seamonkey-venkman-1.1.16-1.1.2<>$'jFSm#2l>J9q/=„Ķ4m.U6cq^yOI!2(+@BFGHIXYZ[\] ^SbcAdefklzCseamonkey-venkman1.1.161.1.2The SeaMonkey JavaScript DebuggerA javascript debugger for the SeaMonkey web browser. Authors: -------- SeaMonkey Council J9[adalid OopenSUSE 11.1openSUSEGPL v2 or later; LGPL v2.1 or later; MOZILLA PUBLIC LICENSE (MPL/NPL)http://bugs.opensuse.orgDevelopment/Tools/Debuggershttp://www.mozilla.org/projects/seamonkeylinuxi586/usr/lib/seamonkey/rebuild-databases.sh exit 0/usr/lib/seamonkey/rebuild-databases.sh exit 0 Z@q=Z=ZJ9[@35284004c8e7f4eab18325fcb6717ff4f5a0cc889766b45dfd86a8cfb1da2d8b9f2098ae7d73824e7e6797b4a2680daabbc6eb1db690650b4d9395df33c5e384rootrootrootrootrootrootrootrootseamonkey-1.1.16-1.1.2.src.rpmmozilla-venkmanseamonkey-venkmanJH@@JJJrpmlib(VersionedDependencies)seamonkey/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-11.1.164.0-13.0.4-14.4.2-14.4.2.3I@I3IHIFFI!\IsH@H@H@H-w@GGu@GG@GC@G9GF&@FF@FFFFzh@FyFw@Fg@F8}@E%E\RE[@EK/@E: E@DDDMDȪwr@rosenauer.orgwr@rosenauer.orghfiguiere@suse.dewr@rosenauer.orgmaw@suse.dewr@rosenauer.orgmaw@suse.dewr@rosenauer.orgmauro@suse.deschwab@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.demaw@suse.decthiel@suse.demaw@suse.demaw@suse.demaw@suse.deaj@suse.demaw@suse.deadrian@suse.demaw@suse.demaw@suse.desbrabec@suse.czstbinner@suse.demkoenig@suse.demkoenig@suse.desbrabec@suse.czsbrabec@suse.czaj@suse.destark@suse.destark@suse.deaj@suse.destark@suse.destark@suse.de- security update to 1.1.16 (bnc#488955,489411,492354) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift- update to security release 1.1.15 (bnc#478625) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazards - use nss-shared-helper from 11.1 on which allows migrating to and sharing with other applications using NSS (can be disabled completely exporting MOZ_SM_NO_NSSHELPER=1)- Review and approve changes.- update to security release 1.1.14 (bnc#455804) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html- Review and approve changes.- update to security release 1.1.13 (bnc#439841) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - fixed desktop file syntax and another rpmlint complaint- Review and approve changes.- update to security release 1.1.12 (bnc#429179) for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - merged Factoy and mozilla versions (again)- Update to Seamonkey 1.1.11 [bnc#407573, bnc#416147] for details: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.html - update enigmail to 0.95.7- Remove unused includes.- Merge changes and fixes from the build service.- Security update to version 1.1.9 (bnc#370353): + MFSA 2008-19/CVE-2008-1241: XUL popup spoofing variant (cross-tab popups) + MFSA 2008-18/CVE-2008-1195 and CVE-2008-1240: Java socket connection to any local port via LiveConnect + MFSA 2008-17/CVE-2007-4879: Privacy issue with SSL Client Authentication + MFSA 2008-16/CVE-2008-1238: HTTP Referrer spoofing with malformed URLs + MFSA 2008-15/CVE-2008-1236 and CVE-2008-1237: Crashes with evidence of memory corruption (rv:1.8.1.13) + MFSA 2008-14/CVE-2008-1233, CVE-2008-1234, and CVE-2008-1235: JavaScript privilege escalation and arbitrary code execution - Respin abuild.patch.- Add mozilla-missing-decl.patch, which is necessary when building against new versions of mozilla-nss (bmo#399589).- Security update to version 1.1.8 (bnc#354469) (thanks, Wolfgang) + MFSA 2008-10/CVE-2008-0593 URL token stealing via stylesheet redirect + MFSA 2008-09/CVE-2008-0592 Mishandling of locally-saved plain text files + MFSA 2008-06/CVE-2008-0419 Web browsing history and forward navigation stealing + MFSA 2008-05/CVE-2008-0418 Directory traversal via chrome: URI + MFSA 2008-03/CVE-2008-0415 Privilege escalation, XSS, Remote Code Execution + MFSA 2008-02/CVE-2008-0414 Multiple file input focus stealing vulnerabilities + MFSA 2008-01/CVE-2008-0412 Crashes with evidence of memory corruption (rv:1.8.1.12) - Update enigmail to version 0.95.6.- Add mozilla-maxpathlen.patch (#354150 and bmo #412610).- Add seamonkey-gcc4.3-fixes.patch.- security update to version 1.1.5 (#332512) (thanks, Wolfgang) * MFSA 2007-29 Crashes with evidence of memory corruption * MFSA 2007-30 onUnload Tailgating * MFSA 2007-31 Digest authentication request splitting * MFSA 2007-32 File input focus stealing vulnerability * MFSA 2007-33 XUL pages can hide the window titlebar * MFSA 2007-34 Possible file stealing through sftp protocol * MFSA 2007-35 XPCNativeWraper pollution using Script object complete advisories on http://www.mozilla.org/projects/security/known-vulnerabilities.html- recommend gpg instead of requireing fixed paths- Added GPG/pinentry requirements (#309160) - Don't run %fdupes on directories where multiple partitions are liable to be mounted.- Correct releasedate.- Merge recent changes from the build service (thanks, Wolfgang): + Update to security release 1.1.4: * MFSA 2007-26 Privilege escalation through chrome-loaded about:blank windows * MFSA 2007-27 Unescaped URIs passed to external programs (only relevant on Windows) + Add gnome-vfs.patch to be able to use helper apps with parameters + Update enigmail to version 0.95.3 + Fixed unreadable GIF in the LEO searchplugin - Use %fdupes.- Use openSUSE instead of SUSE Linux as bookmark.- On x86_64, s390, and s390x, deactivate the hidden visibility support, thereby fixing the build.- fix changelog entry order- Don't hardcode /tmp anywhere; use %{_tmppath} instead.- Merge updates to version 1.1.2 and enigmail version 0.95.0 from the build service (thanks, Wolfgang) - Don't build as root - Add unzip as a build requirement.- Removed invalid desktop Category "Application" (#254654).- install .desktop files into /usr/share/applications- fix build- update to CVS version 20061107 from buildservice [#221676]- Fixed Requires/Provides correctly (#216100#c14).- Do not provide and require internal libraries (#216100). - Use safer place for build-temporary files.- from openSUSE Buildservice (thanks Wolfgang Rosenauer): * update to SeaMonkey 1.1a-20060907 * update enigmail to 0.94.1: Added support for signing attachments with inline-PGP- update to security/stability release 1.0.5 - removed libaoss usage because it's too fragile- update enigmail to 0.94.1 * Added support for signing attachments with inline-PGP- Fix build (remove wrong extern "C").- update to 1.0.4 fixing a major regression in 1.0.3 (#195402)- update to security release 1.0.3 (#195043) - fix overwrite confirmation for GTK filesaver (#179531) - fixed printing crash if the last used printer is not available anymore (#187013)/bin/sh/bin/shmozilla-venkmanadalid 1245273085    g< gM f f1.1.16-1.1.2venkman-window.xpmvenkman-window16.xpmvenkman.jarvenkman-service.js/usr/lib/seamonkey/chrome/icons/default//usr/lib/seamonkey/chrome//usr/lib/seamonkey/components/-march=i586 -mtune=i686 -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.suse.de/SUSE:openSUSE:11.1:Update:Test/standard/228ef644716c847ddf48ceabb4422acf-seamonkeycpiolzma2i586i586-suse-linux He l?0]"k%YwE]ss=rs*#eo BZk'us$9sE7>/5@`|hX.s:#n҉Mŷ2$H<#S|AT`D6HgŴ3P*5;$N:;Ω@x1.o鄎G~j"ۆA!u0БNtY,fG~'wk5qVz2ҕDx`ç`[{5o6MU*8fllgS(y1t&ԉŠ0GxvHQhV2MqB0\BCG庸 V*gr2[΁D4B Z]7HRBB]M6{?0CPG=w\y΁((}VTE$cp=O}%Մ>2#v8^wcgJkxGdHpc{K8q?K"{b4=x~gI } ' Vxt:D`&jǞOD7`O{QSj|K*4D:R%N"!cC=r K5dʼnveNzńg؝DȎTs—Po;B2`ߝv檠k˶.]"zhE.)