mozilla-xulrunner192-translations-other-1.9.2.26-3.5 > A
A l p A ? O1kGvm {x`lR= q"Y^Gn$b;.be3794cf589c611df0fd60f54ca1753ef19021b0 &RyJ|{? O1kGvm' eYq>o kU 5EL0eU|e0py7 > > 7 i ? iy d * 3 7 ^ $ ( 0 4 L m h d h 4 h
h h h
4 h h h h p ( 8 , 9 P , : !? , B ^: F ^\ G ^p h H ` h I a h X b Y b$ Z b@ [ bD \ bT h ] c h ^ h b h` c h d iM e iR f iW l iY z ii C mozilla-xulrunner192-translations-other 1.9.2.26 3.5 Extra translations for XULRunner 1.9.2 XULRunner is a single installable package that can be used to bootstrap
multiple XUL+XPCOM applications that are as rich as Firefox and
Thunderbird.
This package contains rarely used languages. O1build10 >vsmozilla / openSUSE_11.4 obs://build.opensuse.org/mozilla MPL-1.1 or GPL-2.0+ or LGPL-2.1+ System/Localization http://www.mozilla.org linux i586 f f `l U f z f g f f f f f * f f v\ f [ \ P f ] f 9 f j (g f f 6 f
f f Q f S f f % f f f v f /6 N f f | v f k f G f R f N f ] f > f 7g f f f , f f fAA큤 O1ʎO1"O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1 O1 O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1O1 O1 b9215e9a3acd0850e875d6eb9b4080ae 5501abfd628633102fec0328a81e615d 9baede280fa1e2225af4acb51139d8d1 4ca52f8beb6c95a8ae39020e4c820df8 074dd5c757759566ad34d611e298b94e fd7a49c7575f1be1a5dabad8d7259f3f bdf91cf28199e41a912b8a953c5a04cd d394172e57b32311e00848bb79e7889a 3d033ea16d954f7e3c23cf1d013d400a 1120227756997aac3502e73acdc34207 1cb69e166635b8a1a83440e1f45bde21 6d131ea049a3e53f5442d75703e0d5ea 03a7e6f457a79b541d69fb0aa6058795 0cc4386985f2375cc932de37946a0248 1e655b18d8def78aba47f06dd00bc302 13495ed90f12bc2aafbaf00871bb0d5a cb1262da24bacac42f5a1cf834834e90 06c2085d6e05f79ba125ab16a7e4373b 568b2c39c5baeba976c03f9af15d31ef f6db42ddf1458205d549c51339d450ff 370cc1416c39752752e8944a4178a992 897b62350c76d0534907a19f25d71123 be10e43274f69a52c3cbf7f7a1a1be61 f5f52ce2c73900170d63bca78e06364a a3d5012cd037295b82c40fc3520d608a e6fd17310850fab1c2f12deae7eac64d d45252245d5cef2123c8d0e03ce6760c 51eb97b454250c60c21cc89ab37c8666 125a05a3a54cb3a48a9165ea8d82ab2b 0e7e91f65b8512e0085139f22673f665 d25b7ddeb25e39838fd68559aed31358 b1cd076e33895946a0c1d61577d3d2ff 7d7236553a546c466a7730b28a21a32b 1532ef6cd88176fee83b403f20befe44 3dee4f1378505543aa940a4a273dfbc4 c9b20384a1111c4f2235fd13441d33d9 29d6d378969417ee5bef317e77726b57 ef0bb81203652edff0ff569a082cbcc4 c75fe999a7fe6de9d8a81f33c9b377d0 5da670de7e89c3f7de673d9c33d4446e b2898d2c11f459ac1bea7df42ce11250 318b950b7ed24087189e4b266ff0c053 01711b2e4a56b108897c1a8288bcf938 f4fb3296d828d127d725d9fe9f06d66c adf12a65f633963f22da46a8de1506af ab29421660499b9aef086b8cd1ad3a89 95ab5107a8e9a15344a23d052298f824 a06a2c1bdc78ee8cbca5b47417bedc9d 556a699fcc9216d8f0009b4349892cd3 9c1f07af32b88ec156527b5b9a32862e 0a2371c53e46412e2961458057165deb c6f0e0ec403e95edfe86bf1a00dff373 68056c2f9019ac1790d83b13087fc5e9 9b657c7c9bfb64c4e60d27a4f4294adc 447d241b98962712cf1119c4149b96a4 345b149117d7b73694c9eeaf127508f9 4ce5be62ad9e8acb3a28a08904fbd764 ff25a129669eb2a19938e06b72f148c0 c144142137d4943adf35297ed094869a d638afe278d02e5e906fea0ad3367d04 7e92432e79f0e87e667189e6e119387e 63d73c7605836d63fe37d19ad53ba899 59996f531e2a4962f52a1d4bda00e16b e7c72f2724ecbd1bb95f199bc2cc86f1 847100ce97a5b61900db5d384c5fe851 2a238e706d3c26e215f31cd24b23ea1b 72ff69278ace1cf330c3f315d432eebf 2fc59bec651b5af3066d28fa7a149988 68eeb0f0062651736c5ff3b7f49ec7c2 b91d2ffb1125553a8426bee76b7a0e0a f5f5274289879b4e64fbbdf10eca275a a98bce50011a13c02116beb6d7609baa c18cf26e1b0efa45a7a7d32e05c29030 