apache2-mod_security2-2.9.4-150400.3.6.1<>,c]p9|V@x8+{0.B }[ RrF |*PDq ^Q:@Ә9sYChxʉʮta$$eDFB()B]K(H6R&؛KvLP㚦+a 7J Oxe׾*Jn^j.pHITujO͹4Q~Pu]L,o3왗\`};%JrIUb>>j?jd + U 06@qq q q q  q !pq#4q%iq''q))*H,(,8,9-<:.{FIGIqHKqIMLqXMYM\Nq]Oq^]b`cadb$eb)fb,lb.ubDqvdwfqxhhqyj,zjlj|jjjCapache2-mod_security22.9.4150400.3.6.1Web Application Firewall for apache httpdModSecurity is an intrusion detection and prevention engine for web applications (or a web application firewall). Operating as an Apache Web server module or standalone, the purpose of ModSecurity is to increase web application security, protecting web applications from known and unknown attacks.c]sangiovese7'SUSE Linux Enterprise 15SUSE LLC Apache-2.0https://www.suse.com/Productivity/Networking/Web/Servershttps://www.modsecurity.org/linuxppc64le*AXX݊Y"QFL .W@ r Gr# !Ew 5Ds-#1 +W 60iP{] jdaVq19eAj} sQ&w )L"C6*A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤c]c]c]c]c]c]c]SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO c]SO `Їpc]c]`Ї`ЇpQR`Їp`Їp`ЇpSO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO SO c]`Ї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-mod_security2-2.9.4-150400.3.6.1.src.rpmapache2-mod_security2apache2-mod_security2(ppc-64)config(apache2-mod_security2)@@@@@@@@@@@@@@@@    /usr/bin/perlapache2apache_mmn_20120211config(apache2-mod_security2)libapr-1.so.0()(64bit)libaprutil-1.so.0()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcurl.so.4()(64bit)liblua5.3.so.5()(64bit)libpcre.so.1()(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.5.8)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.11)(64bit)libxml2.so.2(LIBXML2_2.9.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)suse_maintenance_mmn_02.9.4-150400.3.6.13.0.4-14.6.0-14.0-15.2-14.14.3c&@c`i@`4@^CZF.@Z:PY*@YJ_XӸU@UTPTgT8TWn@danilo.spinella@suse.comdanilo.spinella@suse.comdanilo.spinella@suse.compgajdos@suse.compgajdos@suse.comjengelh@inai.depgajdos@suse.comkstreitova@suse.comdimstar@opensuse.orgkstreitova@suse.compgajdos@suse.compgajdos@suse.comtchvatal@suse.comcrrodriguez@opensuse.orgthomas.worm@sicsec.depgajdos@suse.com- Fix CVE-2023-24021, FILES_TMP_CONTENT sometimes lacked the complete content (CVE-2023-24021, bsc#1207379) * fix-CVE-2023-24021.patch- Fix CVE-2022-48279, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall (CVE-2022-48279, bsc#1207378) * fix-CVE-2022-48279.patch- Update to 2.9.4: * Add microsec timestamp resolution to the formatted log timestamp * Added missing Geo Countries * Store temporaries in the request pool for regexes compiled per-request. * Fix other usage of the global