seamonkey-venkman-2.4-1.2.1<>,XNl]/=„RE&m 4`sh/&WO%0h1_e. rvEc5J$` eb5=?=d  @x| !(, . 0 4 U X\afA(c8l"9":4"F<1G element * MFSA 2010-77/CVE-2010-3772 (bmo#594547) Crash and remote code execution using HTML tags inside a XUL tree * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer * MFSA 2010-79/CVE-2010-3775 Java security bypass from LiveConnect loaded via data: URL meta refresh * MFSA 2010-80/CVE-2010-3766 (bmo#590771) Use-after-free error with nsDOMAttribute MutationObserver * MFSA 2010-81/CVE-2010-3767 (bmo#599468) Integer overflow vulnerability in NewIdArray * MFSA 2010-82/CVE-2010-3773 (bmo#554449) Incomplete fix for CVE-2010-0179 * MFSA 2010-83/VE-2010-3774 (bmo#602780) Location bar SSL spoofing using network error page * MFSA 2010-84/CVE-2010-3770 (bmo#601429) XSS hazard in multiple character encodings- security update to version 2.0.10 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to version 2.0.9 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-68/CVE-2010-3177 (bmo#556734) XSS in gopher parser when parsing hrefs * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753, bnc#642502) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange * removed upstreamed mozilla-helper-app.patch - require mozilla-nss >= 3.12.8- update to 2.0.8 * fixing startup topcrash (bmo#594699) * add "face" to the list of white-listed attributes (bmo#592601) - added Cairo LCD filter patch to enable subpixel hinting where supported (bnc#638186) (mozilla-cairo-lcd.patch)- security upate to 2.0.7 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-60/CVE-2010-2763 (bmo#585284) XSS using SJOW scripted function * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - always use internal cairo (bnc#622375, bnc#626042)- security update to 2.0.6 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-35/CVE-2010-1208 (bmo#572986) DOM attribute cloning remote code execution vulnerability * MFSA 2010-36/CVE-2010-1209 (bmo#552110) Use-after-free error in NodeIterator * MFSA 2010-37/CVE-2010-1214 (bmo#572985) Plugin parameter EnsureCachedAttrParamArrays remote code execution vulnerability * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-45/CVE-2010-1206/CVE-2010-2751 (bmo#536466,556957) Multiple location bar spoofing vulnerabilities * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- security update to 2.0.5 (bnc#603356) * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.1.10) * MFSA 2010-27/CVE-2010-0183 (bmo#557174) Use-after-free error in nsCycleCollector::MarkRoots() * MFSA 2010-28/CVE-2010-1198 (bmo#532246) Freed object reuse across plugin instances * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting * MFSA 2010-31/CVE-2010-1125 (bmo#552255) focus() behavior can be used to inject or steal keystrokes * MFSA 2010-32/CVE-2010-1197 (bmo#537120) Content-Disposition: attachment ignored if Content-Type: multipart also present * MFSA 2010-33/CVE-2008-5913 (bmo#475585) User tracking across sites using