MozillaFirefox-translations-other-31.8.0-143.1e>UA($^)Sb*?U$jC;\"Mz>j6ǖZ$&ahXgE>8&B?&2d$+ 1 P ([m[ #[ [ F[ [ ^ [ʔ[%[YY[PǜǴN({8Ȅ9:ԤBCF_Gt[H4[I\[X|YZ[\[]i,[^ Sb&c&hd&e& f&l&z&"CMozillaFirefox-translations-other31.8.0143.1Extra translations for FirefoxThis package contains rarely used languages for the user interface of Firefox.Ucloud125FopenSUSE 11.4openSUSEMPL-2.0http://bugs.opensuse.orgSystem/Localizationhttp://www.mozilla.org/linuxx86_64s% Jr1x 9)}h 9 1A `!0 6"h /X  i w$> 03[8q3Z Z{-X8 pf-mvp_}p" X,D.3 Mg6#$s mN EP!M" 5en9?'^yc. Sc_}+i  )VDK5rVZ:(GfayGlC%  " {- 3-#- kV:N>  6'6C 6 n NW4%*  X$AG!w Rk/\J8[&  %8h "vj%J2!YaNqHh +i 9Mu b`> *AN1`T  } 3k[=k7 Z PR U4yFIUG3- ~ cu"brM -F.3 Mg1s/mN `Z 3$Ekp An9@~g gg= v#FZ)J@LWo=A(|fkESuP%  a /O9,'09 $j- P?%&s j;Y nHRj v mQ@7N'a)< 8Wy] <T,0i5I m(J \k B 9v%s^s b|nah[ R @)6x0C_a~7#5 T\0 % ni*xor d!%<4 m%Zk&vZ JP3 #g1#%Snv j{ .OM0 ?en9eggcg. &-*I )'K1ip\W.GfwBw?ov %m  & 7:0(3* C'{  ~x e&u R|X\i \D" ]29W'~ I.rz Kdm?uM")K Y  l[en9?O$$`,:% 2){:SQ]@`E.i: fx3  %m) 4w'N']\ E$ Y'4hb H+HWc  :*- #&$Z? &R_pzLJyG'  [14%8 / 1c1{Y /&h  @ %Q\wf MP t #`,< ?9 @I ,fzu*1 IWsmD8@33 / Cn SgZs}o u? Ze<~!n9 <&3+3+y~h+L  i%[)mMc4A~>~UhYEZn ;,7  Tm2Zg.B )9 H ^I 3 zF?VX h>) 7n1s   a?4op! ? ?%#[  `aG:SgPC#q %^ K c ; \n 1on($! -<PSJ :g%`<,w mv ,Z 05'p{ +QTm z$# QA:  &0fsO u|lQ. gAZ7l7 N` 4%Md% "pI6n9;ggcg.! N+|l1)du >!mIf`T  AS1% e9 3J ocZ7   AGvW {!! EI Rs.. g| "P;LF0O9R  db"\Tr ez" !:fcQ 0e% J " M 8 d ow i.T&( E/~?8 ]gs =&5.1jE v@ /L [2cu :<;A# . M:G {B,e/@} ^ &f' }u  23 gs|N k 6+2D #n9@}Rggng9%r U ?l a ,).i j_(rP 2fm!M:l zRb%% ,`l|U$G E37 qx#:[i%u(*}9 \t[ *\0 :N92?J' ,##4 $ Z^U* u. U" P jg x%Js#6  cY " f *e@|;)Q P| 4 iWA:RfG s*]D 7 x88!g >j  U e S/{D}"] +L Jt >.3 gI g %S  @ 5-?_y u'Vn9= Bggcg.!  O& U I;"),v6 ~ c?U4Yfq(k4 O8Db(%Tm  |/X3J; , #S( ]C~*+$+tOV V9s;c7 eI'.% MDvtC+ / V*\  km w%(W @woh 9 (4 A*0+v6"h :?X ]: $> 0[)E/h %*\=7 (>9h^ 7R g F>%V mi {x BC/O 4:en9Tjggfg2 & " *){[Nsm,-$fazAqw%m  V l6:)O9 q {< b Q~GPn = 8) {>W  #_Y LvzK/) b(UTu > L%J:tb irMf 9} 7)6 2fxK<#Y e^XJM& * F[*ez4c $  #|O3 wzvnH6s1P l=RMg1f/#sbmN Yh &>Zq  @en9jUc. c#%t y)vLLNcRJ+fcr? U%mE  .~'@/u  9~/g XxF 8XBMlY @ {c?6Z'} <Uk N3NfiJKT'. 1o %8h m9%IJ!  2 'lah xY   (j].q-!\6 X u  >[ 8'q,o -^& I=`R= *+p&  "zN Qg>f3sjQN w. FH%" en9?^^DFF T%BKU)YV^"V0c@5"`0m e 4$)+=+I~4 -fT C^A >_V} m j7'>L ?0~ b;+mYMS(? D %8h Xq%T5T`Z wki| z (50C'NCet7"j lKg % 0EX)%b; [ Uf$ek8is2* {nx W7_EN @P  PgZ "%jGoT uO /L:g 6n9*Q~ggcg. U$xE )]U5d?QRH(fMv=>LX%  $ .gN%MFs- pWg '_g L T8JtV  E_$6(9B p 2J_x*RfHE( & . : =o\%jJYE /kmh 9 (4 D,0+6$ :?X]: % 0[)G-U @uF@/ ~flfid !K -K.3 g+#$!lN YLuw;a n9./sggcg. ec#w6 i )S=k4;68'efag<E`E%m  $ .G-3&D$<M3 +@2 1 K.Z9d \ MW!4' H Vfy5 ^D t9bG])& =  ': "v{%jq L hIQlng i )+5 Bc Cc}7@" +2#u+ %V n}\*gEOf VY}]pj-I }1wrpiWL ;K.3 MgM'sFxn tg 8I !`En9VNxggag,C x # )}WO7FY`7' fQ!r;#x%m   +.JO23% n5 orI_ +FMw ?`JS_d r i27Q( .!Pbd I.Nv/clJ'ln a _9 An%$wX4 sDmi Z )6, ,DJO8$p2 ' ' 8+~Pk v}  B3-@'  pO CZ3 g2 %Swn {bo =fK1n9_ggeg0y %92v @)xZv]ZIJ->fu<w@  B]%m  5 e62%L}(_5) r&q :y W_ aQZi    sn:/ {20QN;W lYs=M)   <, B^%OT (y { 2clh 9 (4 A*0+v6"h :?X ]: $> 0[)j vP"~a% 5[@6 P$YF @<Mrg0 t,jkv /m xCs p@en9abkkck. c%XVb'  )4o2 gEcN'~W3faiu;  #bo%mg  0 3%5F" ;f Ok1 Rw )LNXQ 0 RJ6T(C 9: $o{ &.bQEbHna5'* 7D- 8 Iu% x2 t fVl&j # ):53CG\Yd|7"# [z 3 $ K\*<V_$ g ylfRNsa5: }+GYL <Q 3  F7gLs jkf Pb 0?!@ Qen9kLgggg2D #JKc P)PYDTp6, fl;t>S af%m   .2i &"/0 /x} s A@ Ho<Ot` I (`7(T NJd W d0ifI'j = R; I % J Ev S/a h 9 -_B bi\0 6"h SuX  q $> 0[1<}6  =+1k j$~ Xlr)yq -=3z R~l. f3 g4sOj N  #\4g Fen9f`JJKF= >c.t+iK)JyU F >)3SfaMao lY+ % K ^. w3;7 ] 7E !rP%*  oh9 . % 0C,EDH@. x|C"s  z? ^c #" "*@ . %8h "v}%Pi"l 6>hi &R 5F V2IF *>R6Ll9M  s 5/%8>wE \ U!{,F@B: }]]u;2L 7F3 6 ^gN%V0pK dY !D xn931thhcg/h A"3F3  )r$KNQP5)"fj n:6jN%   /OM,%o-# (w\ 1 Ch P-Sf  Pbg 5&= @csw >ND#wcG@%'N ? 83 0mj%h7dIlj c (5Y&VU7F"t Z uR! $` ff)K{67[ aS(PG= y A)T 2F3 |gM%VLld B} .tU@ sn9JR n nT nT  %>n)Ps*.Gf^>ZP*Jfd,i>vf%T o %2E>Y&^( ob 6C n- AVYkY |; 75+(# 33,Ygh s^Z?[hJ)z :z  < \~%y gX@Qvtg 4 (6:Ct L6#; QVX! $ Y*iAI2Cf 6"i &(Y<d+ u*@U GB f Pga#%j|g l> R5 n9>nggcg.g .#-(>3)kEekM-Ij5fSo? >n    =4W X+(SQ#{ %eg^S \`Xh 1F:1*` p<&Ik ro saNql+I   v0X R y)Q7e .Z X9u?M n%JBv+ah 9 k0B a%Ag6"h4f {X  $ [17~Df 7!=04= !` V;MgBp$ mN tu #GK  'en9Xd/* c$*  )[V[RE+' fvxDQ X"%mF 8 W 04X /);. o j | a OtJTe f2A |inI8'V j01z\ K]G^QvRA- 1\& %8h "vX%J , { X zv 9$W !w( I7#=<) cX  # [+  w9s$ (7/P j :!,z/$ " rI3 Dg :# ND b$ /)a9v hen9/F-''"!U8c"W v ,j)!zJ \'m OD)xf`% ,%pm# 4KK G /" n 9"(f+= # $W, p'N] rT D+i` c | p,+p _|uj& '0e^ /  %8h . ;% >dG7 % eU*wn 9 2ADH Jd*g] 6"h gj{XC 5K )2 [36|=i &$p<> E#K{ 9|EJ{\g KOf[g%TzsBDl Le qM^[ Gen9O'd/)a e1+%+!)]Wa.}_d*DgaIP$ @ @&  0K3/ "* J4Ut"a zb edBl  *:*)Ub|,N!# 5dD CdX v3D?2 %8h "v% J>"9 i }; rg 9$ x/>  QN =Z&>:! ;IX 5u 0 }[3Hl 6q S@ !R& v(H@3 4\ U)$bYy3 {3 g* N | *on>WK ! n98c.!\ cc$f *,,)1\# 2Q>2ChPEf\G%H S"%0  0 iFB^2 eI ^ <#! ) 8=@ I"ON  (N : UL5 Q&jydi&h(  ~4 ( C' I#T Q  %8h F =z%ofr`Q5m&fy ? )J56B9T[|7p" ivy, %? a*Xa<_ a-Z!oxho "# u}vIpOS EJ 3 PgF#sSky E` #F ~On9ZW{ggcg. r#v )S$PaYK* f-y?BHjn%m   /1K&/%0 #2 .ywrJ 5V@Ocj th dt6)Jg  sp{ BW9gK35'{ c % x$%Fvov-qlg> - ')7H3Dur7#l \' % w+C?*c m  B {&*^oYR CG3 IgG% hjk t`u 0K .Cbn9?[x4g(gc(g.  &%)y{TAc|f1-fuG@1`j%m  U5'>% R(T z] 0X f_[Oi # ]7\9**)~ 90t  9[+xmM<W) = e% tx w v(| "  .TC[ RdL O>*C6K V  V+ 81 I  ;.  Z  d 8s#7 7< L9@ 5vj~.Mg4skz0 < 9"?[0 UYn9(>gQggOg2 s V7g9),S {;KfWf R%m &SU +95 & ?( )g4"J#l 0/ .     D.Hu6^J 4H#PvS fi! !9oF 2T* K%mTYF mk)f  )5 *c9UKt7K" %n}U $ bHY)n7n/d ` }H.- u[sp)IhwO <Hg%V )_iy ^ \ :n Ien99Kpggcg. I%ev)WQ<$TULM+fzw<#+;S%m   ,0 'V&jAy "V<f h5X`d _ ^F7 &Y #iR -St hLHCt(bk  Q^a 9 Bp% gn ulg 9 'b4 A*+G5"h :?X : #F 0Q)!_ l$  Y0iq& b WG 25.3 Mg9s{k }W.\ Ten9 e.g}gc}g. 0,%AFw )^y+7g8KJL3(^ >fV|<3pb m   #-.'<%?L |%E Sw y [~ 2Ysn D/(   LxFj pPDDdHz8 X(T `  :3j x% ?H E < elr&/ {j-;NA=} a9%. q&x j * /~I  l,\;)> y$y .Vuw ?";: qjg(#:Lg  %$/Mv  H6n9(Wg^gc^g.! `49'lY)b]Y>f%O}k &D_'%   -G 4R8! T eg D. ! K4 6ID t "!B/[MD@ >!oAG g V9Uw-L} *%\k% 9 l #< ^56)- 0 Z/B!b?{Z* 3;a'ZA9o }1 6BfX sFR< 4 G 0[3' - a ..3 Mg9# as!U 1{ 'nn9>gegegu%  0V2T 3($)b(n* G ]YfKu:m k?%/m& d/q RW\1D   #[,9+L^1 E^5 $+@ [V=0P!LA0~#85N+ @%+ 4ca $E  q-Z  B% J $ J n (  k 9+O 5H  : /I1$X  ?/n [:LP ?K Q g,gv _.&  \ ) bi) T` !.3 g <# N  ~/ #Pn97Fc.$ c2Lh p &!)+ zJ!V+M Afmi5wB;$5P%Om 4 ,Ts* x SR$>*- kK m_&^4-T \ BTO9i8=;7K2 (] 74^ ,) ,X Ff %8h t %J_7S;?t9 ( N6bM= &bw> CR'1  s t 4*$[>fPg #;!5/E Lk6>7R S\. fM GsmN ; &Qs qn9}^ggcg.  [d=)cIOhP\+!fuG';N%m  2/O,(;%C  !W j(s qd7Ri` 7@ pd7(s 3*(z  8jYMkK5' N 2  &E. b%m4(} \ d% ' \5 31o ]_P@@J%   =b[$F aUBf "'?  (>"duT mNX 3 )gG $Bvne Cf : HPu \en9?klh i" h$s 2A"| 0n)c_]Nl^:.Z0g`|;|p& m# ]0t$($: [} \u&o w^NSU E y [9(y }7Ol|F vnSL O(s <j  7 !%wfX)  q}eD J #): <](E7$L _&X '( [)W2/o ST!= '#L Z &S ZK.3 Mg3#r  z4QU }en9pmNg'gb'g-p _8& u):aNl:1 .=fmU~B9;s% m* < N6yO(0   ~3!2O P>LM I Db3)r D2 h (+cDu J(T fh0kx @ a|%vxl * &}*aNk o Hu\")2a3U;{+$} rs} Y 7o2<b   |]/ux U* D <wg5hsp s NA E'q  fen9br  7:# w~z)0W@/YPkxY+B,k=|84u^%mV 72Zc'YG.% wVrc dM^ *bk32( 8&A; nQ\k-J"'x !q 9 |%J! G, {2g 9( ]3HDR zVN <%6 >3X <x * f([2k<y 6Vq W- ( 55 7u 7"-fmxJ  w3 (g2#2 N Y )pYN  H~n9?2]c.! c#4B ')_MuKW;)\=S#\fX>%, G(%3  {/ ?XDYN m U6  c%(*8? *D]r  (<i G K35 8LNI$|+e  5w$) ;(Oe  %8h  /#%J a f  !7h 9 2B c& 6"h8# UNX  h # -[2 h/\PH \'W  HY)!sFm[tvx. f3 MgIs mN  /#j? @ben93MdM/= c5 $_) tHz8M<&faBt aC%m] Mh u.H 4x=  'T (9Y!\vH/=v4  'H -2BA,J'# j"!< ?g$- #GC7WQl %8h "v%J%D # " ƅ@ 9* 3C  B?~'H ][X u 2 [8J<@\M `EhA  9 Y! 0cXuM!  [/< T ^ &3 Qg; # :?$/ N  3Aj + 8'jn9@500U) gc@q /)')Oi JYZTf |sG;8%c Y0'm `>1{@hd9 b@)j\*0 ]H!uz&0o  X: q7#$!  \VjAG|m6J,qo 2 f4 X5jd 9L#( %8h 6% V ! # r ) Ap qs,$ C.^?+X+^F ;%)m O -  2 v<9u 6[s W p G-'D9p9%\&YMK N  hx. mgI  %SWp { )IdL $n9,jzgggcg.#8 v $z} _$)\ <lNBKp|mf3g7'L MT %8m W8O/g AuI|6 7( oT  (7 -v:&<&WF l0=; 2'~; {Lk5x|\.E$+!1 g H}&X 8*/Kr Sc4  k%\lvaB [vmwg'  (5V (Bd3T7;$( X, & 4F[**Fw4_ |T0BEhDX* v2l{" V:>J CN.3 Mg9#s>jM c| (:w en9;vggcg. T{(zLy: X)OHoK@NH+f|m> BzK%m  1)%\#eJr i_ Dx R1Wl  hv7M'm   S~ `jGMH'h~  0[)+J" a T+ !jc\. q +<BV3N ,K 3 g A|"jq ]Y =| {nn9Ehhch. #k$Y*m )X#4#7_A>'~" fro;i{o%m  H .GL$M1 .}>* &[N/D *vCTvF . [|7C6(?   jYXZU iWogGt' >9  9t 3\%" E  nk Ns3k % u1 C`v =|'E  J 0 vb4J6 ?r&7 )  c--?o +e me  {F.3 fg7%Sq  &S ,< '_0n9Mggcg.% | @  H$!)!s  y"PE?^fo M,JS%/m :gq6S ?REm7 (SBL!"'(US z?.|c +^T] .T'9b=T2F@ EM .$ Dwjxd) . UU  M .kp Y %T !X a   0h+ $ (5O lC)PI8{"/ |X` ${ 0[+ 9'> 7 3V e(B k),$8<S yH`3 g* %Sqcl } )Qkww !>en9,\`dc/! GF %@. H))G  #DQfGfa% /S%,d  jK Fo/ ,p c&&H T5 n  .'}'f%tDi5J mc  8* F %l p#('Jd ZK  $86 %gG~}mon{m 9 07 b(30 6"h ~TX! f $> 0[/|.lB,c + Y[ /H,U Ua3 gz;4%]gmu ~j WA N@Den9l|ggcg.C P%7)*Snl O,8fzAY"%m   q5C80*2 l Cqe " MO < m9) K+^3Mn  Zv8s3N>2+$ ? U% 7} A~ yok N *P= 0Ecx9%! {k&X'% ( 8,RJ7l 'm"TZ!L9  (Xh&P GX.3 Mg0shyr ds DG (n9r_g gc g. &p )LP^f^S-1fuFxA>Zx%m   3`J(Y $k E `i^ _zNTk U Fj9( ]#,R[ 3 CpLt )} ׍!|_ 8 W[% J %~%  ;&h 9 09 J0 KM6"h :AX % $> 0[0l<  7vOKj9( *>d^ a {%3+=. fMgDs ZN {7l(Hr 6n9>"g 55y kc<+i7 )* + {>a Fd aPH[0 W(hPLr` 84 3FQ PQ 364y1# H c ? &B=';// ?Q'F H$|-/fP  %8h "vp% fiMF pxEdqhU 9 )Y6q9CxAwz7#L R_#0 % t* &L` Y  Vi D=p0M NXG{MgI Wl  tKQ 7~ n90sggbg- H%`j)v:T>FT of.CCfqByB%m  d 5 {&n.H OK 7 l kUQK[ ]0 |8* =6h[a ^<?mM+C)E 5pC ? Yz%]Gg k g  (52^daLnx7H" v+zeo+ $ |a)7X 4. Lk ,q7l%3U@jUM3D b=:_g6y#y(kP _ U99m u,.yen9?]kkck. q"S~ l)_.9STpQ*:fTz9R{g%m .j%_&>; [UPT} =uLIK _6a(v  #+QI kfE}VhK7%( B#m 8 D{% Q,ng /2(j.f  (6n *DGv9%5 WEVLa& , bx8*{,w*g (?lqi^c$=- 8\p gCc/M 0J3 6 ^gN%VBj] d G { Zcn9? Csggog/ Q";S  )US#YSbI)~ fHn:F HtQ%   |.]$% )u7m YO2<b P,K5` 1 tFe5'eN }lw -_1Fe6td:Iy'M  .:> 1~%%s kV,vo&cbK  )599_ Uk7" ]fz % e)-JGj !tb8x'|&1 fqT Y-}N y>S 3 Mg1sl * /;H en9iq P Q Q" 3'J)xJ-C+^Cgfx.w?Bm `GXA%(   4i,(]j^ fQ  M KOVj <G6=(4 x Y>#5Eo d oIZj (; $dF?6 Q% p' X  ! .ah 9 (4 A*0+v6"h :?X ]: $> 0[)gf[y n+jfW=  #$ w M^&f j#c 3 PgE _ +fIof q $!eu<  t`2n9,ygOgcOg. h 2,2a)c59Arbx;Kia_Mm Y* %m u H& ! U5  A ~:3mg" > 'B# ?+w & #)Aq0!|{ O>K&lM1% )bbV! } 7aOdOQ= %$ L-! |Krv6#:*F  -Cz9@cw <(Iz. ] D2 S. 6(fj  3 U H  O.@X#u!O,q Z x Eg5 %SgS l y-T (in9@Oggtg?)g  Re g D&;!)~>Jxk \ {Y<d~{of0p S d#d3%cm Qu OdBA'60 ! ,$zT'C,teN ,d1$B o -uC` X<~vAfqCGEvVM1 & Zu~(' ~*t>UA X0k; 9nct A %J# p ? y/:( /X? ^l- 0>=&?(f \t B0 [4v"G3z >2 t e&xB `Z,% cS!M`)hG &F >. VgP N p ,TyR #In9: ggcg.%W F C. 4 4#})% y{>P Trfrz' )/g%Mm a -U' .E P#OU'<)cX 5W,;6+V$  Q 6 +^@4-&o|i α}) -.U[ n>oom | %Js" , ? & 8 y 9$ p,3$\ X]zu i. [.tO7h `:oK I, " d);c 6Q,#Ji  qx.3 MgHs#TsmN  )vf  n98G<bcb. cA- 0 +a)0k ajG@:`E*fe_5s. "99%%m , 39 plQ  c> bq" y$b)qe)+ rC&q )U:; 6 M"5maD -*#  scO(K R(G?  %8h %orLa#j\nfpi ,%y )x7/ER@R_7#) gYm}z& % Ps)UY?f W!OK uKV mn i)M CM.Mg8# bli $ + ?u ;on9DKggcg. v=%y){i;VA?XdE+af3u>ch %m   2H)) D`%n d  7:U :Y6]` "J pi7(  3edJ YuqTk$JUS(%, S' ; G% :o M , # .t$  m+9 M:v T9$J 53g sz )$  [/9cYux H.8L qC .$!  ">1 =5k EtRg.]p+sa$ D #cif#  $6n9%HYggcg.m 02'>)VAt `tc6 fa>Hvv S.%#K  y.I 3x9 E$ @ "[ "N2 ?=o3 = 0""#B -q[]!)] HIC$DK d! !;:j@'n %8q % J ]{$5z? 9% 1<4 GvDNO H1 :X9} 8//n[4\Ed @#(  VW \ A2 j X cPV=fgH i X uN L" YjF bn9xc. 8c+|7&@)sv2}uNL-l.fryE6 -j! %m   7:f ,/s]" ve  Z # 'h{ ZKk  TZ> 4:* iwKpH7q)y lx@Tm-  %8h %R^EqA  vm +iZ< V d ? uCU9_!M sa  9 t8CIV^ x .-r8b gEnli Y <S3 g$9Yd m^i 3qf v8n9vl ggig4 n&J=)G1d/olC+ Hf6|@# S\c% > k /O +T,'(m .d  p 0m& s Z oyBVg  r-8;)S w/Lle?r \\{zbNIP d+s  =O J%JYJ fpuc 9+i 6LH (N CHk165XB  ?.[;XU g ]!Q !7hK  p=9z fT 2KM. fMg7s- {N Xp H_ Cf &n9v, =d dc&SK  )n 'a[6{p9+3=f|E ._%m K ZB/Op,)t(Q %  .c/f%A  ] EdNVg g 7eD57(\ Y )Sl -w0bNF x*  %8h AAAAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤AAA큤A큤AA큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤AAA큤A큤A큤AAA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤A큤AA큤A큤AA큤UU4UGUGU5UGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGUGU5UFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUFUJU5UGUFUFUFUFUFUFUFUFUFUMUMU5UMUMUMUMU9UMUMUGUIUMUMUGUMUMUMUMUMUMUMUMUMUMUMUMUEUGUCUMUMUMUMUGUGUMUMUMUMUGUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUGUGUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUIUGUGUGUGUMUMUGUMUMUMUGUGUMUMUMUMUMUMUMUMUMUMUMUGUMUMUMUMUMUMUMU;UMU;UGUMUGUGU5UMUMUMUMUMUMUMUMUMUMUMUMUMUFUMUMUMUMUMU>UMUMUMUKUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUFUMUFUFUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUFUFUMUFUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUMUKU5UMUMUMUMUMUMUMUMUMUMURURU5URURURURU:URURUGURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURUDUGURUGURUGURURURURURURURURURURURURURURURURURURURURURURURURURURU;URU;UGUMUGUGU5URURURURURURURURURURURURURUHURU>URUMURU>URUMURU>URUMURURURURURURURURURURURURURURURUFURURURURURURURURURURURURURURURURURURURUMURURURURURURURURURURURURURURURURUFUFURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURURUKU5URURURURURURURURURURU_U_U5U_U_U_U_U:U_U_UGU_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_UGUGU_U_UGU_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U;U_U;UGUMUGUGU5U_U_U_U_U_U_U_U_U_U_U_U_U_U>U_U?U_UMUYUFU_UMUYUMU_UMUYU_U_