sudo-devel-1.8.6p3-29.el6_10.2$>j &m`/ >7`?`d  ! < "(8 @ H X   0DX|((X8`9:#IG^ H^0I^@X^DY^L\^t]^^^b_d_e_f_l_t_u_v_w`hx`x`Csudo-devel1.8.6p329.el6_10.2Development files for sudoThe sudo-devel package contains header files developing sudo plugins that use sudo.]$ x86-01.bsys.centos.orgsCentOSISCCentOS BuildSystem Development/Librarieshttp://www.courtesan.com/sudo/linuxi68630A큤]$ ]$ PX}]$ 6c41e2d01c9ba3eb4e3be3682fc774231cabb708e088c3c16a0979c36b4b3be0d839d1f0b33f76915626f4e3f3f18451f0f4c388010ba0322f218b0ddafac2f6778a83025b6770802ed3e05af168348a15343a780865ce6b5668f02fd9f13291rootrootrootrootrootrootrootrootsudo-1.8.6p3-29.el6_10.2.src.rpmsudo-develsudo-devel(x86-32)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)sudorpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-11.8.6p3-29.el6_10.25.2-14.8.0]Y7Y, @X6@XW@L0L@K\KK`*KMKLd@J@J:JlE@JUJ?r@I@Il@H*HnHXH)HG@G@G9GgG@G[@G@GVGVFֱ@Fɂ@F@EE@>@=@=@=@<<@< - 1.8.6p3-29.2Daniel Kopecek - 1.8.6p3-29Radovan Sroka - 1.8.6p3-28Daniel Kopecek - 1.8.6p3-27Tomas Sykora - 1.8.6p3-26Tomas Sykora - 1.8.6p3-25Daniel Kopecek - 1.8.6p3-24Daniel Kopecek - 1.8.6p3-23Radovan Sroka - 1.8.6p3-22Radovan Sroka - 1.8.6p3-21Daniel Kopecek - 1.8.6p3-21Radovan Sroka - 1.8.6p3-21Daniel Kopecek - 1.8.6p3-21Daniel Kopecek - 1.8.6p3-20Daniel Kopecek - 1.8.6p3-19Daniel Kopecek - 1.8.6p3-18Daniel Kopecek - 1.8.6p3-17Daniel Kopecek - 1.8.6p3-16Daniel Kopecek - 1.8.6p3-15Daniel Kopecek - 1.8.6p3-14Daniel Kopecek - 1.8.6p3-13Daniel Kopecek - 1.8.6p3-12Daniel Kopecek - 1.8.6p3-11Daniel Kopecek - 1.8.6p3-10Daniel Kopecek - 1.8.6p3-9Daniel Kopecek - 1.8.6p3-8Daniel Kopecek - 1.8.6p3-7Daniel Kopecek - 1.8.6p3-6Daniel Kopecek - 1.8.6p3-5Daniel Kopecek - 1.8.6p3-4Daniel Kopecek - 1.8.6p3-3Daniel Kopecek - 1.8.6p3-2Daniel Kopecek - 1.8.6p3-1Daniel Kopecek - 1.7.4p5-13Daniel Kopecek - 1.7.4p5-12Daniel Kopecek - 1.7.4p5-11Daniel Kopecek - 1.7.4p5-10.1Daniel Kopecek - 1.7.4p5-10Daniel Kopecek - 1.7.4p5-9Daniel Kopecek - 1.7.4p5-8Daniel Kopecek - 1.7.4p5-7Daniel Kopecek - 1.7.4p5-6Daniel Kopecek - 1.7.4p5-5Daniel Kopecek - 1.7.4p5-4Daniel Kopecek - 1.7.4p5-3Daniel Kopecek - 1.7.4p5-2Daniel Kopecek - 1.7.4p5-1Daniel Kopecek - 1.7.2p2-9Daniel Kopecek - 1.7.2p2-8Daniel Kopecek - 1.7.2p2-7Daniel Kopecek - 1.7.2p2-6Daniel Kopecek - 1.7.2p2-5Daniel Kopecek - 1.7.2p2-4Daniel Kopecek - 1.7.2p2-3Daniel Kopecek - 1.7.2p2-2Daniel Kopecek - 1.7.2p2-1Daniel Kopecek - 1.7.1-8Tomas Mraz - 1.7.1-7Daniel Kopecek 1.7.1-6Fedora Release Engineering - 1.7.1-5Daniel Kopecek 1.7.1-4Daniel Kopecek 1.7.1-1Daniel Kopecek 1.6.9p17-6Daniel Kopecek 1.6.9p17-3Peter Vrabec 1.6.9p17-2Peter Vrabec 1.6.9p17-1Peter Vrabec 1.6.9p13-7Peter Vrabec 1.6.9p13-6Peter Vrabec 1.6.9p13-5Peter Vrabec 1.6.9p13-4Peter Vrabec 1.6.9p13-3Peter Vrabec 1.6.9p13-2Peter Vrabec 1.6.9p13-1Peter Vrabec 1.6.9p12-1Dennis Gilmore 1.6.9p4-6Peter Vrabec 1.6.9p4-5Release Engineering - 1.6.9p4-4Release Engineering - 1.6.9p4-3Peter Vrabec 1.6.9p4-2Peter Vrabec 1.6.9p4-1Peter Vrabec 1.6.8p12-14Peter Vrabec 1.6.8p12-13Peter Vrabec 1.6.8p12-12Peter Vrabec 1.6.8p12-11Jesse Keating - 1.6.8p12-10Peter Vrabec 1.6.8p12-9Peter Vrabec 1.6.8p12-8Karel Zak 1.6.8p12-7Jesse Keating - 1.6.8p12-6.1Karel Zak 1.6.8p12-6Karel Zak 1.6.8p12-5Jesse Keating - 1.6.8p12-4.1Karel Zak 1.6.8p12-4Jesse Keating - 1.6.8p12-3.1Dan Walsh 1.6.8p12-3Jesse Keating Karel Zak 1.6.8p12-1Karel