seamonkey-irc-2.0.6-0.1.1 > t D H ` p LGw/=; P7!)Tٜqm#ߝ싌S:,u3Bf^PD.{b#,5Ɣ: 8,TKƟ}]>xDw2yEiKct:Ty@t0X@ceYp`ϼnyY&h'PU@44Fi 1Mw * G[Lbx\ Y ni0"ia(})f~f혻ߕϹ\ˢz!!;*r@`"49fbd866a99cd1a1dbfe33c148acd3692f39cb76 LGw/=:S\Q)l7zB6^خ_A~M"9(%Ȳ]q;3бKx?N_}v(#ʸlIeBU!_:aÙ`zSq^N&鎵KfB c iQ}r{dA9?\. XpSGYalklHQj2ݣm7QR;h8 褆P`SW]u'1Wc9V > 5 : ? : d . X \ d h v 4 J ` W d H l ( 8 $ 6 9 6 : 6 F 6r G 6 H 6 I 6 X 6 Y 6 \ 7 ] 78 ^ 7 b 9 c :# d : e : f : l : z : C seamonkey-irc 2.0.6 0.1.1 IRC for SeaMonkey An IRC Client (Chatzilla) for SeaMonkey. LG Nbuild37 nopenSUSE 11.2 openSUSE GPLv2+ ; LGPLv2.1+ ; MPLv1.1+ http://bugs.opensuse.org Productivity/Networking/IRC http://www.mozilla.org/projects/seamonkey linux i586 D p @1 0AA큤AA큤A큤 LFCLFCLFCLFCLFCLFCLFCLFCLFCLFCLFC f1146d3e32e12198ea62572211b1da1f 05c9fcbbdf7793b7c7e60f338a2754c1 e3764a222cd4bc3ce870574d2dfaeacd 32566d23f38e7c657c614dbea3210d23 ede20521565da2827333d1475463d60d dd10967644bab09fb2bba30f24bc9140 root root root root root root root root root root root root root root root root root root root root root root seamonkey-2.0.6-0.1.1.src.rpm seamonkey-irc seamonkey-irc(x86-32) rpmlib(VersionedDependencies) seamonkey rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 3.0.3-1 2.0.6 4.0-1 3.0.4-1 4.4.6-1 4.7.1 L@IK KKK{@KTM@KD{@K JTJ@J0@J:Jn@JeJUJ8I@I3IHIFFI!\IsH@H@H@H-w@GGu@GG@GC@G9GF&@FF@FFFFzh@FyFw@Fg@F8}@E%E\RE[@EK/@E:E@DDDMDȪwr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org vuntz@opensuse.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org @rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org hfiguiere@suse.de wr@rosenauer.org maw@suse.de wr@rosenauer.org maw@suse.de wr@rosenauer.org mauro@suse.de schwab@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de maw@suse.de cthiel@suse.de maw@suse.de maw@suse.de maw@suse.de aj@suse.de maw@suse.de adrian@suse.de maw@suse.de maw@suse.de sbrabec@suse.cz stbinner@suse.de mkoenig@suse.de mkoenig@suse.de sbrabec@suse.cz sbrabec@suse.cz aj@suse.de stark@suse.de stark@suse.de aj@suse.de stark@suse.de stark@suse.de - security update to 2.0.6 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages - security update to 2.0.5 (bnc#603356) * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.1.10) * MFSA 2010-27/CVE-2010-0183 (bmo#557174) Use-after-free error in nsCycleCollector::MarkRoots() * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random() - security update to 2.0.4 (bnc#586567) * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-17/CVE-2010-0175 (bmo#540100,375928) Remote code execution with use-after-free in nsTreeSelection * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy - added translation subpackages - security update to 2.0.3 (bnc#576969) * MFSA-2010-01/CVE-2010-0159 Crashes with evidence of memory corruption * MFSA-2010-02/CVE-2010-0160 Web Worker Array Handling Heap Corruption Vulnerability * MFSA-2010-03/CVE-2009-1571 (bmo#526500) Use-after-free crash in HTML parser * MFSA-2010-04/CVE-2009-3988 (bmo#504862) XSS due to window.dialogArguments being readable cross-domain * MFSA-2010-05/CVE-2010-0162 (bmo#455472) XSS hazard using SVG document and binary Content-Type - Remove unneeded orbit-devel BuildRequires. - stability update to 2.0.2 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193) - security update to 2.0.1 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener - update to 2.0rc2 which might become the final 2.0 version * based on final Gecko 1.9.1.4 (build3) - update to 2.0rc1 * based on Gecko 1.9.1.4 * removed upstreamed patches * compatible with enigmail (bnc#544326, bnc#530811) - fixed startup notification (bnc#518603) (mozilla-startup-notification.patch) - update to 2.0b2 * removed obsolete mozilla-jemalloc_deepbind.patch and mozilla-app-launcher.patch - remove obsolete code for protocol