@Ta@antonio.teixeira@suse.comantonio.teixeira@suse.comantonio.teixeira@suse.comdmueller@suse.comdmueller@suse.combwiedemann@suse.comdmueller@suse.comdanilo.spinella@suse.comdmueller@suse.comdanilo.spinella@suse.comrpm@fthiessen.dedanilo.spinella@suse.comadrian@suse.deandreas.stieger@gmx.dedanilo.spinella@suse.comdanilo.spinella@suse.comdmueller@suse.comidonmez@suse.comandreas.stieger@gmx.deidonmez@suse.comidonmez@suse.comidonmez@suse.comidonmez@suse.comidonmez@suse.comadrian@suse.deidonmez@suse.comidonmez@suse.comidonmez@suse.comadrian@suse.dekbabioch@suse.dejengelh@inai.deadrian@suse.deadrian@suse.deadrian@suse.deadrian@suse.comadrian@suse.comdmueller@suse.comadrian@suse.deadrian@suse.deadrian@suse.denormand@linux.vnet.ibm.comastieger@suse.comastieger@suse.comastieger@suse.comadrian@suse.comjsegitz@novell.com- Fix CVE-2024-48958, out-of-bounds access in execute_filter_delta (CVE-2024-48958, bsc#1231624) * CVE-2024-48958.patch - Additional patch to fix CVE-2024-20697 (also attributed CVE-2024-26256) (CVE-2024-20697, CVE-2024-26256, bsc#1225972) * CVE-2024-20697-2.patch- Fix CVE-2024-48957, out-of-bounds access in execute_filter_audio (CVE-2024-48957, bsc#1231544) * CVE-2024-48957.patch- Fix CVE-2024-20696, heap based out-of-bounds write (CVE-2024-20696, bsc#1225971) * CVE-2024-20696.patch - Fix CVE-2024-20697, Out of bounds Remote Code Execution Vulnerability (CVE-2024-20697, bsc#1225972) * CVE-2024-20697.patch- skip write tests on 32bit, they OOM- update to 3.7.2: * Multiple vulnerabilities have been fixed in the PAX writer * bsdunzip(1) now correctly handles arguments following an - x after the zipfile * zstd filter now supports the "long" write option * SEGV and stack buffer overflow in verbose mode of cpio * bsdunzip updated to match latest upstream code * miscellaneous functional bugfixes- update to 3.7.0 * bsdunzip port from FreeBSD * fix 2 year 2038 issues- update to 3.6.2 (bsc#1205629, CVE-2022-36227) * NULL pointer dereference vulnerability in archive_write.c * include ZSTD in Windows builds (#1688) * SSL fixes on Windows (#1714, #1723, #1724) * rar5 reader: fix possible garbled output with bsdtar -O (#1745) * mtree reader: support reading mtree files with tabs (#1783) * various small fixes for issues found by CodeQL - Drop upstream merged CVE-2022-36227.patch- Fix CVE-2022-36227, Handle a calloc returning NULL (CVE-2022-36227, bsc#1205629) * CVE-2022-36227.patch- update to 3.6.1: * 7zip reader: fix PPMD read beyond boundary (#1671) * ZIP reader: fix possible out of bounds read (OSS-Fuzz 38766 #1672) * ISO reader: fix possible heap buffer overflow in read_children() (OSS-Fuzz 38764, #1685) * RARv4 redaer: fix multiple issues in RARv4 filter code (introduced in libarchive 3.6.0) * fix heap use after free in archive_read_format_rar_read_data() (OSS-Fuzz 44547, 52efa50) * fix null dereference in read_data_compressed() (OSS-Fuzz 44843, 1271f77) * fix heap user after free in run_filters() (OSS-Fuzz 46279, #1715) - Drop upstream merged fix-CVE-2022-26280.patch- Fix