Math.random()- security update to 2.0.4 (bnc#586567) * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-17/CVE-2010-0175 (bmo#540100,375928) Remote code execution with use-after-free in nsTreeSelection * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-19/CVE-2010-0177 (bmo#538310) Dangling pointer vulnerability in nsPluginArray * MFSA 2010-20/CVE-2010-0178 (bmo#546909) Chrome privilege escalation via forced URL drag and drop * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-23/CVE-2010-0181 (bmo#452093) Image src redirect to mailto: URL opens email editor * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy- added translation subpackages- security update to 2.0.3 (bnc#576969) * MFSA-2010-01/CVE-2010-0159 Crashes with evidence of memory corruption * MFSA-2010-02/CVE-2010-0160 Web Worker Array Handling Heap Corruption Vulnerability * MFSA-2010-03/CVE-2009-1571 (bmo#526500) Use-after-free crash in HTML parser * MFSA-2010-04/CVE-2009-3988 (bmo#504862) XSS due to window.dialogArguments being readable cross-domain * MFSA-2010-05/CVE-2010-0162 (bmo#455472) XSS hazard using SVG document and binary Content-Type- Remove unneeded orbit-devel BuildRequires.- stability update to 2.0.2 (bnc#568011) * DNS resolution in MakeSN of nsAuthSSPI causing issues for proxy servers that support NTLM auth (bmo#535193)- security update to 2.0.1 (bnc#559807) * MFSA 2009-65/CVE-2009-3979/CVE-2009-3980/CVE-2009-3982 Crashes with evidence of memory corruption (rv:1.9.1.6) * MFSA 2009-66/CVE-2009-3388 (bmo#504843,bmo#523816) Memory safety fixes in liboggplay media library * MFSA 2009-67/CVE-2009-3389 (bmo#515882,bmo#504613) Integer overflow, crash in libtheora video library * MFSA 2009-68/CVE-2009-3983 (bmo#487872) NTLM reflection vulnerability * MFSA 2009-69/CVE-2009-3984/CVE-2009-3985 (bmo#521461,bmo#514232) Location bar spoofing vulnerabilities * MFSA 2009-70/VE-2009-3986 (bmo#522430) Privilege escalation via chrome window.opener- update to 2.0rc2 which might become the final 2.0 version * based on final Gecko 1.9.1.4 (build3)- update to 2.0rc1 * based on Gecko 1.9.1.4 * removed upstreamed patches * compatible with enigmail (bnc#544326, bnc#530811) - fixed startup notification (bnc#518603) (mozilla-startup-notification.patch)- update to 2.0b2 * removed obsolete mozilla-jemalloc_deepbind.patch and mozilla-app-launcher.patch - remove obsolete code for protocol handlers (bmo#389732) - allow alternative button order for Gtk filechooser (bnc#527418) - added mozilla-prefer_plugin_pref.patch to introduce a new set of prefs to support preferring certain plugins for mime-types - added mozilla-sysplugin-biarch.patch to use /usr/$LIB/mozilla/plugins as system plugin dir (bmo#496708)- added Provides and Obsoletes for package merge (bnc#532678) - allow alternative button order for Gtk filechooser (bnc#527418)- fixed %exclude usage- update to 2.0b1 - added create-tar.sh to source package - removed enigmail as it's provided as an own package