mozilla-js192-1.9.2.8-1.1.1 > t
D H ` p Le!/=$LJNK!OYt`ZI/be+HCSCl*LSbXק#.
ήӮynoZ1
8Kj_~A [$~1 2^Y.4H$
>'T7smXx! Ἐy0b}SE?Uj-R'YT d]7F
+KzT`y
2H~df17714e63c49b795f616a3527bb080cd9ad3882 MЉ Le!/=i~PY
)k$ٱ*Y].=(قm:!֊㜹vn T% >>GD_ Mhźe\ػ(hQky4 .1Jwֻj8o({ZMIt2QHlxp&^lbs!E`/9`Rh&3Q'JB-G5:b-zyN
¤G"SAVIξ+C{+9(PM^شA
~9sH%003 > 5 !^ ? !N d 4 T X ` d r {
/
D P _ n ( ( 8 9 P : F l G H I X Y \ ] ^ b ( c d !" e !' f !, l !. z !> C mozilla-js192 1.9.2.8 1.1.1 Mozilla JS 1.8 engine JavaScript is the Netscape-developed object scripting language used in millions
of web pages and server applications worldwide. Netscape's JavaScript is a
superset of the ECMA-262 Edition 3 (ECMAScript) standard scripting language,
with only mild differences from the published standard. Le build36 XopenSUSE 11.2 openSUSE GPLv2+ ; LGPLv2.1+ ; MPLv1.1+ http://bugs.opensuse.org Productivity/Other http://www.mozilla.org linux i586 XA LeLeLLe9 08e198fe657de5da0e9135733348bed9 xulrunner-1.9.2.8 root root root root root root mozilla-xulrunner192-1.9.2.8-1.1.1.src.rpm libmozjs.so mozilla-js192 mozilla-js192(x86-32)
@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @
rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.1.3) libc.so.6(GLIBC_2.2) libc.so.6(GLIBC_2.3.4) libc.so.6(GLIBC_2.4) libgcc_s.so.1 libgcc_s.so.1(GLIBC_2.0) libm.so.6 libm.so.6(GLIBC_2.0) libnspr4.so libpthread.so.0 libpthread.so.0(GLIBC_2.0) libstdc++.so.6 libstdc++.so.6(CXXABI_1.3) libstdc++.so.6(GLIBCXX_3.4) rpmlib(PayloadIsLzma) 4.0-1 3.0.4-1 4.4.6-1 4.7.1 LPLN@LJL>@L'=@L!@L@K@KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.org meissner@suse.de wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org coolo@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - fixed sound notifications through libesd (bmo#579877)
- updated libproxy implementation after upstream review (bmo#517655)
- added lcd filter patch for internal cairo - disable ipc and crashreport for ia64,ppc,ppc64,s390,s390x. - security update to 1.9.2.8 (bnc#622506)
* MFSA 2010-48/CVE-2010-2755 (bmo#575836)
Dangling pointer crash regression from plugin parameter array
fix - security update to 1.9.2.7 (bnc#622506)
* MFSA 2010-34/CVE-2010-1211/CVE-2010-1212
Miscellaneous memory safety hazards
* MFSA 2010-35/CVE-2010-1208 (bmo#572986)
DOM attribute cloning remote code execution vulnerability
* MFSA 2010-36/CVE-2010-1209 (bmo#552110)
Use-after-free error in NodeIterator
* MFSA 2010-37/CVE-2010-1214 (bmo#572985)
Plugin parameter EnsureCachedAttrParamArrays remote code
execution vulnerability
* MFSA 2010-38/CVE-2010-1215 (bmo#567069)
Arbitrary code execution using SJOW and fast native function
* MFSA 2010-39/CVE-2010-2752 (bmo#574059)
nsCSSValue::Array index integer overflow
* MFSA 2010-40/CVE-2010-2753 (bmo#571106)
nsTreeSelection dangling pointer remote code execution
vulnerability
* MFSA 2010-41/CVE-2010-1205 (bmo#570451)
Remote code execution using malformed PNG image
* MFSA 2010-42/CVE-2010-1213 (bmo#568148)
Cross-origin data disclosure via Web Workers and importScripts
* MFSA 2010-43/CVE-2010-1207 (bmo#571287)
Same-origin bypass using canvas context
* MFSA 2010-44/CVE-2010-1210 (bmo#564679)
Characters mapped to U+FFFD in 8 bit encodings cause subsequent
character to vanish
* MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957)
Multiple location bar spoofing vulnerabilities
* MFSA 2010-46/CVE-2010-0654 (bmo#524223)
Cross-domain data theft using CSS
* MFSA 2010-47/CVE-2010-2754 (bmo#568564)
Cross-origin data leakage from script filename in error messages - update to 1.9.2.6 release
* modifies the crash protection feature to increase the amount
of time that plugins are allowed to be non-responsive before
being terminated.
