<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="ed59239a4dc7dd05e83c6c9a0cb1b85b"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="MozillaFirefox-5411"
    timestamp="1215526951"
    engine="1.0">
  <yum:name>MozillaFirefox</yum:name>
  <summary lang="en">MozillaFirefox: Security update to version 2.0.0.15</summary>
  <summary lang="de">MozillaFirefox: Security Update auf Version 2.0.0.15</summary>
  <description lang="en">Mozilla Firefox was updated to version 2.0.0.15, fixing
various bugs including following security bugs:

CVE-2008-2798 CVE-2008-2799 MFSA-2008-21: Mozilla
developers identified and fixed several stability bugs in
the browser engine used in Firefox and other Mozilla-based
products. Some of these crashes showed evidence of memory
corruption under certain circumstances and we presume that
with enough effort at least some of these could be
exploited to run arbitrary code.

CVE-2008-2800 MFSA-2008-22: Mozilla contributor
moz_bug_r_a4 submitted a set of vulnerabilities which allow
scripts from one document to be executed in the context of
a different document. These vulnerabilities could be used
by an attacker to violate the  same-origin policy and
perform an XSS attack.

CVE-2008-2801 MFSA-2008-23: Security researcher Collin
Jackson reported a series of vulnerabilities which allow
JavaScript to be injected into signed JARs and executed
under the context of the JAR's signer. This could allow an
attacker to run JavaScript in a victim's browser with the
privileges of a different website, provided the  attacker
possesses a JAR signed by the other website.

CVE-2008-2802 MFSA-2008-24: Mozilla contributor
moz_bug_r_a4 reported a vulnerability that allowed
non-priviliged XUL documents to load chrome scripts from
the fastload file. This could allow an attacker to run
arbitrary JavaScript code with chrome  privileges.

CVE-2008-2803 MFSA-2008-25: Mozilla contributor
moz_bug_r_a4 reported a vulnerability which allows
arbitrary JavaScript to be executed with chrome privileges.
The privilege   escalation was possible because JavaScript
loaded via mozIJSSubScriptLoader.loadSubScript() was not
using XPCNativeWrappers when  accessing content. This could
allow an attacker to overwrite trusted objects with
arbitrary code which would be executed with chrome
privileges when the trusted objects were called by the
browser.

CVE-2008-2805 MFSA-2008-27: Opera developer Claudio
Santambrogio reported a vulnerability which allows
malicious content to force the browser into uploading local
files to the remote server. This could be used by an
attacker to steal arbitrary files from a   victim's
computer.

CVE-2008-2806 MFSA-2008-28: Security researcher Gregory
Fleischer reported a vulnerability in the way  Mozilla
indicates the origin of a document to the Java plugin. This
vulnerability could allow a malicious Java applet to bypass
the same-origin policy and create arbitrary socket
connections to other domains.

CVE-2008-2807 MFSA-2008-29: Mozilla developer Daniel
Glazman demonstrated that an improperly encoded .properties
file in an add-on can result in uninitialized memory being
used. This could potentially result in small chunks of data
from other programs being exposed in the browser.

CVE-2008-2808 MFSA-2008-30: Mozilla contributor Masahiro
Yamada reported that file URLs in directory listings were
not being HTML escaped properly when the filenames
contained particular characters. This resulted in files
from directory listings being  opened in unintended ways or
files not being able to be opened by the browser
altogether.

CVE-2008-2809 MFSA-2008-31: Mozilla developer John G. Myers
reported a weakness in the trust model used by Mozilla
regarding alternate names on self-signed certificates. A
user could be prompted to accept a self-signed certificate
from a website which includes      alt-name entries. If the
user accepted the certificate, they would also extend trust
to any alternate domains listed in the certificate, despite
not being prompted about the additional domains. This
technique could be used by an attacker to impersonate
another server.

CVE-2008-2810 MFSA-2008-32: Mozilla community member Geoff
reported a vulnerability in the way Mozilla opens URL files
sent directly to the browser. He demonstrated that such
files  were opened with local file privileges, giving the
remote content access to     read from the local
filesystem. If a user opened a bookmark to a malicious page
in this manner, the page could potentially read from other
local files on the  user's computer.

CVE-2008-2811 MFSA 2008-33: Security research firm Astabis,
via the iSIGHT Partners GVP Program, reported a
vulnerability in Mozilla's block reflow code. This
vulnerablitity could be used by an attacker to crash the
browser and run arbitrary code on the victim's computer.
</description>
  <description lang="de">Mozilla Firefox wurde auf Version 2.0.0.15 gebracht, die
verschiedene Fehler inklusive folgender Sicherheitsfehler
behebt:

CVE-2008-2798 CVE-2008-2799 MFSA-2008-21: Mozilla
developers identified and fixed several stability bugs in
the browser engine used in Firefox and other Mozilla-based
products. Some of these crashes showed evidence of memory
corruption under certain circumstances and we presume that
with enough effort at least some of these could be
exploited to run arbitrary code.

