mozilla-xulrunner192-translations-other-1.9.2.17-0.2.2 > t
D H ` p M4/= %6G:"'ۈlWb5==oAC8jFa*bA-ʣ R['V]u+BcƧv5dm/L^gNdWHLfRB5Hf
,˽Ub;n[tVTt]#^Q7K0qa4?hj]l@yUM$Wp8?N(A'U_=U2 O% A_a6b2c0f4c117a2e4e8bde98b943c3978e7d170fe &G M4/=rj|a
M
ޭ1A&*̽66%["SB4!Hqyaؤv=ڽv>yfaqmW͐vӉs?XmIIasZ^$"AK;#@vw aLڙd+W8t]T}-r_z<!܂r?D ԩ
}ʖ 'D:]\=_
F)bew^~ "> > 8 Z ? Z d * 3 9 ` $ ( 0 4 B K h h \ h , h
h h h
, h h h h h ( 8 " 9 " : d " B Oc F O G O h H Q8 h I R h X S@ Y SL Z Sl [ Sp \ S h ] U h ^ YA b Y c Z d Zw e Z| f Z l Z z Z C mozilla-xulrunner192-translations-other 1.9.2.17 0.2.2 Extra translations for XULRunner 1.9.2 XULRunner is a single installable package that can be used to bootstrap
multiple XUL+XPCOM applications that are as rich as Firefox and
Thunderbird.
This package contains rarely used languages. M0build08 >vvopenSUSE 11.4 openSUSE MPLv1.1 or GPLv2+ or LGPLv2+ http://bugs.opensuse.org System/Localization http://www.mozilla.org linux x86_64 f f `o U f z f g f f f f f * f f v\ f [ \ P f ] f 9 f j (g f f 6 f
f f Q f S f f % f f f v f /6 N f f | v f k f G f R f N f ] f > f 7g f f f , f f fAA큤 M.M.`M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M-M. M. M.M.M.M.M.M.M.
M.
M.M.M.M.M.M.M.M.M.M.M.M.M.'M.'M.)M.)M.*M.*M.,M.,M.-M.-M..M..M.0M.0M.1M.1M.2M.2M.3M.3M.8M.8M.9M.9M.>M.>M.?M.?M.KM.KM.LM.LM.MM.MM.OM.OM.NM.NM.PM.PM.QM.QM.RM.RM.VM.VM._M._ 6357b1d65312ca33ee2d66ccb2f80de7 5501abfd628633102fec0328a81e615d ed48a513adc127709aa4fd435f601b2d 4ca52f8beb6c95a8ae39020e4c820df8 f6aa15f0564dc0414df188f3c9c123f7 fd7a49c7575f1be1a5dabad8d7259f3f 11474159b5a651914a2efda26824196d d394172e57b32311e00848bb79e7889a ef161c5ed6231992e6d206638a3e3459 1120227756997aac3502e73acdc34207 937767b43c669d83cf5e27b78d50da0d 6d131ea049a3e53f5442d75703e0d5ea 234ee18f26b70c07c461687eedadec73 0cc4386985f2375cc932de37946a0248 6e7e9ea2441c3c9ec8ac9a716a7a3341 13495ed90f12bc2aafbaf00871bb0d5a 9bf4c0c7bd27de2f64442e31d1b29eef 06c2085d6e05f79ba125ab16a7e4373b b39a9e9d2d2ec9ea708dd7fc75655ffa f6db42ddf1458205d549c51339d450ff 0682ba1944d9e41f4c3da0ede663ff75 897b62350c76d0534907a19f25d71123 2f8fa33690a207a487bbc0430f48b53d f5f52ce2c73900170d63bca78e06364a 82b709a4f53da7e6d705b02876a49609 e6fd17310850fab1c2f12deae7eac64d 2667ff3c698e7655f158181d44d31b96 51eb97b454250c60c21cc89ab37c8666 12e5ab7b9300cd4043cc67bfe454fe3b 0e7e91f65b8512e0085139f22673f665 c1a0577dbfd89a666260117441191888 b1cd076e33895946a0c1d61577d3d2ff 9e7a4ad9b297d657c773552ad119bb68 1532ef6cd88176fee83b403f20befe44 25eea80881ab1e75b93e7ef85c696df8 c9b20384a1111c4f2235fd13441d33d9 728e9866ece47cb2122a66c2971021c4 ef0bb81203652edff0ff569a082cbcc4 78a50ce31da96b4e4480275c13e42ce4 5da670de7e89c3f7de673d9c33d4446e aa5f139e2b1c88dec05cb326dd7ade2d 318b950b7ed24087189e4b266ff0c053 bcb670b4708f9e0cd0d82cc11911fa55 f4fb3296d828d127d725d9fe9f06d66c 3c2544e3a28bbd8150ebd091e91729ce ab29421660499b9aef086b8cd1ad3a89 47f7d9dc0331097ae9cfdd6a1db82e98 a06a2c1bdc78ee8cbca5b47417bedc9d 7898e240ef85ffcd4147d85525c69118 9c1f07af32b88ec156527b5b9a32862e 7fa956b7dfcb6b68b053362c641c4e50 c6f0e0ec403e95edfe86bf1a00dff373 9f8c722a15da08ce666d5182175d24c9 9b657c7c9bfb64c4e60d27a4f4294adc ace5d2a3ffe301fc2b79fe8d0869b5ac 345b149117d7b73694c9eeaf127508f9 5aa638fd34260e7c1d38556bcd32bc88 ff25a129669eb2a19938e06b72f148c0 8805af82fb17526f1e94232897354d34 d638afe278d02e5e906fea0ad3367d04 eeeed3ec911ac6438d7c0f309150dfe1 63d73c7605836d63fe37d19ad53ba899 426c6bb9a47880c52822e489ef52c6ba