MozillaFirefox-4.0.0-0.3.1<>,`MU/=„K ?ya 9^Fu[w:ec+a;y'm 9Cx"tK1xh֊:X_px& {c h$b`- =&GvT#8%D'ǀ5CneK4$q#Fvn]@4R+5[9pA J(MH/^= ף~X?&oH6O0>9}?}d  9! :_w}@{ ,{  "{  { { { x{d{{!2!X{#D $/%D/(/()=8)D39*3:-t3>j@jFjGj{Hl{In|{Xn Yo, \o`{]qL{^x&b|}c}d}qe}vf}{l}}z}CMozillaFirefox4.0.00.3.1Mozilla Firefox Web BrowserMozilla Firefox is a standalone web browser, designed for standards compliance and performance. Its functionality can be enhanced via a plethora of extensions.Mbuild24MxEopenSUSE 11.4openSUSEGPLv2+ ; LGPLv2.1+ ; MPLv1.1+http://bugs.opensuse.orgProductivity/Networking/Web/Browsershttp://www.mozilla.org/linuxi586# update mime and desktop database if test -x /usr/bin/update-mime-database; then /usr/bin/update-mime-database "/usr/share/mime" || true fi if test -x /usr/bin/update-desktop-database; then /usr/bin/update-desktop-database --quiet "/usr/share/applications" || true fi ICON_THEME="hicolor" if test -x /usr/bin/gtk-update-icon-cache; then /usr/bin/gtk-update-icon-cache --quiet --force "/usr/share/icons/${ICON_THEME}" || true fi exit 0 if [ $1 -eq 0 ]; then ICON_THEME="hicolor" if test -x /usr/bin/gtk-update-icon-cache; then /usr/bin/gtk-update-icon-cache --quiet --force "/usr/share/icons/${ICON_THEME}" || true fi fi if [ $1 -eq 0 ]; then if test -x /usr/bin/update-desktop-database; then /usr/bin/update-desktop-database --quiet "/usr/share/applications" || true fi fi if [ $1 -eq 0 ]; then if test -x /usr/bin/update-mime-database; then /usr/bin/update-mime-database "/usr/share/mime" || true fi fi exit 0?09 `N$Jy 3zM <4xK2eY%[. 2'%GxE@1d[O'!geb!2)|:y5H%|~I 1Xy+"1TUH-yP9 ]H. v#|V===$&&A큤A큤AA큤A큤큤AA큤AA큤AAAA큤A큤A큤A큤A큤A큤A큤A큤AAAA큤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../lib/firefox/firefox.sh../../../../../lib/firefox/chrome/icons/default/default16.png../../../../../lib/firefox/chrome/icons/default/default32.png../../../../../lib/firefox/chrome/icons/default/default48.png../../lib/firefox/icons/mozicon128.png../../lib/firefox/icons/mozicon128.pngrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootMozillaFirefox-4.0.0-0.3.1.src.rpmweb_browserfirefoxfirefoxmimehandler(application/vnd.mozilla.xul+xml)mimehandler(application/x-xpinstall)mimehandler(application/xhtml+xml)mimehandler(text/html)mimehandler(text/mml)mimehandler(text/xml)mimehandler(x-scheme-handler/http)mimehandler(x-scheme-handler/https)MozillaFirefoxMozillaFirefox(x86-32)      @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ rpmlib(VersionedDependencies)coreutilsshared-mime-infodesktop-file-utilsshared-mime-infodesktop-file-utilsmozilla-xulrunner20mozilla-xulrunner20mozilla-xulrunner20-32bitmozilla-xulrunner20-32bitMozillaFirefox-branding/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/bin/shld-linux.so.2ld-linux.so.2(GLIBC_2.3)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.2)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libgcc_s.so.1libgcc_s.so.1(GLIBC_2.0)libgdk-x11-2.0.so.0libgdk_pixbuf-2.0.so.0libglib-2.0.so.0libgobject-2.0.so.0libmozalloc.solibnspr4.solibplc4.solibpthread.so.0libpthread.so.0(GLIBC_2.0)libpthread.so.0(GLIBC_2.1)libstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.solibxul.sorpmlib(PayloadIsLzma)3.0.3-12.0.0-0.3.12.0.02.0.0-0.3.12.0.04.04.0-13.0.4-14.4.6-14.8.0MI@MdMK@MBM:M,F@M!@ML@L@LdL@LvW@LPLJL@IL'=@L!@L @K@KKKTM@KD{@K4@K*@K@K y@J@JٱĴJ@JJ@J@J|@JrJn@J]JQ@JI@J@J:,@J*Z@J+@J@IIII̿Ixwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- update to version 4.0 (rc2) - fixed rpm macros delivered with devel package (bnc#679950)- update to version 4.0b12 - rebased patches- update to version 4.0b11 * loads of bugfixes compared to last beta * added "Do Not Track" option - rebased patches - disable testpilot- set correct desktop file name within KDE for 11.4 and up - add devel package with macros for extensions (from lnussel@suse.de)- update to version 4.0b10 - removed obsolete firefox-shell-bmo624267.patch - testpilot moved to distribution/extensions - updated locale provides and removed bn-IN from locales- update to version 4.0b9 - added x-scheme-handler for http and https to desktop file for newer Gnome environments - fixed default browser check/set for GIO (bmo#611953) (mozilla-shellservice.patch) - removed obsolete firefox-appname.patch (integrated into shellservice patch) - renamed desktop file to firefox.desktop for 11.4 and newer (bnc#664211) - removed support for 10.3 and older from the spec file - removed obsolete "Ximian" categories from desktop file- Mirror ac_add_options --disable-ipc from xulrunner for PowerPC.- update to version 4.0beta8- major update to version 4.0beta7 * based on mozilla-xulrunner20 * far too many internal changes to list- security update to 3.6.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to 3.6.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange- update to 3.6.10 * fixing startup topcrash (bmo#594699)- security update to 3.6.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText- disable crash reporter for non x86/x86_64 to make it build.- security update to 3.6.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 3.6.