handlers (bmo#389732) - allow alternative button order for Gtk filechooser (bnc#527418) - added mozilla-prefer_plugin_pref.patch to introduce a new set of prefs to support preferring certain plugins for mime-types - added mozilla-sysplugin-biarch.patch to use /usr/$LIB/mozilla/plugins as system plugin dir (bmo#496708) - added Provides and Obsoletes for package merge (bnc#532678) - allow alternative button order for Gtk filechooser (bnc#527418) - fixed %exclude usage - update to 2.0b1 - added create-tar.sh to source package - removed enigmail as it's provided as an own package built in Thunderbird now - update to 2.0a3-20090707 snapshot - define MOZ_APP_LAUNCHER for session management (bmo#453689) (mozilla-app-launcher.patch and mozilla.sh.in) - move intl.locale.matchOS to distribution specific prefs (removed locale.patch) - moved openSUSE specific prefs from greprefs to app prefs - added mozilla-jemalloc_deepbind.patch to fix various possible crashes (bnc#503151, bmo#493541) - added seamonkey-no-update.patch to hide the update menu item - major update to 2.0a3-20090617 * based on Gecko 1.9.1 * ported to Mozilla's toolkit - security update to 1.1.16 (bnc#488955,489411,492354) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift - update to security release 1.1.15 (bnc#478625) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazards - use nss-shared-helper from 11.1 on which allows migrating to and sharing with other applications using NSS (can be disabled completely exporting MOZ_SM_NO_NSSHELPER=1) - Review and approve changes. - update to security release 1.1.14 (bnc#455804) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - Review and approve changes. - update to security release 1.1.13 (bnc#439841) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - fixed desktop file syntax and another rpmlint complaint - Review and approve changes. - update to security release 1.1.12 (bnc#429179) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - merged Factoy and mozilla versions (again) - Update to Seamonkey 1.1.11 [bnc#407573, bnc#416147] for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - update enigmail to 0.95.7 - Remove unused includes. - Merge changes and fixes from the build service. - Security update to version 1.1.9 (bnc#370353): + MFSA 2008-19/CVE-2008-1241: XUL popup spoofing variant (cross-tab popups) + MFSA 2008-18/CVE-2008-1195 and CVE-2008-1240: Java socket connection to any local port via LiveConnect + MFSA 2008-17/CVE-2007-4879: Privacy issue with SSL Client Authentication + MFSA 2008-16/CVE-2008-1238: HTTP Referrer spoofing with malformed URLs + MFSA 2008-15/CVE-2008-1236 and CVE-2008-1237: Crashes with evidence of memory corruption (rv:1.8.1.13) + MFSA 2008-14/CVE-2008-1233, CVE-2008-1234, and CVE-2008-1235: JavaScript privilege escalation and arbitrary code execution - Respin abuild.patch. - Add mozilla-missing-decl.patch, which is necessary when building against new versions of mozilla-nss (bmo#399589). - Security update to version 1.1.8 (bnc#354469) (thanks, Wolfgang) + MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect + MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files + MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing + MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI + MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution + MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities + MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12) - Update enigmail to version 0.95.6. - Add mozilla-maxpathlen.patch (#354150 and bmo #412610). - Add seamonkey-gcc4.3-fixes.patch. - security update to version 1.1.5 (#332512) (thanks, Wolfgang) * MFSA 2007-29 Crashes with evidence of memory corruption * MFSA 2007-30 onUnload Tailgating * MFSA 2007-31 Digest