e7c72f2724ecbd1bb95f199bc2cc86f1 68eb31bd12bc44e1b7eb21d21f2076da 2a238e706d3c26e215f31cd24b23ea1b 0eb5b03e76559f9d0d91594a9599872e 2fc59bec651b5af3066d28fa7a149988 54876b819a3924b5725b02d942932aba b91d2ffb1125553a8426bee76b7a0e0a e269d64d076e1973694ecce16956f120 a98bce50011a13c02116beb6d7609baa 430e1dc2c3fae59fa34b55664085b95b 3e7a55c9065f93b3489c038822fcb1e3 e9e40f52e67f6b1ad31045b6b8c5c6c5 bb623a6bbdeda99028669a8253c79061 b4417f904a4325f12ff69e3faff8d320 38557d52a44476e23f8e9e88a6c873e0 8e390645bedd1673ceb45ee286373e26 aa142d79628b4bf3ca95a8c24376e501 7ae1d06b476f95d658bbc3cfd96d1678 d56dd0cf1c3a5e362591de3dbb4a4e07 63d08fe6925b066ef13f0c245d58e21d 069779dfb2894c6e917ff207df206df3 c8bd540f88317bfae5a454cd71f593d4 93a399e9eb092ebb263ef77f17fa050a 078c971c920aced741ef4669083f7d09 a5358ec7ee8e6d1ac1e1e7bdf99f3475 5df96cad38abc089a5793da6913ab919 23906223c3c78d982d629dad352e29fb 2a15920a2614bed392cf0d8d7aea271d 6a3fca5691def796950d8350ea46a978 4e70ea488ab8bb741ccec522922adac4 22ea934b8eaea5bf9275f86a699f7014 75c8324ebedcc398a34e340f2a33e88a 221a47f9e9b91aeed4720b0f05cefd1e 381e7885faa90d6744442c2d5272c760 d459617804f5ef82f72c9077d2028580 691f499106640b419f4d8893d5c6d369 f87ffa1767f56558565cb78b9982401f 231d9e08c3522ec11aa0915a01815cdd 39076844785d27e549a6b3630b82e0a2 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root mozilla-xulrunner192-1.9.2.17-0.2.2.src.rpm locale(mozilla-xulrunner192:af;as;be;bg;bn_BD;bn_IN;cy;el;eo;es_MX;et;eu;fa;fy_NL;ga_IE;gl;gu_IN;he;hi_IN;hr;id;is;ka;kk;kn;ku;lt;lv;mk;ml;mr;nn_NO;oc;or;pa_IN;rm;ro;si;sk;sl;sq;sr;ta;ta_LK;te;th;tr;uk;vi) mozilla-xulrunner192-translations-other mozilla-xulrunner192-translations-other(x86-64)
mozilla-xulrunner192 rpmlib(VersionedDependencies) rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 1.9.2.17 3.0.3-1 4.0-1 3.0.4-1 4.4.6-1 4.8.0 M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L@K@KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.org llunak@novell.com wr@rosenauer.org wr@rosenauer.org pcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org meissner@suse.de wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org coolo@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - security update to 1.9.2.17 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - fix 'save as' with KDE integration (bnc#557598) - security update to 1.9.2.16 (bnc#680771)
* MFSA 2011-11
Update HTTPS certificate blacklist (bmo#642395) - update to 1.9.2.15
* fix a regression introduced with previous update affecting
Java applet integration (bmo#629030) - use full path to the ntlm_auth binary (bmo#634334)
(mozilla-ntlm-full-path.patch) - security update to 1.9.2.14 (build3) (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - security update to 1.9.2.13 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to 1.9.2.12 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion
- ignore empty LANGUAGE environment variable (bnc#648854) - security update to 1.9.2.11 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
- removed upstreamed patches:
* mozilla-esd.patch
* mozilla-helper-app.patch
- build and runtime requirement is NSS 3.12.8 - update to 1.9.2.10
* fixing startup topcrash (bmo#594699) - security update to 1.9.2.9 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-59/CVE-2010-2762 (bmo#584180)
SJOW creates scope chains ending in outer object
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using