MozillaFirefox-4.0.0-0.3.1<>,TPpFʸ/=„F+CS#F KrYόcY Z/d~^ UECXTZ<"\Jg]D_?8ꃔv김Ѿ/:'IL(͔ 1gi0rtz)" TZPg4i_f X3Vɗf 4҅mPT Ðhp fиw7jCgh4N`8 ((0>^UtU=]A~n^t8[Vvz' o>9}?}d  9! :_w}@{ ,{  "{  { { { x{d{{!2!X{#D $/%D/(/()=8)D39*3:-t3>j@jFjGj{Hl{In|{Xn Yo, \o`{]qL{^x&b|}c}d}qe}vf}{l}}z}CMozillaFirefox4.0.00.3.1Mozilla Firefox Web BrowserMozilla Firefox is a standalone web browser, designed for standards compliance and performance. Its functionality can be enhanced via a plethora of extensions.Mbuild24MxEopenSUSE 11.4openSUSEGPLv2+ ; LGPLv2.1+ ; MPLv1.1+http://bugs.opensuse.orgProductivity/Networking/Web/Browsershttp://www.mozilla.org/linuxi586# update mime and desktop database if test -x /usr/bin/update-mime-database; then /usr/bin/update-mime-database "/usr/share/mime" || true fi if test -x /usr/bin/update-desktop-database; then /usr/bin/update-desktop-database --quiet "/usr/share/applications" || true fi ICON_THEME="hicolor" if test -x /usr/bin/gtk-update-icon-cache; then /usr/bin/gtk-update-icon-cache --quiet --force "/usr/share/icons/${ICON_THEME}" || true fi exit 0 if [ $1 -eq 0 ]; then ICON_THEME="hicolor" if test -x /usr/bin/gtk-update-icon-cache; then /usr/bin/gtk-update-icon-cache --quiet --force "/usr/share/icons/${ICON_THEME}" || true fi fi if [ $1 -eq 0 ]; then if test -x /usr/bin/update-desktop-database; then /usr/bin/update-desktop-database --quiet "/usr/share/applications" || true fi fi if [ $1 -eq 0 ]; then if test -x /usr/bin/update-mime-database; then /usr/bin/update-mime-database "/usr/share/mime" || true fi fi exit 0?09 `N$Jy 3zM <4xK2eY%[. 2'%GxE@1d[O'!geb!2)|:y5H%|~I 1Xy+"1TUH-yP9 ]H. v#|V===$&&A큤A큤AA큤A큤큤AA큤AA큤AAAA큤A큤A큤A큤A큤A큤A큤A큤AAAA큤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../lib/firefox/firefox.sh../../../../../lib/firefox/chrome/icons/default/default16.png../../../../../lib/firefox/chrome/icons/default/default32.png../../../../../lib/firefox/chrome/icons/default/default48.png../../lib/firefox/icons/mozicon128.png../../lib/firefox/icons/mozicon128.pngrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootMozillaFirefox-4.0.0-0.3.1.src.rpmweb_browserfirefoxfirefoxmimehandler(application/vnd.mozilla.xul+xml)mimehandler(application/x-xpinstall)mimehandler(application/xhtml+xml)mimehandler(text/html)mimehandler(text/mml)mimehandler(text/xml)mimehandler(x-scheme-handler/http)mimehandler(x-scheme-handler/https)MozillaFirefoxMozillaFirefox(x86-32)      @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ rpmlib(VersionedDependencies)coreutilsshared-mime-infodesktop-file-utilsshared-mime-infodesktop-file-utilsmozilla-xulrunner20mozilla-xulrunner20mozilla-xulrunner20-32bitmozilla-xulrunner20-32bitMozillaFirefox-branding/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/bin/shld-linux.so.2ld-linux.so.2(GLIBC_2.3)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.2)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libgcc_s.so.1libgcc_s.so.1(GLIBC_2.0)libgdk-x11-2.0.so.0libgdk_pixbuf-2.0.so.0libglib-2.0.so.0libgobject-2.0.so.0libmozalloc.solibnspr4.solibplc4.solibpthread.so.0libpthread.so.0(GLIBC_2.0)libpthread.so.0(GLIBC_2.1)libstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(GLIBCXX_3.4)libxpcom.solibxul.sorpmlib(PayloadIsLzma)3.0.3-12.0.0-0.3.12.0.02.0.0-0.3.12.0.04.04.0-13.0.4-14.4.6-14.8.0MI@MdMK@MBM:M,F@M!@ML@L@LdL@LvW@LPLJL@IL'=@L!@L @K@KKKTM@KD{@K4@K*@K@K y@J@JٱĴJ@JJ@J@J|@JrJn@J]JQ@JI@J@J:,@J*Z@J+@J@IIII̿Ixwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgmeissner@suse.dewr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgllunak@novell.comwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- update to version 4.0 (rc2) - fixed rpm macros delivered with devel package (bnc#679950)- update to version 4.0b12 - rebased patches- update to version 4.0b11 * loads of bugfixes compared to last beta * added "Do Not Track" option - rebased patches - disable testpilot- set correct desktop file name within KDE for 11.4 and up - add devel package with macros for extensions (from lnussel@suse.de)- update to version 4.0b10 - removed obsolete firefox-shell-bmo624267.patch - testpilot moved to distribution/extensions - updated locale provides and removed bn-IN from locales- update to version 4.0b9 - added x-scheme-handler for http and https to desktop file for newer Gnome environments - fixed default browser check/set for GIO (bmo#611953) (mozilla-shellservice.patch) - removed obsolete firefox-appname.patch (integrated into shellservice patch) - renamed desktop file to firefox.desktop for 11.4 and newer (bnc#664211) - removed support for 10.3 and older from the spec file - removed obsolete "Ximian" categories from desktop file- Mirror ac_add_options --disable-ipc from xulrunner for PowerPC.- update to version 4.0beta8- major update to version 4.0beta7 * based on mozilla-xulrunner20 * far too many internal changes to list- security update to 3.6.12 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to 3.6.11 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange- update to 3.6.10 * fixing startup topcrash (bmo#594699)- security update to 3.6.9 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText- disable crash reporter for non x86/x86_64 to make it build.