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 3.6.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated.- update to final 3.6.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 3.6.4(build6)- security update to 3.6.4 (Lorentz) * enable crashreporter also for x86-64 * Flash runs in a separate process to avoid crashing Firefox (ix86 only; x86-64 still uses nspluginwrapper)- security update to 3.6.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to version 3.6.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy- update to 3.6rc2 (already named 3.6.0) - removed obsolete orbit-devel build requirement- major update to 3.6rc1- update to version 3.5.7 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193) - added missing lockdown preferences (bnc#567131)- readded firefox-ui-lockdown.patch (bnc#546158)- security update to version 3.5.6 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener - fixed firefox-browser-css.patch (bnc#561027)- rebased patches for fuzz=0- update to version 3.5.5 (bnc#553172)- security update to version 3.5.4 (bnc#545277) * MFSA 2009-52/CVE-2009-3370 (bmo#511615) Form history vulnerable to stealing * MFSA 2009-53/CVE-2009-3274 (bmo#514823) Local downloaded file tampering * MFSA 2009-54/CVE-2009-3371 (bmo#514554) Crash with recursive web-worker calls * MFSA 2009-55/CVE-2009-3372 (bmo#500644) Crash in proxy auto-configuration regexp parsing * MFSA 2009-56/CVE-2009-3373 (bmo#511689) Heap buffer overflow in GIF color map parser * MFSA 2009-57/CVE-2009-3374 (bmo#505988) Chrome privilege escalation in XPCVariant::VariantDataToJS() * MFSA 2009-59/CVE-2009-1563 (bmo#516396, bmo#516862) Heap buffer overflow in string to number conversion * MFSA 2009-61/CVE-2009-3375 (bmo#503226) Cross-origin data theft through document.getSelection() * MFSA 2009-62/CVE-2009-3376 (bmo#511521) Download filename spoofing with RTL override * MFSA 2009-63/CVE-2009-3377/CVE-2009-3379/CVE-2009-3378 Upgrade media libraries to fix memory safety bugs * MFSA 2009-64/CVE-2009-3380/CVE-2009-3381/CVE-2009-3383 Crashes with evidence of memory corruption - removed upstreamed patch * firefox-bug506901.patch- fix KDE button order in one more place (bnc#170055)- improve UI colors to be usable with dark themes at all (firefox-browser-css.patch) (bnc#503351) - extend list of supported architectures as ABI identifier (mozilla-abi.patch) (bnc#543460)- added KDE integration patch from llunak@novell.com (firefox-kde.patch) * support for knotify, making -kde4-addon obsolete * KDE-specific support