mozilla-js-10.0.4-2.1> A AlpA?OkGvmwZ4Ww%dġj`ҹ> Qmm0c1c43db4a74fdc3aa8f5fcde92dfb28e8a6609d+{=Ī ?OkGvmHLfV\pԴ^BdcaDAT>cP->4;?+d   *LPX\t     3 HTcr0O({89:FmGHIXY\]^bcdef l zCmozilla-js10.0.42.1Mozilla JS engineJavaScript is the Netscape-developed object scripting language used in millions of web pages and server applications worldwide. Netscape's JavaScript is a superset of the ECMA-262 Edition 3 (ECMAScript) standard scripting language, with only mild differences from the published standard.OQbuild31-mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+ or LGPL-2.1+Productivity/Otherhttp://www.mozilla.org/linuxi586-AO element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - removed obsolete ppc64 patch - disable neon for ARM as it doesn't build correctly- update to Firefox 9.0.1 * (strongparent) parentNode of element gets lost (bmo#335998)- update to release 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling