mozilla-xulrunner192-translations-other-1.9.2.17-0.2.1 > t
D H ` p M2/= wsQ#\crkl]ڏ#%!Zir={"찹j(˞P1fLWJ'TX=q
H&/wm\oӗt;5(Fɧ$h'&)XmzQ `W""8G^/SՐ`;rHtŎWTH} 5
ɸy*4`6jתQ")?Мq|t&z0MysK{w9V2;#W"ԔM79 941ff66133be23126ce662618c099b5b7d552949 &j M2/=&M4VN tGOF8!T/CpBJ:
OMTVqXkc>AxO׳|UW*^ELqPiK'\Ɔ4bKZG5KogwhMoגl6C܄]Bz4(fU5tFhLA
O21n q/*'gAP!8 %$hޞKK7({dp1deB()
{?S /=evSW2gD> > 8 Z ? Z d * 3 9 ` $ ( 0 4 B K h h \ h , h
h h h
, h h h h h ( 8 " 9 " : d " B Oc F O G O h H Q8 h I R h X S@ Y SL Z Sl [ Sp \ S h ] U h ^ YA b Y c Z d Zw e Z| f Z l Z z Z C mozilla-xulrunner192-translations-other 1.9.2.17 0.2.1 Extra translations for XULRunner 1.9.2 XULRunner is a single installable package that can be used to bootstrap
multiple XUL+XPCOM applications that are as rich as Firefox and
Thunderbird.
This package contains rarely used languages. Mbuild31 >vvopenSUSE 11.3 openSUSE MPLv1.1 or GPLv2+ or LGPLv2+ http://bugs.opensuse.org System/Localization http://www.mozilla.org linux x86_64 f f `o U f z f g f f f f f * f f v\ f [ \ P f ] f 9 f j (g f f 6 f
f f Q f S f f % f f f v f /6 N f f | v f k f G f R f N f ] f > f 7g f f f , f f fAA큤 M[MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM 2659291bd7dcb6387678a085ea59641f 5501abfd628633102fec0328a81e615d af4dbca9d7ec0630d090ccec06d6bf7c 4ca52f8beb6c95a8ae39020e4c820df8 44aca2cce0bb81d4f0ee58e68599dea8 fd7a49c7575f1be1a5dabad8d7259f3f 7d5891c013ff71e6dd69884f697710e0 d394172e57b32311e00848bb79e7889a c155c09a05bb98789c44d5865a1a71c2 1120227756997aac3502e73acdc34207 1dfde3ddf64135efa289b6ccd40cf861 6d131ea049a3e53f5442d75703e0d5ea 8fd840901cb8a6c92bc1763b4bdf9d2d 0cc4386985f2375cc932de37946a0248 595a7d2cadcca7e9174faf3f3bec5267 13495ed90f12bc2aafbaf00871bb0d5a f795a366b2af9a5ecf92bc0b0273a062 06c2085d6e05f79ba125ab16a7e4373b 2b18872cf3b70eecbcc32d52a5cf5689 f6db42ddf1458205d549c51339d450ff 355aad5d7885287e9386054a5302639e 897b62350c76d0534907a19f25d71123 31c7dc6835c03723ea35627eb4e24923 f5f52ce2c73900170d63bca78e06364a e0148a029be26555682da089e5df5924 e6fd17310850fab1c2f12deae7eac64d 2b1c3161a98a386c0ad116c728007754 51eb97b454250c60c21cc89ab37c8666 4281b06673cfe6eccb200f5546372be8 0e7e91f65b8512e0085139f22673f665 edd0fa5115dbce5bd40078a9344c6501 b1cd076e33895946a0c1d61577d3d2ff 29d83c5aeaff276dd2544d362bfaf3c6 1532ef6cd88176fee83b403f20befe44 0d1e780327bbf0928f889b9f8578ebd7 c9b20384a1111c4f2235fd13441d33d9 1454ec992a0b5df1137131098be2c30f ef0bb81203652edff0ff569a082cbcc4 01147c10f798841837ffa2a54f748c4b 5da670de7e89c3f7de673d9c33d4446e 3e6afc1f7609c02b909c43b5545a5924 318b950b7ed24087189e4b266ff0c053 649e22a2e2221892ce41409977045366 f4fb3296d828d127d725d9fe9f06d66c 4526fe846251aa1abaf60ef6ad5be12a ab29421660499b9aef086b8cd1ad3a89 e26fb9efe1d4812bf7d7eba2375dbd78 a06a2c1bdc78ee8cbca5b47417bedc9d cccf8af7a622eda4d7a0d60e1b94ed9e 9c1f07af32b88ec156527b5b9a32862e 6b08fb2ab21ffb62257b5ce1dbca076c c6f0e0ec403e95edfe86bf1a00dff373 eab5288193825dc717e2ab38982b101c 9b657c7c9bfb64c4e60d27a4f4294adc c0a9bc699e442b135e49ef08f70e4518 345b149117d7b73694c9eeaf127508f9 51a38e581baeb09f1d43e5ceff537861 ff25a129669eb2a19938e06b72f148c0 ca572a9230bf29c2672d556e5897e103 d638afe278d02e5e906fea0ad3367d04 4fe34a39adfdf490beeff94494f242a8 63d73c7605836d63fe37d19ad53ba899 8a2a00ccefa82257e79eaa935bb5787a e7c72f2724ecbd1bb95f199bc2cc86f1 9feb3e51c5d97ac4def811d00a03c5f3 