functional (bnc#170055) - do not build libnkgnomevfs (bmo#512671) (firefox-no-gnomevfs)- security update to version 3.5.3 (bnc#534458) * MFSA 2009-47/CVE-2009-3069/CVE-2009-3070/CVE-2009-3071/ CVE-2009-3072/CVE-2009-3073/CVE-2009-3074/CVE-2009-3075 Crashes with evidence of memory corruption * MFSA 2009-49/CVE-2009-3077 (bmo#506871) TreeColumns dangling pointer vulnerability * MFSA 2009-50/CVE-2009-3078 (bmo#453827) Location bar spoofing via tall line-height Unicode characters * MFSA 2009-51/CVE-2009-3079 (bmo#454363) Chrome privilege escalation with FeedWriter- renamed patch firefox-contextmenu-gnome to firefox-cross-desktop as it contains more tweaks to handle non-Gnome environments and especially KDE integration: * added the ability to set the KDE default browser (still part of bnc#170055)- split -translations package into -common and -other (bnc#529180) - remove "set as background" from context menu if not running in Gnome (part of bnc#170055)- security update to version 3.5.2 * MFSA 2009-38/CVE-2009-2470 (bmo#459524) Data corruption with SOCKS5 reply containing DNS name longer than 15 characters * MFSA 2009-44/CVE-2009-2654 (bmo#451898) Location bar and SSL indicator spoofing via window.open() on invalid URL * MFSA 2009-45 Crashes with evidence of memory corruption * MFSA 2009-46 (bmo#498897) Chrome privilege escalation due to incorrectly cached wrapper * various other stability fixes - export MOZ_APP_LAUNCHER in the startscript (bmo#453689)- fixed %exclude usage - fixed preferences' advanced pane for fresh profiles (bmo#506901)- security update to version 3.5.1 * MFSA 2009-41 Corrupt JIT state after deep return from native function- added mozilla-linkorder.patch to fix build with --as-needed- update to final version 3.5 (20090623)- fixed build by linking to a real file- update to version 3.5rc2 (20090617) - BuildRequire mozilla-xulrunner191 = 1.9.1.0- update to version 3.5b99 (20090604) - BuildRequire mozilla-xulrunner191 = 1.9.1b99- fixed typos in improved xulrunner dependencies- use non-localized Downloads folder (bnc#501724)- update to new major version 3.5b4 * based on Gecko 1.9.1 (mozilla-xulrunner191) * Private Browsing Mode * TraceMonkey JavaScript engine * Geolocation support * native JSON and web worker threads support * speculative parsing for faster content rendering * Some HTML5 support - updated firefox.schemas - improved firefox-no-update.patch- security update to 3.0.10 * MFSA 2009-23/CVE-2009-1313 (bmo#489647) Crash in nsTextFrame::ClearTextRun()- security update to 3.0.9 (bnc#495473) * MFSA 2009-14/CVE-2009-1302/CVE-2009-1303/CVE-2009-1304/CVE-2009-1305 Crashes with evidence of memory corruption (rv:1.9.0.9) * MFSA 2009-15/CVE-2009-0652 (bmo#479336) URL spoofing with box drawing character * MFSA 2009-16/CVE-2009-1306 (bmo#474536) jar: scheme ignores the content-disposition: header on the inner URI * MFSA 2009-17/CVE-2009-1307 (bmo#481342) Same-origin violations when Adobe Flash loaded via view-source: scheme * MFSA 2009-18/CVE-2009-1308 (bmo#481558) XSS hazard using third-party stylesheets and XBL bindings * MFSA 2009-19/CVE-2009-1309 (bmo#482206,478433) Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString * MFSA 2009-20/CVE-2009-1310 (bmo#483086) Malicious search plugins can inject code into arbitrary sites * MFSA 2009-21/CVE-2009-1311 (bmo#471962) POST data sent to wrong site when saving web page with embedded frame * MFSA 2009-22/CVE-2009-1312 (bmo#475636) Firefox allows Refresh header to redirect to javascript: URIs- security update to 1.9.0.8 (bnc#488955,489411) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift - allow RPM provides for stuff besides shared libraries (e.g. mime-types)- security update to 3.0.7 (bnc#478625) * MFSA 2009-07 - Crashes with evidence of memory corruption CVE-2009-0771 - Layout Engine Crashes CVE-2009-0772 - Layout Engine Crashes CVE-2009-0773 - crashes in the JavaScript engine CVE-2009-0774 - Layout Engine Crashes * MFSA 2009-08/CVE-2009-0775 - (bmo#474456) Mozilla Firefox XUL Linked Clones Double Free Vulnerability * MFSA 2009-09/CVE-2009-0776 (bmo#414540) XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040 (bmo#478901) Upgrade PNG library to fix memory safety hazards * MFSA 2009-11/CVE-2009-0777 (bmo#452979) URL spoofing with invisible control characters/bin/sh/bin/shbuild24 1300755221 < ?   ;  M N O Q ,F ,N ,O ,0 l l l l l! l" F J K L : 54.0.0-0.3.14.04.0.0-0.3.14.0.0-0.3.1    !"#$%%firefoxfirefoxapplication.iniblocklist.xmlchromechrome.manifestbrowser.jaren-US.jariconsdefaultdefault16.pngdefault32.pngdefault48.pnglocalized.manifestnonlocalized.manifestcomponentsFeedConverter.jsFeedWriter.jsPlacesProtocolHandler.jsWeave.jsWebContentConverter.jsbrowser.xptcomponents.manifestfuelApplication.jsinterfaces.manifestlibbrowsercomps.sonsBrowserContentHandler.jsnsBrowserGlue.jsnsPrivateBrowsingService.jsnsSafebrowsingApplication.jsnsSessionStartup.jsnsSessionStore.jsnsSetDefaultBrowser.jsnsSidebar.jscrashreporter-override.inidefaultspreferenceschannel-prefs.jsfirefox-branding.jsfirefox.jskde.jsservices-sync.jsprofilechromeuserChrome-example.cssuserContent-example.csslocalstore.rdfmimeTypes.rdfprefs.jsdistributionextensionsextensions{972ce4c6-7e08-4474-a285-3208198ce6fd}icon.pnginstall.rdfpreview.pngfirefoxfirefox.shiconsdocument.pngmozicon128.pngmodulesHUDService.jsmNetworkHelper.jsmNetworkPrioritizer.jsmPlacesUIUtils.jsmPropertyPanel.jsmdistribution.jsdomplate.jsmopenLocationLastURL.jsmservices-cryptoWeaveCrypto.jsservices-syncconstants.jsenginesengines.jsbookmarks.jsclients.jsforms.jshistory.jspasswords.jsprefs.jstabs.jsextObservers.jsPreferences.jsStringBundle.jsidentity.jsjpakeclient.jslog4moz.jsmain.jsnotifications.jsrecord.jsresource.jsservice.jsstatus.jsutil.jsstylePanel.jsmtabviewAllTabs.jsmutils.jsmsearchpluginsmozillaextensions{ec8030f7-c20a-464f-9b0e-13a3a9e97384}firefox.desktophicolor16x16appsfirefox.png32x32appsfirefox.png48x48appsfirefox.pngfirefox.1.gzfirefox.xmlmozillaextensions{ec8030f7-c20a-464f-9b0e-13a3a9e97384}firefox-gnome.pngfirefox.png/usr/bin//usr/lib//usr/lib/firefox//usr/lib/firefox/chrome//usr/lib/firefox/chrome/icons//usr/lib/firefox/chrome/icons/default//usr/lib/firefox/components//usr/lib/firefox/defaults//usr/lib/firefox/defaults/preferences//usr/lib/firefox/defaults/profile//usr/lib/firefox/defaults/profile/chrome//usr/lib/firefox/distribution//usr/lib/firefox/extensions//usr/lib/firefox/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}//usr/lib/firefox/icons//usr/lib/firefox/modules//usr/lib/firefox/modules/services-crypto//usr/lib/firefox/modules/services-sync//usr/lib/firefox/modules/services-sync/engines//usr/lib/firefox/modules/services-sync/ext//usr/lib/firefox/modules/tabview//usr/lib/mozilla//usr/lib/mozilla/extensions//usr/share/applications//usr/share/icons//usr/share/icons/hicolor//usr/share/icons/hicolor/16x16//usr/share/icons/hicolor/16x16/apps//usr/share/icons/hicolor/32x32//usr/share/icons/hicolor/32x32/apps//usr/share/icons/hicolor/48x48//usr/share/icons/hicolor/48x48/apps//usr/share/man/man1//usr/share/mime/packages//usr/share//usr/share/mozilla//usr/share/mozilla/extensions//usr/share/pixmaps/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/b163c4036c8b1a968a902c822b76b050-MozillaFirefoxcpiolzma5i586-suse-linuxDBK AdLl '?p] "k%{Mi>$vkkF37IAmGH;p?PEz֡ϡQ~yLDhho}Kb7ccnYuO41f+ kTB7fSjh&MۨosK/Y:rO0}GGv>).E0X9GFMI{YC{s{@b(i\+c-JR nuX6QN3բf Cg%nBNk䵡Wg"i:u*ՉA*t15:@rx unӂJ]Mbh}[W8BWalL}$V 0I O 5'Y Z0@РεID+ js-W)֓jmΙBA*mLS:ض voa5 \*HL)渢]ƹ @hm7):]SDNgƁFqAkiă3E%tj6W2+DqF UwG^VpIK8SGM1Hk~Regw_ZHΥ[-| N`gaA|;0 ;w.f~Qx+J u1(f7翘 L2 xL0^E\rm@zGF3nC'KPjѱ *'M2 ڀհ9r1 ( ]:dgpG N:7jb=f F[8kmd|o48Sp{QJEG,(SA.