pool for request temporaries in re_operators.c * Adds a sanity check before use ctl:ruleRemoveTargetById and ctl:ruleRemoveTargetByMsg. * Fix the order of error_msg validation * When the input filter finishes, check whether we returned data * fix: care non-null terminated chunk data * Fix for apr_global_mutex_create() crashes with mod_security * Fix inet addr handling on 64 bit big endian systems - Run spec-cleaner - Remove if/else for older version of SUSE distribution- version update to 2.9.3 * Enable optimization for large stream input by default on IIS [Issue #1299 - @victorhora, @zimmerle] * Allow 0 length JSON requests. [Issue #1822 - @allanbomsft, @zimmerle, @victorhora, @marcstern] * Include unanmed JSON values in unnamed ARGS [Issue #1577, #1576 - @marcstern, @victorhora, @zimmerle] * Fix buffer size for utf8toUnicode transformation [Issue #1208 - @katef, @victorhora] * Fix sanitizing JSON request bodies in native audit log format [p0pr0ck5, @victorhora] * IIS: Update Wix installer to bundle a supported CRS version (3.0) [@victorhora, @zimmerle] * IIS: Update dependencies for Windows build [Issue #1848 - @victorhora, @hsluoyz] * IIS: Set SecStreamInBodyInspection by default on IIS builds (#1299) [Issue #1299 - @victorhora] * IIS: Update modsecurity.conf [Issue #788 - @victorhora, @brianclark] * Add sanity check for a couple malloc() and make code more resilient [Issue #979 - @dogbert2, @victorhora, @zimmerl] * Fix NetBSD build by renaming the hmac function to avoid conflicts [Issue #1241 - @victorhora, @joerg, @sevan] * IIS: Windows build, fix duplicate YAJL dir in script [Issue #1612 - @allanbomsft, @victorhora] * IIS: Remove body prebuffering due to no locking in modsecProcessRequest [Issue #1917 - @allanbomsft, @victorhora] * Fix mpm-itk / mod_ruid2 compatibility [Issue #712 - @ju5t , @derhansen, @meatlayer, @victorhora] * Code cosmetics: checks if actionset is not null before use it [Issue #1556 - @marcstern, @zimmerle, @victorhora] * Only generate SecHashKey when SecHashEngine is On [Issue #1671 - @dmuey, @monkburger, @zimmerle] * Docs: Reformat README to Markdown and update dependencies [Issue #1857 - @hsluoyz, @victorhora] * IIS: no lock on ProcessRequest. No reload of config. [Issue #1826 - @allanbomsft] * IIS: buffer request body before taking lock [Issue #1651 - @allanbomsft] * good practices: Initialize variables before use it [Issue #1889 - Marc Stern] * Let body parsers observe SecRequestBodyNoFilesLimit [Issue #1613 - @allanbomsft] * potential off by one in parse_arguments [Issue #1799 - @tinselcity, @zimmerle] * Fix utf-8 character