Zak 1.6.8p11-1Tomas Mraz 1.6.8p9-6Karel Zak 1.6.8p9-5Karel Zak 1.6.8p9-4Karel Zak 1.6.8p9-3Dan Walsh 1.6.8p9-2Karel Zak 1.6.8p9-1Karel Zak 1.6.8p8-2Thomas Woerner 1.6.8p8-1Thomas Woerner 1.6.7p5-31Thomas Woerner 1.6.7p5-30.1Dan Walsh 1.6.7p5-30Dan Walsh 1.6.7p5-29Dan Walsh 1.6.7p5-28Elliot Lee Dan Walsh 1.6.7p5-26Thomas Woerner 1.6.7p5-25Colin Walters 1.6.7p5-24Dan Walsh 1.6.7p5-23Dan Walsh 1.6.7p5-22Dan Walsh 1.6.7p5-21Dan Walsh 1.6.7p5-20Dan Walsh 1.6.7p5-19Thomas Woerner 1.6.7p5-18Elliot Lee Dan Walsh 1.6.7p5-16Karsten Hopp 1.6.7p5-15Dan Walsh 1.6.7p5-14Dan Walsh 1.6.7p5-13Dan Walsh 1.6.7p5-12Dan Walsh 1.6.7p5-11Dan Walsh 1.6.7p5-10Thomas Woerner Jeremy Katz 1.6.7p5-9Dan Walsh 1.6.7p5-8Dan Walsh 1.6.7p5-7Dan Walsh 1.6.7p5-6Dan Walsh 1.6.7p5-5Dan Walsh 1.6.7p5-4.selDan Walsh 1.6.7p5-3Elliot Lee Thomas Woerner 1.6.7p5-1Nalin Dahyabhai 1.6.6-2Bill Nottingham 1.6.6-1Tim Powers Tim Powers Bernhard Rosenkraenzer 1.6.5p2-2Bernhard Rosenkraenzer 1.6.5p2-1Bernhard Rosenkraenzer 1.6.5p1-1Bernhard Rosenkraenzer 1.6.5-1Bernhard Rosenkraenzer 1.6.4p1-1Bernhard Rosenkraenzer 1.6.4-1Bernhard Rosenkraenzer 1.6.3p7-2Than Ngo Bernhard Rosenkraenzer Bernhard Rosenkraenzer Prospector Karsten Hopp Nalin Dahyabhai Bernhard Rosenkraenzer Preston Brown Tim Powers Bill Nottingham Preston Brown Preston Brown Michael Maher Michael Maher Otto Hammersmith Otto Hammersmith Michael Fulbright Michael Fulbright - RHEL-6.10.z ERRATUM - fixed CVE-2019-14287 Resolves: rhbz#1760684- Fixes CVE-2017-1000368 Resolves: rhbz#1459409- Fixes CVE-2017-1000367 Resolves: rhbz#1455400- Update noexec syscall blacklist - Fixes CVE-2016-7032 and CVE-2016-7076 Resolves: rhbz#1391938- RHEL-6.9 erratum - Fix race condition when creating /var/log/sudo-io direcotry Resolves: rhbz#1365156- RHEL-6.9 erratum - Fix "sudo -l command" in the LDAP and SSS backends when the command is not allowed. Resolves: rhbz#1374410 - Fix sudo log file wrong group ownership Resolves: rhbz#1330001 - Fix sudo parsing sudoers with user's locale Resolves: rhbz#1318374- RHEL-6.8 erratum - fixed a bug causing that non-root users can list privileges of other users Resolves: rhbz#1312481- RHEL-6.8 erratum - fixed handling of closefrom_override defaults option Resolves: rhbz#1309976- RHEL-6.8 erratum - fixed potential getcwd failure, resulting in Null pointer exception Resolves: rhbz#1284886- RHEL-6.8 erratum - fixed sssd's detection of user with zero rules Resolves: rhbz#1220480- RHEL-6.8 erratum - search also by user id when fetching rules from LDAP Resolves: rhbz#1135531- RHEL-6.8 erratum - fixed ldap's and sssd's sudoOption value and remove quotes - fixed ldap's and sssd's sudoOption whitespaces parse problem Resolves: rhbz#1144422 Resolves: rhbz#1279447- RHEL-6.8 erratum - removed defaults option requiretty from /etc/sudoers - backported pam_service and pam_login_service defaults options - implemented a new defaults option for changing netgroup processing semantics - fixed visudo's quiet cli option Resolves: rhbz#1248695 Resolves: rhbz#1247231 Resolves: rhbz#1241896 Resolves: rhbz#1197885 Resolves: rhbz#1233205- added patch to re-introduce old group processing behaviour Resolves: rhbz#1075836- RHEL-6.7 erratum - modified the authlogicfix patch to fix #1144448 - fixed a bug in the ldapusermatchfix patch Resolves: rhbz#1144448 Resolves: rhbz#1142122- RHEL-6.7 erratum - fixed