seamonkey-irc-1.1.18-0.1.1<>,+Jߵ/=„=Fпi&^]F3rMU K>fݰʶ{\H?a+##: 갾x W0v[U)*9X"-B1tS ;z}I23Foh+87&ZPhX>N \J`k4=PѪ%0!E 3p 5Zd?-9{=Wd2T})i("9QW߶"|A wYStZ>=$e?$Ud  / *Fpv{      4(8'9':'>!@"B" F"G",H"<I"LX"PY"XZ"h["l\"p]"^"b#2c#d$$e$)f$.k$0l$5z$ECseamonkey-irc1.1.180.1.1IRC for SeaMonkeyAn IRC Client (Chatzilla) for SeaMonkey. Authors: -------- SeaMonkey Council JǪbrahmsopenSUSE 11.1openSUSEGPL v2 or later; LGPL v2.1 or later; MOZILLA PUBLIC LICENSE (MPL/NPL)http://bugs.opensuse.orgProductivity/Networking/IRChttp://www.mozilla.org/projects/seamonkeylinuxi586/usr/lib/seamonkey/rebuild-databases.sh exit 0/usr/lib/seamonkey/rebuild-databases.sh exit 0&>J]=Z=ZD1cad6e18a7ddf3ddf22c71536af53eac06c5b6659ad32832364e2f59170dfd19bc633465a136de29fce5a7a6d4832bcbf5cff2081f32fdc96512738a3312006afrootrootrootrootrootrootrootrootseamonkey-1.1.18-0.1.1.src.rpmmozilla-ircseamonkey-ircJH@@JJJrpmlib(VersionedDependencies)seamonkey/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-11.1.184.0-13.0.4-14.4.2-14.4.2.3ĴI@I3IHIFFI!\IsH@H@H@H-w@GGu@GG@GC@G9GF&@FF@FFFFzh@FyFw@Fg@F8}@E%E\RE[@EK/@E: E@DDDMDȪmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orghfiguiere@suse.dewr@rosenauer.orgmaw@suse.dewr@rosenauer.orgmaw@suse.dewr@rosenauer.orgmauro@suse.deschwab@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.decthiel@suse.demaw@suse.demaw@suse.demaw@suse.deaj@suse.demaw@suse.deadrian@suse.demaw@suse.demaw@suse.desbrabec@suse.czstbinner@suse.demkoenig@suse.demkoenig@suse.desbrabec@suse.czsbrabec@suse.czaj@suse.destark@suse.destark@suse.deaj@suse.destark@suse.destark@suse.de- update to security release 1.1.18 (bnc#544910) * MFSA 2009-43/CVE-2009-2404: Heap overflow in SSL certificate handling * MFSA 2009-42/CVE-2009-2408: SSL certificate handling \0 issues. - update to security release 1.1.17 (bnc#515951) * MFSA 2009-17/CVE-2009-1307 (bmo#481342) Same-origin violations when Adobe Flash loaded via view-source: scheme * MFSA 2009-21/CVE-2009-1311 (bmo#471962) POST data sent to wrong site when saving web page with embedded frame * MFSA 2009-24/CVE-2009-1392/CVE-2009-1832/CVE-2009-1833 Crashes with evidence of memory corruption (rv:1.9.0.11) * MFSA 2009-26/CVE-2009-1835 (bmo#491801) Arbitrary domain cookie access by local file: resources * MFSA 2009-27/CVE-2009-1836 (bmo#479880) SSL tampering via non-200 responses to proxy CONNECT requests * MFSA 2009-29/CVE-2009-1838 (bmo#489131) Arbitrary code execution using event listeners attached to an element whose owner document is null * MFSA 2009-32/CVE-2009-1841 (bmo#479560) JavaScript chrome privilege escalation * MFSA 2009-33 (bmo#495057) Crash viewing multipart/alternative message with text/enhanced part- security update to 1.1.16 (bnc#488955,489411,492354) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift- update to security release 1.1.15 (bnc#478625) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazards - use nss-shared-helper from 11.1 on which allows migrating to and sharing with other applications using NSS (can be disabled completely exporting MOZ_SM_NO_NSSHELPER=1)- Review and approve changes.- update to security release 1.1.14 (bnc#455804) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html- Review and approve changes.- update to security release 1.1.13 (bnc#439841) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - fixed desktop file syntax and another rpmlint complaint- Review and approve changes.- update to security release 1.1.12 (bnc#429179) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - merged Factoy and mozilla versions (again)- Update to Seamonkey 1.1.11 [bnc#407573, bnc#416147] for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - update enigmail to 0.95.7- Remove unused includes.- Merge changes and fixes from the build service.- Security update to version 1.1.9 (bnc#370353): + MFSA 2008-19/CVE-2008-1241: XUL popup spoofing variant (cross-tab popups) + MFSA 2008-18/CVE-2008-1195 and CVE-2008-1240: Java socket connection to any local port via LiveConnect + MFSA 2008-17/CVE-2007-4879: Privacy issue with SSL Client Authentication + MFSA 2008-16/CVE-2008-1238: HTTP Referrer spoofing with malformed URLs + MFSA 2008-15/CVE-2008-1236 and CVE-2008-1237: Crashes with evidence of memory corruption (rv:1.8.1.13) + MFSA 2008-14/CVE-2008-1233, CVE-2008-1234, and CVE-2008-1235: JavaScript privilege escalation and arbitrary code execution - Respin abuild.patch.