U_U_U_U_U_U_U_U_U_U_U_U_UFU_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_UFU_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_UFUFU_UFU_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_UMU5U_U_U_U_U_U_U_U_U_U_UdUdU5UdUdUdUdU:UdUdUGUDUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUCUdUdUdUdUGUGUdUdUdUdUGUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUGUGUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdU9UGUdUdUGUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUGUdUdUdUdUdUdUdU;UdU?UGUGUGUGU5UdUdUdUdUdUdUdUdUdUdUdUdUdUDUdUdUdUdUdUHUdUdUdUHUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUFUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUFUFUdURUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUdUHU5UdUdUdUdUdUdUdUdUdUdUiUiU5UiUiUiUiU:UiUiUGUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUGUiUiUGUiUiUiUGUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiU;UiUiUiUiUGUGU5UiUiUiUiUiUiUiUiUiUiUiUiUiUDUiUiUiUiUiUKUiUiUiUKUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUFUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUFUiUiURUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUiUKU5UiUiUiUiUiUiUiUiUiUiUnUnU5UnUnUnUnU:UnUnUGUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUGUnUGUnUGUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnU;UnUnUnUnUGUGU5UnUnUnUnUnUnUnUnUnUnUnUnUnUHUnU>UnUMUnUFUnUMUYUJUnUMUYUnUnUnUnUnUnUnUnUnUnUnUnUnUnUFUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUMUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUFUFUnUFUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUnUJU5UnUnUnUnUnUnUnUnUnUnUsUsU5UsUsUsUsU:UsUsUGUEUsUsUGUsUsUsUsUsUsUsUsUsUsUsUsUEUGUCUsUsUsUsUGUGUsUsUsUsUGUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUGUGUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUGUGUGUsUsUGUsUsUsUsUGUsUsUsUsUsUsUsUsUsUsUsUGUsUsUsUsUsUsUsU;UsU;UGUMUGUGU5UsUsUsUsUsUsUsUsUsUsUsUsUsUFUsU>UsUMUsU>UsUMUsUIUsUMUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUFUsUFUFUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUFUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUFUFUsUFUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUsUIU5UsUsUsUsUsUsUsUsUsUsUxUxU5UxUxUxUxU:UxUxUGUHUxUxUxUxUxUxUxUxUMUxUxUxUxUxUxUxUxUHUxUxUxUxUxUxUxUGUxUxUYUxUxUxUxUxUxUxUxUMUxUxUxUxUxUMUxUxUxUxUxUxUxUxUxUxUYUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUHUGUGUxUGUxUxUxUxU_UxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxU;UxU;UGUMUGUGU5UxUxUxUxUxUxUxUxUxUxUxUxUxUHUxU?UxUMUYUFUxUMUYUFUxUMUYUxUxUxUxUxUxUxUxUxUxUxUxUxUxUFUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUFUxUxUxUxUsUxUxUxUxUxUxUxUxUxUxUxUFUFUxURUxU_UxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUxUHU5UxUxUxUxUxUxUxUxUxUxU}U}U5U}U}U}U}U:U}U}UGU}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}UCUGUGUGUGUGUGUGUGU}U}UGUGU}U}UGU}U}UGUGUGUGU}U}U}UGUGU}U}U}U}U}UxUGUGU}UGUGU}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U9U}U}UGU}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U;U}U?UGUGUGUGU5U}U}U}U}U}U}U}U}U}U}U}U}U}UHU}U?U}UMUYU>U}UMU}U>U}UMU}U}U}U}U}U}U}U}U}U}U}U}U}U}U}UFU}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}UMUGUFUFU}U}U}U}U}U}U}U}U}U}U}U}U}UFUFU}URU}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}U}ULU5U}U}U}U}U}U}U}U}U}U}UUU5UUUUU:UUUGUIUUUGUUUUUUUUUUUUUEUGUCUUGUGUUGUGUUUUUGUUUUUUUUUUUUUUGUGUUUUUUUUUUGUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUIUGUGUUUUGUUGUUUUGUGUUUUUUUUUUUUGUUUUUUUU;UU?UGUGUGUGU5UUUUUUUUUUUUUUFUUFUUFUUFUUFUYUJUUFUYUUUUUUFUUUUUUUUUFUUFUFUUUUUUUUUUUUUUUUUUCUUFUUUUUUUUUUUUUUFUFUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUJU5UUUUUFUFUFUFUUUUU5UUUUU:UUUGUEUUUGUUUUUUUUUUUUUEUGUCUGUUUUGUGUUUUUGUUUUUUUUUUUUUUGUGUUUUUUUUUUGUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU9UUUGUUUUUUUUUUGUUUUUUUUUUUUGUUUUUUUU;UU?UGUGUGUGU5UUUUUUUUUUUUUUFUUUUUUJUUUUJUUUUUUUUUUUUUUUUUUFUUFUFUUUUUUUUUUUUUUUUUUCUUFUUUUUUUUUUUUUUUUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUJU5UUUUUFUFUFUFUUUUU5UUUUU:UUUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUFUU_UUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU;UU;UGUMUGUGU5UUUUUUUUUUUUUU>UU?UUMUYUFUUMUYUKUUMUYUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUFUFUUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUKU5UUUUUUUUUUUUU5UUUUULUUUGULUUUGUUUxUUUMUUUUUUUUULUUUGUGUGUGUUGUUUGUxUUUGU}UUUUUGU}UU}UUGUxUUxUUUUUGUUGUGUUUUUUUUUUULUUUUUUUULUUUUUULUUUUUUUUUUUUUUUUUUUUUUUULUUUUUUJUGUGUGUUGUGUUUUnUUUUUUUUUUUUUGUUUUUUUU;UU;UGUMUGUGU5UUUUUUHUFUULUUMUUULUU?UUMUYUHUxUMUYUHUxUMUYUHUxUUUUFUUUUUUUUUFUUUFUUUUUUUUUUUUUUUUxUMUGUFUFUUUUUUUUUUUUUUFUFUURUUUUUUUUUUCUFUUUUUUUUUUUUUUUUUUFULUULUUUFUUUUUUUUUUUUUULUUUUUUUUUUUULUUUUUUUUUUULUUUUUULUUUUUUUUULUUUULUUUUULUUULUUUULUUUUUUUUUUUUMU5UUUUUHUUUUUFUUU5UUUUU:UUUGUUUUUUUUUUUUUUUUUUUBUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUxUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUIUGUGU_UGUGUUUUGUUUUUUUUUUUUUUUUUUUUUUUUU;UU;UGUMUGUGU5UUUUUUUUUUUUUUIUUDUUMUU>UUMUU>UUMUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUFUFUURUUUUUUUUUUCUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUKUUUUUUUUKUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUKU5UUUUUUUUUUUUU5UUUUU:UUUGUJUUUUUUUUUUUUUUUUUUIUUUUUUUUUUUYUUUUUUUUUUUUUUUUUUUUUUUUUUYUUUUUUUUJUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU9UGUGUUUUUUUURUUUUUUUUUUUUUUUUUUUUU;UU;UGUMUGUGU5UUUUUUJUFUUUUUUUJUU?UUMUYU>UUMUUJUUMUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUMUUUUUUUUUUUUUUUUUFUFUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUJUUUUUUUUUUUUUUUUUUUUUUUUUJUUUUUURUUUUUJUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUJU5UUUUUUUUUUUUU5UUUUU:UUUGUUUUUUUUUUUUUUUUUUUCUGUGUGUGUGUGUGUGU}U}UGUGU}U}UGU}U}UGUGUGUGU}U}U}UGUGU}U}U}U}U}UxUGUGU}UGUGU}UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUIUGUUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUU;UU?UUGUGUGU5UUUUUUKUUUUUUUUKUUIUUUUIUUUYUKUUUYUUUUUUFUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUUGUFUFUUUUUUUUUUUUUUFUFUURUUUUUUUUUUCUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUKU5UUUUUUUUUUUUU5UUUUU:UUUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUHUUGU_UUUGUUUGUUUUUUUUUUUUUUUUUUUUUUUUU;UU?UUGUGUGU5UUUUUUUUUUUUUUHUU?UUMUYU>UUMUUHUUMUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUMUUUUUUUUUUUUUUUUUFUFUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUHU5UUUUUUUUUUUUU5UUUUU:UUUGUGUUUGUUUGUUUUUUUUUUEUGUGUGUGUGUGUGUGUGUGUUUGUGUUUGUUUGUGUGUGUUUUGUGUxUUUUUxUGUGUUGUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUGUGUUGUGUUUGUUUGUUGUUUUUUUUUUUUGUUUUUUUU;UU?UGUGUGUGU5UUUUUUHUFUUUUUUUGUUUUUUGUUUUHUUUUUUUUUFUUUUFUFUUUUFUUFUFUUUUUUUUUUUUUUUUUUGUFUFUUUUUUUUUUUUUUYUFUUUUUUUUUUUUCUFUUUUUUUUUUUUUUUUUUFUUUGUUUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUGU5UUUUUHUFUFUFUFUFUUU5UUUUU:UUUGUUUUUUUUUUUUUUUUUUU9UUUUUUUUUUUYUUUUUUUUUUUUUUUMUMUUUUUMUUUUUYUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU9UUGUUUGUUU}UUUUUUUUUUUUUUUUUUUUUUUUU;UU;UGUMUGUGU5UUUUUUUUUUUUUU>UU?UUUYU?UUUU>UUMUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUFUFUUFUUUUUU?UUMUYUFUUMUYUJUUMUYUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUFUFUUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUJU5UUUUUUUUUUUUU5UUUUU:UUUGUIUUUGUUUUUUUUUUUUUEUGUIUGUGUGUGUGUGUUUUUGUGUUUUUUGUGUUUUUUGUGUUUUUUUUUUGUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUIUU_UUGUUUUUUGUGUGUUUUUUUUUUUUGUUUUUUUU;UU?UGUGUGUGU5UUUUUUHUFUUUUUUUIUUUUUUIUUUUIUUUUUUUUUFUUUUUUUUUFUUFUFUUUUUUUUUUUUUUUUUUCUUFUUUUUUUUUUUUUUFUFUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUFUUUGUUUFUUUUUUUUUUUUUUUUUUUUUUUUUUIUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUIU5UUUUUHUFUFUFUFUFUUU5UUUUU:UUUGUEUUUGUUUUUUUUUUUUUEUGUCUUGUGUUGUGUUUUUGUUUUUUUUUUUUUUGUGUUUUUUUUUUGUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU9UGUUGUUUUUUUGUUGUUUUUUUUUUUUGUUUUUUUU;UU?UUGUGUGU5UUUUUUUUUUUUUUIUUUUUULUUUULUUUUUUUUUFUUUUUUUUUFUUFUFUUUUUUUUUUUUUUUUUUCUUFUUUUUUUUUUUUUUFUFUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUULU5UUUUUFUFUFUFUUUUU5UUUUU:UUUGUDUUUUUUUUUUUUUUUUUUCUUGUGUGUGUGUUGUUUGUUUUUUUGUGUGUGUUUUGUGUUUUUUUUUUGUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUGUGUUUUGUUUUnUUUUUUUUUUUUUGUUUUUUUU;UU?UGUGUGUGU5UUUUUUUUUUUUUUGUUUUUUKUUUUKUUUUUUUUUUUUUFUUUUUFUUUFUUUUUUUUUUUUUUUUUUGUFUFUUUUUUUUUUUUUUUUUUUUUUUUUUUCUFUUUUUUUUUUUUUUUUUUUUUGUUUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUKU5UUUUUHUFUFUFUFUFU U U5U U U U U:U U UGUEU U UGU U U U U U U U U U U U UEUGUCU UGUGU UGUGU U U U UGU U U U U U U U U U U U U UGUGU U U U U UxU U U UGUGU U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U9UGU UGU U U U U UGU UGU U U U U U U U U U U UGU U U U U U U UUUMUUHUUMUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUMUUUUUUUUUUUUUUUUUFUFUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUHU5UUUUUUUUUUU U U5U U U U U:U U UGU U U U U U U U U U U U U U U U U U U9U U U U U U U U U U UYU U U U U U U U U U U U U U U U U U U U U U U U U UYU U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U UIUGUGUGU U U UGU U U U U U U U U U U U U U U U U U U U U U U U UU UMU U>U UMU U U U U U U U U U U U U U U UFU U U U U U U U U U U U U U U U U U U UMU U U U U U U U U U U U U U U U UFUFU URU U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U U UIU5U U U U U U U U U U U%U%U5U%U%U%U%U:U%U%UGU%UJUU%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U9UGU%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%U%UU@UMU@U>U@UMU@UIU@UMU@U@U@U@U@U@U@U@U@U@U@U@U@U@U@UFU@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@UFU@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@UFUFU@URU@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@U@UIU5U@U@UIU5U@U@U@U@U@U@U@U@U@U@UEUEU5UEUEUEUEU:UEUEUGUEUEUEUGUEUEUEUEUEUEUEUEUEUEUEUEUEUGUHUxUGUGUEUGUGUEUEUEUEUGUEUEUEUEUEUEUEUEUEUEUEUEUEUGUGUEUEUEUEUEUEUEUEUEUGUGUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEUEULUGUGUGUEUEUEUUEUEUGUEUGUEUEUEUEUEUEUEUEUEUEUEUGUEUEUEUEUEUEUEUUZUMUZUKUZUMUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUFUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUdUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUFUFUZURUZUZUZUZUZUZUZUZUZUZUZUUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUZUKU5UZUZUZUZUZUZUZUZUZUZU_U_U5U_U_U_U_U:U_U_UGU_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_UGU_UGU_U_U_U_UGU_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_U_UUU?UUMUYU>UUMUUJUUMUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUFUFUUFUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUJU5UUUUUUUUUUUUU5UUUUU:UUUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUIUUGUGUGUUUGUUUUUUUUUUUUUUUUUUUUUUUUUUUMUUJUUMUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUUUUFUUUUUUUUUUUUUUUUUFUFUURUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUJU5UUUUUUUUUUUUU5UUUUU:UUUGUEUUUGUUUUUUUUUUUUUEUGUCUUUUUGUGUUUUUGUUUUUUUUUUUUUUUUUUUUUUUUUGUGUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUGUGU_UUGUUUUUUUUUGUUUUUUUUUUUUGUUUUUUUUU$U?U$UMU$U?U$UMU$UKU$UMU$U$U$U$U$U$U$U$U$U$U$U$U$U$U$UFU$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$UFU$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$UFUFU$UFU$U$U$UA@O 24.0 build system- update to Firefox 28.0 (bnc#868603) * MFSA 2014-15/CVE-2014-1493/CVE-2014-1494 Miscellaneous memory safety hazards * MFSA 2014-17/CVE-2014-1497 (bmo#966311) Out of bounds read during WAV file decoding * MFSA 2014-18/CVE-2014-1498 (bmo#935618) crypto.generateCRMFRequest does not validate type of key * MFSA 2014-19/CVE-2014-1499 (bmo#961512) Spoofing attack on WebRTC permission prompt * MFSA 2014-20/CVE-2014-1500 (bmo#956524) onbeforeunload and Javascript navigation DOS * MFSA 2014-22/CVE-2014-1502 (bmo#972622) WebGL content injection from one domain to rendering in another * MFSA 2014-23/CVE-2014-1504 (bmo#911547) Content Security Policy for data: documents not preserved by session restore * MFSA 2014-26/CVE-2014-1508 (bmo#963198) Information disclosure through polygon rendering in MathML * MFSA 2014-27/CVE-2014-1509 (bmo#966021) Memory corruption in Cairo during PDF font rendering * MFSA 2014-28/CVE-2014-1505 (bmo#941887) SVG filters information disclosure through feDisplacementMap * MFSA 2014-29/CVE-2014-1510/CVE-2014-1511 (bmo#982906, bmo#982909) Privilege escalation using WebIDL-implemented APIs * MFSA 2014-30/CVE-2014-1512 (bmo#982957) Use-after-free in TypeObject * MFSA 2014-31/CVE-2014-1513 (bmo#982974) Out-of-bounds read/write through neutering ArrayBuffer objects * MFSA 2014-32/CVE-2014-1514 (bmo#983344) Out-of-bounds write through TypedArrayObject after neutering - requires NSPR 4.10.3 and NSS 3.15.5 - new build dependency (and recommends): * libpulse - update of PowerPC 64 patches (bmo#976648) (pcerny@suse.com) - rebased patches- update to Firefox 27.0.1 * Fixed stability issues with Greasemonkey and other JS that used ClearTimeoutOrInterval * JS math correctness issue (bmo#941381) - incorporate Google API key for geolocation (bnc#864170) - updated list of "other" locales in RPM requirements- update to Firefox 27.0 (bnc#861847) * MFSA 2014-01/CVE-2014-1477/CVE-2014-1478 Miscellaneous memory safety hazards (rv:27.0 / rv:24.3) * MFSA 2014-02/CVE-2014-1479 (bmo#911864) Clone protected content with XBL scopes * MFSA 2014-03/CVE-2014-1480 (bmo#916726) UI selection timeout missing on download prompts * MFSA 2014-04/CVE-2014-1482 (bmo#943803) Incorrect use of discarded images by RasterImage * MFSA 2014-05/CVE-2014-1483 (bmo#950427) Information disclosure with *FromPoint on iframes * MFSA 2014-06/CVE-2014-1484 (bmo#953993) Profile path leaks to Android system log * MFSA 2014-07/CVE-2014-1485 (bmo#910139) XSLT stylesheets treated as styles in Content Security Policy * MFSA 2014-08/CVE-2014-1486 (bmo#942164) Use-after-free with imgRequestProxy and image proccessing * MFSA 2014-09/CVE-2014-1487 (bmo#947592) Cross-origin information leak through web workers * MFSA 2014-10/CVE-2014-1489 (bmo#959531) Firefox default start page UI content invokable by script * MFSA 2014-11/CVE-2014-1488 (bmo#950604) Crash when using web workers with asm.js * MFSA 2014-12/CVE-2014-1490/CVE-2014-1491 (bmo#934545, bmo#930874, bmo#930857) NSS ticket handling issues * MFSA 2014-13/CVE-2014-1481(bmo#936056) Inconsistent JavaScript handling of access to Window objects - requires NSS 3.15.4 or higher - rebased/reworked patches - removed obsolete mozilla-bug929439.patch- Add support for powerpc64le-linux. * mozilla-ppc64le.patch: general support * mozilla-libffi-ppc64le.patch: libffi backport * mozilla-xpcom-ppc64le.patch: port xpcom - Add build fix from mainline. * mozilla-bug929439.patch- update to Firefox 26.0 (bnc#854367, bnc#854370) * rebased patches * requires NSPR 4.10.2 and NSS 3.15.3.1 * MFSA 2013-104/CVE-2013-5609/CVE-2013-5610 Miscellaneous memory safety hazards * MFSA 2013-105/CVE-2013-5611 (bmo#771294) Application Installation doorhanger persists on navigation * MFSA 2013-106/CVE-2013-5612 (bmo#871161) Character encoding cross-origin XSS attack * MFSA 2013-107/CVE-2013-5614 (bmo#886262) Sandbox restrictions not applied to nested object elements * MFSA 2013-108/CVE-2013-5616 (bmo#938341) Use-after-free in event listeners * MFSA 2013-109/CVE-2013-5618 (bmo#926361) Use-after-free during Table Editing * MFSA 2013-110/CVE-2013-5619 (bmo#917841) Potential overflow in JavaScript binary search algorithms * MFSA 2013-111/CVE-2013-6671 (bmo#930281) Segmentation violation when replacing ordered list elements * MFSA 2013-112/CVE-2013-6672 (bmo#894736) Linux clipboard information disclosure though selection paste * MFSA 2013-113/CVE-2013-6673 (bmo#970380) Trust settings for built-in roots ignored during EV certificate validation * MFSA 2013-114/CVE-2013-5613 (bmo#930381, bmo#932449) Use-after-free in synthetic mouse movement * MFSA 2013-115/CVE-2013-5615 (bmo#929261) GetElementIC typed array stubs can be generated outside observed typesets * MFSA 2013-116/CVE-2013-6629/CVE-2013-6630 (bmo#891693) JPEG information leak * MFSA 2013-117 (bmo#946351) Mis-issued ANSSI/DCSSI certificate (fixed via NSS 3.15.3.1) - removed gecko.js preference file as GStreamer is enabled by default now- update to Firefox 25.0 (bnc#847708) * rebased patches * requires NSS 3.15.2 or above * MFSA 2013-93/CVE-2013-5590/CVE-2013-5591/CVE-2013-5592 Miscellaneous memory safety hazards * MFSA 2013-94/CVE-2013-5593 (bmo#868327) Spoofing addressbar through SELECT element * MFSA 2013-95/CVE-2013-5604 (bmo#914017) Access violation with XSLT and uninitialized data * MFSA 2013-96/CVE-2013-5595 (bmo#916580) Improperly initialized memory and overflows in some JavaScript functions * MFSA 2013-97/CVE-2013-5596 (bmo#910881) Writing to cycle collected object during image decoding * MFSA 2013-98/CVE-2013-5597 (bmo#918864) Use-after-free when updating offline cache * MFSA 2013-99/CVE-2013-5598 (bmo#920515) Security bypass of PDF.js checks using iframes * MFSA 2013-100/CVE-2013-5599/CVE-2013-5600/CVE-2013-5601 (bmo#915210, bmo#915576, bmo#916685) Miscellaneous use-after-free issues found through ASAN fuzzing * MFSA 2013-101/CVE-2013-5602 (bmo#897678) Memory corruption in workers * MFSA 2013-102/CVE-2013-5603 (bmo#916404) Use-after-free in HTML document templates- as GStreamer is not automatically required anymore but loaded dynamically if available, require it explicitely - recommend optional GStreamer plugins for comprehensive media support- move greek to the translations-common package (bnc#840551)- update to Firefox 24.0 (bnc#840485) * MFSA 2013-76/CVE-2013-1718/CVE-2013-1719 Miscellaneous memory safety hazards * MFSA 2013-77/CVE-2013-1720 (bmo#888820) Improper state in HTML5 Tree Builder with templates * MFSA 2013-78/CVE-2013-1721 (bmo#890277) Integer overflow in ANGLE library * MFSA 2013-79/CVE-2013-1722 (bmo#893308) Use-after-free in Animation Manager during stylesheet cloning * MFSA 2013-80/CVE-2013-1723 (bmo#891292) NativeKey continues handling key messages after widget is destroyed * MFSA 2013-81/CVE-2013-1724 (bmo#894137) Use-after-free with select element * MFSA 2013-82/CVE-2013-1725 (bmo#876762) Calling scope for new Javascript objects can lead to memory corruption * MFSA 2013-85/CVE-2013-1728 (bmo#883686) Uninitialized data in IonMonkey * MFSA 2013-88/CVE-2013-1730 (bmo#851353) Compartment mismatch re-attaching XBL-backed nodes * MFSA 2013-89/CVE-2013-1732 (bmo#883514) Buffer overflow with multi-column, lists, and floats * MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301) Memory corruption involving scrolling * MFSA 2013-91/CVE-2013-1737 (bmo#907727) User-defined properties on DOM proxies get the wrong "this" object * MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897) GC hazard with default compartments and frame chain restoration - enable gstreamer explicitely via pref (gecko.js) - require NSS 3.15.1- update to Firefox 23.0.1 * Audio static/"burble"/breakup in Firefox to Firefox WebRTC calls (bmo#901527)- update to Firefox 23.0 (bnc#833389) * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702 Miscellaneous memory safety hazards * MFSA 2013-64/CVE-2013-1704 (bmo#883313) Use after free mutating DOM during SetBody * MFSA 2013-65/CVE-2013-1705 (bmo#882865) Buffer underflow when generating CRMF requests * MFSA 2013-67/CVE-2013-1708 (bmo#879924) Crash during WAV audio file decoding * MFSA 2013-68/CVE-2013-1709 (bmo#838253) Document URI misrepresentation and masquerading * MFSA 2013-69/CVE-2013-1710 (bmo#871368) CRMF requests allow for code execution and XSS attacks * MFSA 2013-70/CVE-2013-1711 (bmo#843829) Bypass of XrayWrappers using XBL Scopes * MFSA 2013-72/CVE-2013-1713 (bmo#887098) Wrong principal used for validating URI for some Javascript components * MFSA 2013-73/CVE-2013-1714 (bmo#879787) Same-origin bypass with web workers and XMLHttpRequest * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397) Local Java applets may read contents of local file system - requires NSPR 4.10 and NSS 3.15- fix build on ARM (/-g/ matches /-grecord-switches/)- update to Firefox 22.0 (bnc#825935) * removed obsolete patches + mozilla-qcms-ppc.patch + mozilla-gstreamer-760140.patch * GStreamer support does not build on 12.1 anymore (build only on 12.2 and later) * MFSA 2013-49/CVE-2013-1682/CVE-2013-1683 Miscellaneous memory safety hazards * MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686 Memory corruption found using Address Sanitizer * MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823) Privileged content access and execution via XBL * MFSA 2013-52/CVE-2013-1688 (bmo#873966) Arbitrary code execution within Profiler * MFSA 2013-53/CVE-2013-1690 (bmo#857883) Execution of unmapped memory through onreadystatechange event * MFSA 2013-54/CVE-2013-1692 (bmo#866915) Data in the body of XHR HEAD requests leads to CSRF attacks * MFSA 2013-55/CVE-2013-1693 (bmo#711043) SVG filters can lead to information disclosure * MFSA 2013-56/CVE-2013-1694 (bmo#848535) PreserveWrapper has inconsistent behavior * MFSA 2013-57/CVE-2013-1695 (bmo#849791) Sandbox restrictions not applied to nested frame elements * MFSA 2013-58/CVE-2013-1696 (bmo#761667) X-Frame-Options ignored when using server push with multi-part responses * MFSA 2013-59/CVE-2013-1697 (bmo#858101) XrayWrappers can be bypassed to run user defined methods in a privileged context * MFSA 2013-60/CVE-2013-1698 (bmo#876044) getUserMedia permission dialog incorrectly displays location * MFSA 2013-61/CVE-2013-1699 (bmo#840882) Homograph domain spoofing in .com, .net and .name- Fix qcms altivec include (mozilla-qcms-ppc.patch)- update to Firefox 21.0 (bnc#819204) * removed upstreamed patch firefox-712763.patch * removed disabled mozilla-disable-neon-option.patch * MFSA 2013-41/CVE-2013-0801/CVE-2013-1669 Miscellaneous memory safety hazards * MFSA 2013-42/CVE-2013-1670 (bmo#853709) Privileged access for content level constructor * MFSA 2013-43/CVE-2013-1671 (bmo#842255) File input control has access to full path * MFSA 2013-46/CVE-2013-1674 (bmo#860971) Use-after-free with video and onresize event * MFSA 2013-47/CVE-2013-1675 (bmo#866825) Uninitialized functions in DOMSVGZoomEvent * MFSA 2013-48/CVE-2013-1676/CVE-2013-1677/CVE-2013-1678/ CVE-2013-1679/CVE-2013-1680/CVE-2013-1681 Memory corruption found using Address Sanitizer- revert to use GStreamer 0.10 on 12.3 (bnc#814101) (remove mozilla-gstreamer-1.patch)- Explicitly disable WebRTC support on non-x86, the configure script disables it only half-heartedly- update to Firefox 20.0 (bnc#813026) * requires NSPR 4.9.5 and NSS 3.14.3 * mozilla-webrtc-ppc.patch included upstream * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789 Miscellaneous memory safety hazards * MFSA 2013-31/CVE-2013-0800 (bmo#825721) Out-of-bounds write in Cairo library * MFSA 2013-35/CVE-2013-0796 (bmo#827106) WebGL crash with Mesa graphics driver on Linux * MFSA 2013-36/CVE-2013-0795 (bmo#825697) Bypass of SOW protections allows cloning of protected nodes * MFSA 2013-37/CVE-2013-0794 (bmo#626775) Bypass of tab-modal dialog origin disclosure * MFSA 2013-38/CVE-2013-0793 (bmo#803870) Cross-site scripting (XSS) using timed history navigations * MFSA 2013-39/CVE-2013-0792 (bmo#722831) Memory corruption while rendering grayscale PNG images - use GStreamer 1.0 starting with 12.3 (mozilla-gstreamer-1.patch)- build fixes for armv7hl: * disable debug build as armv7hl does not have enough memory * disable webrtc on armv7hl as it is non-compiling- update to Firefox 19.0.2 (bnc#808243) * MFSA 2013-29/CVE-2013-0787 (bmo#848644) Use-after-free in HTML Editor- update to Firefox 19.0.1 * blocklist updates- update to Firefox 19.0 (bnc#804248) * MFSA 2013-21/CVE-2013-0783/2013-0784 Miscellaneous memory safety hazards * MFSA 2013-22/CVE-2013-0772 (bmo#801366) Out-of-bounds read in image rendering * MFSA 2013-23/CVE-2013-0765 (bmo#830614) Wrapped WebIDL objects can be wrapped again * MFSA 2013-24/CVE-2013-0773 (bmo#809652) Web content bypass of COW and SOW security wrappers * MFSA 2013-25/CVE-2013-0774 (bmo#827193) Privacy leak in JavaScript Workers * MFSA 2013-26/CVE-2013-0775 (bmo#831095) Use-after-free in nsImageLoadingContent * MFSA 2013-27/CVE-2013-0776 (bmo#796475) Phishing on HTTPS connection through malicious proxy * MFSA 2013-28/CVE-2013-0780/CVE-2013-0782/CVE-2013-0777/ CVE-2013-0778/CVE-2013-0779/CVE-2013-0781 Use-after-free, out of bounds read, and buffer overflow issues found using Address Sanitizer - removed obsolete patches * mozilla-webrtc.patch * mozilla-gstreamer-803287.patch - added patch to fix session restore window order (bmo#712763)- update to Firefox 18.0.2 * blocklist and CTP updates * fixes in JS engine- update to Firefox 18.0.1 * blocklist updates * backed out bmo#677092 (removed patch) * fixed problems involving HTTP proxy transactions- Fix WebRTC to build on powerpc- update to Firefox 18.0 (bnc#796895) * MFSA 2013-01/CVE-2013-0749/CVE-2013-0769/CVE-2013-0770 Miscellaneous memory safety hazards * MFSA 2013-02/CVE-2013-0760/CVE-2013-0762/CVE-2013-0766/CVE-2013-0767 CVE-2013-0761/CVE-2013-0763/CVE-2013-0771/CVE-2012-5829 Use-after-free and buffer overflow issues found using Address Sanitizer * MFSA 2013-03/CVE-2013-0768 (bmo#815795) Buffer Overflow in Canvas * MFSA 2013-04/CVE-2012-0759 (bmo#802026) URL spoofing in addressbar during page loads * MFSA 2013-05/CVE-2013-0744 (bmo#814713) Use-after-free when displaying table with many columns and column groups * MFSA 2013-06/CVE-2013-0751 (bmo#790454) Touch events are shared across iframes * MFSA 2013-07/CVE-2013-0764 (bmo#804237) Crash due to handling of SSL on threads * MFSA 2013-08/CVE-2013-0745 (bmo#794158) AutoWrapperChanger fails to keep objects alive during garbage collection * MFSA 2013-09/CVE-2013-0746 (bmo#816842) Compartment mismatch with quickstubs returned values * MFSA 2013-10/CVE-2013-0747 (bmo#733305) Event