3e7a55c9065f93b3489c038822fcb1e3 514a1515519e635cd2673f5873e2dc1a bb623a6bbdeda99028669a8253c79061 987720d8e09f88193f0e85e61079ceec 38557d52a44476e23f8e9e88a6c873e0 2dc3429df46c26d567bd93aab7faf9a5 aa142d79628b4bf3ca95a8c24376e501 0196764261a5f8a0366af09d42477cf7 d56dd0cf1c3a5e362591de3dbb4a4e07 522d0e2d265c918905737444bca6a7da 069779dfb2894c6e917ff207df206df3 4787416eac85821c7d9b43f42bbb5742 93a399e9eb092ebb263ef77f17fa050a 3aeb71c70d86bdff096aeccd87dd7f0a a5358ec7ee8e6d1ac1e1e7bdf99f3475 6b39b0a0251fdf819e3ce2f2187c5382 23906223c3c78d982d629dad352e29fb 4ed53da7245161521eca9b32fe9b226b 6a3fca5691def796950d8350ea46a978 1828db786f2d4a7cd5fa2deb3ecf7ded 22ea934b8eaea5bf9275f86a699f7014 6263bc19511160c1a970cbaf901d96cc 221a47f9e9b91aeed4720b0f05cefd1e 4f76e24769c6e387ce7cb3324002236d d459617804f5ef82f72c9077d2028580 07c83c8aea50c8e83f7ab17a667f2d2f f87ffa1767f56558565cb78b9982401f 8635b74e487ae645ee40dec7b7a46ce3 39076844785d27e549a6b3630b82e0a2 root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root root mozilla-xulrunner192-1.9.2.26-3.5.src.rpm locale(mozilla-xulrunner192:af;as;be;bg;bn_BD;bn_IN;cy;el;eo;es_MX;et;eu;fa;fy_NL;ga_IE;gl;gu_IN;he;hi_IN;hr;id;is;ka;kk;kn;ku;lt;lv;mk;ml;mr;nn_NO;oc;or;pa_IN;rm;ro;si;sk;sl;sq;sr;ta;ta_LK;te;th;tr;uk;vi) mozilla-xulrunner192-translations-other mozilla-xulrunner192-translations-other(x86-32)
mozilla-xulrunner192 rpmlib(VersionedDependencies) rpmlib(PayloadFilesHavePrefix) rpmlib(CompressedFileNames) rpmlib(PayloadIsLzma) 1.9.2.26 3.0.3-1 4.0-1 3.0.4-1 4.4.6-1 4.8.0 ON@N@NyNp@Ng\N`@N;@M6@Mz@M@Mx@MMp@Mn1@Mc@LOL@LdL@L{@L{@LPLN@LJL>@L'=@L!@L@K@KՀ@K@KKP@KTM@KD{@K3WJUJx@J@J`@JjJ@Jwr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org pcerny@suse.com pcerny@suse.com wr@rosenauer.org wr@rosenauer.org cgiboudeaux@gmx.com wr@rosenauer.org llunak@novell.com wr@rosenauer.org wr@rosenauer.org pcerny@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org meissner@suse.de wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org coolo@novell.com wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org wr@rosenauer.org - security update to 1.9.2.26 (bnc#744275)
* MFSA 2012-01/CVE-2012-0442/CVE-2012-0443
Miscellaneous memory safety hazards
* MFSA 2012-02/CVE-2011-3670 (bmo#504014)
* MFSA 2012-04/CVE-2011-3659 (bmo#708198)
Child nodes from nsDOMAttribute still accessible after removal
of nodes
* MFSA 2012-07/CVE-2012-0444 (bmo#719612)
Potential Memory Corruption When Decoding Ogg Vorbis files
* MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466)
Crash with malformed embedded XSLT stylesheets - security update to 1.9.2.25 (bnc#737533)
* MFSA 2011-59/CVE-2011-3666 (bmo#704622)
.jar not treated as executable in Firefox 3.6 on Mac - security update to 1.9.2.24 (bnc#728520)
* MFSA 2011-46/CVE-2011-3647 (bmo#680880)
loadSubScript unwraps XPCNativeWrapper scope parameter
* MFSA 2011-47/CVE-2011-3648 (bmo#690225)
Potential XSS against sites using Shift-JIS
* MFSA 2011-49/CVE-2011-3650 (bmo#674776)
Memory corruption while profiling using Firebug - security update to 1.9.2.23 (bnc#720264)
* MFSA 2011-36/CVE-2011-2996 (bmo#555018)
Miscellaneous memory safety hazards
* MFSA 2011-37/CVE-2011-2998 (bmo#684815)
Integer underflow when using JavaScript RegExp
* MFSA 2011-38/CVE-2011-2999 (bmo#665548)
XSS via plugins and shadowed window.location object
* MFSA 2011-39/CVE-2011-3000 (bmo#655389)
Defense against multiple Location headers due to CRLF Injection
* MFSA 2011-40/CVE-2011-2372/CVE-2011-3001