- require exact matching version of mozilla-js192 - update to final 1.9.2.4 release (bnc#603356)
* MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/
CVE-2010-1203
Crashes with evidence of memory corruption (rv:1.9.2.4)
* MFSA 2010-28/CVE-2010-1198 (bmo#532246)
Freed object reuse across plugin instances
* MFSA 2010-29/CVE-2010-1196 (bmo#534666)
Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal
* MFSA 2010-30/CVE-2010-1199 (bmo#554255)
Integer Overflow in XSLT Node Sorting
* MFSA 2010-31/CVE-2010-1125 (bmo#552255)
focus() behavior can be used to inject or steal keystrokes
* MFSA 2010-32/CVE-2010-1197 (bmo#537120)
Content-Disposition: attachment ignored if
Content-Type: multipart also present
* MFSA 2010-33/CVE-2008-5913 (bmo#475585)
User tracking across sites using Math.random() - update to 1.9.2.4(build6) - security update to 1.9.2.4 (Lorentz)
* enable crashreporter also for x86-64
* provide mozilla-runtime to host NPAPI out of process plugins
- removed libproxy debug message (bnc#604711) - point alternatives link to the stable version to improve
robustness (bnc#589037) - buildrequire pkg-config to fix provides - security update to 1.9.2.3
* MFSA 2010-25/CVE-2010-1121 (bmo#555109)
Re-use of freed object due to scope confusion - security update to 1.9.2.2 (bnc#586567)
* MFSA 2010-08/CVE-2010-1028
WOFF heap corruption due to integer overflow
* MFSA 2010-09/CVE-2010-0164 (bmo#547143)
Deleted frame reuse in multipart/x-mixed-replace image
* MFSA 2010-10/CVE-2010-0170 (bmo#541530)
XSS via plugins and unprotected Location object
* MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167
Crashes with evidence of memory corruption
* MFSA 2010-12/CVE-2010-0171 (bmo#531364)
XSS using addEventListener and setTimeout on a wrapped object
* MFSA 2010-13/CVE-2010-0168 (bmo#540642)
Content policy bypass with image preloading
* MFSA 2010-14/CVE-2010-0169 (bmo#535806)
Browser chrome defacement via cached XUL stylesheets
* MFSA 2010-15/CVE-2010-0172 (bmo#537862)
Asynchronous Auth Prompt attaches to wrong window
* MFSA 2010-16/CVE-2010-0173/CVE-2010-0174
Crashes with evidence of memory corruption
* MFSA 2010-18/CVE-2010-0176 (bmo#538308)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-19/CVE-2010-0177 (bmo#538310)
Dangling pointer vulnerability in nsPluginArray
* MFSA 2010-20/CVE-2010-0178 (bmo#546909)
Chrome privilege escalation via forced URL drag and drop
* MFSA 2010-22/CVE-2009-3555 (bmo#545755)
Update NSS to support TLS renegotiation indication
* MFSA 2010-23/CVE-2010-0181 (bmo#452093)
Image src redirect to mailto: URL opens email editor
* MFSA 2010-24/CVE-2010-0182 (bmo#490790)
XMLDocument::load() doesn't check nsIContentPolicy
- general.useragent.locale in profile overrides
intl.locale.matchOS (bmo#542999)
- split mozilla-js192 package which contains libmozjs only
to allow its installation w/o all GUI dependencies - update to 1.9.2rc2
- add update-alternatives %ghost file to filelist starting
with 11.2 (%ghost files are conflicting in earlier versions)
- fixed mozilla-plugin.pc (remove obsolete stable reference) - update to 1.9.2rc1
* removed obsolete mozilla-breakpad.patch
- expand -translations-* and -gnome filelists to clean up the
filesystem for upgrades and removals correctly
- enable crashreporter and create breakpad buildsymbols package
for mozilla crashreporter (for ix86)
- drop PreReq usage by cleaning up the different Requires tags - update to 1.9.2b5
- removed upstreamed mozilla-abi.patch
- integrated mozilla-kde.patch
- use .autoreg file for autoregistration when needed (bnc#440872)
- enable libproxy support from 11.2 on
- renamed -gnomevfs subpackage to -gnome
- readded lockdown patches and preferences
- fix baselibs.conf - update to 1.9.2b2
- merge from xulrunner191 package - update to 1.9.2b1
- use newer internal cairo for 11.1 and older - reworked PreReq list - update to snapshot 1.9.2b2pre (20091015)
(entering beta phase) - BuildRequire libiw-devel instead of wireless-tools from 11.2 on - new snapshot (20090916) - first alpha package of XULRunner 1.9.2 build36 1281695773 U y 1.9.2.8-1.1.1 1.9.2.8-1.1.1 xulrunner-1.9.2 xulrunner-1.9.2.8 libmozjs.so /usr/lib/ /usr/lib/xulrunner-1.9.2.8/ -fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -g obs://build.opensuse.org/openSUSE:11.2:Update:Test/standard/63269bf523052117c72ac53bfb4ee626-mozilla-xulrunner192 cpio lzma 2 i586-suse-linux %g1dc^ ? ]
b2
w11d+<̡fs!|-^Nr cCjWRTr'|k)^ƾ4S( 㵂K9,8>z B}wsqmH{|<صT6c3.:ߺfNýjV
B uQ]'k&
w\YKM`VC0q'ݶ.˙1}:tT1e<H,IppSeZ{k&2ʅGDD`jB6KpcOr(]/8/ yKGOr5&L|
#WAS8ɬe5S\O%TT٦YnzrD=uS\& 賈ɛG*8%^J<BsrFxn]}י
Di_묳vx`{|Zg
x n73LפHp =Ԙ ?x8z@= }.m/q|>}*FNQZJ<*kێX0M;Ǩ(ny|05ڇjf*}~+ı3K4?UrE]ϝCPS]eMX)\5*kSմ77Ҧ$Uwb͙>Cr?ᶺRD;7%.B0d
^\a9FnlC)<^ѵF4r3λ`y$%y{wɮioKdVy ݑ/դmun{ѱ}G.3nq/t)R5#+zF0# e;nS_z-y& -Z3D}S,/߾G9 ^Mͼt͇ǕڅC#2wKrMڊ&Q
֫`#g]O|۽ƥ1J#n`ԩ&k].1)ۏ8+ᰇSWʹE+ Dk[2=4:ڤI~_; pW
#Hn6Xm'f3&e