the mantypos-ldap.patch Resolves: rhbz#1138267- RHEL-6.7 erratum - added patch for CVE-2014-9680 - added BuildRequires for tzdata Resolves: rhbz#1200253- RHEL-6.7 erratum - added zlib-devel build required to enable zlib compression support - fixed two typos in the sudoers.ldap man page - fixed a hang when duplicate nss entries are specified in nsswitch.conf - SSSD: implemented sorting of the result entries according to the sudoOrder attribute - LDAP: fixed logic handling the computation of the "user matched" flag - fixed restoring of the SIGPIPE signal in the tgetpass function - fixed listpw, verifypw + authenticate option logic in LDAP/SSSD Resolves: rhbz#1106433 Resolves: rhbz#1138267 Resolves: rhbz#1147498 Resolves: rhbz#1138581 Resolves: rhbz#1142122 Resolves: rhbz#1094548 Resolves: rhbz#1144448- RHEL-6.6 erratum - SSSD: dropped the ipahostnameshort patch, as it is not needed. rhbz#1033703 is a configuration issue. Related: rhbz#1033703- RHEL-6.6 erratum - SSSD: fixed netgroup filter patch - SSSD: dropped serparate patch for #1006463, the fix is now part of the netgroup filter patch Resolves: rhbz#1006463 Resolves: rhbz#1083064- RHEL-6.6 erratum - don't retry authentication when ctrl-c pressed - fix double-quote processing in Defaults options - fix sesh login shell argv[0] - handle the "(none)" hostname correctly - SSSD: fix ipa_hostname handling - SSSD: fix sudoUser netgroup specification filtering - SSSD: list correct user when -U -l specified - SSSD: show rule names on long listing (-ll) Resolves: rhbz#1065415 Resolves: rhbz#1078338 Resolves: rhbz#1052940 Resolves: rhbz#1083064 Resolves: rhbz#1033703 Resolves: rhbz#1006447 Resolves: rhbz#1006463 Resolves: rhbz#1070952- added patches for CVE-2013-1775 CVE-2013-2777 CVE-2013-2776 Resolves: rhbz#1015355- sssd: fixed a bug in ipa_hostname processing Resolves: rhbz#853542- sssd: fixed buffer size for the ipa_hostname value Resolves: rhbz#853542- sssd: match against ipa_hostname from sssd.conf too when checking sudoHost Resolves: rhbz#853542- updated man-page - fixed handling of RLIMIT_NPROC resource limit - fixed alias cycle detection code - added debug messages for tracing of netgroup matching - fixed aborting on realloc when displaying allowed commands - show the SUDO_USER in logs, if running commands as root - sssd: filter netgroups in the sudoUser attribute Resolves: rhbz#856901 Resolves: rhbz#947276 Resolves: rhbz#886648 Resolves: rhbz#994563 Resolves: rhbz#848111 Resolves: rhbz#994626 Resolves: rhbz#973228 Resolves: rhbz#880150- fixed potential stack overflow in visudo Resolves: rhbz#903020- added patches to address a number of issues in ldap & sssd plugins - fixed README.LDAP updating in the spec file Resolves: rhbz#860397 Resolves: rhbz#876208 Resolves: rhbz#876578 Resolves: rhbz#879675 Resolves: rhbz#879633- Include just one sample plugin in the documentation for the -devel subpackage. Don't include architecture specific files. - patch: Do not inform the user that the command was not permitted by the policy if they do not successfully authenticate. Resolves: rhbz#759480 Resolves: rhbz#871303 Resolves: rhbz#872740- removed %doc since sudo installs the files anyway Resolves: rhbz#759480- added SHLIB_MODE=755 to get striping to work again Resolves: rhbz#759480- extended the default sudo-ldap.conf file - corrected default file