built in Thunderbird now- update to 2.0a3-20090707 snapshot - define MOZ_APP_LAUNCHER for session management (bmo#453689) (mozilla-app-launcher.patch and mozilla.sh.in) - move intl.locale.matchOS to distribution specific prefs (removed locale.patch) - moved openSUSE specific prefs from greprefs to app prefs - added mozilla-jemalloc_deepbind.patch to fix various possible crashes (bnc#503151, bmo#493541) - added seamonkey-no-update.patch to hide the update menu item- major update to 2.0a3-20090617 * based on Gecko 1.9.1 * ported to Mozilla's toolkit- security update to 1.1.16 (bnc#488955,489411,492354) * MFSA 2009-12/CVE-2009-1169 (bmo#460090,485217) Crash and remote code execution in XSL transformation * MFSA 2009-13/CVE-2009-1044 (bmo#484320) Arbitrary code execution via XUL tree moveToEdgeShift- update to security release 1.1.15 (bnc#478625) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazards - use nss-shared-helper from 11.1 on which allows migrating to and sharing with other applications using NSS (can be disabled completely exporting MOZ_SM_NO_NSSHELPER=1)build20 1317231298f2.4-1.2.12.4-1.2.1{f13b157f-b174-47e7-a34d-4815ddfdfeb8}.xpi/usr/lib/seamonkey/distribution/extensions/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/6283de239a9d20f8842a1ca386c0e48c-seamonkeycpiolzma5i586-suse-linux8殸@|>r ̒6?] "k%wE]ss=rsCscΎ2)PW 54s[-eiЉ{~.ߴ B x~ ;Ml&֐i{IQ#n/&އ?eQ\P?-|e3?Qc 0پ[^MG ~!u l)߲݊#6!d{hJ dȗemyxX4j9k0v <}aڹ k}Nǃ;u\Һ{t"@HY &pfzXy/45=3$_6X 5I+O O}Hvʅx5qC6ӀY{2v4F&Gk sG/sw.J (@rn<5#Ӱ"4t8W۪BEE8Cم~] ?Nb E*Ż0yS3 x@0/{^ɁCcM=d/ wr!^yPn)#'r !#GJ&\*9i_*JޣN%{|.Qꥩ㲰ueZ3a#.rEL1@xWBia9X$P =@9h^plqW>ef?m>CObW۾ $>A\٭$,TZ 8~>Ky!m'acB=7P!s6r,21Hy)\nOHPqRA|-{fRÃ"2A`jrV.Ip*6 *]) ƾab} !3Yl X[e>꧔("7~9ocÐc`7}tB84O089o`i8_ .W.YY'k"E;]t û>hj{5l lNO=EZ =6mhC y ƒcjXTfSIJcS- i2^(pgvW}rxQkʃLFVGf'lr훖*^ / P!l7.hݗqb?b5QsK&y>p<:$1<1-1& 2Doe [^ۚYd 2߰5nK;SK7)n*Hi2CuX qie!8: TKgԽeQ=Bu1FۍE,/<&([;^vi̚H0榩vTGr{|Zg9逥_Xkfx FaARӖ `G]];:5HD͑z;ހ1H^c4m'Eb;QIY]J+L] }(\}l@_#E32ب]ig%ZHaXu(2;+ZLjUA l1h*?z:Q=TA ڞf|^k(irbOY>3UpVtrݹ̎"p}s6bB:jP1ņ7 ,Dh󷭳>9DÀW %:\(<ș>f (I̝hoOu"/2@c^+[>z,샂Zh?&r`wԐUdiS!BG+9Fi[հ-XAD$ڣ1ČuԕU$jÀ{.V2/IsPc҂e醺Ikyf 9_Zd|[[w:~,>薄$ 4TՇNX ]>.ŭhwxrWN 빎#q{)B8rM|7l$X?2و=X.W]Em#j'F,c~(>il/U^'zm [/XZ ő!lI[ay/ Y mlA'Vj~i42tS4赬--ꅯMVl'fP\ Cx9Kgc.<~k{R;aUr-nw(1/=hJOkDaZ,H嫛ᵎV+%5ʅ%ٹ*bI-8GbPd2h|N-]ԀUTUf6RA#+j,$-SlLt G"(J8v~LQWhx&R-ӭL"`u z~v @;gJ#{83 @L )b8Ud6 s_*Nd`Α`́Oak;E cc6 ҫq-I<_,$sJ) P{NLӞZ=j6cC%j%}^]ܹ-yWp4nPE@BT K3Sz$j*@ ZioKǘAw1tT:Uq4U LBƴ8X)`/rj"u2/0i3L-R$WKo;Xۜɀ|5ii#ctH\єITQQGA8kPe޶0 48g1%!&; ɿR1d(U)3SLG 4fr9Fc7V=t)yI l!*LnT|ToXȿmwlه".yY\)jn)Jͱ7 lSƷ 3:ɒ..1b|ufSIϘu*eur}I:dh:0QDܻn!Lx{r|n.tJf ?ϵu4ݓpP"QtEGp(_ŠU ٞ*_[n*`@̢р}࿃=#I Q4i',1{FJBQk\*i1{&cNrЉDĉXn[/)_­⟑Ĵ 0ff>jr̀{iqqYa *Hm@ciT5u1+~mq5gfXDK?Qw=S$Lm@BZXwyK&e 7ߍ,r[ xydVMSw.u[ 6>L5*CjڒY`&AС$COY9?(Lȇb@ ChL7au~ Kf;.Q]MVޱح8۔xg"+o)|ߝ9N|s8LoY]bQ5_tq2CgvKN;')I]friJ(SQ+DO}}QOV)hY(^L-4]G˵03xNzKwM`PeJ}vuf>C F6>*Bcp!n5M{ =l$ݰrsXeʇ"`o.BV:H#&$M'Tes~Fu lIćX(s)OY+6-bIheխYUB^*шQ0oPh~_wۖ1su`OCJY۽yc42-n`M