^{i59ZڧNZȔ_Sړ=-MZN Po V,k,LÄ0ҋ6Gڐph1ӅjI]Dw33uXHIQc+1N79nucdnN|}RզTMc1J ʷۆ_OiD9ǎN}2x'۾.zfkɴ׮&ݹ$MaaN$n{8M-0>I:# )}m銡܌\h_n_"FQ' u f0)rMM>Tby6Ew_~α5[&-yH&v?b_TBoqeSc#[m#W1x ꈪzF %i-Bu~'GDPdLܔSQ nƧ\݇%nLHC-3nOc: .uwj]fF&M4Ll-=N| = {o w=z Jo:^u_1,E/k9LlObTA"zaY<uWLj;0D{`?d-7"jF"vvX^]O8pѧOq,7U6\ P15|Lt:atDj9;w% `@pO=][#اE,4UŸE}^g⻃eTT88ݸC);S}[R-ipڊN J?h I_ \j6!7ٶvMPHf/Xi,I}C>II9zh3jϭ&Ug<.?O6tsbvp='Sa5$sZcnYiuDX1ːEo3<@|Wb%hoӥhr0u72\XҎL<#|NJ킲EۋH儋&eN c?GPM@C1jg(5s9' 6xA@{'v`/'f!h vnU_7;dsv ~ +ec`hbU%fP'a5|y-c va49Oٟܲ%/#T[&f~O(Xna2kLpёlOy `M[Y;x;Z{U!)%aInSɕݕn#3UcQb,yx)6x7`^cRn)1íY[ !c %0E>@3lHBhT1ha]]҄rk_0Wit^!cRNAQk3َTb-|`'ەV96gAwڵ- t2F8Icn9A%Wx:Z :&o3%Z`1r^ZA:dǟ>;¯{vopj*ʥ!Ms Z z/)'ڜTFQ᫮]ys`/H!MmƊ5Rb]Z X`F*05`??&1T7Ⅱ~l' )2#[-/?a?KYx{%ږ"8iX$U/B"t~Nj`P$قL8 8Nߴ3@Ezڟ  8uC/Z{oN FUFrHF ]0v"UP>+1.cds,8?tf%iKC+G5]8Y+K]&Í=!.<%dN<Ӧr{EVe5Nװ*X`>g4bI{ ըS8ܘVmYݡ~s?c@n7w_ǯuΪwjhaDs׳F %:>eI՝!K"/ oLꄦps%KS1 E9B-qdq ,e'jj|נ\lۉvi5S~Jp҄;tWc1͂7䆀#LM R`7#A dpoi@S%oi>꾫 Xu84+cX|re2i£)WF(ka&HLmut.NۑIIb OugZR,vKm;<@&_=ݎe+Xl`PSj"* }ҩ.g %g8d}>1PaZ\xgee5[:|((ع i#V<=R8xEZndhy_/YPhA0A=*,-%c7jgT}gMLRhuwp^J}H ہqS-1eˁX,mOp{E1ͳb ڬw;0~X k0!딍rh 4>Cҭ>7Hݱڊ`(C! bg|}x%.7Rx :'\gzcVGVǍ]ku/S%'@s ?/4}vQ~v4X)hĢ"K"ƪ< cv|v+6p%}H2jl_pUo 3y9ρAdXKji>Y`8F &!QE:+%ܕ84w @4ibsE@ɹߞU7`xp (@cw 4\}=򁸎xM\._BPbk#x_i;1g^JG`Hn߅Wl:-6F w4Z>N}(dQ4`.W;_RS?qBGm ˥YOź(!KM0df)vW0%]򇁀#h01 ?sњNDL>U%i@@{!@Ba@ϜRoièU$U؎\-qZF?L=&pSƈ-:w^$[%˗ <ǵ!\ױd!.rxNk'p"kQ68`9S s ;,ԿdYr;ZHQ{zeEt_+FapcTCQpo`Oq0Y/MKHqxFvjc .R @*w'iK0TH5cFA :HsΗ).v~kUj},uG l}tʯ<箑c{h2-#چɔ0;W1;%2̋ m25^%Yr؀u;I@VEDSim:)y>/#K#p9].1n-M[CON"M8@Q|6Tjc.B$Z zˮW/_|\<1e| cF f6pvwFj)Fesk@|=k;HioreRS2cbB ,񺲮VDe訫Jet+oDͦ6[դVkeTXR.KqY\^I/T g`"<^P]S^/˙4j'] l07>oX٢9%doS }Ao?׵Cxfg=2;C UckۨujRe>k$izv;,umD5W?''āW2os[d6úu vk&E˄ Lv#/dG31M855) Hu\%)qhW!ÒO]zqIt{}\i@`1vJo?S֭F2$1 (X햽? rRyZJ(8 cpD[YtbaTA6~bFw1ȇM]qn7wAl!t+ُ5*(;pVJΛְCBb6_{?C11]zzs6vTPYD5ZQ)\( .@cɽn: @6Rm4oIŦ)Vihi7E'"{5snϑ$M*4PtgH$*@Hl 깿*1mawYX\)Tki}ݚ{9v3[K]- jZ[X3/ݧCgK.Hs hxIZަHMuƆ"ZxCAP/w:y)%j]u߾OILt+Br/}j9_~V(w0 7&r{ sMq(Yɱ:wXf! dzb~`nӥ00PM mz8-9.L>k@v3*~n4A)cH\$ewާn꣨✑u(VD%ɫ_ ě#=i\.oBaRzR - !}`cu6!/l6{MiK2ٿ93KD9^a%$8CJU4G7 +4C8ќ\Ż umO~i۴kVN,YX.n*iбÇ{ њu0gV{py8 wͫZ#:x\@D!dwRrPpTaEsJ]ӫy 3RiXW69q&!7\# qIg% k9'[+6JDys)!@cA+\*uJ tB!p*nW/o RD$mtBV9ێIc-vۥYJ&()-8[BUnk:o=]pwqE3"jG]jbV?J U 3\OKLt޹T.35T7sr~4k@,]֐ L:&75WkFFk\ݬd*!)-RPd;fT. e<ΟQfK{W.#6(KwYP]u߶O!B_$A$c؈lbcpbiˆAwNA,gP8ֈ9fKG U+.-8c 1(0rO}Dur3rjAaX h[3đnp=״*'h|K9@M* 0`%hojcq,O޾p.UGĜ`A(*n:ZB@|!, [{RIhPC ?