CVE-2022-26280 out-of-bounds read via the component zipx_lzma_alone_init (CVE-2022-26280, bsc#1197634) * fix-CVE-2022-26280.patch- Update to 3.6.0 * Fix use-after-free bug (CVE-2021-36976) * tar: new option "--no-read-sparse" * tar: threads support for zstd * RAR reader: filter support * RAR5 reader: self-extracting archive support * ZIP reader: zstd decompression support * tar: respect "--ignore-zeros" in c, r and u modes * reduced size of application binaries * internal code optimizations - Drop upstream merged: * fix-following-symlinks.patch * fix-CVE-2021-36976.patch- Fix CVE-2021-36976 use-after-free in copy_string (CVE-2021-36976, bsc#1188572) * fix-CVE-2021-36976.patch - The following issues have already been fixed in this package but weren't previously mentioned in the changes file: CVE-2017-5601, bsc#1022528, bsc#1189528- fix permission settings on following symlinks (fix-following-symlinks.patch) this fixes also wrong permissions of /var/tmp in factory systems CVE-2021-31566- update to 3.5.2: * CPIO: Support for PWB and v7 binary cpio formats * ZIP reader: Support of deflate algorithm in symbolic link decompression * security: fix handling of symbolic link ACLs on Linux (boo#1192425) * security: never follow symlinks when setting file flags on Linux (boo#1192426) * security: do not follow symlinks when processing the fixup list (boo#1192427) * fix extraction of hardlinks to symlinks * 7zip reader and writer fixes * RAR reader fixes * ZIP reader: fix excessive read for padded zip * CAB reader: fix double free * handle short writes from archive_write_callback - Drop upstream mereged: * CVE-2021-23177.patch * CVE-2021-31566.patch * bsc1192427.patch- Fix CVE-2021-31566, modifies file flags of symlink target (CVE-2021-31566, bsc#1192426.patch) CVE-2021-31566.patch - Fix bsc#1192427, processing fixup entries may follow symbolic links bsc1192427.patch- Fix CVE-2021-23177, extracting a symlink with ACLs modifies ACLs of target (CVE-2021-23177, bsc#1192425) * CVE-2021-23177.patch- update to 3.5.1: * various compilation fixes (#1461, #1462, #1463, #1464) * fixed undefined behavior in a function in warc reader (#1465)- Update to version 3.5.0 New features: * mtree digest reader support (#1347) * completed support for UTF-8 encoding conversion (#1389) * minor API enhancements (#1258, #1405) * support for system extended attributes (#1409) * support for decompression of symbolic links in zipx archives (#1435) Important bugfixes * fixed extraction of archives with hard links pointing to itself (#1381) * cpio fixes (#1387, #1388) * fixed uninitialized size in rar5_read_data (#1408) * fixed memory leaks in error case of archive_write_open() functions (#1456) - Drop libarchive-3.4.3-fix_test_write_disk_secure.patch, fixed upstream.- fix build with binutils submitted to Factory, adding upstream libarchive-3.4.3-fix_test_write_disk_secure.patch- Update to version 3.4.3 * support for pzstd compressed files (#1357) * support for RHT.security.selinux tar extended attribute (#1348) * various zstd fixes and improvements (#1342 #1352 #1359) * child process handling fixes (#1372)- Switch back to cmake build now that cmake-mini exists, this will no longer create a build-cycle.