permissions on sudo.conf, sudo-ldap.conf - added patch that introduces the cmnd_no_wait Defaults option Resolves: rhbz#840980 - sudo creates a new parent process Resolves: rhbz#860397 - new /etc/sudo-ldap.conf configuration file problems- rebase to 1.8.6p3 - new -devel subpackage - new configuration file: /etc/sudo.conf Resolves: rhbz#852045 - ulimit -c got Operation not permitted Resolves: rhbz#804123 - sudo does not call pam_close_session() or pam_end() Resolves: rhbz#828707 - sudo fails to report error correctly when execv(3) fails Resolves: rhbz#844691 - Cannot set RLIMIT_NPROC to unlimited via pam_limits when running sudo Resolves: rhbz#759480 - Rebase sudo to 1.8 in RHEL 6.4 Resolves: rhbz#846117 - Sudo interpretation of wildcard command arguments is more lenient providing a security risk Resolves: rhbz#789937 - [RFE] Add ability to treat files authoritatively in sudoers.ldap Resolves: rhbz#836242 - sudo -s -u USERNAME can't change ulimit -c- fixed job control Resolves: rhbz#823993- added patch for CVE-2012-2337 Resolves: rhbz#829757- use SIG_SETMASK when resetting signal mask instead of SIG_UNBLOCK (#821976) Resolves: rhbz#821976- backported ldap code modifications that fix an issue with tls_checkpeer (#810372) Resolves: rhbz#810372- fixed bug in Runas_Spec group matching (#810147) - disable `sudo -l' output word wrapping if the output is piped (#810326) - fixed `sudo -i' command escaping (#806095) Resolves: rhbz#806095 Resolves: rhbz#810147 Resolves: rhbz#810326- fixed uninitialized value warning introduced with the sudoedit-selinux patch Resolves: rhbz#806386- created a separate ldap configuration file, sudo-ldap.conf - visudo: mark unused aliases as warnings, not errors - backported signal handling from 1.7.5 - don't disable coredumping from the code, rely on /proc/sys/fs/suid_dumpable - use correct SELinux context when editing files with sudoedit - fixed visudo syntax checks - fixed typos and inconsistencies in documentation - switched to an updated -getgrouplist patch to fix sudo -l -U behavior Resolves: rhbz#760843 Resolves: rhbz#736030 Resolves: rhbz#697775 Resolves: rhbz#726634 Resolves: rhbz#708515 Resolves: rhbz#736653 Resolves: rhbz#667120 Resolves: rhbz#769701 Resolves: rhbz#751680 Resolves: rhbz#604297 Resolves: rhbz#797511- set ldap configuration file to nslcd.conf Resolves: rhbz#709235- removed the --with-ldap-*conf options - added RELRO flags Resolves: rhbz#709235 Resolves: rhbz#709859- patch: log failed user role changes Resolves: rhbz#665131- added #includedir /etc/sudoers.d to sudoers Resolves: rhbz#615087- added !visiblepw option to sudoers Resolves: rhbz#688640- added patch for rhbz#665131 Resolves: rhbz#665131- rebase to latest stable version - sudo now uses /var/db/sudo for timestamps - new command available: sudoreplay - use native audit support - sync configuration paths with the nss_ldap package Resolves: rhbz#615087 Resolves: rhbz#652726 Resolves: rhbz#634159 Resolves: rhbz#603823- added patch for CVE-2010-2956 (#628628) Resolves: rhbz#629054- sudoers change: always set $HOME to the target user home directory Resolves: rhbz#619293- move the sudo_end* calls before closefrom() - close audit_fd before exec - fixed typo in Makefile.in Resolves: rhbz#569313- fixed segfault when #include directive is used in cycles Resolves: rhbz#598363- added patch that fixes insufficient