encoding conversion [Issue #1794 - @tinselcity, @zimmerle] * Fix ip tree lookup on netmask content [Issue #1793 - @tinselcity, @zimmerle] * IIS: set overrideModeDefault to Allow so that individual websites can add to their web.config file [Issue #1781 - @default-kramer] * modsecurity.conf-recommended: Fix spelling [Issue #1721 - @padraigdoran] * build: fix when multiple lines for curl version [Issue #1771 - @Artistan] * Fix arabic charset in unicode_mapping file [Issue #1619 - @alaa-ahmed-a] * Optionally preallocates memory when SecStreamInBodyInspection is on [Issue #1366 - @allanbomsft, @zimmerle] * Fixed typo in build_yajl.bat [Issue #1366 - @allanbomsft] * Fixes SecConnWriteStateLimit [Issue #1545 - @nicjansma] * Added "empy chunk" check [Issue #1347, #1446 - @gravagli, @bostrt, @zimmerle] * Add capture action to @detectXSS operator [Issue #1488, #1482 - @victorhora] * Fix for wildcard operator when loading conf files on Nginx / IIS [Issue #1486, #1285 - @victorhora and @thierry-f-78] * Set of fixies to make windows build workable with the buildbots [Commit 94fe3 - @zimmerle] * Uses LOG_NO_STOPWATCH instead of DLOG_NO_STOPWATCH [Issue #1510 - @marcstern] * Adds missing headers [Issue #1454 - @devnexen] - modified patches % modsecurity-fixes.patch (fix crash caused by our patch) [bsc#1180830] - added patches + modsecurity-2.9.3-input_filtering_errors.patch [bsc#1180830]- removing %apache_test_* macros, do not test module just by loading the module- Trim advertisement and filler wording from descriptions.- fix build for SLE_11_SP4: BuildRoot and %deffattr have to be present- update to 2.9.2 * release notes https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.2 * refresh apache2-mod_security2-no_rpath.diff * remove apache2-mod_security2-lua-5.3.patch that was applied upstream - remove outdated html pages and diagram (they can be accessed online at https://github.com/SpiderLabs/ModSecurity/wiki) * Reference-Manual.html.bz2 * ModSecurity-Frequently-Asked-Questions-FAQ.html.bz2 * modsecurity_diagram_apache_request_cycle.jpg - don't pack the whole doc directory as it contains also Makefiles or doxygen configuration files - disable mlogc as we don't pack it and it also can't be built for curl <=7.34 - add basic and regression test suite (but disabled for now) * add apache2-mod_security2_tests_conf.patch for apache2 configuration file used for tests that was trying to load mpm_worker_module (it's static for our apache2 package) * add "BuildRequires: perl-libwww-perl" needed for the test suite- Update modsecurity-fixes.patch: additionally include netdb.h in order to have gethostbyname defined.