- Update to version 3.4.2 New features: * support for atomic file extraction (bsdtar -x --safe-writes) (#1289) * support for mbed TLS (PolarSSL) (#1301) Important bugfixes: * security fixes in RAR5 reader (#1280 #1326) * compression buffer fix in XAR writer (#1317) * fix uname and gname longer than 32 characters in PAX writer (#1319) * fix segfault when archiving hard links in ISO9660 and XAR writers (#1325) * fix support for extracting 7z archive entries with Delta filter (#987)- Revert back to autoconf, cmake introduces a cycle. Leave cmake patches in since they are basically correct and might be useful in the future.- Update to version 3.4.1 New features: * Unicode filename support for reading lha/lzh archives * New pax write option "xattrhdr" Important bugfixes: * security fixes in wide string processing (#1276 #1298) * security fixes in RAR5 reader (#1212 #1217 #1296) CVE-2019-19221 * security fixes and optimizations to write filter logic (#351) * security fix related to use of readlink(2) (1dae5a5) * sparse file handling fixes (#1218 #1260) - Drop CVE-2019-19221.patch and fix-zstd-test.patch, fixed upstream- fix bsc#1157569 CVE-2019-19221.patch out-of-bounds read in libarchive- Switch to cmake build - Add lib-suffix.patch to honor LIB_SUFFIX - Add fix-zstd-test.patch to fix zstd test - Add fix-soversion.patch to fix the soversion to 13 as autotools- Add lz4 and zstd support - Add BuildRequires on liblz4-devel and libzstd-devel- Update to version 3.4.0 * Support for file and directory symlinks on Windows * Read support for RAR 5.0 archives * Read support for ZIPX archives with xz, lzma, ppmd8 and bzip2 compression * Support for non-recursive list and extract * New tar option: --exclude-vcs * Improved file attribute support on Linux and file flags support on FreeBSD * Fix reading Android APK archives (#1055 ) * Fix problems related to unreadable directories (#1167) * A two-digit number of OSS-Fuzz issues was resolved in this release including CVE-2019-18408 - Add libarchive.keyring and validate the tarball signature - Drop all security patches, fixed upstream: * CVE-2018-1000877.patch * CVE-2018-1000878.patch * CVE-2018-1000879.patch * CVE-2018-1000880.patch * CVE-2019-1000019.patch * CVE-2019-1000020.patch- Added patches: * CVE-2019-1000019.patch Fixes 7zip crash (boo#1124341) * CVE-2019-1000020.patch ISO9660 infinite loop fixed (boo#1124342)- Added patches: * CVE-2018-1000877.patch, which fixes a double free vulnerability in RAR decoder (CVE-2018-1000877 bsc#1120653) * CVE-2018-1000878.patch, which fixes a Use-After-Free vulnerability in RAR decoder (CVE-2018-1000878 bsc#1120654) * CVE-2018-1000879.patch, which fixes a NULL Pointer Dereference vulnerability in ACL parser (CVE-2018-1000879 bsc#1120656) * CVE-2018-1000880.patch, which fixes an improper input validation vulnerability in WARC parser (CVE-2018-1000880 bsc#1120659) - Make use of %license macro - Applied spec-cleaner- Fix RPM groups. Remove idempotent %if..