seamonkey-venkman-2.0.12-0.3.1<>,?M}/=„;li|GWm(|#GȖN|$\67 ^#ss;:gUU7sDzp$xM;[D|Fac~p$d [#mtٳL3?yjgš0nLMVcW9aα#mlr+}T5[`P"UXp Z#-"('A_ 󨿇]L@r珺J`bq>56j?6Zd ! Cx| "(D R ` |   (Kne(89:F32G3HH3dI3X3Y3\3]3^4<b5?c5d6.e63f68l6:z6JCseamonkey-venkman2.0.120.3.1The SeaMonkey JavaScript DebuggerA javascript debugger for the SeaMonkey web browser.Mubuild16 openSUSE 11.4openSUSEGPLv2+ ; LGPLv2.1+ ; MPLv1.1+http://bugs.opensuse.orgDevelopment/Tools/Debuggershttp://www.mozilla.org/projects/seamonkeylinuxi586 bR XAA큤A큤MuMuMuMuMuMuMu0801fb64cc98b29c0d96a23c4fcff25e9726f52b72fa981293ebb854fccbe899a344402dc95273aeca445faf7033f70df46d0a5569657ff888dcb8aacf68df20rootrootrootrootrootrootrootrootrootrootrootrootrootrootseamonkey-2.0.12-0.3.1.src.rpmseamonkey-venkmanseamonkey-venkman(x86-32)    rpmlib(VersionedDependencies)seamonkeyrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)3.0.3-12.0.124.0-13.0.4-14.4.6-14.8.0M=iM*LOL@L@L@LvW@L@IKK@KK{@KTM@KC)K JTJ@J0@J:Jn@JeJUJ8I@I3wr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgvuntz@opensuse.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org@rosenauer.orgwr@rosenauer.orgwr@rosenauer.orgwr@rosenauer.org- security update to version 2.0.12 (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-02/CVE-2011-0051 (bmo#616659) Recursive eval call causes confirm dialogs to evaluate to true * MFSA 2011-03/CVE-2011-0055 (bmo#616009, bmo#619255) Use-after-free error in JSON.stringify * MFSA 2011-04/CVE-2011-0054 (bmo#615657) Buffer overflow in JavaScript upvarMap * MFSA 2011-05/CVE-2011-0056 (bmo#622015) Buffer overflow in JavaScript atom map * MFSA 2011-06/CVE-2011-0057 (bmo#626631) Use-after-free error using Web Workers * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image * MFSA 2011-10/CVE-2011-0059 (bmo#573873) CSRF risk with plugins and 307 redirects- add x-scheme-handlers to desktop files as needed by newer Gnome environment- security update to version 2.0.11 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-76/CVE-2010-3771 (bmo#609437) Chrome privilege escalation with window.open and element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to version 2.0.10 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to version 2.0.9 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753, bnc#642502) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange * removed upstreamed mozilla-helper-app.patch - require mozilla-nss >= 3.12.8- update to 2.0.8 * fixing startup topcrash (bmo#594699) * add "face" to the list of white-listed attributes (bmo#592601) - added Cairo LCD filter patch to enable subpixel hinting where supported (bnc#638186) (mozilla-cairo-lcd.patch)- security upate to 2.0.7 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-60/CVE-2010-2763 (bmo#585284) XSS using SJOW scripted function * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - always use internal cairo (bnc#622375, bnc#626042)- security update to 2.0.6 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- security update to 2.0.5 (bnc#603356) * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.1.10) * MFSA 2010-27/CVE-2010-0183 (bmo#557174) Use-after-free error in nsCycleCollector::MarkRoots() * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- security update to 2.0.4 (bnc#586567) * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-17/CVE-2010-0175 (bmo#540100,375928) Remote code execution with use-after-free in nsTreeSelection * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy- added translation subpackages- security update to 2.0.3 (bnc#576969) * MFSA-2010-01/CVE-2010-0159 Crashes with evidence of memory corruption * MFSA-2010-02/CVE-2010-0160 Web Worker Array Handling Heap Corruption Vulnerability * MFSA-2010-03/CVE-2009-1571 (bmo#526500) Use-after-free crash in HTML parser * MFSA-2010-04/CVE-2009-3988 (bmo#504862) XSS due to window.dialogArguments being readable cross-domain * MFSA-2010-05/CVE-2010-0162 (bmo#455472) XSS hazard using SVG document and binary Content-Type- Remove unneeded orbit-devel BuildRequires.