- security update to 3.6.8 (bnc#622506) * MFSA 2010-48/CVE-2010-2755 (bmo#575836) Dangling pointer crash regression from plugin parameter array fix- security update to 3.6.7 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-38/CVE-2010-1215 (bmo#567069) Arbitrary code execution using SJOW and fast native function * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-43/CVE-2010-1207 (bmo#571287) Same-origin bypass using canvas context * MFSA 2010-44/CVE-2010-1210 (bmo#564679) Characters mapped to U+FFFD in 8 bit encodings cause subsequent character to vanish * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- update to 3.6.6 release * modifies the crash protection feature to increase the amount of time that plugins are allowed to be non-responsive before being terminated.- update to final 3.6.4 release (bnc#603356) * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.2.4) * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- update to 3.6.4(build6)- security update to 3.6.4 (Lorentz) * enable crashreporter also for x86-64 * Flash runs in a separate process to avoid crashing Firefox (ix86 only; x86-64 still uses nspluginwrapper)- security update to 3.6.3 * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion- security update to version 3.6.2 (bnc#586567) * MFSA 2010-08/CVE-2010-1028 WOFF heap corruption due to integer overflow * MFSA 2010-09/CVE-2010-0164 (bmo#547143) Deleted frame reuse in multipart/x-mixed-replace image * MFSA 2010-10/CVE-2010-0170 (bmo#541530) XSS via plugins and unprotected Location object * MFSA 2010-11/CVE-2010-0165/CVE-2010-0166/CVE-2010-0167 Crashes with evidence of memory corruption * MFSA 2010-12/CVE-2010-0171 (bmo#531364) XSS using addEventListener and setTimeout on a wrapped object * MFSA 2010-13/CVE-2010-0168 (bmo#540642) Content policy bypass with image preloading * MFSA 2010-14/CVE-2010-0169 (bmo#535806) Browser chrome defacement via cached XUL stylesheets * MFSA 2010-15/CVE-2010-0172 (bmo#537862) Asynchronous Auth Prompt attaches to wrong window * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy- update to 3.6rc2 (already named 3.6.0) - removed obsolete orbit-devel build requirement- major update to 3.6rc1- update to version 3.5.7 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193) - added missing lockdown preferences (bnc#567131)- readded firefox-ui-lockdown.patch (bnc#546158)- security update to version 3.5.6 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener - fixed firefox-browser-css.patch (bnc#561027)- rebased patches for fuzz=0- update to version 3.5.5 (bnc#553172)- security update to version 3.5.4 (bnc#545277) * MFSA 2009-52/CVE-2009-3370 (bmo#511615) Form history vulnerable to stealing * MFSA 2009-53/CVE-2009-3274 (bmo#514823) Local downloaded file tampering * MFSA 2009-54/CVE-2009-3371 (bmo#514554) Crash with recursive web-worker calls * MFSA 2009-55/CVE-2009-3372 (bmo#500644) Crash in proxy auto-configuration regexp parsing * MFSA 2009-56/CVE-2009-3373 (bmo#511689) Heap buffer overflow in GIF color map parser * MFSA 2009-57/CVE-2009-3374 (bmo#505988) Chrome privilege escalation in XPCVariant::VariantDataToJS() * MFSA 2009-59/CVE-2009-1563 (bmo#516396, bmo#516862) Heap buffer overflow in string to number conversion * MFSA 2009-61/CVE-2009-3375 (bmo#503226) Cross-origin data theft through document.getSelection() * MFSA 2009-62/CVE-2009-3376 (bmo#511521) Download filename spoofing with RTL override * MFSA 2009-63/CVE-2009-3377/CVE-2009-3379/CVE-2009-3378 Upgrade media libraries to fix memory safety bugs * MFSA 2009-64/CVE-2009-3380/CVE-2009-3381/CVE-2009-3383 Crashes with evidence of memory corruption - removed upstreamed patch * firefox-bug506901.patch- fix KDE button order in one more place (bnc#170055)- improve UI colors to be usable with dark themes at all (firefox-browser-css.patch) (bnc#503351) - extend list of supported architectures as ABI identifier (mozilla-abi.patch) (bnc#543460)- added KDE integration patch from llunak@novell.com (firefox-kde.patch) * support for knotify, making -kde4-addon obsolete * KDE-specific support functional (bnc#170055) - do not build libnkgnomevfs (bmo#512671) (firefox-no-gnomevfs)- security update to version 3.5.3 (bnc#534458) * MFSA 2009-47/CVE-2009-3069/CVE-2009-3070/CVE-2009-3071/ CVE-2009-3072/CVE-2009-3073/CVE-2009-3074/CVE-2009-3075 Crashes with evidence of memory corruption * MFSA 2009-49/CVE-2009-3077 (bmo#506871) TreeColumns dangling pointer vulnerability * MFSA 2009-50/CVE-2009-3078 (bmo#453827) Location bar spoofing via tall line-height Unicode characters * MFSA 2009-51/CVE-2009-3079 (bmo#454363) Chrome privilege escalation with FeedWriter- renamed patch firefox-contextmenu-gnome to firefox-cross-desktop as it contains more tweaks to handle non-Gnome environments and especially KDE integration: * added the ability to set the KDE default browser (still part of bnc#170055)- split -translations package into -common and -other (bnc#529180) - remove "set as background" from context menu if not running in Gnome (part of bnc#170055)- security update to version 3.5.2 * MFSA 2009-38/CVE-2009-2470 (bmo#459524) Data corruption with SOCKS5 reply containing DNS name longer than 15 characters * MFSA 2009-44/CVE-2009-2654 (bmo#451898) Location bar and SSL indicator spoofing via window.open() on invalid URL * MFSA 2009-45 Crashes with evidence of memory corruption * MFSA 2009-46 (bmo#498897) Chrome privilege escalation due to incorrectly cached wrapper * various other stability