mozilla-xulrunner192-translations-common-32bit-1.9.2.17-0.2.1 > t
D H ` p M츋/=G`[]1v(owƖ^
5m:gW` ieG|GEd"G[aGT|+vimovl}{9fn\k[leRcJF
NmZ@0HLDQ"%DvWea\d@xW-|ySP2)cgbY,m,EM}xu:Ks&2p%E358989448ec71e0b62de7f0c95cf0b2f1cc70473 ) M츋/= ;[}ioǏ:I0.6vKF8V=VcA'W'=8!t{\7
zZy7ā!:gs(\QDNyƖZ6丱8~N+p.)`3$az-U/z Ψ}q5-Iѯ1=.>z]
I2w÷td[w70DE/8x,L1戩w4jZQQIQKSF'oA2ԫqA > 8 G ? G d 1 : @ h ` d l p ~ 2 2 0 2
2 \ 2
2
2 2 2
|
2 p ` ( 8 " 9 " : T " > AS G A\ 2 H B$ 2 I B 2 X C Y C( \ CH 2 ] D 2 ^ F. b Fy c G d Gs e Gx f G} l G G G G C mozilla-xulrunner192-translations-common-32bit 1.9.2.17 0.2.1 Common translations for XULRunner 1.9.2 XULRunner is a single installable package that can be used to bootstrap
multiple XUL+XPCOM applications that are as rich as Firefox and
Thunderbird.
This package contains the most common languages but en-US which is
delivered in the main package. M"build36 openSUSE 11.2 openSUSE MPLv1.1 or GPLv2+ or LGPLv2+ http://bugs.opensuse.org System/Localization http://www.mozilla.org linux x86_64 /sbin/ldconfig z f p( f 1 f 6 f | f ' W _W ? f s f r f f ݟ f n@ f 4 f f E1 f gS A \; f m i AA큤 M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M!M! e97638a121bbee96aed5ac8a949a4338 a881730c03b8efda3dd947273fdfd0ff 1b1476f3f5a060c6600edf64dfdc0490 80be24c9a0b3b2c707ec5234f0f907f8 e219409d06583d5949a27a216a0a7f14 8537e28a7dcd76cd3c1a1bc480c73fde e4511e0f2fc58ecedcae92744830ebf1 d38bd46df897f700d9ed8bd623f1f24d 64d66e7192df422e8a7404c19a86eade 31e00fe6854e9266853e023656250ef3 fc63e3d254f396658ad3c7b0b5066345 06f1474e64dbf16e9f5de25c159c5c0f e35c121fea22197f21417f92f9a9cfbf fcddb0b5f7068defe3c4075254e48871 645d0987ec3320f7b2f6a2a796aa67b8 b994acd0ce00f1859650b9b24b8b2bea b380f3f0427d13598a0b4574dda5094c bcaa530d1ac13d1078ed5fdfed9ecf60 f4be4a5f8c375a2d1c0e9a1b59801139 3b4ce29d9e5cf8705babe02cb9824237 398739ce3abd4094b2217581e3496680 938c6ee67705e98ef9238378a100908b fabf9a9a59a161cc7e4002bc7272edb2 8ee0e193a0bc95a4cb71ce712101d3de 57df99ac23269c340fcc5a168a074021 4d5273a68b3a4ad7d3dfec35ee3828b3 c6353654fa26425d9223077571b96a59 37bbd584a66475d243c400ed8c07f1b7 a5091e3380e6517a8da5139fc7cbfb45 c47038cf8cf873024cf02c92b365bc82 ad0645184e931c6beaad5f315d4c4f92 14d6b894d1af7f2313829db2bba37ea6 1ac3e8a08b6317598650ef91edbd28d7 18ff4c1863a3e5a5268161ec0d4abee2 8588ed18e51b89c6a7b07b0ab119a9ec 893ef5ad18ac88b42e579f2aa19085c8 a6579a9daba6c9a1dd71aabf39b450e9 a2183284dfd613b35e267cf3edc48132 7e4c1570e89d1a1edd3394cc035437d2 fc083d3727ef24bf623a814973ec7e07 611e793c587406cea2aa5d4c48541cfa ece7022e6aa88541b38363dd5018eefe b208ad68931427ccf26cca530817fe24 61f9181f3ffe9cfd104fb8e1fc0ee419 9bd0ee52de0187de59f020453a6e42f1 81d82b6e379082c7b47e7806f7e8fccb 26c09e957fc2bca93e86e59d08a7aa34 3416258271ffee4673381467b0334dc4 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root mozilla-xulrunner192-1.9.2.17-0.2.1.src.rpm mozilla-xulrunner192-translations-common-32bit mozilla-xulrunner192-translations-common-32bit(x86-32)
mozilla-xulrunner192-32bit /bin/sh rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 1.9.2.17 4.0-1 3.0.4-1 4.4.6-1 4.7.1 M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L@K@KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.org llunak@novell.com wr@rosenauer.org wr@rosenauer.org pcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org meissner@suse.de wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org coolo@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - security update to 1.9.2.17 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - fix 'save as' with KDE integration (bnc#557598) - security update to 1.9.2.16 (bnc#680771)
* MFSA 2011-11
Update HTTPS certificate blacklist (bmo#642395) - update to 1.9.2.15
* fix a regression introduced with previous update affecting
Java applet integration (bmo#629030) - use full path to the ntlm_auth binary (bmo#634334)
(mozilla-ntlm-full-path.patch) - security update to 1.9.2.14 (build3) (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - security update to 1.9.2.13 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to 1.9.2.12 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion
- ignore empty LANGUAGE environment variable (bnc#648854) - security update to 1.9.2.11 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
- removed upstreamed patches:
* mozilla-esd.patch
* mozilla-helper-app.patch
- build and runtime requirement is NSS 3.12.8 - update to 1.9.2.10
* fixing startup topcrash (bmo#594699) - security update to 1.9.2.9 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-59/CVE-2010-2762 (bmo#584180)
SJOW creates scope chains ending in outer object
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using