environment sanitization issue (#598154) Resolves: rhbz#598383- added second patch for CVE-2010-0426 (#580441) Resolves: rhbz#580527- added patch for CVE-2010-0426 (#567337) Resolves: rhbz#567675- changed the License: value to ISC Related: rhbz#543948- new upstream version Resolves: rhbz#554321 - drop *.pod man page duplicates from docs - commented out unused aliases in sudoers to make visudo happy (#550239)- Rebuild for new libaudit Related: rhbz#543948- rebuilt with new audit- moved secure_path from compile-time option to sudoers file (#517428)- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- moved the closefrom() call before audit_help_open() (sudo-1.7.1-auditfix.patch) - epoch number sync- updated sudo to version 1.7.1 - fixed small bug in configure.in (sudo-1.7.1-conffix.patch)- fixed building with new libtool - fix for incorrect handling of groups in Runas_User - added /usr/local/sbin to secure-path- build with sendmail installed - Added /usr/local/bin to secure-path- adjust audit patch, do not scream when kernel is compiled without audit netlink support (#401201)- upgrade- build with newer autoconf-2.62 (#449614)- compiled with secure path (#80215)- fix path to updatedb in /etc/sudoers (#445103)- include ldap files in rpm package (#439506)- include [sudo] in password prompt (#437092)- audit support improvement- upgrade to the latest upstream release- upgrade to the latest upstream release - add selinux support- sparc64 needs to be in the -fPIE list with s390- fix complains about audit_log_user_command(): Connection refused (#401201)- Rebuild for deps- Rebuild for openssl bump- fix autotools stuff and add audit support- upgrade to upstream release- also use getgrouplist() to determine group membership (#235915)- fix some spec file issues- fix rpmlint issue- fix typo in sudoers file (#212308)- rebuilt for unwind info generation, broken in gcc-4.1.1-21- fix sudoers file, X apps didn't work (#206320)- use Red Hat specific default sudoers file- fix #198755 - make login processes (sudo -i) initialise session keyring (thanks for PAM config files to David Howells) - add IPv6 support (patch by Milan Zazrivec)- rebuild- fix #190062 - "ssh localhost sudo su" will show the password in clear- add LDAP support (#170848)- bump again for double-long bug on ppc(64)- reset env. by default- rebuilt for new gcc4.1 snapshot and glibc changes- Remove selinux patch. It has been decided that the SELinux patch for sudo is - no longer necessary. In tageted policy it had no effect. In strict/MLS policy - We require the person using sudo to execute newrole before using sudo.- rebuilt- new upstream version 1.6.8p12- new upstream version 1.6.8p11- use include instead of pam_stack in pam config- enable interfaces in selinux patch - merge sudo-1.6.8p8-sesh-stopsig.patch to selinux patch- fix debuginfo- fix #162623 - sesh hangs when child suspends- Add back in interfaces call, SELinux has been fixed to work around- new version 1.6.8p9 (resolve #161116 - CAN-2005-1993 sudo trusted user arbitrary command execution)- fix #154511 - sudo does not use limits.conf- new version 1.6.8p8: new sudoedit and sudo_noexec- rebuild- added missing BuildRequires for libselinux-devel (#132883)- Fix missing param error in sesh- Remove full patch check from sesh- Fix selinux patch to switch to root user- rebuilt- Eliminate tty handling from selinux- fixed spec file: sesh in file section with selinux flag (#119682)- Enhance sesh.c to fork/exec children itself, to avoid having sudo reap all domains. - Only reinstall default signal handlers immediately before exec of child with SELinux patch- change to default to sysadm_r - Fix tty handling- Add /bin/sesh to run selinux code. - replace /bin/bash -c with /bin/sesh- Hard code to use "/bin/bash -c" for selinux- Eliminate closing and reopening of terminals, to match su.