libjasper1-32bit-1.900.14-182.1<>,l[ظ/=„LNSӨ+3orO{zUZ niNr=S!1D~ ank@$yeQ5_"DXm(䰶k=b"ȚNfSy&Ek%d(Jզ.w۾e lXKrw OT@֘.pEa;_3i^9.⅘Oyxbܴ$A)>a5&X)lJ~-C }u{~U. I>=C(?Cd " 4 AGN`l r x   $p(89:>@ B@G@$H@0I@<X@@Y@PZ@p[@t\@x]@^@b@cA|dB eBfBlBuB,vB8wBxByB Clibjasper1-32bit1.900.14182.1JPEG-2000 libraryThis package contains libjasper, a library implementing the JPEG-2000 image compression standard Part 1.[lamb25dopenSUSE Leap 42.3openSUSESUSE-Public-Domainhttp://bugs.opensuse.orgProductivity/Graphics/Convertorshttp://www.ece.uvic.ca/~mdadams/jasper/linuxx86_64/sbin/ldconfigd[[[7feeffec526e5eae5d84316f51d93803libjasper.so.1.0.0libjasper.so.1.0.0rootrootrootrootrootrootjasper-1.900.14-182.1.src.rpmlibjasper-32bitlibjasper.so.1libjasper1-32bitlibjasper1-32bit(x86-32)@@@@@@@@@@@@   /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libjpeg.so.8libjpeg.so.8(LIBJPEG_8.0)libm.so.6libm.so.6(GLIBC_2.0)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2Z@Yf@YdYdX@Xg@XX~@XO@XZnXOXX V@VVUVTZ@T@T}S@SR0[@QT0PP@N@NFLV@LQm@K(fstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comsbrabec@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.combadshah400@gmail.comnadvornik@suse.comnadvornik@suse.comnadvornik@suse.comnadvornik@suse.comnadvornik@suse.compgajdos@suse.commmeister@suse.comcoolo@suse.comcoolo@suse.comuli@suse.comcoolo@novell.comcoolo@novell.comjengelh@medozas.de- Added patch: * jasper-CVE-2018-9055.patch + fix CVE-2018-9055, bsc#1087020: jasper: denial of service via a reachable assertion in the function jpc_firstone in libjasper/jpc/jpc_math.c.- Other bugs fixed by existing patches: * jasper-CVE-2016-9395.patch - bsc#1010756, CVE-2016-9394: assertion in jas_matrix_t * jas_seq2d_create(int, int, int, int): Assertion `xstart <= xend && ystart <= yend' - bsc#1010757, CVE-2016-9392: pc_dec.c:1637: void calcstepsizes(uint_fast16_t, int, uint_fast16_t *): Assertion `!((expn + (numrlvls - 1) - (numrlvls - 1 - ((bandno > 0) ? ((bandno + 2) / 3) : (0)))) & (~0x1f))' failed. - bsc#1010766, CVE-2016-9393: jpc_t2cod.c:297: int jpc_pi_nextrpcl(jpc_pi_t *): Assertion `pi->prcno pirlvl->numprcs' failed. - bsc#1010977, CVE-2016-9395: jas_seq.c:90: jas_matrix_t * jas_seq2d_create(int, int, int, int): Assertion `xstart <= xend && ystart <= yend' failed. - Other bugs fixed in current version: * bsc#1010774, CVE-2016-9390: jas_seq.c:90: jas_matrix_t * jas_seq2d_create(int, int, int, int): Assertion `xstart <= xend && ystart <= yend' failed. * bsc#1010782, CVE-2016-9391: jpc_bs.c:197: long jpc_bitstream_getbits(jpc_bitstream_t *, int): Assertion `n >= 0 && n < 32' failed. * bsc#1010968, CVE-2016-9389: Assertion `((c1)->numcols_) == numcols && ((c2)->numcols_) == numcols' failed. * bsc#1010975, CVE-2016-9388: ras_dec.c:330: int ras_getcmap(jas_stream_t *, ras_hdr_t *, ras_cmap_t *): Assertion `numcolors <= 256' failed.- Added patch: * jasper-CVE-2016-9262.patch + Fix for Multiple overflow vulnerabilities leading to use after free (bsc#1009994, CVE-2016-9262)- Added patch: * jasper-CVE-2017-1000050.patch + Upstream fix for NULL Pointer Dereference jp2_encode (bsc#1047958, CVE-2017-1000050)- Modified patch: * jasper-CVE-2016-9583.patch + integrate upstream change 99a50593254d1b53002719bbecfc946c84b23d27, which fixed a null pointer dereferencing crash.