seamonkey-translations-common-2.0.14-0.2.1 > t
D H ` p M |/=[-3KNbe!^."MHEdrr+!kƾ Ӄȧچ!Z""#g
n;CڐqA@@삦aAm5
kދ˙B7PNY %VP|syDD6(0U|ܳu:O?Sn. #ٚꌏsrUṂ5^S;fjr{rPmcn4aec80e7a49a1ac68c6c35b9d0aeb3729025ac0d Aky M |/=2vױ>(;sA@&I=;gC.`k
:yh ESíFq]N/vl9L3b "^m#Q!?^Ppn"D(w J@@t:>LJb7GoXG1iGMSלV;Bd'jلHeTR{5+;lXT1AH̺qFY47072xTX+.U)x > 5 C ? B d ' - O E K T $ $ , $
t $ $ $
$ \ $ $ $
t ( 8 9 0 :
F >= G >P $ H > $ I ?p $ X ? Y ? \ ? $ ] @L $ ^ A b A c B\ d B e B f B l B z B C seamonkey-translations-common 2.0.14 0.2.1 Common translations for SeaMonkey This package contains several optional languages for the user interface
of SeaMonkey. Mbuild35 xopenSUSE 11.4 openSUSE MPLv1.1 or GPLv2+ or LGPLv2.1+ http://bugs.opensuse.org System/Localization http://www.mozilla.org/projects/seamonkey linux x86_64 !0 c "J' c $ c !~ h !; h !z h ! c ( c # c c # c !g; h "Z c "g c !8 h - c # h !: h MMMMMMMMMMMMMMMMMMMMMMM
M
MMMMMMM!M!M(M(M0M046158cf3350052ba53b548451244e0c0 fb24f68fc33643f100b8838ffe0eb464 e345c0f852a789849b598220a75c3053 0eee91bd194fcc2703464db385152bbb 6f58d727e58764a0623ec55337569c35 2361a54d3390603108bcc2a00ce03c6b 6c8a1d7e0e6c249acbdf00dccc68a1bc bc2c8509d67b45469573ac08d8a90224 f8208328418014a407741213f0af575c 3f702cc88059b151b7781c9ece09028b 31d6f4b7dacfb599e56fefa8d35d18d8 0f797beaf5adbb1ebfe7aa4818eec5d3 f147095aa8051859b59f1025e6eee777 13749770e2f50c7a65221d32a21b739b b22eb72e295361817a9372fc504a8013 080b1c67751cda723928e0d435ea5298 13b799bfa6cfab5410fc94b01475ee20 684876d5f44092859b014850d04f39c9 46673e8e61965d6d883ce080681c1f79 673ecd7ff6d365dbb33631e1e20ee195 f5fcef5577488ff426070b09ad1c79d4 56513cceb2f39665e0baa3a5026bb328 89b2d83d2a91ee4138991772d2c8664b a2ce1e6f6494278b75c52422979f6c8b cd9865213979aefad986dff5a0cfc0a2 edfee4a1ac94b925be90f6ece8697734 ba4f90b12734bdea80449600f56b073a a04b9145ba83703e94681c9fc0b26a32 1e17e34cc70acc2e02cecb8de4fa7ea8 ed1e1ada283120be498259cdc84d6489 ca02bce5d923f9a0181f95462058f93e baee6dda164a73904e22621021042142 06abb3dc1434fc6009f5cc531c9573cd 8eafb14245f3ad7bcb9927c48402bca6 f1ecf7fed5c588f3f23d120e367109e9 2c448b715782d7ba28428dcc3f23df97 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root seamonkey-2.0.14-0.2.1.src.rpm locale(seamonkey:ca;cs;de;es_AR;es_ES;;fr;hu;it;ja;nb_NO;nl;pl;pt_PT;ru;sv_SE) seamonkey-translations-common seamonkey-translations-common(x86-64)
rpmlib(VersionedDependencies) seamonkey rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 3.0.3-1 2.0.14 4.0-1 3.0.4-1 4.4.6-1 4.8.0 MmM@MM=iM*LOL@L@L@LvW@L@IK K@KK{@KTM@KC)K JTJ@J0@J:Jn@JeJUJ8I@I3pcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org vuntz@opensuse.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org @rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - fixed hunspell patch - security update to version 2.0.14 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - security update to version 2.0.13 (bnc#680771)
* MFSA 2011-11 (bmo#642395)
Update HTTPS certificate blacklist - security update to version 2.0.12 (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - add x-scheme-handlers to desktop files as needed by newer Gnome
environment - security update to version 2.0.11 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to version 2.0.10 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion - security update to version 2.0.9 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753, bnc#642502)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
* removed upstreamed mozilla-helper-app.patch
- require mozilla-nss >= 3.12.8 - update to 2.0.8
* fixing startup topcrash (bmo#594699)
* add "face" to the list of white-listed attributes (bmo#592601)
- added Cairo LCD filter patch to enable subpixel hinting where
supported (bnc#638186) (mozilla-cairo-lcd.patch) - security upate to 2.0.7 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-60/CVE-2010-2763 (bmo#585284)
XSS using SJOW scripted function
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using