- stability update to 2.0.2 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193)- security update to 2.0.1 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener- update to 2.0rc2 which might become the final 2.0 version * based on final Gecko 1.9.1.4 (build3)- update to 2.0rc1 * based on Gecko 1.9.1.4 * removed upstreamed patches * compatible with enigmail (bnc#544326, bnc#530811) - fixed startup notification (bnc#518603) (mozilla-startup-notification.patch)- update to 2.0b2 * removed obsolete mozilla-jemalloc_deepbind.patch and mozilla-app-launcher.patch - remove obsolete code for protocol handlers (bmo#389732) - allow alternative button order for Gtk filechooser (bnc#527418) - added mozilla-prefer_plugin_pref.patch to introduce a new set of prefs to support preferring certain plugins for mime-types - added mozilla-sysplugin-biarch.patch to use /usr/$LIB/mozilla/plugins as system plugin dir (bmo#496708)- added Provides and Obsoletes for package merge (bnc#532678) - allow alternative button order for Gtk filechooser (bnc#527418)- fixed %exclude usage- update to 2.0b1 - added create-tar.sh to source package - removed enigmail as it's provided as an own package built in Thunderbird now- update to 2.0a3-20090707 snapshot - define MOZ_APP_LAUNCHER for session management (bmo#453689) (mozilla-app-launcher.patch and mozilla.sh.in) - move intl.locale.matchOS to distribution specific prefs (removed locale.patch) - moved openSUSE specific prefs from greprefs to app prefs - added mozilla-jemalloc_deepbind.patch to fix various possible crashes (bnc#503151, bmo#493541) - added seamonkey-no-update.patch to hide the update menu item- major update to 2.0a3-20090617 * based on Gecko 1.9.1 * ported to Mozilla's toolkit- security update to 1.1.16 (bnc#488955,489411,492354) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift- update to security release 1.1.15 (bnc#478625) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazards - use nss-shared-helper from 11.1 on which allows migrating to and sharing with other applications using NSS (can be disabled completely exporting MOZ_SM_NO_NSSHELPER=1)build16 1299520937BBBBBBB2.0.12-0.3.12.0.12-0.3.1{f13b157f-b174-47e7-a34d-4815ddfdfeb8}chromechrome.manifestvenkman.jarcomponentsvenkman-service.jsinstall.rdf/usr/lib/seamonkey/extensions//usr/lib/seamonkey/extensions/{f13b157f-b174-47e7-a34d-4815ddfdfeb8}//usr/lib/seamonkey/extensions/{f13b157f-b174-47e7-a34d-4815ddfdfeb8}/chrome//usr/lib/seamonkey/extensions/{f13b157f-b174-47e7-a34d-4815ddfdfeb8}/components/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/d5331468b8bb265aa340aa680ab593c6-seamonkeycpiolzma5i586-suse-linux. hyԁ.?] "k%YwE]ss=rsCs|wb!f<}%XfjDX*ۥ&+ )}{/JޑJ"Xe5E1w"ER:߾:~_O D2 π 8Aet8ї ڋj#2΀+yJIH3c*Wkߊo?>}LiHDp-&-yDžXT{ N.;ɼ[Vi FKø~'ӹOrڌP:L$j0;ynl+{?P~ m ="m?E2W@PI5x1vJ$V )R+SeĦk ~7@XJV/3NόG::Ql?SO5ED׵Yח)Uq=i! v9xhQʤJx{ ɇlB\R͖>hpldZ %ەj@W<5J鐸l5 մ9&h;sh{ree^iudnV e"4d> 4]a8u ޛEQNmb7&U,>EkJ 睿CR~?59!1 ۃ^юJۍ[l183Xy1yO>S/\*I40}鄨W*@(WdaH>{8!>bD!_֦FGk n1}tedC]UGE.u$'~y6DkC6ov|LG\Jrz_y6M` 5y̓f)sJ.8eʑv֣dJ64)fTFUp~{0 = 1Hԟ;=eN 0