- Added patches: * jasper-CVE-2016-9583.patch - Out of bounds heap read in jpc_pi_nextpcrl() (bsc#1015400, CVE-2016-9583) * jasper-CVE-2017-6850.patch - NULL pointer dereference in jp2_cdef_destroy (jp2_cod.c) (bsc#1021868, CVE-2017-6850)- Added patches: * jasper-CVE-2017-5498.patch - Upstream changes putting braces and belts around CVE-2017-5498, bsc#1020353, left-shift undefined behaviour * jasper-CVE-2016-9600.patch - Upstream fix for "Null Pointer Dereference due to missing check for UNKNOWN color space in JP2 encoder" (CVE-2016-9600, bsc#1018088)- Added patch: * jasper-CVE-2016-10251.patch - Upstream fix for bsc#1029497, CVE-2016-10251: Use of uninitialized value in jpc_pi_nextcprl (jpc_t2cod.c)- Add -D_BSD_SOURCE to fix redefinition of system types in jas_config.h and breakage in ppc64le, s390 and s390x (bsc#1028070).- Added patch: * jasper-CVE-2016-9591.patch - Fix for bsc#1015993, CVE-2016-9591: Use-after-free on heap in jas_matrix_destroy- Added patches: * jasper-CVE-2016-8654.patch - Upstream fix for bsc#1012530, CVE-2016-8654: Heap-based buffer overflow in QMFB code in JPC codec * jasper-CVE-2016-9395.patch - Upstream fix for bsc#1010977, CVE-2016-9395: jas_seq.c:90: jas_matrix_t *jas_seq2d_create(int, int, int, int): Assertion 'xstart <= xend && ystart <= yend' failed * jasper-CVE-2016-9398.patch - Fix for bsc#1010979, CVE-2016-9398: jpc_math.c:94: int jpc_floorlog2(int): Assertion 'x > 0' failed * jasper-CVE-2016-9560.patch - Upstream fix for bsc#1011830, CVE-2016-9560: stack-based buffer overflow in jpc_tsfb_getbands2 (jpc_tsfb.c)- Updated to bugfix release 1.900.14 * Security fixes + bsc#941919, CVE-2015-5203 + bsc#1006591, CVE-2016-8880 + bsc#1006593, CVE-2016-8881 + bsc#1006597, CVE-2016-8882 + bsc#1006598, CVE-2016-8883 + bsc#1007009, CVE-2016-8884, CVE-2016-8885 + bsc#1006599, CVE-2016-8886 + bsc#1006836, bsc#1006839, CVE-2016-8887 * Changes + Add another data file for testing (Michael Adams) + Ensure that not all tiles lie outside the image area (Michael Adams) + Added a note on sanitizer options (Michael Adams) + Added a simple test script (Michael Adams) + Added an --enable-memory-limit configure option (Michael Adams) + Manually merged and edited a few changes from Bob Friesenhahn (GraphicsMagick Maintainer) for Windows (Michael Adams) + Added some new mostly small image files (many of which are corrupt/invalid) that are useful for testing purposes (Michael Adams) + The debugging function jpc_dec_dump did not consider the case that a band can have a null data pointer (when a band contains no samples). This caused a null pointer to be dereferenced (Michael Adams) + Changed the JPC bitstream code to more gracefully handle a request for a larger sized integer than what can be handled (i.e., return with an error instead of failing an assert). (Michael Adams) + The component domains must be the same for the ICT/RCT in the JPC codec. This was previously