mozilla-xulrunner192-translations-common-32bit-1.9.2.25-0.2.1 > t
D H ` p N)C/=H\r;,gXؿIHȰ_V'\GWߠ14#jL^:l]r/mO/sl?O1)?!@a䇬K[&7YjyתϾy&>yuJQP,U ♊1hy`}ަߔOQ8g!ZN>HZxeԨQ͏OL#
-%Mk1,;t[P䐽r(ċdR2ۢE3U:_T#bc7aad2fbc277ac6bed31fd3299e62f401b2d840 N)C/=NưCf
{y{DTaRL
iL"n
_7c'o>*v{Af1v\{{jXWܷ1Q+a/!hl}sڈ;)Czg?zL
s-F͉AQz!'dQڢ,s/?AZ90r<\a੫XCNK%R"rӳEh !x 0B
[¯eC` > 8 T ? T d 1 : @ h ` d l p ~ 2 2 4 2
2 ` 2
2
2 2 2
2 t d ( 8 + 9 8 + : + > N G N 2 H N 2 I O 2 X O Y O \ P 2 ] P 2 ^ R b S9 c S d T3 e T8 f T= l T? TQ T T C mozilla-xulrunner192-translations-common-32bit 1.9.2.25 0.2.1 Common translations for XULRunner 1.9.2 XULRunner is a single installable package that can be used to bootstrap
multiple XUL+XPCOM applications that are as rich as Firefox and
Thunderbird.
This package contains the most common languages but en-US which is
delivered in the main package. N'build02 openSUSE 11.4 openSUSE MPL-1.1 or GPL-2.0+ or LGPL-2.1+ http://bugs.opensuse.org System/Localization http://www.mozilla.org linux x86_64 /sbin/ldconfig z f p( f 1 f 6 f | f ' W _W ? f s f r f f ݟ f n@ f 4 f f E1 f gS A ]. f m i AA큤 N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N'N' bf23ac938d713ca2c4febd5f333f110d a881730c03b8efda3dd947273fdfd0ff 0438c320fbf9fcf192ce9f8d015f4822 80be24c9a0b3b2c707ec5234f0f907f8 d51f4039e15bc8dc14bf0366adbc79d9 8537e28a7dcd76cd3c1a1bc480c73fde 3315eb5ce2327d09018f4be4e24db7c6 d38bd46df897f700d9ed8bd623f1f24d 35e9a19e4bfae32d63cdcefe6dc1161c 31e00fe6854e9266853e023656250ef3 f0b1c1378930cc292150de92ac03f59f 06f1474e64dbf16e9f5de25c159c5c0f f7c58881d9eb4f3b263f8a9683a46a93 fcddb0b5f7068defe3c4075254e48871 1daac8d36157083b41c30b9733eb34be b994acd0ce00f1859650b9b24b8b2bea d42fbd8bfb7ae19fd15030fe564583c0 bcaa530d1ac13d1078ed5fdfed9ecf60 71c863497ad84e9b942c0d50d5dedff0 3b4ce29d9e5cf8705babe02cb9824237 de6a8ec9c64e0c8dea977dd870e00b9b 938c6ee67705e98ef9238378a100908b 37a0f994af14f446ac69eb5ebaa446b8 8ee0e193a0bc95a4cb71ce712101d3de 8750b281f5be7396c4a5ef452f215421 4d5273a68b3a4ad7d3dfec35ee3828b3 437fa0edc71652005de1030c5e246776 37bbd584a66475d243c400ed8c07f1b7 db9aff990c0d428a796a49dd66c9209b c47038cf8cf873024cf02c92b365bc82 88112d0fd6a2f9053c4d6c46517d6dd1 14d6b894d1af7f2313829db2bba37ea6 644f35a02d51e3b680f68e4746c16522 18ff4c1863a3e5a5268161ec0d4abee2 e74d4b804504379e5c1ef2e61802f32a 893ef5ad18ac88b42e579f2aa19085c8 b31a0e1257f7ee74cdf62ad229132765 a2183284dfd613b35e267cf3edc48132 b8a75237f4a9f608645cc5f6b82b1490 fc083d3727ef24bf623a814973ec7e07 302d3aa0e767a8c04bf5c3374837da84 ece7022e6aa88541b38363dd5018eefe 5b752f5ad372218c19949c7ff6903e8a 61f9181f3ffe9cfd104fb8e1fc0ee419 e8079045edafb4fd9c4b7bb119c2e4ea 81d82b6e379082c7b47e7806f7e8fccb 8f5a317e371fafa5a7286505b507d30f 3416258271ffee4673381467b0334dc4 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root mozilla-xulrunner192-1.9.2.25-0.2.1.src.rpm mozilla-xulrunner192-translations-common-32bit mozilla-xulrunner192-translations-common-32bit(x86-32)
mozilla-xulrunner192-32bit /bin/sh rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 1.9.2.25 4.0-1 3.0.4-1 4.4.6-1 4.8.0 N@N@NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L@K@KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org pcerny@suse.com pcerny@suse.com wr@rosenauer.org wr@rosenauer.org cgiboudeaux@gmx.com wr@rosenauer.org llunak@novell.com wr@rosenauer.org wr@rosenauer.org pcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org meissner@suse.de wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org coolo@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - security update to 1.9.2.25 (bnc#737533)
* MFSA 2011-59/CVE-2011-3666 (bmo#704622)
.jar not treated as executable in Firefox 3.6 on Mac - security update to 1.9.2.24 (bnc#728520)
* MFSA 2011-46/CVE-2011-3647 (bmo#680880)
loadSubScript unwraps XPCNativeWrapper scope parameter
* MFSA 2011-47/CVE-2011-3648 (bmo#690225)