%endif guards. Diversify summaries. Set CFLAGS instead of re-defining optflags with itself.- update to version 3.3.3 * Avoid super-linear slowdown on malformed mtree files * Many fixes for building with Visual Studio * NO_OVERWRITE doesn't change existing directory attributes * New support for Zstandard read and write filters - Fixes CVE-2017-14501, CVE-2017-14502, CVE-2017-14503 - fix-CVE-2017-14166.patch is obsolete- update to version 3.3.2 * NFSv4 ACL support for Linux (librichacl) - fix-CVE-2017-14166.patch (boo#1057514)- update to version 3.3.1 * Security & Feature release Details are not documented from upstream yet fix-extract-over-links.patch and libarchive-openssl.patch obsoleted- fix extracting over symlinks: fix-extract-over-links.patch the problem is solved upstream different, but git master is too different atm.- update to version 3.2.2 Unspecified security fixes, but at least: * CVE-2016-8687 * CVE-2016-8689 * CVE-2016-8688 * CVE-2016-5844 * CVE-2016-6250 * CVE-2016-5418 - obsoletes fix-build.patch- make bsdtar require a matching libarchive version to avoid missing symbol errors- update to version 3.2.1 Fixes a number of security issues: CVE-2015-8934, CVE-2015-8933, CVE-2015-8917, CVE-2016-4301, CVE-2016-4300 - and fixing the build (fix-build.patch)- limit size of symlinks in cpio archives (CVE-2016-4809, boo#984990) CVE-2016-4809.patch- 4GB _constraints for ppc64le only, it would break other archs - update to version 3.2.0 * Fixes CVE-2016-1541 * Fixes CVE-2015-8928 * changes are only documented in git history * updated openssl patch * new bsdcat utility - removed obsolete patches for: * CVE-2013-0211.patch * directory-traversal-fix.patch * libarchive-xattr.patch- add _constraints memory 4096MB to avoid ppc64le build failure- build static lib on RHEL 7- RHEL/CentOS build fix, skipping autoreconf- add CVE for previous change- fix a directory traversal in cpio tool (bnc#920870) directory-traversal-fix.patch CVE-2015-2304- Added CVE-2013-0211.patch to fix CVE-2013-0211 (bnc#800024)/sbin/ldconfig/sbin/ldconfigs390zp39 17302774603.7.2-150600.3.9.13.7.2-150600.3.9.1libarchive.so.13libarchive13NEWSlibarchive13COPYING/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libarchive13//usr/share/licenses//usr/share/licenses/libarchive13/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:36269/SUSE_SLE-15-SP6_Update/65f9c68c52c52caff14dea763c666939-libarchive.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=466633e57e7e49e357fcd022d0e90d398f998c7a, strippeddirectoryUTF-8 Unicode textASCII textPRRRRR RR R RRR RRR RRRRRRRRRRRRRRRR$ -u k]4utf-88600d696ca05339d0149ce2ff0c8c3aaa2e485a8fe0e926eb7a7716539c9f433?7zXZ !t/9:).]"k%AKֿ[(>DTU=k iDNZ ϙTaӝ$sh'|vʙ讔N%I4Q5Dճc6^ʌkMޤ(L۟xKyQ7}Qm93hĸt.ȓ.pQK[IHDn,W\?>}aR`P洛1б*dcٟʷ\ cdv!q56^ 6͍ -$gG><=pR@ qB=wRi8U>+V,ZkK(L3|ĕU3:ʭKJ'-⒈!uvLo 6cS 9R1~`.~F YS@8 %bG _(OhWbd2oa ޢhWH#7ll'(q'ݫ[^4z8j!