enforced with an assertion. Now, it is handled in a more graceful manner (Michael Adams) + Fixed a few bugs in the RAS encoder and decoder where errors were tested with assertions instead of being gracefully handled (Michael Adams)- Updated to bugfix release 1.900.13 * Changes + Fixed another problem with incorrect cleanup of JP2 box data upon error. (Michael Adams) + Fixed another integer overflow problem. (Michael Adams) + Replaced the remaining left and right shifts in the QMFB/MCT code that can result in undefined behavior (due to shifting negative values) with call to inline functions. These functions collect all of the undefined behavior in one place and also allow code sanitizers to ignore this ugliness (via function attributes). (Michael Adams) + Fixed a bug in the row/column split operations for QMFBs. (Michael Adams) + Made the PNM decoder more gracefully handle the not-fully- supported feature of signed sample data. (Michael Adams) + The PNM decoder did not gracefully handle an invalid magic number in the PNM header. (Michael Adams) + Fixed a MIF decoder bug. (Michael Adams) + The imginfo command did not correctly handle an image with zero components. (Michael Adams) + Fixed an integer overflow problem. (Michael Adams) + A new experimental memory allocator has been introduced. The allocator is experimental in the sense that its API is not considered stable and the allocator may change or disappear entirely in future versions of the code. This new allocator tracks how much memory is being used by jas_malloc and friends. A maximum upper bound on the memory usage can be set via the experimental API provided and a default value can be set at build time as well. Such functionality may be useful in run-time environments where the user wants to be able to limit the amount of memory used by JasPer. This allocator is not used by default. (Michael Adams) + Changed the configure setup so that if GCC is used warnings and pedantic errors are enabled. (Michael Adams) + Fixed a bug that resulted in the destruction of JP2 box data that had never been constructed in the first place. (Michael Adams) + The memory stream interface allows for a buffer size of zero. The case of a zero-sized buffer was not handled correctly, as it could lead to a double free (bsc#1005242, CVE-2016-8693). (Michael Adams) + Fixed a small memory leak for CRG marker segments. (Michael Adams) + Fixed a problem with a null pointer dereference in the BMP decoder. (Michael Adams) + Introduced jas_fast32_asl, jas_fast32_asr, and friends in order to pull all undefined behavior for left and right shift of (negative) integers into a small number of places and provide a means to have UBSAN ignore this ugliness. (Michael Adams) + Fixed an integral type promotion problem by adding a JAS_CAST. Modified the jpc_tsfb_synthesize function so that it will be a noop for an empty sequence (in order to avoid dereferencing a null pointer). (Michael Adams) + Added some extra debugging log messages for memory allocation/deallocation. (Michael Adams) + The RCT and ICT require at least three