Potential XSS against sites using Shift-JIS
* MFSA 2011-49/CVE-2011-3650 (bmo#674776)
Memory corruption while profiling using Firebug - security update to 1.9.2.23 (bnc#720264)
* MFSA 2011-36/CVE-2011-2996 (bmo#555018)
Miscellaneous memory safety hazards
* MFSA 2011-37/CVE-2011-2998 (bmo#684815)
Integer underflow when using JavaScript RegExp
* MFSA 2011-38/CVE-2011-2999 (bmo#665548)
XSS via plugins and shadowed window.location object
* MFSA 2011-39/CVE-2011-3000 (bmo#655389)
Defense against multiple Location headers due to CRLF Injection
* MFSA 2011-40/CVE-2011-2372/CVE-2011-3001
Code installation through holding down Enter
- bring KDE's dialog.xml in sync with original widget - add dbus-1-glib-devel to BuildRequires (not pulled in
automatically with 12.1) - security update to 1.9.2.22 (bnc#714931)
* Complete blocking of certificates issued by DigiNotar
(bmo#683449) - security update to 1.9.2.21 (bnc#714931)
* MFSA 2011-34
Protection against fraudulent DigiNotar certificates
(bmo#682927) - security update to 1.9.2.20 (bnc#712224)
fixed security issues MFSA 2011-30
* CVE-2011-2982
Miscellaneous memory safety hazards
* CVE-2011-0084 (bmo#648094)
Crash in SVGTextElement.getCharNumAtPosition()
* CVE-2011-2981
Privilege escalation using event handlers
* CVE-2011-2378 (bmo#572129)
Privilege escalation dropping a tab element in content area
* CVE-2011-2980 (bmo#642469)
Binary planting vulnerability in ThinkPadSensor::Startup
* CVE-2011-2983 (bmo#626297)
Private data leakage using RegExp.input
- added mozilla-implicit-declarations.patch to fix rpmlint/gcc
checks
- added mozilla-curl.patch to remove obsolete header dependency
- added mozilla-linux3.patch to make python symbol dumper aware
of the "linux3" platform - security update to 1.9.2.18 (bnc#701296)
* MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364
CVE-2011-2365
Miscellaneous memory safety hazards
* MFSA 2011-20/CVE-2011-2373 (bmo#617247)
Use-after-free vulnerability when viewing XUL document with
script disabled
* MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303)
Memory corruption due to multipart/x-mixed-replace images
* MFSA 2011-22/CVE-2011-2371 (bmo#664009)
Integer overflow and arbitrary code execution in
Array.reduceRight()
* MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363
Multiple dangling pointer vulnerabilities
* MFSA 2011-24/CVE-2011-2362 (bmo#616264)
Cookie isolation error
- speedier find-external-requires.sh
- do not build dump_syms static as it is not needed for us
- > fixes build for 12.1 and above - Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6 - security update to 1.9.2.17 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - fix 'save as' with KDE integration (bnc#557598) - security update to 1.9.2.16 (bnc#680771)
* MFSA 2011-11
Update HTTPS certificate blacklist (bmo#642395) - update to 1.9.2.15
* fix a regression introduced with previous update affecting
Java applet integration (bmo#629030) - use full path to the ntlm_auth binary (bmo#634334)
(mozilla-ntlm-full-path.patch) - security update to 1.9.2.14 (build3) (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - security update to 1.9.2.13 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to 1.9.2.12 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion
- ignore empty LANGUAGE environment variable (bnc#648854) - security update to 1.9.2.11 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
- removed upstreamed patches:
* mozilla-esd.patch
* mozilla-helper-app.patch
- build and runtime requirement is NSS 3.12.8 - update to 1.9.2.10
* fixing startup topcrash (bmo#594699) - security update to 1.9.2.9 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-59/CVE-2010-2762 (bmo#584180)
SJOW creates scope chains ending in outer object
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using