߂`)0+Ơlђ/8)jؠh7?)f6iC`;B?[C0QVo.@hJU0]-f\wb_U)Hօ< { `Ok-˹f6gL#,9TpHpF7DyMaܯ+F gN嶲T۠'&ʲ/Y>xR񊕞ـ_xGK ءK$$ ij{lp#QN0kũ: ó<8q셺$DNɁї+YyEx@;9kokP Y( Z,{%i;e`2hW:9S2SX4\5{SpOI[F:/,@rz7VϸdAyz3FpPjz41AR+,[[gipPLߓaTbH?l݇98iUN@#B&Y6j!zw_zn >c{Zpz- I-bu!&s˺@d%Ց=W.6? mcX2{B*J*K?F e{ Z_,X6k!Tptmhb.fϳcj6zQ"TŤw d}ڰ{kWټ&;bI(v:9';{wm_m#`@ fU4̙be`+5+j;I&T (w񯉃O{޺w}SItӞ2Py%L@Y&B7v9I"-TE]j4~%35F󘪰RFWz4KEu$栧8_6'wmb+ ʞJeG3f% TjO*M} "ڪ6wՆ-a^j%jL\ػKE녬9nzU]!UN2 G谒i~]z+6x_F!J@8Jv >ʮveΖ3\,(>bi0sPsB2] To-QpwR]ƴ;* S5NbpdiyG\< ]i<=.śƔP.io8<vަ=+SqD^}@;Y)>'lY$N朹6t쌙®3> a~Q,>ɧѧzH;lr0~@U--47z;13)B6\RO2I%¦& ,szԙC rSҥ?ACs&/Oxh၄S†9-Ɔh+TA?,]Z큶K jZ1~QWv OW!@NǕ V?W[ɂ*cb9l$lF1x"Tɽu# =MPnֳT\+?Jܞuzk\"G06ƹZ=Td`8/Z&) }VhRc첝՝N3gW~1 EձN f5IrT2'p:u#0wq1}>YH5̧w )b2c'ft: /DHyн7O&YbSզf5Pv yb|3toXvq ?iT5,#siBFӑL00QRo%!1QQUՋJ^Rzyt㤪`Fj4Fμ&pT} >öz]Os:HT'q65ef{)(MDu@w%C^++Ko( IH)$ qF aJ) ]Ny_%@bp/"_.IV*P0SoEua _RD*OʜdqMel˯-!?e@ *26rF5لsFdR\zU0^[[^S? 8̒h"+S{ :P(֖#T퀉pJ@s؋ork̓;Rh.(eQpy3Vѭ(t9y!y`"<=Cp‚%cXz # ADXNTsU1k!@Y,K`ת2&G.II->چf-*мLTªrkhTѪhmaum $k*0sp١](ϣX!Ү0(xoڈ-k?tWVelNxrѶb'S/%~jKO#ۭyTG[JHzvgIwU\8Tœ?̈́o[v 6iŏ# `>|.49;!╊WT9& *U攚L5=3)7[pͧU:ؘ k8!i^ע#56HHXawS!$y?3b!U.5eko+'uWj6wI\ d mb(?^vtX %NO^φ'zkV3+FfrdU-[e ~q EbTry-2alMΧpn/1Ap&H94dNM b<,?*V^$N2_+3 UXת%z6}#UcxpyՌ#BtIc! 3'2p̀s WOƸp"\;30Ӓ-@&FuXY >6q\UΙR7n$6h$+Pߛ/{7r& 9UDxQ%¦`ɼ⠇2/+J 3W~0 o6hAlv0켽蛕=׈c(֗.tnYty#:VSJY>@ {uK/x KnX mpRfmxcjUԁwrG\@6gy@cA*6ܻ0/i`Lْ?@bj9k>喴8UKEy'*1Jk$ D˝"|~d\J]%Ћ+9ea}9]>ug6NVj6`I@ikAFzLJ(ILҠak^Yaw{EցJ{ Y͂EJRkw6(=7 VDvfRM/<~ OgRCj|+^D%8 <l~lado@'JX_d2&욖%^G(#,A\jDPkwL$7rIx6J&:(n{J@PH^Q>,WrrR,s|J8m)Ʃ_V>wN?O2_.pt9+.wO~fTgV$+pC:~]U3³,_SgF~o4K#۝`|Ue/ݨ,^ַ29$\n|D&ڟ{Qz@oyrdq-,}0,R!ꖞĐGh5*K5D&gX@gĔ}px 䨗]kr͞{V=Ib) G$!hr96l$]H޻pŰ/eC|UMHg꘸淹Jc1^[\j1\ˠMs|v\씟F6w6wA/KZKY2ʶEƜk-𓤹0#܉ !*1Wl1 eՃF"qz6x9 f{)㸯܇'/RhG|No$%mXc "Pf|2Ot}[ya bGόbÂY:dIBlCO'ohgWGՈ^JvxU,csЅcm{S'$&./1eoiub89Aɦ=ONLW\e%52qB @*\c"F^ݟ T';wYզiV.GnB!_j#_pj?컚=5hL 3H}E|M.󸴆Z|qBa:/7 {e.sBf UxcF4e(YPvf4OW!r׻jdlu:[lj;@+N/#1]'=u"UV*z(ol S8>B81Î&]/?X ^1qX.E7֟bޝ]\* ݅؁ V=s*[$GW7,+ lq[bYܲ/5^;qe|5A` ˏVPi0 +6,,R6 'y)Π7spWGfԉii 8% r+6hc &d'4(ggiRAш%&.\z ct:P%#XBwև;wPS@RA@Jo~h QFW($Ec@M ܨ çε!v-OFj+Pv~Ihcq$Lk^ eM]h;:KvRU*p!%;Gl:PI&̞xGH*߯"pBdJ,SdF$ /jfE4;K EL?Aã` %\!cꁎ~ѬUٻ=;Z ?^{P^Z+49a)Lm8jnȎ.(4VFٞ+xnp &'}{%W]08/MmwIkӿx󰉪p"-w$Aꇁ[w.瓂GHS =@gY2cD%ըThzLמ7Ғ (qN gHAHՐ˦Ɔ\oEO}_F' ,7w fe/N@p'?Gk[;VL>pu*IeM @AL |k,9d3B1pܕn$Q -Ciķ({KcNfǷLVx0f:Z 2 ncp.H%cB{&)6-=dp+C卒1[WϨ ҷąɶ]໙oF5@oK/aDNޡ)3T4jc&>,ʈyV6Dr)fHZYPvڳvuį*Y%$Ff[U6SXGy1i7#.}|?TU.b+Afw,=T}.GZ>4|izЕ``N:PȗܲIO^HHw(SP:ox#[R xOhuWoxtH$]xxQޢs5QsckeTs:LY@SORsFϯ83*=,ӿ @Rwھǔ.XdRy(Y7D "]'LF>31gDDG5G)d%BXV̬X /_f>UnLob裐<Tb浃laӭM;gNRE"İXp%)C_6{Poz%*h7IJS&>PjvlEhBa‡B~sҲNXU;Gt_φ.7lc}F~ Wi q{l&]r_jxw&qw}}bƐNT&a(X3xnͤw[h?=3Ӊi[<$ȄyUI3cMqLX?1R3NR"ffu5qnN-8 :6k#ES%XVf F:(yfm/رQ=ߥ#&F?Eȍ̀K 'C Mb/!Y^Pqqj kmڿƺiK2ZOXκwL2 OR˯rh W3%*-91egxzޕp'^}$e59:s1N{"zf` M'B}N!H*ȝ_`* JުT##UW44lmq/S/R,ȋ0Fq 3]&?+A*j⢲P+zeoH[CGΨ+>&{Uzֲ ?5XWzPIh.נIv?l}UPԂUόh3g">'6X1~'D(dlZբ<[anxrsָzf%M=â(-Rĥ:L%rqwQD*ku.Ӕnm:7mQec9z[Dax^uPE̖G!aʮ9|8W|by ֤Q 5f((oaA>FBP :vbuw23k )2B^e`d6E?Ճt )n\4 LA+iA g- VZ6CMzp#b箠=t4FX[dA&Yfl6^#$V85ߢPUthQ