components. Previously, this was enforced with an assertion. Now, the assertion has been replaced with a proper error check. (Michael Adams) + The member (pi) in tiles was not properly initialized. This is now corrected. Also, each tile is now only cleaned up once. (Michael Adams) + Initialize uninitialized variable. (Michael Adams) + Added some options to configure for enabling various code sanitizers. (Michael Adams) + Added some range checks on parameters in some JPC marker segments. (Michael Adams) + Fixed potential integer overflow problem. (Michael Adams) + Added some functions for safe integer arithmetic (for size_t) in jas_math.h. (Michael Adams) + Fixed some indentation issues. (Michael Adams) + Converted a few raw mallocs to use jas_alloc2. Added code in the jas_* memory allocation/deallocation functions to generate debugging log messages. Only disable JAS_DBGLOG message if NDEBUG is defined. (Michael Adams) + Added more error/log messages for debugging in the JPEG decoder. (Michael Adams) + Added some extra log messages for debugging. Added check of value returned by jas_matrix_create. (Michael Adams) + Applied fix for VPATH builds (Michael Adams) + Did some configure.ac cleanup (Michael Adams) + Fixed 'inline' for older version of Visual Studio. (dirk) + Fix a potential double fclose of a FILE* in the JPEG decoder. (Michael Adams) + Changed jas_types.h to assume that header files required by the C99 standard are present. (Michael Adams) + Incorporated changes from patch jasper-1.900.3-libjasper-stepsizes-overflow.patch (Michael Adams) + Incorporated changes from patch jasper-1.900.3-CVE-2011-4516-CVE-2011-4517-CERT-VU-887409.patch (Michael Adams) + Incorporated changes from patch jasper-1.900.3-Coverity-RESOURCE_LEAK.patch (Michael Adams) + Incorporated patch jasper-1.900.3-Coverity-NULL_RETURNS.patch (Michael Adams) + Fixed memory leak in jiv. (Michael Adams) + Fixed a sanitizer failure in the BMP codec (bsc#1005084, CVE-2016-8690). Also, added a --debug-level command line option to the imginfo command for debugging purposes. (Michael Adams) + Added some missing type casts to ensure promotion to the correct unsigned type to avoid undefined behavior (and stop warnings from USAN). (Michael Adams) + Fixed a linking problem with newer versions of GCC. (Michael Adams) + Changed --enable-debug configure option to enable some GCC sanitizers. (Michael Adams) + Added range check on XRsiz and YRsiz fields of SIZ marker segment (bsc#1005090, CVE-2016-8691, CVE-2016-8692). (Michael Adams) + At many places in the code, jas_malloc or jas_recalloc was being invoked with the size argument being computed in a manner that would not allow integer overflow to be detected. Now, these places in the code have been modified to use special-purpose memory allocation functions (e.g., jas_alloc2, jas_alloc3, jas_realloc2) that check for overflow. (Michael Adams) + Add fixes for CVE-2014-8137. (Michael Adams) + Added fix for CVE-2016-2089. (Michael Adams) + Moved abort into default case of switch statement. (Michael Adams) + Remove auto-generated file aclocal.m4 