- SELinux fixes to make transitions work properly- pied sudo- rebuilt- Eliminate interfaces call, since this requires big SELinux privs - and it seems to be useless.- visudo requires vim-minimal or setting EDITOR to something useful (#68605)- Fix is_selinux_enabled call- Clean up patch on failure- Remove sudo.te for now.- Fix usage message- Clean up sudo.te to not blow up if pam.te not present- added missing BuildRequires for groff- remove left-over debugging code- Fix terminal handling that caused Sudo to exit on non selinux machines.- Remove sudo_var_run_t which is now pam_var_run_t- Fix terminal handling and policy- Fix policy- Turn on SELinux support- Add support for SELinux- rebuilt* Wed Jan 22 2003 Tim Powers - rebuilt- remove absolute path names from the PAM configuration, ensuring that the right modules get used for whichever arch we're built for - don't try to install the FAQ, which isn't there any more- update to 1.6.6- automated rebuild- automated rebuild- Fix bug #63768- 1.6.5p2- 1.6.5p1 - Hope this "a new release per day" madness stops ;)- 1.6.5- 1.6.4p1- Update to 1.6.4- Add build requirements (#49706) - s/Copyright/License/ - bzip2 source- update to 1.6.3p7 - use %{_tmppath}- 1.6.3p6, fixes buffer overrun- 1.6.3p5- automatic rebuild- fixed owner of sudo and visudo- modify PAM setup to use system-auth - clean up buildrooting by using the makeinstall macro- initial build in main distrib - update to 1.6.3 - deal with compressed man pages- updated to 1.6.1 for Powertools 6.2 - config files are now noreplace.- updated to 1.5.9p2 for Powertools 6.1- sudo is configured with pam. There's no pam.d file. Oops.- upgraded to 1.59p1 for powertools 6.0- fixed so it doesn't find /usr/bin/vi first, but instead /bin/vi (always installed)- built package for 5.2- updated SPEC file- updated to 1.5.4- built for glibc, no problems- Fixed for 4.2 PowerTools - Still need to be pamified - Still need to move stmp file to /var/log- First version for PowerCD.1.8.6p3-29.el6_10.21.8.6p3-29.el6_10.2sudo_plugin.hsudo-devel-1.8.6p3sample_plugin.csudo_plugin.8.gz/usr/include//usr/share/doc//usr/share/doc/sudo-devel-1.8.6p3//usr/share/man/man8/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnuASCII textdirectorytroff or preprocessor input text (gzip compressed data, from Unix, max compression)?7zXZ !#,\]"k%{dʄ+q{*=T4 z#ծ^fUNĴ°ck?mFiR]!{ZulHr5j|H!17S2vrè}~vF&#!P Eio6)8փL  ZI},/gVRdnL3 9aa^4f^:k \sG}@#XY:1VP2­ij1䱍K_bOko)!.J5T"\xOHB>e,]wU,,`Rq&='H=^R]zUL3=hxڝQaX_+4@b!~c>gd/ ko_ po,Μk@y##QmvZ}=*8eyj&\t]>ayoB L$? D,~ 8zdG)*P(EޛPARA+K?;?껲 M`-ZRML/vX|о7xy:D*p5s5gR%TJCީME|t7wcT4R*s,G03dc;Fql>)!W\BZ+р_+d)Դee-*T_-b7̓B a>۹7x,tzEf(%[HЀ|-&.E}Y>}%ڙ-?;$0-*#W-CrXݒziKoG'}Of)suU)j~Yv>7'|Ev"Sç^M q<:9w`#q;/мYؚYrp[hbԴcE08U/zq=@Ր9/vg~HcUG~zvZKxWKNnϗKc4wL򡍀t'D5wP+^ƍ~WbAE@?P ޔ"ۀyLq`U-q`-8YY=(_<D uk;186+E˨"iH]PLPPt?補t\mCC }`1TD~]k&wdBȚ&A u>ev/XnZ >@ٶ YZ