Code installation through holding down Enter
- bring KDE's dialog.xml in sync with original widget - add dbus-1-glib-devel to BuildRequires (not pulled in
automatically with 12.1) - security update to 1.9.2.22 (bnc#714931)
* Complete blocking of certificates issued by DigiNotar
(bmo#683449) - security update to 1.9.2.21 (bnc#714931)
* MFSA 2011-34
Protection against fraudulent DigiNotar certificates
(bmo#682927) - security update to 1.9.2.20 (bnc#712224)
fixed security issues MFSA 2011-30
* CVE-2011-2982
Miscellaneous memory safety hazards
* CVE-2011-0084 (bmo#648094)
Crash in SVGTextElement.getCharNumAtPosition()
* CVE-2011-2981
Privilege escalation using event handlers
* CVE-2011-2378 (bmo#572129)
Privilege escalation dropping a tab element in content area
* CVE-2011-2980 (bmo#642469)
Binary planting vulnerability in ThinkPadSensor::Startup
* CVE-2011-2983 (bmo#626297)
Private data leakage using RegExp.input
- added mozilla-implicit-declarations.patch to fix rpmlint/gcc
checks
- added mozilla-curl.patch to remove obsolete header dependency
- added mozilla-linux3.patch to make python symbol dumper aware
of the "linux3" platform - security update to 1.9.2.18 (bnc#701296)
* MFSA 2011-19/CVE-2011-2374 CVE-2011-2376 CVE-2011-2364
CVE-2011-2365
Miscellaneous memory safety hazards
* MFSA 2011-20/CVE-2011-2373 (bmo#617247)
Use-after-free vulnerability when viewing XUL document with
script disabled
* MFSA 2011-21/CVE-2011-2377 (bmo#638018, bmo#639303)
Memory corruption due to multipart/x-mixed-replace images
* MFSA 2011-22/CVE-2011-2371 (bmo#664009)
Integer overflow and arbitrary code execution in
Array.reduceRight()
* MFSA 2011-23/CVE-2011-0083 CVE-2011-0085 CVE-2011-2363
Multiple dangling pointer vulnerabilities
* MFSA 2011-24/CVE-2011-2362 (bmo#616264)
Cookie isolation error
- speedier find-external-requires.sh
- do not build dump_syms static as it is not needed for us
- > fixes build for 12.1 and above - Add mozilla-gcc46.patch. Fixes various build errors with GCC4.6 - security update to 1.9.2.17 (bnc#689281)
* MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072
CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078
CVE-2011-0080 CVE-2011-0081
Miscellaneous memory safety hazards
* MFSA 2011-13/CVE-2011-0065/CVE-2011-0066/CVE-2011-0073
Multiple dangling pointer vulnerabilities
* MFSA 2011-14/CVE-2011-0067 (bmo#527935)
Information stealing via form history
* MFSA 2011-18/CVE-2011-1202 (bmo#640339)
XSLT generate-id() function heap address leak - fix 'save as' with KDE integration (bnc#557598) - security update to 1.9.2.16 (bnc#680771)
* MFSA 2011-11
Update HTTPS certificate blacklist (bmo#642395) - update to 1.9.2.15
* fix a regression introduced with previous update affecting
Java applet integration (bmo#629030) - use full path to the ntlm_auth binary (bmo#634334)
(mozilla-ntlm-full-path.patch) - security update to 1.9.2.14 (build3) (bnc#667155)
* MFSA 2011-01/CVE-2011-0053/CVE-2011-0062
Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17)
* MFSA 2011-02/CVE-2011-0051 (bmo#616659)
Recursive eval call causes confirm dialogs to evaluate to true
* MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255)
Use-after-free error in JSON.stringify
* MFSA 2011-04/CVE-2011-0054 (bmo#615657)
Buffer overflow in JavaScript upvarMap
* MFSA 2011-05/CVE-2011-0056 (bmo#622015)
Buffer overflow in JavaScript atom map
* MFSA 2011-06/CVE-2011-0057 (bmo#626631)
Use-after-free error using Web Workers
* MFSA 2011-08/CVE-2010-1585 (bmo#562547)