2a238e706d3c26e215f31cd24b23ea1b 870836d6b0dcb9d66c7e4ea60bedda83 2fc59bec651b5af3066d28fa7a149988 c662fa340d16c0454b34395d712eeb03 b91d2ffb1125553a8426bee76b7a0e0a fa8a93636305cdc1107736ad4e0dd85d a98bce50011a13c02116beb6d7609baa 4235cb5206ac3ca90dac1901547ad45c 3e7a55c9065f93b3489c038822fcb1e3 88e6703171d602b1a2acfc9daf0ab6a1 bb623a6bbdeda99028669a8253c79061 3fa8d6fe54defefd176d8d78c4142fd1 38557d52a44476e23f8e9e88a6c873e0 2865b2b1c3ce7c36eca28e6487852b7d aa142d79628b4bf3ca95a8c24376e501 8f43014b60d70bb9d536904ac8117083 d56dd0cf1c3a5e362591de3dbb4a4e07 3fad70b1f3870a3d889cb4f8569c5bcd 069779dfb2894c6e917ff207df206df3 0869df3196f344ff5c2cb69891b14a49 93a399e9eb092ebb263ef77f17fa050a ef8c8aaab3c09346ebb7d106b23d5fed a5358ec7ee8e6d1ac1e1e7bdf99f3475 08d9a88b6f52d9d8c028ec57e7bb1b05 23906223c3c78d982d629dad352e29fb 18a8269d5de0ec5aba3a1c97280b9cdc 6a3fca5691def796950d8350ea46a978 a962c43879952325fdd8d9f7d70112e4 22ea934b8eaea5bf9275f86a699f7014 ce4d54e904c089ec0fc64092682abc39 221a47f9e9b91aeed4720b0f05cefd1e ba02a3d5adf0a321bc80b5c917404735 d459617804f5ef82f72c9077d2028580 0cc02624154da05a85e19211be857593 f87ffa1767f56558565cb78b9982401f 6aaf5b2deba6b76308ab834651644202 39076844785d27e549a6b3630b82e0a2 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root mozilla-xulrunner192-1.9.2.17-0.2.1.src.rpm locale(mozilla-xulrunner192:af;as;be;bg;bn_BD;bn_IN;cy;el;eo;es_MX;et;eu;fa;fy_NL;ga_IE;gl;gu_IN;he;hi_IN;hr;id;is;ka;kk;kn;ku;lt;lv;mk;ml;mr;nn_NO;oc;or;pa_IN;rm;ro;si;sk;sl;sq;sr;ta;ta_LK;te;th;tr;uk;vi) mozilla-xulrunner192-translations-other mozilla-xulrunner192-translations-other(x86-64)
mozilla-xulrunner192 rpmlib(VersionedDependencies) rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 1.9.2.17 3.0.3-1 4.0-1 3.0.4-1 4.4.6-1 4.8.0 M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L@K@KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.org llunak@novell.com wr@rosenauer.org wr@rosenauer.org pcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org meissner@suse.de wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org coolo@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - security update to 1.9.2.17 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - fix 'save as' with KDE integration (bnc#557598) - security update to 1.9.2.16 (bnc#680771)
* MFSA 2011-11
Update HTTPS certificate blacklist (bmo#642395) - update to 1.9.2.15
* fix a regression introduced with previous update affecting
Java applet integration (bmo#629030) - use full path to the ntlm_auth binary (bmo#634334)
(mozilla-ntlm-full-path.patch) - security update to 1.9.2.14 (build3) (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - security update to 1.9.2.13 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to 1.9.2.12 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion
- ignore empty LANGUAGE environment variable (bnc#648854) - security update to 1.9.2.11 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
- removed upstreamed patches:
* mozilla-esd.patch
* mozilla-helper-app.patch
- build and runtime requirement is NSS 3.12.8 - update to 1.9.2.10
* fixing startup topcrash (bmo#594699) - security update to 1.9.2.9 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-59/CVE-2010-2762 (bmo#584180)
SJOW creates scope chains ending in outer object
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using