- Add mozilla-missing-decl.patch, which is necessary when building against new versions of mozilla-nss (bmo#399589).- Security update to version 1.1.8 (bnc#354469) (thanks, Wolfgang) + MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect + MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files + MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing + MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI + MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution + MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities + MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12) - Update enigmail to version 0.95.6.- Add mozilla-maxpathlen.patch (#354150 and bmo #412610).- Add seamonkey-gcc4.3-fixes.patch.- security update to version 1.1.5 (#332512) (thanks, Wolfgang) * MFSA 2007-29 Crashes with evidence of memory corruption * MFSA 2007-30 onUnload Tailgating * MFSA 2007-31 Digest authentication request splitting * MFSA 2007-32 File input focus stealing vulnerability * MFSA 2007-33 XUL pages can hide the window titlebar * MFSA 2007-34 Possible file stealing through sftp protocol * MFSA 2007-35 XPCNativeWraper pollution using Script object complete advisories on http://www.mozilla.org/projects/security/known-vulnerabilities.html- recommend gpg instead of requireing fixed paths- Added GPG/pinentry requirements (#309160) - Don't run %fdupes on directories where multiple partitions are liable to be mounted.- Correct releasedate.- Merge recent changes from the build service (thanks, Wolfgang): + Update to security release 1.1.4: * MFSA 2007-26 Privilege escalation through chrome-loaded about:blank windows * MFSA 2007-27 Unescaped URIs passed to external programs (only relevant on Windows) + Add gnome-vfs.patch to be able to use helper apps with parameters + Update enigmail to version 0.95.3 + Fixed unreadable GIF in the LEO searchplugin - Use %fdupes.- Use openSUSE instead of SUSE Linux as bookmark.- On x86_64, s390, and s390x, deactivate the hidden visibility support, thereby fixing the build.- fix changelog entry order- Don't hardcode /tmp anywhere; use %{_tmppath} instead.- Merge updates to version 1.1.2 and enigmail version 0.95.0 from the build service (thanks, Wolfgang) - Don't build as root - Add unzip as a build requirement.- Removed invalid desktop Category "Application" (#254654).- install .desktop files into /usr/share/applications- fix build- update to CVS version 20061107 from buildservice [#221676]- Fixed Requires/Provides correctly (#216100#c14).- Do not provide and require internal libraries (#216100). - Use safer place for build-temporary files.- from openSUSE Buildservice (thanks Wolfgang Rosenauer): * update to SeaMonkey 1.1a-20060907 * update enigmail to 0.94.1: Added support for signing attachments with inline-PGP- update to security/stability release 1.0.5 - removed libaoss usage because it's too fragile- update enigmail to 0.94.1 * Added support for signing attachments with inline-PGP- Fix build (remove wrong extern "C").- update to 1.0.4 fixing a major regression in 1.0.3 (#195402)- update to security release 1.0.3 (#195043) - fix overwrite confirmation for GTK filesaver (#179531) - fixed printing crash if the last used printer is not available anymore (#187013)/bin/sh/bin/shmozilla-ircbrahms 1254934442    1.1.18-0.1.1chatzilla.jarchatzilla-window.xpmchatzilla-window16.xpmchatzilla-service.js/usr/lib/seamonkey/chrome//usr/lib/seamonkey/chrome/icons/default//usr/lib/seamonkey/components/-march=i586 -mtune=i686 -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.suse.de/SUSE:openSUSE:11.1:Update:Test/standard/36e444f8f508c57cbb7d94aa5452424f-seamonkeycpiolzma2i586i586-suse-linuxc[]u^RPc..?0]"k%w*wE\9m9Sn| ^/@XMV3QPG5"QuKfTT aKa$hHםnq[TU6'\I@DЏ^9 GD9ۊЉsk4o,%P&"wX&sR ~\G6y0f}35 N4aj«%AEW7E;&U - A:7Z}iR&Cy[U6Р ¡$S-TUr`yĻ*qXl/B& oa3=S&FRʱĠtp %w/E /(Nn!e9D3$湹)(j^=.KWyX^sVnri$o0@vI3$" I%}`J[ ʓb}:gJ>&ŋ oqZL[Zf"FC?NuSʤ2y\v>H;\oc&Gl@余+w b"1JPZdhy\L@ n()yMK#t+oO.?ڄCx C=4|F˸U&\՘bts8KþI- psG<^#)?Ug䬓I22Nx_!-d?^%qz+ّ99rAfo5L }b5kuIMZ| SML19^v2l_8 ٦ 0ۏ?h$P