ParanoidFragmentSink allows javascript: URLs in chrome documents
* MFSA 2011-09/CVE-2011-0061 (bmo#610601)
Crash caused by corrupted JPEG image
* MFSA 2011-10/CVE-2011-0059 (bmo#573873)
CSRF risk with plugins and 307 redirects - security update to 1.9.2.13 (bnc#657016)
* MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778
Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16)
* MFSA 2010-75/CVE-2010-3769 (bmo#608336)
Buffer overflow while line breaking after document.write with
long string
* MFSA 2010-76/CVE-2010-3771 (bmo#609437)
Chrome privilege escalation with window.open and element
* MFSA 2010-77/CVE-2010-3772 (bmo#594547)
Crash and remote code execution using HTML tags inside a XUL tree
* MFSA 2010-78/CVE-2010-3768 (bmo#527276)
Add support for OTS font sanitizer
* MFSA 2010-79/CVE-2010-3775
Java security bypass from LiveConnect loaded via data: URL
meta refresh
* MFSA 2010-80/CVE-2010-3766 (bmo#590771)
Use-after-free error with nsDOMAttribute MutationObserver
* MFSA 2010-81/CVE-2010-3767 (bmo#599468)
Integer overflow vulnerability in NewIdArray
* MFSA 2010-82/CVE-2010-3773 (bmo#554449)
Incomplete fix for CVE-2010-0179
* MFSA 2010-83/VE-2010-3774 (bmo#602780)
Location bar SSL spoofing using network error page
* MFSA 2010-84/CVE-2010-3770 (bmo#601429)
XSS hazard in multiple character encodings - security update to 1.9.2.12 (bnc#649492)
* MFSA 2010-73/CVE-2010-3765 (bmo#607222)
Heap buffer overflow mixing document.write and DOM insertion
- ignore empty LANGUAGE environment variable (bnc#648854) - security update to 1.9.2.11 (bnc#645315)
* MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176
Miscellaneous memory safety hazards
* MFSA 2010-65/CVE-2010-3179 (bmo#583077)
Buffer overflow and memory corruption using document.write
* MFSA 2010-66/CVE-2010-3180 (bmo#588929)
Use-after-free error in nsBarProp
* MFSA 2010-67/CVE-2010-3183 (bmo#598669)
Dangling pointer vulnerability in LookupGetterOrSetter
* MFSA 2010-68/CVE-2010-3177 (bmo#556734)
XSS in gopher parser when parsing hrefs
* MFSA 2010-69/CVE-2010-3178 (bmo#576616)
Cross-site information disclosure via modal calls
* MFSA 2010-70/CVE-2010-3170 (bmo#578697)
SSL wildcard certificate matching IP addresses
* MFSA 2010-71/CVE-2010-3182 (bmo#590753)
Unsafe library loading vulnerabilities
* MFSA 2010-72/CVE-2010-3173
Insecure Diffie-Hellman key exchange
- removed upstreamed patches:
* mozilla-esd.patch
* mozilla-helper-app.patch
- build and runtime requirement is NSS 3.12.8 - update to 1.9.2.10
* fixing startup topcrash (bmo#594699) - security update to 1.9.2.9 (bnc#637303)
* MFSA 2010-49/CVE-2010-3169
Miscellaneous memory safety hazards
* MFSA 2010-50/CVE-2010-2765 (bmo#576447)
Frameset integer overflow vulnerability
* MFSA 2010-51/CVE-2010-2767 (bmo#584512)
Dangling pointer vulnerability using DOM plugin array
* MFSA 2010-53/CVE-2010-3166 (bmo#579655)
Heap buffer overflow in nsTextFrameUtils::TransformText
* MFSA 2010-54/CVE-2010-2760 (bmo#585815)
Dangling pointer vulnerability in nsTreeSelection
* MFSA 2010-55/CVE-2010-3168 (bmo#576075)
XUL tree removal crash and remote code execution
* MFSA 2010-56/CVE-2010-3167 (bmo#576070)
Dangling pointer vulnerability in nsTreeContentView
* MFSA 2010-57/CVE-2010-2766 (bmo#580445)
Crash and remote code execution in normalizeDocument
* MFSA 2010-59/CVE-2010-2762 (bmo#584180)
SJOW creates scope chains ending in outer object
* MFSA 2010-61/CVE-2010-2768 (bmo#579744)
UTF-7 XSS by overriding document charset using