- cleanup with spec-cleaner- fix build for lua 5.3 + apache2-mod_security2-lua-5.3.patch- Requries: %{apache_suse_maintenance_mmn} This will pull this module to the update (in released distribution) when apache maintainer thinks it is good (due api/abi changes).- Remove useless comment lines/whitespace- spec, build: Respect optflags - spec: buildrequire pkgconfig - modsecurity-fixes.patch: mod_security fails at: * building with optflags enabled due to undefined behaviour and implicit declarations. * It abuses it apr_allocator api, creating one allocator per request and then destroying it, flooding the system with mmap() , munmap requests, this is particularly nasty with threaded mpms. it should instead use the allocator from the request pool.- Raised to version 2.9.0 - Updated patch: apache2-mod_security2-no_rpath.diff (adapted lines)- call spec-cleaner - use apache rpm macrossangiovese 1676303782  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq2.9.4-150400.3.6.12.9.4-150400.3.6.12.9.4-150400.3.6.1    mod_security2.confmod_security2.dREADME-SUSE-mod_security2.txtempty.confmod_security2.soapache2-mod_security2rulesCHANGESactivated_rulesREADMEbase_rulesmodsecurity_35_bad_robots.datamodsecurity_35_scanners.datamodsecurity_40_generic_attacks.datamodsecurity_50_outbound.datamodsecurity_50_outbound_malware.datamodsecurity_crs_20_protocol_violations.confmodsecurity_crs_21_protocol_anomalies.confmodsecurity_crs_23_request_limits.confmodsecurity_crs_30_http_policy.confmodsecurity_crs_35_bad_robots.confmodsecurity_crs_40_generic_attacks.confmodsecurity_crs_41_sql_injection_attacks.confmodsecurity_crs_41_xss_attacks.confmodsecurity_crs_42_tight_security.confmodsecurity_crs_45_trojans.confmodsecurity_crs_47_common_exceptions.confmodsecurity_crs_48_local_exceptions.conf.examplemodsecurity_crs_49_inbound_blocking.confmodsecurity_crs_50_outbound.confmodsecurity_crs_59_outbound_blocking.confmodsecurity_crs_60_correlation.confexperimental_rulesmodsecurity_crs_11_brute_force.confmodsecurity_crs_11_dos_protection.confmodsecurity_crs_11_proxy_abuse.confmodsecurity_crs_11_slow_dos_protection.confmodsecurity_crs_16_scanner_integration.confmodsecurity_crs_25_cc_track_pan.confmodsecurity_crs_40_appsensor_detection_point_2.0_setup.confmodsecurity_crs_40_appsensor_detection_point_2.1_request_exception.confmodsecurity_crs_40_appsensor_detection_point_2.9_honeytrap.confmodsecurity_crs_40_appsensor_detection_point_3.0_end.confmodsecurity_crs_40_http_parameter_pollution.confmodsecurity_crs_42_csp_enforcement.confmodsecurity_crs_46_scanner_integration.confmodsecurity_crs_48_bayes_analysis.confmodsecurity_crs_55_response_profiling.confmodsecurity_crs_56_pvi_checks.confmodsecurity_crs_61_ip_forensics.confmodsecurity_crs_10_setup.confoptional_rulesmodsecurity_42_comment_spam.datamodsecurity_crs_10_ignore_static.confmodsecurity_crs_11_avs_traffic.confmodsecurity_crs_13_xml_enabler.confmodsecurity_crs_16_authentication_tracking.confmodsecurity_crs_16_session_hijacking.confmodsecurity_crs_16_username_tracking.confmodsecurity_crs_25_cc_known.confmodsecurity_crs_42_comment_spam.confmodsecurity_crs_43_csrf_protection.confmodsecurity_crs_46_av_scanning.confmodsecurity_crs_47_skip_outbound_checks.confmodsecurity_crs_49_header_tagging.confmodsecurity_crs_55_application_defects.confmodsecurity_crs_55_marketing.confslr_rulesmodsecurity_46_slr_et_joomla.datamodsecurity_46_slr_et_lfi.datamodsecurity_46_slr_et_phpbb.datamodsecurity_46_slr_et_rfi.datamodsecurity_46_slr_et_sqli.datamodsecurity_46_slr_et_wordpress.datamodsecurity_46_slr_et_xss.datamodsecurity_crs_46_slr_et_joomla_attacks.confmodsecurity_crs_46_slr_et_lfi_attacks.confmodsecurity_crs_46_slr_et_phpbb_attacks.confmodsecurity_crs_46_slr_et_rfi_attacks.confmodsecurity_crs_46_slr_et_sqli_attacks.confmodsecurity_crs_46_slr_et_wordpress_attacks.confmodsecurity_crs_46_slr_et_xss_attacks.conftoolsREADME-rules-updater.txtrules-updater-example.confrules-updater.plapache2-mod_security2CHANGESNOTICEREADME-SUSE-mod_security2.txtREADME.mdREADME.txtauthors.txtregression-testsINSTALLREADMEmodsecurity_crs_59_header_tagging.confrulestest.confrulestest.pltestsmodsecurity_crs_20_protocol_violations.testsmodsecurity_crs_21_protocol_anomalies.testsmodsecurity_crs_23_request_limits.testsmodsecurity_crs_30_http_policy.testsmodsecurity_crs_35_bad_robots.testsmodsecurity_crs_40_generic_attacks.testsmodsecurity_crs_41_sql_injection_attacks.testsmodsecurity_crs_41_xss_attacks.testsmodsecurity_crs_50_outbound.testsruby.teststestserver.cgiapache2-mod_security2LICENSE/etc/apache2/conf.d//etc/apache2//etc/apache2/mod_security2.d//usr/lib64/apache2//usr/share//usr/share/apache2-mod_security2//usr/share/apache2-mod_security2/rules//usr/share/apache2-mod_security2/rules/activated_rules//usr/share/apache2-mod_security2/rules/base_rules//usr/share/apache2-mod_security2/rules/experimental_rules//usr/share/apache2-mod_security2/rules/optional_rules//usr/share/apache2-mod_security2/rules/slr_rules//usr/share/apache2-mod_security2/tools//usr/share/doc/packages//usr/share/doc/packages/apache2-mod_security2//usr/share/doc/packages/apache2-mod_security2/regression-tests//usr/share/doc/packages/apache2-mod_security2/regression-tests/tests//usr/share/licenses//usr/share/licenses/apache2-mod_security2/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:27785/SUSE_SLE-15-SP4_Update/cdc3b50a3f48df48ef56985d1b232e53-apache2-mod_security2.SUSE_SLE-15-SP4_Updatedrpmxz5ppc64le-suse-linux     