fixes - export MOZ_APP_LAUNCHER in the startscript (bmo#453689)- fixed %exclude usage - fixed preferences' advanced pane for fresh profiles (bmo#506901)- security update to version 3.5.1 * MFSA 2009-41 Corrupt JIT state after deep return from native function- added mozilla-linkorder.patch to fix build with --as-needed- update to final version 3.5 (20090623)- fixed build by linking to a real file- update to version 3.5rc2 (20090617) - BuildRequire mozilla-xulrunner191 = 1.9.1.0- update to version 3.5b99 (20090604) - BuildRequire mozilla-xulrunner191 = 1.9.1b99- fixed typos in improved xulrunner dependencies- use non-localized Downloads folder (bnc#501724)- update to new major version 3.5b4 * based on Gecko 1.9.1 (mozilla-xulrunner191) * Private Browsing Mode * TraceMonkey JavaScript engine * Geolocation support * native JSON and web worker threads support * speculative parsing for faster content rendering * Some HTML5 support - updated firefox.schemas - improved firefox-no-update.patch- security update to 3.0.10 * MFSA 2009-23/CVE-2009-1313 (bmo#489647) Crash in nsTextFrame::ClearTextRun()- security update to 3.0.9 (bnc#495473) * MFSA 2009-14/CVE-2009-1302/CVE-2009-1303/CVE-2009-1304/CVE-2009-1305 Crashes with evidence of memory corruption (rv:1.9.0.9) * MFSA 2009-15/CVE-2009-0652 (bmo#479336) URL spoofing with box drawing character * MFSA 2009-16/CVE-2009-1306 (bmo#474536) jar: scheme ignores the content-disposition: header on the inner URI * MFSA 2009-17/CVE-2009-1307 (bmo#481342) Same-origin violations when Adobe Flash loaded via view-source: scheme * MFSA 2009-18/CVE-2009-1308 (bmo#481558) XSS hazard using third-party stylesheets and XBL bindings * MFSA 2009-19/CVE-2009-1309 (bmo#482206,478433) Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString * MFSA 2009-20/CVE-2009-1310 (bmo#483086) Malicious search plugins can inject code into arbitrary sites * MFSA 2009-21/CVE-2009-1311 (bmo#471962) POST data sent to wrong site when saving web page with embedded frame * MFSA 2009-22/CVE-2009-1312 (bmo#475636) Firefox allows Refresh header to redirect to javascript: URIs- security update to 1.9.0.8 (bnc#488955,489411) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift - allow RPM provides for stuff besides shared libraries (e.g. mime-types)- security update to 3.0.7 (bnc#478625) * MFSA 2009-07 - Crashes with evidence of memory corruption CVE-2009-0771 - Layout Engine Crashes CVE-2009-0772 - Layout Engine Crashes CVE-2009-0773 - crashes in the JavaScript engine CVE-2009-0774 - Layout Engine Crashes * MFSA 2009-08/CVE-2009-0775 - (bmo#474456) Mozilla Firefox XUL Linked Clones Double Free Vulnerability * MFSA 2009-09/CVE-2009-0776 (bmo#414540) XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040 (bmo#478901) Upgrade PNG library to fix memory safety hazards * MFSA 2009-11/CVE-2009-0777 (bmo#452979) URL spoofing with invisible control characters/bin/sh/bin/shbuild24 1300755221 < ?   ;  M N O Q ,F ,N ,O ,0 l l l l l! l" F J K L : 54.0.0-0.3.14.04.0.0-0.3.14.0.0-0.3.1    !"#$%%firefoxfirefoxapplication.iniblocklist.xmlchromechrome.manifestbrowser.jaren-US.jariconsdefaultdefault16.pngdefault32.pngdefault48.pnglocalized.manifestnonlocalized.manifestcomponentsFeedConverter.jsFeedWriter.jsPlacesProtocolHandler.jsWeave.jsWebContentConverter.jsbrowser.xptcomponents.manifestfuelApplication.jsinterfaces.manifestlibbrowsercomps.sonsBrowserContentHandler.jsnsBrowserGlue.jsnsPrivateBrowsingService.jsnsSafebrowsingApplication.jsnsSessionStartup.jsnsSessionStore.jsnsSetDefaultBrowser.jsnsSidebar.jscrashreporter-override.inidefaultspreferenceschannel-prefs.jsfirefox-branding.jsfirefox.jskde.jsservices-sync.jsprofilechromeuserChrome-example.cssuserContent-example.csslocalstore.rdfmimeTypes.rdfprefs.jsdistributionextensionsextensions{972ce4c6-7e08-4474-a285-3208198ce6fd}icon.pnginstall.rdfpreview.pngfirefoxfirefox.shiconsdocument.pngmozicon128.pngmodulesHUDService.jsmNetworkHelper.jsmNetworkPrioritizer.jsmPlacesUIUtils.jsmPropertyPanel.jsmdistribution.jsdomplate.jsmopenLocationLastURL.jsmservices-cryptoWeaveCrypto.jsservices-syncconstants.jsenginesengines.jsbookmarks.jsclients.jsforms.jshistory.jspasswords.jsprefs.jstabs.jsextObservers.jsPreferences.jsStringBundle.jsidentity.jsjpakeclient.jslog4moz.jsmain.jsnotifications.jsrecord.jsresource.jsservice.jsstatus.jsutil.jsstylePanel.jsmtabviewAllTabs.jsmutils.jsmsearchpluginsmozillaextensions{ec8030f7-c20a-464f-9b0e-13a3a9e97384}firefox.desktophicolor16x16appsfirefox.png32x32appsfirefox.png48x48appsfirefox.pngfirefox.1.gzfirefox.xmlmozillaextensions{ec8030f7-c20a-464f-9b0e-13a3a9e97384}firefox-gnome.pngfirefox.png/usr/bin//usr/lib//usr/lib/firefox//usr/lib/firefox/chrome//usr/lib/firefox/chrome/icons//usr/lib/firefox/chrome/icons/default//usr/lib/firefox/components//usr/lib/firefox/defaults//usr/lib/firefox/defaults/preferences//usr/lib/firefox/defaults/profile//usr/lib/firefox/defaults/profile/chrome//usr/lib/firefox/distribution//usr/lib/firefox/extensions//usr/lib/firefox/extensions/{972ce4c6-7e08-4474-a285-3208198ce6fd}//usr/lib/firefox/icons//usr/lib/firefox/modules//usr/lib/firefox/modules/services-crypto//usr/lib/firefox/modules/services-sync//usr/lib/firefox/modules/services-sync/engines//usr/lib/firefox/modules/services-sync/ext//usr/lib/firefox/modules/tabview//usr/lib/mozilla//usr/lib/mozilla/extensions