from repository. (Michael Adams) + Removed HAVE_VLA stuff from various configuration and build files. Also, changed a few INCLUDES to AM_CPPFLAGS in automake files (since INCLUDES is deprecated). (Michael Adams) + 1.701.0-GL (Richard Hughes) + pkgconfig (Richard Hughes) + Coverity-UNREACHABLE (Richard Hughes) + CVE-2016-1867 (Richard Hughes) + CVE-2014-9029 (Richard Hughes) + CVE-2014-8158 (Richard Hughes) + CVE-2014-8157 (Richard Hughes) + CVE-2014-8138 (Richard Hughes) + CVE-2015-5221 (Richard Hughes) + CVE-2016-2116 (Richard Hughes) + Coverity-FORWARD_NULL (Richard Hughes) + jpc_dec.c (Richard Hughes) + Coverity-CHECKED_RETURN (Richard Hughes) + CVE-2016-1577 (Richard Hughes) + Coverity-UNUSED_VALUE (Richard Hughes) + Coverity-BAD_SIZEOF (Richard Hughes) + CVE-2008-3522 (Richard Hughes) - Removed patches: * jasper-1.900.1-bug258253.patch * jasper-1.900.1-bug392410.patch * jasper-1.900.1-no-undef-true-false.patch * jasper-1.900.1-bug725758.patch * jasper-overflow-bnc906364.patch * jasper-CVE-2014-8137.patch * jasper-CVE-2014-8138.patch * jasper-CVE-2014-8157.patch * jasper-CVE-2014-8158.patch * jasper-jpc_dec.patch * jasper-CVE-2016-1867.patch * jasper-CVE-2016-2089.patch + Fixed upstream - Force -std=c99, since the upstream sources assume C99- Modified patch * jasper-CVE-2016-2089.patch + Use the new version of patch from https://bugzilla.redhat.com/show_bug.cgi?id=1302636 with more targetted checks. - Version the Obsoletes/Provides so that the package does not obsolete itself- Add jasper-CVE-2016-2089.patch * CVE-2016-2089: invalid read in the JasPer's jas_matrix_clip() function (bsc#963983)- Add jasper-CVE-2016-1867.patch * CVE-2016-1867: Out-of-bounds Read in the JasPer's jpc_pi_nextcprl() function (bsc#961886)- Add jasper-jpc_dec.patch to fix failure when manipulating images with 4 component color using reversible color translation (deb#469786); patch taken from Fedora.- fixed CVE-2014-8157, CVE-2014-8158 (bnc#911837)- fixed CVE-2014-8137, CVE-2014-8138 (bnc#909474, bnc#909475)- fixed possible overflow CVE-2014-9029 (bnc#906364)- added obsoletes and provides of libjasper-32bit (bnc#881716)- fixed possible overflow (bnc#725758, bnc#830803)- added no-undef-true-false.patch to fix [bnc#839584]- Added url as source. Please see http://en.opensuse.org/SourceUrls- remove suse_update_config- add libtool as explicit buildrequire to avoid implicit dependency from prjconf- cross-build fix: use %configure macro- fix baselibs.conf- do not build the highlevel image viewer in a basic library (in case someone needs it, we better do a 2nd spec file) - follow shared library policy- add baselibs.conf as a source - enable parallel building/bin/shlibjasper-32bit1.900.14-182.11.900.14-182.1libjasper-1.701.so.1libjasper.so.1libjasper.so.1.0.0/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:8183/openSUSE_Leap_42.3_Update/4a227cfe7bf84b42b1b6785690d757e3-jasper.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=c00c7bc9c0bc2fafb61c61e43ae5ec7a80eb757e, stripped PR R RRRRRRRR R R?0]"k%AKG,L R!%#B؅N, s/$o!,G5Ir ?zVjZpnȠ#05vrL)iYd/ 6 B'pun6U? mE@YC>mo]>S];Zm 2Q7j>Fq .