ASCII textdirectoryELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=814c47d9025dda4622a8153c1cdee02855d7af45, strippedHTML document, ASCII textUTF-8 Unicode textASCII text, with very long linesUTF-8 Unicode text, with very long linesHTML document, ASCII text, with very long linesAlgol 68 source, ASCII text, with very long linesPerl script text executableNon-ISO extended-ASCII text, with CRLF, NEL line terminatorsASCII text, with CRLF line terminatorsASCII text, with very long lines, with CRLF line terminatorsHTML document, ASCII text, with very long lines, with CRLF line terminatorsR RRRRRRR RRRR R R RR?=eutf-8351ea530590ecc9ec91cede79bb63cfb2338f1da39cee51256f36deddd0986ac? 7zXZ !t/X(0i]"k%9"5okw@_Tln"i$<_:_+ TaY ^|Wi1jk<Y""A p ;:"ք@nTHv }[oy㰨dݤWWy Zǁ_q_0"סH!!؎ noA5ԻǞo'1mX2Ǵȍ;F9GNarFNcr۩ì2p֍l߹hb3 aJ Q!8}s p/A~_tNXÖ[-Pfnõ7c{~ո˞/b H\yApjw v2xYyV C Sb$&1^,8C´'mDaZMɗgϞ"|`UdϘ̀+GZ6} |9~!U}ī<ę'$ Hݽ_}G oHI=q['nL LSGo6jƝ~rPD9#6K;qي,mQg#}*0'rHѽ@Oph.5Uje-OشI2FhrnRJJBrKMlyp_ɿ3 > `b_gN@Jp j)IXS4G"lg(MZsw AHaZa3n) 'Ԭ#O @]m2! ;R7<^7"dS}Bwv(S|BiwI 0Oo.&':tޱNwV׿`K}0xKx8H+.=h]72 ?D8I4dZ:AC㿡g?Nohn4,mEkTOa[z[z0w2IZJШx)rt8bڏ'o I<ƌH `kP)YzSoG+pP7B }МK;P|XhXo(Uaw)IC߈7oe<l/f4 T BoVs htuB`nmb-qwʭ"ݴކnBP CwdžQ/7ҨU) VQ{ Àꀇ ؅fnU©<Ri2rȲ]ZJV3!r-8ÅLl{x9Ϣ_Epk+izW:&Z$7onXm3׀Ug Ś+nK#$~&{0M';z@-*pn|shdEɜC7J|z"M]@s+=[FimCq]h.l1 ,8MJ wg#([I̫ )$z2P/}l UzVyqjxuEą:]F./N>KL[.*e VzpW{zo{ W`SCM2 A{4[\, /q6, 3eUfA9 H ?1Qtm@@p'Eb罌: : 1֨0Pg3ԯq77[;CRp]>ྼSmW1`hz UZ V6^̛je$$JS2ϫ -˖w&6/ ,3nl( ywgA/m]N<8{eGrjuAumA@Pzw39}gpԘ@{0hwvݲ'\gwݓ!EĻjaxCH3j#Td3@{Ow@!g[CEi@)砓:Jv1\!al Bk8Ψ8$GA.F+2qe;/dQ!19%@g0m8xi/UKcźk*lg>k ZC9Oe$͝ 8sa=p H9o=~YUM˜'§:,J$ '5-"aov)[$i@zN`m/ų L8T5|GϑmOCf}.;"X,O0( ]?3YA1%AldX+;|3iP@loZۦiepřwq=0XHZ?|E>2|O7%7Rh!&>ij',bRwbbuOxqƕ{q$鈘@#ALki)o'oqxJ@M'Z:(yZ/\B9L82 #kgZ`hH4]XD9mu&b9h%]FX5 '~N6ʆs[7^w46~]jߒfn)RP^V$rdvN|nb&a 7q7ZUh)7| KE֊@(ogYeCgf\¤/S~?11}z6C#/t0>kǻ]`6@J'p=v%PsV{ Ō] Mia)fb Y[HϵV!Kވ CR'hM{LAg"@ <+ 3Yh`}2*ei%@f!O!15!+],sW&MN"TJt5\&0ձ%g ,;loUF5`M]QyvQ'hGG;2\zְp͢9FM0vH|3 z K3n{r߆AQmꢊƺs!cux#024;@hqN*_TM(.L3k[9l%t6 w3XD-dgB/Qm)SyYzGy`,8LDlT"UD~\t/aH2_>:%/v*SuL#E4ͳbBv~(UCS#' *Ԗa1u䵿2O_xU^{f(ΖV;0'71Σ~ݿ΂%BdR“jضjk%II TP%3|#"ꔚ J}>\M_iXĸfx ?g2ޤΝ%*[\ k`z2Dedk`w/(u'/(\*5VJɎՏ55d@/Q[.w4N0xاimF'Ҙh8Œ'պzھPK)LS'9XϫcHwYkpq>p/zMf0$2~d}w1Uhd0 [f_T۝"#@-sU6EU0z. 1wwrס 0nGEµ'k*݈tj a; apAW4)x!