//usr/share/applications//usr/share/icons//usr/share/icons/hicolor//usr/share/icons/hicolor/16x16//usr/share/icons/hicolor/16x16/apps//usr/share/icons/hicolor/32x32//usr/share/icons/hicolor/32x32/apps//usr/share/icons/hicolor/48x48//usr/share/icons/hicolor/48x48/apps//usr/share/man/man1//usr/share/mime/packages//usr/share//usr/share/mozilla//usr/share/mozilla/extensions//usr/share/pixmaps/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/b163c4036c8b1a968a902c822b76b050-MozillaFirefoxdrpmlzma5i586-suse-linuxDBK AdLl '?p]"k%{Mi>$vkkF37IAmGH;p?PEz֡ϡQ~yLDhho}Kb7ccnYuO41f+ k|,10bSF^"4qX>N5l\}_-V&S;7{tc)84@ne{wU^*p U+Pg!gAŰ$1uےf8.V'TH8!C*2@Kh`iFVgnk=@k)QPB?I|;aAFBZ;i `(,YvUBW46s}\ù"xnw0]4cQtZWQEfbs/ޏZ/j[x"ErY歃qs vJHli@]Q5#\{&i'!]vsZ$)0pk#8i"~d`45߱w犄_f@ŁyҮ6xKQeŽg94?Lr6 wM* &#H81jlѠF%EI%Ԃ#(p((%{ݘ1'a&Azt{=}tN1P:U$Iv7Mg{#a gf8x͙*m fdYO.gVO1(Sh$Ce_{(F5z 1@d%,|ɔs4B,CXdKu#Is䝱 vw8@R]}9~zɾys, 'T> .? .yby7_TLuGsMN bA[GS }ܰҺZ>es'mKlyAk ]kvNoEMÍׂ>|Ϳ/o8j $RNIL䤟j\1T'pj-;Ǥ,ةiW+ va]ׯ7^Pz, aNH oLyxl)ɶ*B?B<몢:~Hg'7$)%~b7> ($(6rs3鄋,~dn\G;3Rī!i)wm OӪfJF-2ޓLZ9M fQa=%AXƟ̹'`3%{dXNt>cfnVDt|S 2 BRDs3؜u]N)K0V:x)5s`tvГcY1>໭=R#onL `G%BF#Ax{^.W !.V/Ls#K3K}r#267 f :4)Q] ܰ9ls[^ ,#Tm7U l[+|'RNO2Glm]?`JlwboD1xkp6n"܂ƹt`uE|<ފ|da6k,\'}d:=O[kѪ|B/? s` pEd'Hcͦ+tk: w]'ؾźP*LA ?GlϿWijvDNK*%;9)NOy ٸnي6px?U>ԯJ~Qt"ڃk&l1 ;) UI_En4ƟE*ȎE]TSk.wa(U(DTSg:KAJj(1~R[b p4S::$*oRT|84Hd%bX8WPtTӵVYBJ=}+3 ;narty1K)'4xܶI@gxPfQAKK+U>EK}"21o/.pz|cxBa w>xД Rm:m迣dOKQrͶhUi:w4>D*[@3e@Hݦo6U#v#aQ>h6mV9vPB*YdMAkɝl\#߭K29ӔѲZDIZ?]#.vw뗌؈0c|Y fYTg Q@@ړ)Ƭs, ヌ޾%v\>x]B%hQ ެ G9`"WH&;CW6(G,WUq eߜp` ^xV4E2palfl#F4eQ2V3H  "҅1`qwlA#ڠk- q>t~㼒H*S*հOa(F.\h "$}Y]EStMhD,I6e. eCXɍ:"kVZwX=꟮8_FƬZ~=8DmZߡ!%LT=^ Lu`ZS?|GnɉB-~d7C(zx\Cell};K>n\Y~>CCr:Y ?Epeג-8ut7~R<Ъpmk=@gۖo'04=v?loűϟM52)C&wgcWj1m ݧJ[%D뢿IF4eb̞r$1U :]Oc~Ke} y.תN{7$m=A9&Xt&yOpGKeQ֗4ks65,SƝ^7sP H{ Vb4o:bfNޅlB_A}=jB֚H&FxakgNԛL_%tڱҾ!]oW27\(?T9)jIc5Ve@ZJ1}WC=P%yL C@R9f,JZ$Fl)&k? *fN>LPŻC/NX( k(.j._yUq-::u9$s8K Qן389P,T k'1G̟o?(͂xT /Atu-S&ލwo.oՇe./|pȞJ ]7zpEuvF׼Mt; K$(j*iK(&W]r :̹U}mI!5znUqjqv7Jz|8Aj[`zQ\&t7`gi/xϐt0 y)Л7e.]e@X8}㙅Q J[< HVBğgϰ|ń?BjH=BIE wD%ʢ7b헻rzLߪ WIFUH"`8vzᓬҕ(#RNKt1`橲qJ~\m[MG_D/Ob$ NK`6so;ZI|=)J`Pgd:NZ@t*mzQe xrS H9LbMaسuC9dC +]_Zs pb6jy .q~@g>e3y CK.tO +KƯGgVuf%$zXK-}m=g:Gy>귞LJ%ZR=ZAvZFiz -Yp1 zZ5h M~< ,.jHµM۪KҞwVۃF~|U.ɺ I6&A E_0iۺytC|@K,x|E!uʪK7QUP/KƳmefZ ۖ9 ";BT(+^][TugT9\RZZe0 T3潨ūlʹB5.os<(ڧ8*{Z[@Fa.}YR}|,-aLw#C H;dy b/3M}^ ^Gy:I{d:t]:2aapE6(XM_҉|<2;BMC6pU# Aϣ3'Rt)1̾7uekFTς$ w;Fl`w͹dQܖAr č- | &QNi{2x_qQ $0\2g<vŚ?ù'3&Ú_`WZ3!㉑t5NյY]xKj29t\IІ"#eh;V&UWV$yZ kGc=f#1\Ο8 $idyvC<(OzmX aw]fA)9:{FEbD)wу9fG0]95~H#5Yf7L5XHb֍( E\+Hv1l ډ^[W&I Er UOU"N#%D'6iݟBIw8)lv} h RRNxԂPo=LsRY{O ŇS 8֐9ǰ&chB|}1JůT5 '뤓kb<`ț_WzO6(jѮx{Ta]7qWRL"a(挷;"E8'OmKa^ >K.HLQ8tlDWmWF/~ <) - ^)^k9l_gPkKfYz̜{`L{ 0=a8D5Υ{#vkM urT=nQ ;rf2D]/]\&gҸ"]Y8 65T!!Jw eT}UzYE⪔#jtF0B0Y3)2 n>>.TڿPհa3J7PG8<3vzQBPD'zQm7Q]^T!5}ȿ!d^0C3LHg^?lbJX㈭_ư*8Rjuu K [:T a!d`l*]Ә*!