|präHس\h71z;Q)aJTjQi1n>&'ZD&5vFX}UՠktFxaΨkrlt#)cfͣ>eduF2xЇ%op/vX CnPT[iB(fPtEHur!P^H/#=nM]]i 6hGkq0.Y,۞ښ6#yNe(jFME.;d;H  3XxA3mVh@v6c!\#l0_e]EQ3+2 YJDL1ILIw]Z^{÷%́' qipuGy 7o΍0]Uv}z9ɂ?q HSusoM:>J@Q{`Nx$TG# ʨk#LࣆC8 2;!{yW)?s8B-td'<&D۶0|ZQ+ZZ p̨$[5n2hLc *u,sZDp]|A$% XHw}mYj  eC ] 2:H`OTE} hxZƲQX 3)K4s"UT,-e 4@)̂;,.W(6&- :-C 0x? joFr'[>]N]0WK Buՙ@Z,n4xȀ_[k VuQU,UR5~#Z)h,Η͜&k~^c؞:,.4ԈuV0 rO1CCgɗyu}֛{muXUٮ 9Dz 6OFƟ̊u:2_=@4FOW'JX]΢5b%)esaIUy _lxR;;?MO8&)٦Η/I:$R^YsY+QP1k{~iC;Fhzr1s} %+vBp6A3%+I*;ρSy}u,B9l3ϖDBt]}=7NOIpZHZ$R |~|ƿ z- G)tX&[#> laEgp|ՈLEo{:%:"(H"Qs_55򍚜5tOj;;eCǦVb7Q%0H$Erӛߣeu2T'ë^ !A 9j?5ޘVaDkt: ~:b^5r~a}=.kSq1Zd;OW9~ʾjX9Yb6`HRGZixʧ\b%;;A#R(YF*E-knxD$ɐdR6m)P }@E-i޳Plsx@/K- g(*5ngEH"98*+3(ӫvX_Y R̂:" ZAB┅QHLgz6;eX˒E{H7W3(maL!kHB|\7]FK* P3xӓ/Ҥn=.]V=k1ʋe&EVjXi ԵΈ?NqyB覝1#$~tyU a s>^5:2*b_PiXE# i2,bV/h,9Jad`\iŤV.+؄}+8soltԧrĨ;)nhDCx,mNeF::V1},q~#ޒNuxhR*!Yϲ`}̊@ꮧ3eپTG9w%⍑/AM%o;T'J phej4 eTlr)xǏvJI$]JBF⍴'Ox@z[%\#Ϊ\Fv ^y @nưhs ?VX< ,(EFnY+!_n$1'x&?&.> [ ۗOz$WVf>;1;[<&Jٚ\23|MI%|ӡeeNEpm=azEC [ UdI;f77wG-ܥXyĺFF4.-62τҽN@TDW|% W=`xIS'I쏣!~[P5At/z-Y.O#4u5..ֶ^?aa!Sŗ NڋI1C˘v_6 MO2>06:FQDﮕ 2( 7&e+S4HǢw7MWH[0BAP1H^o^`,7{T݃L| |2LvPr]By`~n^ϛ %,o%tPsP۴gӌՇR(|sAA y=36A޾\(+6uiiڎA1 <'pjPhaՏ9!i6|CՆw@Ied4M$bnUERƋF<{|ཌྷ +S!D|fƋ_c9r` J~朳$}[~t(6<.e<=Ǿv\S2tA^ոs JrTE@E56OJ/_ScPT*"Ʀ_V~F* 2i?_dtѮ^/݀hei*g>y 3lZ}F{t34ZEI+ؑW<{4ZjThh8lʏRWPQ2*閛w01l!e0Z\5k~;g:,vQ ԏm:%b!0i{! t4CkBs13' '$eJ`V<XӋ4޴\/Vݫ#G4 NBU1p.DHWc􃃴Yc. S~2/ tY5Y :-`f :T`YY NtZ5_y'@02:_s2!iR*O;>?ٹ'D3:anC_`0!Q'0NV>yO^l)K< a̫_a+ܿ1?C:R n[h,P mF^WR25 {aKㅢ!{?Z=E,A1$"̹mF ,NWNwhM(2ѰqSl c(k286D0[Áʹ3n'H?q@OOރ 59*r>[&e'Η&wh'/ȗv?l mePe˱<~xZ( ꖲrdIG&t|1 $y3{i JYA2&ț<[Վc'-[&nj7 `L;=* z9߂'b9#)b.~:t`"5;al$MT%P]s)zPdIH844nRx4;YbLv'[G_Qn4&= D%)[IܵAaf e3\ &9aEi3&?A1q?]Fr.)O"]%$Hr*Fk O{TpsrK.=;NߠN&:Ѷ6$*,즬ɐQ6 ȺHs>k(K+yK1qT[$jkQ)MgpuKJIK[˅UO 픗|2,ֶR䙝yxM~%OSӬs>xl kA??$%}PP[O T.ׯh, 0kvF|"o{ųOlx94RB3AJݭu@YCV`PQ9ʸ4T#Z!ϻQ EaoQ=7I H%OtR2%^[cBۓ3#lGFP *B~0_'0.JOb_(xӷ vMwYO}hn|W7/?5w <]Ҵ[2})rH 8/ Z6bB: ,<)pmRVbRs2'IS*gnZ=;WLĕ@Zlu=cWi놦H(f.t9A׶#R~ÿV;2r (!C}TƔg8'72t,t'8pBQڛ( Knֆޙ=\M`Sa)/L޼"_hWS*;\ bX/ 3!|0!XVnkB'^kҧ>}:} O*pͰ:t24)q+gTG&'Dk~r:(0r5&UvZuD7ߕ3 Ǝ'_6#u>ʳ!+HG$6F,R2V+zR$TJQ͖ BB7YR[+yUOL, mŰ;&?+ϷDp5nCvx!֜1%x-!syĻ& 4dc{IO3^9ϬUXZZB_d7!yU!7Vx`1k+Ήቲ>[ MKZ!1'UCQA4i ^O*~r3~^_ue"b6s.yrY$gX 1 {vHTV_ 0]8r$.8XRl>)f[_2JׅP;*ר1QHJZDSaj\0_AXs逷G=ϼ Ձ$%M*wnf=]hn 'XXZf*iO1ߧ>)}tBh(c*̇ĻLCz*{q)#GNЦ (D`FzzWQ_)g|n⇿ituYE1V yf* 4´7PzAI0X %&_.D=}Q\6 .)cZGt`kTv\gnѯ^e@AgCg7Z}5O ɨri-WntrU֥bOj UZ{ˌ>T>A2&{^97p#]|or_3|$s+w833ǨFCΦJmS5VAj*6ؘաPS3rQG̕+* EO;9д隰0jɕM 2 Kga\B+{}LCr_r@_sӲ !E5QCy߰ns1jt{3pkE>` /,[*ث5uzə\r+ơChX1S3y;;ކ༝ !b'm״ǬJ,͐ѥ_ItՂ,/j"+!g k4i=F;g}qRN"M:ك8lb WqWýgX̗3Ol!ckiH=mJ3_ƻv{"tמfDE}.\Ÿ%:㍒\ޜh֣%']`ۃKl =xP8E)"]@"N~=l8t<"/z?[Q`2*8**1L};n)ׯ*)q ®.jf l\[ =\ߩi<;fp $BcZջ K{Ӣ;^2072 5M$Oa˱ݗIP¥?rɍBMУFQ[_|mLL.2eojoy'*s+k(@- 0$٨6PJJfge3?9x?3tɜ)Kݙ_%:/Ր =Md6PO:MY%RM r59SlyZe] c9E]_rj4zD pY:I,hl(M͔ޔdFRx\y_52D;: _UZ%0kIp|L CZy@Z $jT/Χ|"T ^|ݮab"aɢJm>(E=S _Yr0VUyMMS[U3Q@ކwl'ޔJ$jP TG/8V ebF1օls {h|qq`rK3|g hD%gg9mM8zORڀY-^sziyٌ A? q=\0;p'󴍆,G'eŭC4:/[7ӟPo/EvFn,G8&xˡAȧ8ÂlS8;?Hma{o!u4{4|4>IMwG@^6.hnqV:`${0T_xț쐂cǮZzk~ӓ&%J]}4R"g/?׸̮vܷZzj`_2^BC (-c({4w aȈLZGFDDCK@,>2*_9Nj'Jބ*Qwu~