manipulation in plugin handler to bypass same-origin policy * MFSA 2013-11/CVE-2013-0748 (bmo#806031) Address space layout leaked in XBL objects * MFSA 2013-12/CVE-2013-0750 (bmo#805121) Buffer overflow in Javascript string concatenation * MFSA 2013-13/CVE-2013-0752 (bmo#805024) Memory corruption in XBL with XML bindings containing SVG * MFSA 2013-14/CVE-2013-0757 (bmo#813901) Chrome Object Wrapper (COW) bypass through changing prototype * MFSA 2013-15/CVE-2013-0758 (bmo#813906) Privilege escalation through plugin objects * MFSA 2013-16/CVE-2013-0753 (bmo#814001) Use-after-free in serializeToStream * MFSA 2013-17/CVE-2013-0754 (bmo#814026) Use-after-free in ListenerManager * MFSA 2013-18/CVE-2013-0755 (bmo#814027) Use-after-free in Vibrate * MFSA 2013-19/CVE-2013-0756 (bmo#814029) Use-after-free in Javascript Proxy objects - requires NSS 3.14.1 (MFSA 2013-20, CVE-2013-0743) - removed obsolete SLE11 patches (mozilla-gcc43*) - reenable WebRTC - added mozilla-libproxy-compat.patch for libproxy API compat on openSUSE 11.2 and earlier - backed out restartless language packs as it broke multi-locale setup (bmo#677092, bmo#818468)- update to Firefox 17.0.1 * revert some useragent changes introduced in 17.0 * leaving private browsing with social enabled doesn't reset all social components (bmo#815042) - fix KDE integration for file dialogs- update to Firefox 17.0 (bnc#790140) * MFSA 2012-91/CVE-2012-5842/CVE-2012-5843 Miscellaneous memory safety hazards * MFSA 2012-92/CVE-2012-4202 (bmo#758200) Buffer overflow while rendering GIF images * MFSA 2012-93/CVE-2012-4201 (bmo#747607) evalInSanbox location context incorrectly applied * MFSA 2012-94/CVE-2012-5836 (bmo#792857) Crash when combining SVG text on path with CSS * MFSA 2012-95/CVE-2012-4203 (bmo#765628) Javascript: URLs run in privileged context on New Tab page * MFSA 2012-96/CVE-2012-4204 (bmo#778603) Memory corruption in str_unescape * MFSA 2012-97/CVE-2012-4205 (bmo#779821) XMLHttpRequest inherits incorrect principal within sandbox * MFSA 2012-99/CVE-2012-4208 (bmo#798264) XrayWrappers exposes chrome-only properties when not in chrome compartment * MFSA 2012-100/CVE-2012-5841 (bmo#805807) Improper security filtering for cross-origin wrappers * MFSA 2012-101/CVE-2012-4207 (bmo#801681) Improper character decoding in HZ-GB-2312 charset * MFSA 2012-102/CVE-2012-5837 (bmo#800363) Script entered into Developer Toolbar runs with chrome privileges * MFSA 2012-103/CVE-2012-4209 (bmo#792405) Frames can shadow top.location * MFSA 2012-104/CVE-2012-4210 (bmo#796866) CSS and HTML injection through Style Inspector * MFSA 2012-105/CVE-2012-4214/CVE-2012-4215/CVE-2012-4216/ CVE-2012-5829/CVE-2012-5839/CVE-2012-5840/CVE-2012-4212/ CVE-2012-4213/CVE-2012-4217/CVE-2012-4218 Use-after-free and buffer overflow issues found using Address Sanitizer * MFSA 2012-106/CVE-2012-5830/CVE-2012-5833/CVE-2012-5835/CVE-2012-5838 Use-after-free, buffer overflow, and memory corruption issues found using Address Sanitizer - rebased patches - disabled WebRTC since build is broken (bmo#776877)- build on SLE11 * mozilla-gcc43-enums.patch * mozilla-gcc43-template_hacks.patch * mozilla-gcc43-templates_instantiation.patch- update to Firefox 16.0.2 (bnc#786522) * MFSA 2012-90/CVE-2012-4194/CVE-2012-4195/CVE-2012-4196 (bmo#800666, bmo#793121, bmo#802557) Fixes for Location object issues - bring back Obsoletes for libproxy's mozjs plugin for distributions before 12.2 to avoid crashes- update to Firefox 16.0.1 (bnc#783533) * MFSA 2012-88/CVE-2012-4191 (bmo#798045) Miscellaneous memory safety hazards * MFSA 2012-89/CVE-2012-4192/CVE-2012-4193 (bmo#799952, bmo#720619) defaultValue security checks not applied- update to Firefox 16.0 (bnc#783533) * MFSA 2012-74/CVE-2012-3982/CVE-2012-3983 Miscellaneous memory safety hazards * MFSA 2012-75/CVE-2012-3984 (bmo#575294) select element persistance allows for attacks * MFSA 2012-76/CVE-2012-3985 (bmo#655649) Continued access to initial origin after setting document.domain * MFSA 2012-77/CVE-2012-3986 (bmo#775868) Some DOMWindowUtils methods bypass security checks * MFSA 2012-79/CVE-2012-3988 (bmo#725770) DOS and crash with full screen and history navigation * MFSA 2012-80/CVE-2012-3989 (bmo#783867) Crash with invalid cast when using instanceof operator * MFSA 2012-81/CVE-2012-3991 (bmo#783260) GetProperty function can bypass security checks * MFSA 2012-82/CVE-2012-3994 (bmo#765527) top object and location property accessible by plugins * MFSA 2012-83/CVE-2012-3993/CVE-2012-4184 (bmo#768101, bmo#780370) Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties * MFSA 2012-84/CVE-2012-3992 (bmo#775009) Spoofing and script injection through location.hash * MFSA 2012-85/CVE-2012-3995/CVE-2012-4179/CVE-2012-4180/ CVE-2012-4181/CVE-2012-4182/CVE-2012-4183 Use-after-free, buffer overflow, and out of bounds read issues found using Address Sanitizer * MFSA 2012-86/CVE-2012-4185/CVE-2012-4186/CVE-2012-4187/ CVE-2012-4188 Heap memory corruption issues found using Address Sanitizer * MFSA 2012-87/CVE-2012-3990 (bmo#787704) Use-after-free in the IME State Manager - requires NSPR 4.9.2 - improve GStreamer integration (bmo#760140) - removed upstreamed mozilla-crashreporter-restart-args.patch - webapprt now included - use kmozillahelper's new REVEAL command (bnc#777415) (requires mozilla-kde4-integration >= 0.6.4) - updated translations-other with new languages- update to Firefox 15.0.1 (bnc#779936) * Sites visited while in Private Browsing mode could be found through manual browser cache inspection (bmo#787743)- update to Firefox 15.0 (bnc#777588) * MFSA 2012-57/CVE-2012-1970 Miscellaneous memory safety hazards * MFSA 2012-58/CVE-2012-1972/CVE-2012-1973/CVE-2012-1974/CVE-2012-1975 CVE-2012-1976/CVE-2012-3956/CVE-2012-3957/CVE-2012-3958/CVE-2012-3959 CVE-2012-3960/CVE-2012-3961/CVE-2012-3962/CVE-2012-3963/CVE-2012-3964 Use-after-free issues found using Address Sanitizer * MFSA 2012-59/CVE-2012-1956 (bmo#756719) Location object can be shadowed using Object.defineProperty * MFSA 2012-60/CVE-2012-3965 (bmo#769108) Escalation of privilege through about:newtab * MFSA 2012-61/CVE-2012-3966 (bmo#775794, bmo#775793) Memory corruption with bitmap format images with negative height * MFSA 2012-62/CVE-2012-3967/CVE-2012-3968 WebGL use-after-free and memory corruption * MFSA 2012-63/CVE-2012-3969/CVE-2012-3970 SVG buffer overflow and use-after-free issues * MFSA 2012-64/CVE-2012-3971 Graphite 2 memory corruption * MFSA 