>7LU2fE%Nki3Q'/[^dKd{> M@ẏei8akԷ-2F@M*z/L簆du] (OK񞂠r^ב+q^r jޑm g$I&1Be5yVeO r=X3DS?ձA}Չ8ꘁȈ=<uL֔#+{<&o`}TzOwU* pf]~ 2R2WpP0x}fcJOhڗ\C"nf@ ~&i^bEWF\N(6[2d;F(oİZBtχʏ7_y}dyӋ cpF5;l& [2UU0A_+uzrD;7Ga?l=+(#iMq 4sҏjt4^ џf]/r mi ,EDo|l(dF Kм?"IUryp l=,OO#'sO@lHת?C$o%=M@^qc^}vfun|=O6ۉcE֑1lwr S`~-U=>\vZtҌCঈfR8|<]Owtr_q%O A<W^n? :MM*3*_[y1Awq'd1hfh [J! QүL VNJ85X?g-_0 Bgk0&zNBɪH%\$lGz節3+aFmKW!ρu;.7S˛jm8 10Z0W2 W]$g-9]$j"ꐇe!ȃ5_eWAȖpiN` Ahbog%LCI%\ 6}TTcq2NDTpM`יx鎏+s]ݻ0n$C'pt^v`#&QZ|Փ{}]DtД* g4VgÏN4Pw' OMpK"?#`+A]9*$6`SI $ %$I}.dSKDl:Zs:J1 P Pl󵰿yg "I)R oEsz+ Uz‹JA9AGF$kM> @1!#%qrVA#T;nfVph_L0!V'O{RYH3 1kN KBQdS˺a!u)`F/o+ D;ʐfbqsix^bUhrn_piaqz>:MZeIuf(Gq妄v "e|R" [to)}&%F43ۤ(̞/4ɡѐK,הO %'^]lKtT.ozX>è ~zn.U- m&|OaC5=ڰ|Q t(z8C, *~6ځ`bOA]vY(2l}-Prg=_?,Xym!odQDBX}SAJ}%<>IDp @!_ > R)Ɂ(?{Hg=I9_gd<|W ; z0_m1zYbCg#X IB"S id#UtZڴvx"ӏn euu7S2U(Zcrr\Ɑ:&88k49[>x{fKYu/-K`:~Nqm Qa֛v>G6P7f4OhiGVᖼ݈DhcL%k"DBDU|Ms'a;oP uդjzp.8arkc{ED~+*KHY0!g6jBFO =j:%.al!J&遡qr&y0Jݜppw <;RZ1&!~ٖVX xilji.dlOMTEiL~:Wǰ9;qqI?9Qwj8N2K`vpFڛȹ1lz3d.Z)o f\!;:a??lwPf0 ++p1,fqCڇe.sN8N!Uϯ3,bکl <@I[]Xր|5K-?"k|J뷱/DU/]6il+~-pP-\9Xͣȗh #sjϩfgݞxkLFCzx ͠g6w TA5>\iLeRЊDn$\wQ9B7iX2[:=Τ`or_Gy\´өlVLHb' A{BF?;M^Ӗr7Å+(XUi(:P[J- cmj醤W}kz ,Vr|P-C-J ц/O'ty4;ѭ?zS%!Gzm5|uAcR@! B Ú[cz2rPk{!NgFKj/nHȆ)edizCej H)fTii"nnZu(&X{/,*B{'y}XR~|>Ideׇ.j>5RZȎz*Q,݅Ga1ƀW3edm*Sawh΅'zԧS*;Jk 0CEmW^Mlٌ^Q='?uyVEY0{͘PN`XT)_pҊD#('4$p%uA:y0ݫ&pPs%x . [\FU1AzK,[jf8tۭSmەMg. Pt, B)55Xh9ȣ}ޠ{̩~̛^u {,SӠtfs8h60>ƟJ8}(L凥`Aҳ'15º3sVbt߯hEcjwpܽ0˧lpNKr:N56jn~gy)D.jo+3;=_5|cCLz])kbҝOk;)lhT籈/23h|8 9y=p2[a:[Լhr:_#>9Say C3 u'(t'9>I*Qv@u/)[[(ɵdw9].LZ4PaAuN8<lQ䨳L91V{7I|J.!dxt*!8)V Xgft'[8aӱLuթĩ^bIx 26 ߀R *Y x]QY`Px~IRuSkF/)"ED+762ѩjntEK!(JA,OA08B*CbR82Bu񼢂fTC82fgwlɳXc`dÀIAs`s%/m5f4r {8( K ~BIz ӆ9Շf5֠"仃GExX-a4A>6bqh 5QȿC=:耲Ki(ҕE<>vQ7zXC$f(yd(Ά _+R]Ѷq3Epg}>"\ -T5A>є1"9#;ZǶ3BݎRt}7'cyEI//'l[}ģ񊒌hB4) NR߆ WDOů GG~E:q snx%ULʱD;h𥔪KJnp %)=}!Guy:b)Jse*–G_WPMa"nzuDsg8ǒ,FYdӁ~C!kmzWVՖgL[ *tuB sk*}q!;Ac:޶H){ 8l gv, s9d@oq. R^&R8 pk쨠[⺥e.8,:2~>8jWk$KP[q R=ӥ+= Pay$= %hč-=dn8'L ,>WE~ͣej<-w#^.s3/QvK#=rNAb]J6D叆:8-`Ϥ>'@ L#f:2L2?eXWI|@7j- .lv~;3UrYy(JЊLJSVu!KH^U>4p}B tOɄYbP$lUcW"~dI )uk$|y6ge.;[Ͷ: 'x L5-/wh]xٶ[ؙÕfщ؏{GG]$) 0Ba#,SlgxW! ٕcPˤrQ|ɒ䣀 Z | 65%ߠ@P/6tJ%wD-'$Hvlv@QyGLL>|ѼyeS5@S3d{ u?'% WW*[[nuQ/_yZƦyIa~ƕLWBl*Ӆfyy jn8$*1RkN~!9pkؿYťXpYy=&`1ĨFi.(XЌ9l!PdоN\Tرm6f #WAc3̋NGk !|2o+`0-d ߨ[" *ݞ1/ثOLeS3=Zpwӕ`ȀkE[Y/|\.LQr+т5)[*FHJTD_C]B}9\@+}5&G0Eĩ3{Er_`W$^Qe`\Wla,w-(hC' r6Pl7YPJPv+ICL0g?"巷I`-Ӈa=RKkZLg0d,KWI[5Qdڟ)RnD_Hs(˲@?Np - c;Ak5L2#}@iމrUa"}f* T,2[{J}1[IMٷ edZ6Dס+iޖ3T^^ԴZ 4Yat]㹫7ͫF*v EU|(5}J&> [p ab('ExuE