_P Gޮh(5_M.j A aiMԊM={Tć.Ve7o73u(wTOBhkMN)m[. \EV=Ɔ1I`POh_1$VEj8~ MW&U< eɼYrCIP"Х洁 I^{֚Ce?9|OckYԛ$umpһ*k_'jҽ1"S7mkWB_"gfR"l r[GHfҁ.2ᄏEF܎!dHs,Lجm?j ^2NV)`[W`<I+ݦ ѤTt I{ FMь<%.o dV4[z'BA%_pq X2>*Y\7%[}YxD`1 |#˫Io{I`~2޹Xi$&1cVP3[ˆk /ɌB 5`@(WHV|Q ҇kZηYƥ8辠5O-S;ɢ\?snRGg]0 Xcj7O*D[#LגJO6(QV,W *+mZ}d0rc]'i^n4T1Sb׆o7]$yƾSSfa֦c:]4E I&k-gl\o@W'5]9kddgiTy2z&#zX ;3[5gTMǮfHfNDpPt "õ_ NUѴz&j1.8H hd;$ޞc5 (][%ڼؒ`Ȟ^kX>F! :O3_dmKj M _D0/'"F1w@mk ep.jGc5O9fv [:?WXt bS ¥ h}]hBa’8ƥNx*':?CXQ}Ye^7vmZ E/\?LhF.hf 5.!>!QJD3\U q#x! ŝH&HR9\)U\~).^ֵ0 b'P,ڼ!t$ΕMBGD;wdZ!ʱkum Gѯik$ xLEf)nXC uU/@I*XjZ'lЖVo=L='PSQnmL@=Vr4bB(I)ax'sb`JA˓^|| Цz#6eLa )iv >eOe('j]&%~IHUq3L|"$wڜhʊX[:V˥wt\Z5*ŌDR+BFŏw w7[aׯLhcAC=(t l0/K&)$WKďޭh/ p`D>` s3`H}]Gn pH"Rw9{jak I3YE4@ }obl"L%КE T{u!Wl?f+9m? ( 1V_v[+%}=q!S- gw]@a+L!~VrxOP˿Q8` U=n5^.C2kd DʀTmy}clў{b-=rz0 |+fEe.̞< ے7rǔgQ:tmJQ3"Cm{s50+ݘhY`}=Dž^@lgpgqx/SblqLgUuT eU/1RP_Y讚+;9(Np fӎ&r ^e!kZϔZw~\̳&~qpyLɝÕ\Ĭ3@nϔ`d8aFD83b;xC0ʄ/~&!F^{OGdCqNgI%)}])r\!R!N;\|N3K+ Jf-.ZY׫f,ȧcy:f1Պ↫ [G:G[^C6vg+k*<6"7|7WVab$?'%wU PnxG}aG[yɵ1~Q]oMծM,ߜA`JGKzD,PZIt%[aZ;"5y :V>tA9(w1UU6noh]P/]w-I/vbm̂+\؀S/FW92u-<0WR+fiL F6Hl+<ލPCis{ s@!qı\x!?֖m6*66r(vL&2TX8X?:)Fo̚`g"ᭉs]HsyTN ~B=sm^`F,pvJ敵J&'?uȉF3]ŕ"wc~!0 &0Yv p5r*%~fOjy7cTw!}w:R(E-6b = mxa%Nc OJi43W͓<0]):g)Z9;ed6( ?eOLm$gך2a}O1g5tOk џS"D#as<^^QUZXF!k\z6G5;I[ dWet(0-cz':4+@dtb88;7UgvuY"Di#@/Д\T ^9zΣ~\GffuJ0CxnC&Ax.و%oo-!Gh#]j%,9h߮MOM^ݓe#8ZJW?rbDbIy&(`o}ߐ&TfJY $~SsѯcMyHGh*v"J;y_K40u5Gɒ_0s¡E)&i SG=ZeEdKo2K8R*9 ] 1bEKWbRֻ >/r e\56EF̈́􅘖&Qm Y<K&诔s<k^ɚda+q9ngLȭv(!WWIܔq= 5BnT4cnu]I44l6gN&zo޷C"*PN4 fIyp߻v})5}tC`̈y>1Uh>YΩM;r}bȫ̥lizP0JM1WF YnXBAG)13Ç̻춞z:C|.%QЮf-+W.mhûdPT◊5 βO-7JݕZ;-O%j0T.%/e1J. UҋU{j93z(&Ej.B/{D[xrQ*ZakJΙG/4<+kx_jYo l֗1*tm~7՘즌y&6纁] 1A%Vq$`p硘.k[qqXzc~f:R R/(rSRۯՔg,"M)%MnOG*ɴ&G38,pӂ"3KbQlF7hfCu4 Xߩ[RE`SH]@ o6@V*.4.<rHwߒX8]ϣ Y{rc,ǏX&($ %%5/S4(ą#u|@g10R qpk\ߑD82żYj06+V819 m8hBזt1:$DDIme;ʥ"{4YPA@-q Sks#SVծ;xaONE4!C I/'bRD_vG/{ګKZ5پIcw=O9M: 2$[_ T^l<㵭6\e4Y/Y!sqC NЍE3I ^`)"cDmj idž?p?P(cdu YRrpв>Qjktrkup~=^fBC9lqF#j|~sR6U=Ǽi'6O/5Hc)o2mn0W-h} l{iьx"5$^z\(N; WB5 O+G(Vċ6yXMa℘l_!ң%ȃ))r~ MF}*SٷX[ OH#D]ҏ>dJ)d%Hݞ|^&288K b`2dl9:lWg9@ކȌur?^>``A/JgO*-i4;H4cUy+5p9;)76oCq5c2`=ȶ^Ma5<9LEj">FaF x'(&+zUO? bYW}rR*Wysg|0.&<4jl`/". Ĵ/'1$-^J'0Y=;Nnǣm 稴/wV3Kw l k]-NbjDX2Be*dpvFJ#!ޣn_W'ޓkh >,ɟw:ٜޝ_` @$o>Z1y܇kT F㱯1l3\n( mI :WǨ\4\=y7RQ5xJ3W8iyl`4.E<~ߟU._nrGYkʋ4PoT#fu;:@ _Ù{uh5O9OŔ(V\Sz=& 9a`gcR $,=rwb=+`uQ0?:rfߍqh3+aB`qk2"kB%EY@]Z]ANvw5dzA$(*0oE!w3$lWf|y#/XbVovρJ|fR#A.t5$Y2QK@_הYƆW>zlZw{ԖWw+EU:1WEm܂~m@$P!1QZ82#ց󼃋x'MYlJ'J4-.w_ŌCr0cs u{K[|=vO*1K_DH|y2`( 2{oʼYGtK)YM ;[gunOo?J#xDgIn'8DŽӗNI1:d܋+yFz/شc9djFԽ !j3^/& \m-i/8:U{W(RA]¬ZJ D|z ӄ8ĸuI%G*AFd p1y3&]L!*opxyH"ʌs+_b K5Fc^oT)|ڄTť/1jAJM0q[Iqhown+y=nN}ԏ