2012-65/CVE-2012-3972 (bmo#746855) Out-of-bounds read in format-number in XSLT * MFSA 2012-66/CVE-2012-3973 (bmo#757128) HTTPMonitor extension allows for remote debugging without explicit activation * MFSA 2012-68/CVE-2012-3975 (bmo#770684) DOMParser loads linked resources in extensions when parsing text/html * MFSA 2012-69/CVE-2012-3976 (bmo#768568) Incorrect site SSL certificate data display * MFSA 2012-70/CVE-2012-3978 (bmo#770429) Location object security checks bypassed by chrome code * MFSA 2012-72/CVE-2012-3980 (bmo#771859) Web console eval capable of executing chrome-privileged code - fix HTML5 video crash with GStreamer enabled (bmo#761030) - GStreamer is only used for MP4 (no WebM, OGG) - updated filelist - moved browser specific preferences to correct location- Fix mozilla-kde.patch to include sys/resource.h for getrlimit etc (glibc 2.16)- update to 14.0.1 (bnc#771583) * MFSA 2012-42/CVE-2012-1949/CVE-2012-1948 Miscellaneous memory safety hazards * MFSA 2012-43/CVE-2012-1950 Incorrect URL displayed in addressbar through drag and drop * MFSA 2012-44/CVE-2012-1951/CVE-2012-1954/CVE-2012-1953/CVE-2012-1952 Gecko memory corruption * MFSA 2012-45/CVE-2012-1955 (bmo#757376) Spoofing issue with location * MFSA 2012-46/CVE-2012-1966 (bmo#734076) XSS through data: URLs * MFSA 2012-47/CVE-2012-1957 (bmo#750096) Improper filtering of javascript in HTML feed-view * MFSA 2012-48/CVE-2012-1958 (bmo#750820) use-after-free in nsGlobalWindow::PageHidden * MFSA 2012-49/CVE-2012-1959 (bmo#754044, bmo#737559) Same-compartment Security Wrappers can be bypassed * MFSA 2012-50/CVE-2012-1960 (bmo#761014) Out of bounds read in QCMS * MFSA 2012-51/CVE-2012-1961 (bmo#761655) X-Frame-Options header ignored when duplicated * MFSA 2012-52/CVE-2012-1962 (bmo#764296) JSDependentString::undepend string conversion results in memory corruption * MFSA 2012-53/CVE-2012-1963 (bmo#767778) Content Security Policy 1.0 implementation errors cause data leakage * MFSA 2012-55/CVE-2012-1965 (bmo#758990) feed: URLs with an innerURI inherit security context of page * MFSA 2012-56/CVE-2012-1967 (bmo#758344) Code execution through javascript: URLs - license change from tri license to MPL-2.0 - fix crashreporter restart option (bmo#762780) - require NSS 3.13.5 - remove mozjs pacrunner obsoletes again for now - adopted mozilla-prefer_plugin_pref.patch - PPC fixes: * reenabled mozilla-yarr-pcre.patch to fix build for PPC * add patches for bmo#750620 and bmo#746112 * fix xpcshell segfault on ppc- update to Firefox 13.0.1 * bugfix release - obsolete libproxy's mozjs pacrunner (bnc#759123)- update to Firefox 13.0 (bnc#765204) * MFSA 2012-34/CVE-2012-1938/CVE-2012-1937/CVE-2011-3101 Miscellaneous memory safety hazards * MFSA 2012-36/CVE-2012-1944 (bmo#751422) Content Security Policy inline-script bypass * MFSA 2012-37/CVE-2012-1945 (bmo#670514) Information disclosure though Windows file shares and shortcut files * MFSA 2012-38/CVE-2012-1946 (bmo#750109) Use-after-free while replacing/inserting a node in a document * MFSA 2012-40/CVE-2012-1947/CVE-2012-1940/CVE-2012-1941 Buffer overflow and use-after-free issues found using Address Sanitizer - require NSS 3.13.4 * MFSA 2012-39/CVE-2012-0441 (bmo#715073) - fix sound notifications when filename/path contains a whitespace (bmo#749739)- fix build on arm- reenabled crashreporter for Factory/12.2 (fix in mozilla-gcc47.patch)- update to Firefox 12.0 (bnc#758408) * rebased patches * MFSA 2012-20/CVE-2012-0467/CVE-2012-0468 Miscellaneous memory safety hazards * MFSA 2012-22/CVE-2012-0469 (bmo#738985) use-after-free in IDBKeyRange * MFSA 2012-23/CVE-2012-0470 (bmo#734288) Invalid frees causes heap corruption in gfxImageSurface * MFSA 2012-24/CVE-2012-0471 (bmo#715319) Potential XSS via multibyte content processing errors * MFSA 2012-25/CVE-2012-0472 (bmo#744480) Potential memory corruption during font rendering using cairo-dwrite * MFSA 2012-26/CVE-2012-0473 (bmo#743475) WebGL.drawElements may read illegal video memory due to FindMaxUshortElement error * MFSA 2012-27/CVE-2012-0474 (bmo#687745, bmo#737307) Page load short-circuit can lead to XSS * MFSA 2012-28/CVE-2012-0475 (bmo#694576) Ambiguous IPv6 in Origin headers may bypass webserver access restrictions * MFSA 2012-29/CVE-2012-0477 (bmo#718573) Potential XSS through ISO-2022-KR/ISO-2022-CN decoding issues * MFSA 2012-30/CVE-2012-0478 (bmo#727547) Crash with WebGL content using textImage2D * MFSA 2012-31/CVE-2011-3062 (bmo#739925) Off-by-one error in OpenType Sanitizer * MFSA 2012-32/CVE-2011-1187 (bmo#624621) HTTP Redirections and remote content can be read by javascript errors * MFSA 2012-33/CVE-2012-0479 (bmo#714631) Potential site identity spoofing when loading RSS and Atom feeds - added mozilla-libnotify.patch to allow fallback from libnotify to xul based events if no notification-daemon is running - gcc 4.7 fixes * mozilla-gcc47.patch * disabled crashreporter temporarily for Factory - recommend libcanberra0 for proper sound notifications- update to Firefox 11.0 (bnc#750044) * MFSA 2012-13/CVE-2012-0455 (bmo#704354) XSS with Drag and Drop and Javascript: URL * MFSA 2012-14/CVE-2012-0456/CVE-2012-0457 (bmo#711653, #720103) SVG issues found with Address Sanitizer * MFSA 2012-15/CVE-2012-0451 (bmo#717511) XSS with multiple Content Security Policy headers * MFSA 2012-16/CVE-2012-0458 Escalation of privilege with Javascript: URL as home page * MFSA 2012-17/CVE-2012-0459 (bmo#723446) Crash when accessing keyframe cssText after dynamic modification * MFSA 2012-18/CVE-2012-0460 (bmo#727303) window.fullScreen writeable by untrusted content * MFSA 2012-19/CVE-2012-0461/CVE-2012-0462/CVE-2012-0464/ CVE-2012-0463 Miscellaneous memory safety hazards - ported and reenabled KDE integration (bnc#746591) - explicitely build-require X libs- add Provides: browser(npapi) FATE#313084- better plugin directory resolution (bnc#747320)- update to Firefox 10.0.2 (bnc#747328) * CVE-2011-3026 (bmo#727401) libpng: integer overflow leading to heap-buffer overflow- update to Firefox 10.0.1 (bnc#746616) * MFSA 2012-10/CVE-2012-0452 (bmo#724284) use after free in nsXBLDocumentInfo::ReadPrototypeBindings- Use YARR interpreter instead of PCRE on platforms where YARR JIT is not supported, since PCRE doesnt build (bmo#691898) - fix ppc64 build (bmo#703534)- update to Firefox 10.0 (bnc#744275) * MFSA 2012-01/CVE-2012-0442/CVE-2012-0443 Miscellaneous memory safety hazards * MFSA 2012-03/CVE-2012-0445 (bmo#701071)