authentication request splitting * MFSA 2007-32 File input focus stealing vulnerability * MFSA 2007-33 XUL pages can hide the window titlebar * MFSA 2007-34 Possible file stealing through sftp protocol * MFSA 2007-35 XPCNativeWraper pollution using Script object complete advisories on http://www.mozilla.org/projects/security/known-vulnerabilities.html - recommend gpg instead of requireing fixed paths - Added GPG/pinentry requirements (#309160) - Don't run %fdupes on directories where multiple partitions are liable to be mounted. - Correct releasedate. - Merge recent changes from the build service (thanks, Wolfgang): + Update to security release 1.1.4: * MFSA 2007-26 Privilege escalation through chrome-loaded about:blank windows * MFSA 2007-27 Unescaped URIs passed to external programs (only relevant on Windows) + Add gnome-vfs.patch to be able to use helper apps with parameters + Update enigmail to version 0.95.3 + Fixed unreadable GIF in the LEO searchplugin - Use %fdupes. - Use openSUSE instead of SUSE Linux as bookmark. - On x86_64, s390, and s390x, deactivate the hidden visibility support, thereby fixing the build. - fix changelog entry order - Don't hardcode /tmp anywhere; use %{_tmppath} instead. - Merge updates to version 1.1.2 and enigmail version 0.95.0 from the build service (thanks, Wolfgang) - Don't build as root - Add unzip as a build requirement. - Removed invalid desktop Category "Application" (#254654). - install .desktop files into /usr/share/applications - fix build - update to CVS version 20061107 from buildservice [#221676] - Fixed Requires/Provides correctly (#216100#c14). - Do not provide and require internal libraries (#216100). - Use safer place for build-temporary files. - from openSUSE Buildservice (thanks Wolfgang Rosenauer): * update to SeaMonkey 1.1a-20060907 * update enigmail to 0.94.1: Added support for signing attachments with inline-PGP - update to security/stability release 1.0.5 - removed libaoss usage because it's too fragile - update enigmail to 0.94.1 * Added support for signing attachments with inline-PGP - Fix build (remove wrong extern "C"). - update to 1.0.4 fixing a major regression in 1.0.3 (#195402) - update to security release 1.0.3 (#195043) - fix overwrite confirmation for GTK filesaver (#179531) - fixed printing crash if the last used printer is not available anymore (#187013) build37 1279721550 t y x ~ z { | } u v w 2.0.6-0.1.1 2.0.6-0.1.1 {59c81df5-4b7a-477b-912d-4e0fdf64e5f2} chrome chrome.manifest chatzilla.jar icons default chatzilla-window.xpm chatzilla-window16.xpm components chatzilla-service.js install.rdf /usr/lib/seamonkey/extensions/ /usr/lib/seamonkey/extensions/{59c81df5-4b7a-477b-912d-4e0fdf64e5f2}/ /usr/lib/seamonkey/extensions/{59c81df5-4b7a-477b-912d-4e0fdf64e5f2}/chrome/ /usr/lib/seamonkey/extensions/{59c81df5-4b7a-477b-912d-4e0fdf64e5f2}/chrome/icons/ /usr/lib/seamonkey/extensions/{59c81df5-4b7a-477b-912d-4e0fdf64e5f2}/chrome/icons/default/ /usr/lib/seamonkey/extensions/{59c81df5-4b7a-477b-912d-4e0fdf64e5f2}/components/ -fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -g obs://build.opensuse.org/openSUSE:11.2:Update:Test/standard/6b47d233860bcaa664cbf20132fef81c-seamonkey cpio lzma 2 i586-suse-linux ݝpQm<Y ? ] b2t]tZ\Xs%xS_使8Ri7] gY'|֩08[ hpi-QGWQp 1?ҸOh|MqT 7h:됱p<|g + ]+A#zP.5="<(Pb̟O,%A/)aƗdN߉ݲCR3BV]nM5AiMUEme0)o)6BsV:d =A)"0L=WGM=էzzCԚ:0+ fFq#zhmNN^ryyB`2#=w>0")aY#}kq~xjڹS]nj`5*쑎w=`=- k}E3`K>=Y.@ &*9-SY_rנ+0sVD?m89Q.*G2r@Rb`U1ގ::fäҚa"}/rpm/Ζxt0k] )۳P~Dp"[Xվ5o 淭(n5> Rܞk\A+JmuaPҗwnx$?Á :+'@'l#2.YȜx[bm E ;nX O]A qsswk,`yꎌ =ܙ#b}sjsovU2LK8/az!͏+iR3_2#G2GxA?hUCpY!݅u}Qq)V.t!W!?[nL.V$Y&N>/3Ph舗Sm:tWn#Cb՞C9=XʲWf+[msYE[tыx-抍 Cas(k R=X<q ('='L%vGGP58 QOcL=Iŕ5L$t.*Mt,6ifԔ1F#B7bvC6㆖5{ i;+'"YS%r *P6 *O## ׯ+4;6oL\ii)%ևqd:Rm6]A6ۮoc9]i!00;sp|DTJ-o%u= 7ƌb\.|>)6ndWP>toؤv