뛿P& .'"g. s}\ ;i+1hp4kidTψ&D{2mk>Iͫ?1PLIq,mtSM2^ŗW|;{vY]%4߫T/؝zm&qQڴa݈x4.|sUsy Ɩ?֗"KEu\U?0PZ;Bg-#h a:<6Ñ\5Zf˛O ֦³aɩf g^=?2?W$ZVfRxR{LuL&IH ۠q 48RT)ia5*{ Ճ81Bje-;uB4JksJ[)O)>)f iHJz=jCsFAVdca+500tj-0Pneur[=8W :.!Kk}^wTS߿SwW7!?d\ \OkU4O.aZy)<&*WJ|0!MR~'[SIPw ^*u8A%W=9 PA&6UWdf]7S-Lֲ),/ˉt,l0)X|7UXvp+?8%󢣳XmfȨ&$NxC_װ`Nqo*ہ23PX"g9_;8zr=^ $c4Cpdd-NbŒE[rTpO3`vU<`ycʠt"Dbm-f}0QƠ_,}{B.*D?Ըb[ɽF_ ,6;w[dsסSeSjپ V$`Y(:ia(4k6Zt:O)o2> ~݈l7ߟ*NQXrcK!1|)4C>Vt2F˘\Sܾ[,Z?=LTjU!Fa]s5!G}}[r(m4sӏ_VFvXVm0hV "8cM@Hd6ZGt=э;^UL&!GTR`Zemho*2S>`UT6lxz# N#TKeFee4tnn*-EOtpA_T%ɽX|?ń ,\b,hbZT?7:BVo$&g07p/ Fk? ^T0c vO,XkXucjbHuYSk5Trxg&Au|;f+X#|׿'D:c?q]"}\r(xJ(  v' $>e׬<}JG$>(#Zu]FftVzu zb-?o'~>{o 5'_O=ƆR<#aM`,=kEΗLƒCdV SWDjH)aMjA=Ђ|ѕ1 ڸqD@Հ"}ŁDyIIa151J7͒ :MW%_'uI).B<x>rIgS=PO'jn_L@HA3?KaW4B帷Es3Z^ӁgXQ%4N`, +Fw'<'\e(G\w qc,5Iz4n+pRN_\/6uWe"F36 '^F\"O[?@Sz^\jSr&x\ ) ݅+@ b'lOP_9VXW^4@vOӪ(Z'\CĹcH&s156n}Eӂ@!6'}0J(Y`{JfEv>/ /qe!]6P&塾#IȨ=#M-JHo%1mŢ=aݙ>rzݯX-1Wk⺕)"9fYFp ֘=}ݿ%_!|%|Qh"Φ8vTZ曉,4 /fјeCRIKi[^ MX+Ѱͷ)dr+oPߓF l?<G鲊h;X_&vcY0Js0:Hk Lhɇ֦,R&=r`_!DӖ6<=BF)y ^((\UL3z'x~5}2Ib [d_`y4Ou 54#G #O Fhn ݒ '-]Sd9*5`Ŏ+@nZExXTvbxhf $ˁ֪I8?dx7d7tZ_.B~~Hcd5j|ݕ?av va~fƃR/uErC)<<_~CR^Cbb0/^tSӥ1g1 !;i,FS)r !A>5 .EMB Ճ a39 *p ø-t9gD WI۠ԟ[4, [y 1XBlqPjFZ-x*0S6 yьECZ/he|:pCH_BFHd2(UD;=G7rqiKO@*wmhL]{MO,6x[^CrRͧBsPhDjvr7aLQli|W= u!=ex1=\,YP-S;KGV eeExpl4v1X|yA(4FM 0ފ1t8H~0PaM.-QgxdRQg`՗܆ݲWyT ;*GWTF(rwp ;{PmaX/[~z#_S0ߎJ֧J5>RY#۞{Lb %5`7U9v6W-0kS/C3g{V~Y,#OM4\(.u%uKhl^R9Q*aa#[_Ё ֫Iz4vD<Vһ NE6h9"s O)p&Zp/Ne' n# F-*cg:<`Ut[Q;ײ r EE0"u!}^_?Fz}Vj]D %=ٲ$zT|_daP#e-B(p8.@ƘvǷF?7-Kgں$sPc~|Fpˆ鰤<ڊߑtk4-HrvoSP3dƺ ~2J')rAOitQz>o]>9:*lE艷԰ZFʋgla[! *u}3|B>OW.!FtN/V2/ŏRBT_h3[Qe,DAh0_X:5,l;mfdPVP&Q6g'? KW(D_5iD5u? W1Yg*SqLҜ|u88/xyȯf1jwj68#ýqA؎|՚zD^2|.Xh|%{0d~"&<|oF!{M{#i ,'6 ;wݠ9YA/x3PtBǗ)PtG=c}T(s5Fd+a#}@NJ nCݳ%)쀘& uz, c H*#& /sEЄ$+MQ7.%{<[Aۅ8XϗoneXtY4hwފM{g,vSp#h˝'}(DY Fy觻9Ag#l+6hxPTT@EH_ʉJ]HgA[{) /W"R^Đ#_rn6HxkLL~G¢w-Fc#O66Jql/{DԧԆdFE|^lGږ$BQsCݼu+n Ccb ^Gx#4׏diZ5m?,z@OBW Эdl\a)'X*!D6ʙUr"T,w -,ݷS@+DJiqOǸ6cmW/2_ 0bWe#۰L/ԾUͭ1eïFϘ\(|<־p`eQ6Oe!dM]gEzKzG0b#3DÕ{&U(b#f6LhZy/׎bY*vxicuvV>x)wANLfOr'[,ӨJi!׷eS3pڧm~uB{맵[h `kP*/?f6o޲AՖ)g_s.7j!Vz|vcR]! nt?h_ V%M+i5LieP. {2W R|Is0*ZPt|J6ydRLIװ<dZfH.h:,u%WMNsnG o; ڼtXJ:.[I 3iʾ"j{HbIL6Nkgdg.A7d9N9-c?wOFy$%q!n=_;Cz)PsQ(LL]bn.c(|j(mJȂ> *Iݡ59ơvâ/R|/ /\KZqo<'Pv'_(}r3Xg,ֿa x+p8 $\IgXZD9>2!OO-/$} ߔZEt}^Uu>۠6q.F?jy/%d&sDWw+H~y r8;y"dm T40=J{n\c  +}wxɷL O̵b fW㌧ qod4 0\OOh|Dn[5z6fRqv"lcC9K/EM§37Ao.1DXtv*~ZR6z7Y zZMyѧvB&w#F;2(̊>x+t$5rMf;ɢAϭ`૗DPܷ1n,?9=S:i4ӣŃPL*Rϙ, !)E՚A G^(ejBȻ:B Uc"u83x^nWĉ+*F'[y&]?%Ϊ 102IKHN.uj(D+bRXG22>&OÎUHC ɘ 3d\<3ujg2" `ڭd {i6t=0qEsԲ%I¤\{TIgOTT;[m?C7j46o_DNxM"&Y߅$=|[t{r`J~bH0a$':e'ԮI&z SSvac* YZ