mozilla-xulrunner192-translations-common-1.9.2.17-0.2.1 > t
D H ` p M1/= oGrzbwK,vq^ۈK8\Lhz:*:舐UyWlbI XdZ\CVfn\>(_X4Uu jw? CN!jh30>AFA"X^=OoMJ:
ӧpZ@bnL6~RW:g`8iqҢ .UrQ/)m}/*EDeefd4a2f85ff61cfffd3f8d8d37de1078cfd42415 M1/=<*Ԏ>p`#x."ste_;~&"6ÅRE"N#N'O1:Py+1$W+u&=o~Q!CIA=𝞮\mp4Y,ySk\Y:AƳiq2Q*4dz(,^AvHh{
Y|߹Vcw6k#T*nԏ@Ox_F0ѰQ#\ f0'Ģ)0Pۃ > 8 Hf ? HV d + 4 : b \ ` h l z 2 2 2
2 L 2
~ 2
2 x 2 r 2
l
2 ` @ T ( 8 " 9 " : " B A F A G B 2 H B 2 I C 2 X C Y C Z C [ C \ D 2 ] D 2 ^ F b GC c G d H( e H- f H2 l H4 z HF C mozilla-xulrunner192-translations-common 1.9.2.17 0.2.1 Common translations for XULRunner 1.9.2 XULRunner is a single installable package that can be used to bootstrap
multiple XUL+XPCOM applications that are as rich as Firefox and
Thunderbird.
This package contains the most common languages but en-US which is
delivered in the main package. Mbuild31 openSUSE 11.3 openSUSE MPLv1.1 or GPLv2+ or LGPLv2+ http://bugs.opensuse.org System/Localization http://www.mozilla.org linux x86_64 z f p( f 1 f 6 f | f ' W _W ? f s f r f f ݟ f n@ f 4 f f E1 f gS A \; f m i AA큤 M[MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM 6e4056429f8b24a6272da0e292829d4f a881730c03b8efda3dd947273fdfd0ff 96bd0b95ff85880dff9e5c7e24064e69 80be24c9a0b3b2c707ec5234f0f907f8 aa2b6431540e2967549ae5f10aa80b2d 8537e28a7dcd76cd3c1a1bc480c73fde 3a538ce5f36376bffa66e838a9ade19a d38bd46df897f700d9ed8bd623f1f24d 630d8d8792d17e7404705db9e4603d84 31e00fe6854e9266853e023656250ef3 5ec316a2715bd98a94877f0ef4c088ca 06f1474e64dbf16e9f5de25c159c5c0f df2f072082272fee88f782cbb09cd7f4 fcddb0b5f7068defe3c4075254e48871 5fd5a510dfc49f0f03bf8c8c306e1ec1 b994acd0ce00f1859650b9b24b8b2bea 09369b0ceaa93bc0e5a85202ca81aeeb bcaa530d1ac13d1078ed5fdfed9ecf60 9721c270c3478d5f8b48d6559bab5475 3b4ce29d9e5cf8705babe02cb9824237 3e80d67b4e262122e1556d3693e68404 938c6ee67705e98ef9238378a100908b b7a8ac89cd507878edf31baf09081374 8ee0e193a0bc95a4cb71ce712101d3de d0705e95ab7fa49ccfe43e35f0bc450e 4d5273a68b3a4ad7d3dfec35ee3828b3 713ddc9d7fdac144f6ce57e0abd290e2 37bbd584a66475d243c400ed8c07f1b7 cd860550a9a1804b3cb5d3bdbe8b0734 c47038cf8cf873024cf02c92b365bc82 723a72658ff0ceeab03f7e11eca76cb2 14d6b894d1af7f2313829db2bba37ea6 3a7d069884331bacd80afebc20f564e6 18ff4c1863a3e5a5268161ec0d4abee2 29daed89fc5c95a1075439d42a53d756 893ef5ad18ac88b42e579f2aa19085c8 bf6a43504d9187a28574d6b62c7b7722 a2183284dfd613b35e267cf3edc48132 1fab203297e262e82d3c9e1ca05c91d7 fc083d3727ef24bf623a814973ec7e07 80e943236f3b9111621bdd1abfc3c52b ece7022e6aa88541b38363dd5018eefe 57f68ac7d5b56facd08ec22160ff6ce6 61f9181f3ffe9cfd104fb8e1fc0ee419 46a1f08080201fc920e74cefe1040d7b 81d82b6e379082c7b47e7806f7e8fccb a6b6add895e3c20df7fc16a906e3208e 3416258271ffee4673381467b0334dc4 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root mozilla-xulrunner192-1.9.2.17-0.2.1.src.rpm locale(mozilla-xulrunner192:ar;ca;cs;da;de;en_GB;es_AR;es_CL;es_ES;fi;fr;hu;it;ja;ko;nb_NO;nl;pl;pt_BR;pt_PT;ru;sv_SE;zh_CN;zh_TW) mozilla-xulrunner192-translations-common mozilla-xulrunner192-translations-common(x86-64)
mozilla-xulrunner192 rpmlib(VersionedDependencies) rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 1.9.2.17 3.0.3-1 4.0-1 3.0.4-1 4.4.6-1 4.8.0 M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L@K@KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.org llunak@novell.com wr@rosenauer.org wr@rosenauer.org pcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org meissner@suse.de wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org coolo@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - security update to 1.9.2.17 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - fix 'save as' with KDE integration (bnc#557598) - security update to 1.9.2.16 (bnc#680771)
* MFSA 2011-11
Update HTTPS certificate blacklist (bmo#642395) - update to 1.9.2.15
* fix a regression introduced with previous update affecting
Java applet integration (bmo#629030) - use full path to the ntlm_auth binary (bmo#634334)
(mozilla-ntlm-full-path.patch) - security update to 1.9.2.14 (build3) (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - security update to 1.9.2.13 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to 1.9.2.12 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion
- ignore empty LANGUAGE environment variable (bnc#648854) - security update to 1.9.2.11 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
- removed upstreamed patches:
* mozilla-esd.patch
* mozilla-helper-app.patch
- build and runtime requirement is NSS 3.12.8 - update to 1.9.2.10
* fixing startup topcrash (bmo#594699) - security update to 1.9.2.9 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-59/CVE-2010-2762 (bmo#584180)
SJOW creates scope chains ending in outer object
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using