CVE-2008-2800 MFSA-2008-22: Mozilla contributor
moz_bug_r_a4 submitted a set of vulnerabilities which allow
scripts from one document to be executed in the context of
a different document. These vulnerabilities could be used
by an attacker to violate the  same-origin policy and
perform an XSS attack.

CVE-2008-2801 MFSA-2008-23: Security researcher Collin
Jackson reported a series of vulnerabilities which allow
JavaScript to be injected into signed JARs and executed
under the context of the JAR's signer. This could allow an
attacker to run JavaScript in a victim's browser with the
privileges of a different website, provided the  attacker
possesses a JAR signed by the other website.

CVE-2008-2802 MFSA-2008-24: Mozilla contributor
moz_bug_r_a4 reported a vulnerability that allowed
non-priviliged XUL documents to load chrome scripts from
the fastload file. This could allow an attacker to run
arbitrary JavaScript code with chrome  privileges.

CVE-2008-2803 MFSA-2008-25: Mozilla contributor
moz_bug_r_a4 reported a vulnerability which allows
arbitrary JavaScript to be executed with chrome privileges.
The privilege   escalation was possible because JavaScript
loaded via mozIJSSubScriptLoader.loadSubScript() was not
using XPCNativeWrappers when  accessing content. This could
allow an attacker to overwrite trusted objects with
arbitrary code which would be executed with chrome
privileges when the trusted objects were called by the
browser.

CVE-2008-2805 MFSA-2008-27: Opera developer Claudio
Santambrogio reported a vulnerability which allows
malicious content to force the browser into uploading local
files to the remote server. This could be used by an
attacker to steal arbitrary files from a   victim's
computer.

CVE-2008-2806 MFSA-2008-28: Security researcher Gregory
Fleischer reported a vulnerability in the way  Mozilla
indicates the origin of a document to the Java plugin. This
vulnerability could allow a malicious Java applet to bypass
the same-origin policy and create arbitrary socket
connections to other domains.

CVE-2008-2807 MFSA-2008-29: Mozilla developer Daniel
Glazman demonstrated that an improperly encoded .properties
file in an add-on can result in uninitialized memory being
used. This could potentially result in small chunks of data
from other programs being exposed in the browser.

CVE-2008-2808 MFSA-2008-30: Mozilla contributor Masahiro
Yamada reported that file URLs in directory listings were
not being HTML escaped properly when the filenames
contained particular characters. This resulted in files
from directory listings being  opened in unintended ways or
files not being able to be opened by the browser
altogether.

CVE-2008-2809 MFSA-2008-31: Mozilla developer John G. Myers
reported a weakness in the trust model used by Mozilla
regarding alternate names on self-signed certificates. A
user could be prompted to accept a self-signed certificate
from a website which includes      alt-name entries. If the
user accepted the certificate, they would also extend trust
to any alternate domains listed in the certificate, despite
not being prompted about the additional domains. This
technique could be used by an attacker to impersonate
another server.

CVE-2008-2810 MFSA-2008-32: Mozilla community member Geoff
reported a vulnerability in the way Mozilla opens URL files
sent directly to the browser. He demonstrated that such
files  were opened with local file privileges, giving the
remote content access to     read from the local
filesystem. If a user opened a bookmark to a malicious page
in this manner, the page could potentially read from other
local files on the  user's computer.

CVE-2008-2811 MFSA 2008-33: Security research firm Astabis,
via the iSIGHT Partners GVP Program, reported a
vulnerability in Mozilla's block reflow code. This
vulnerablitity could be used by an attacker to crash the
browser and run arbitrary code on the victim's computer.
</description>
  <yum:version ver="5411" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="MozillaFirefox" epoch="0" ver="2.0.0.15" rel="0.1" flags="EQ"/>
    <rpm:entry kind="atom" name="MozillaFirefox-translations" epoch="0" ver="2.0.0.15" rel="0.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.0.0.15" rel="0.1"/>
      <checksum type="sha" pkgid="YES">b95d398802d3e1d0b153141dc02ac56af627d393</checksum>
      <time file="1215610703" build="1215526951"/>
      <size package="8010785" installed="21836738" archive="21872100"/>
      <location href="rpm/i586/MozillaFirefox-2.0.0.15-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="2.0.0.15" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-2.0_2.0.0.15-30_0.1.i586.delta.rpm"/>
          <checksum type="sha">494feab2d10b7f73c8aa6061f6df0a585a023350</checksum>
          <time file="1215614191" build="1215526951"/>
          <size package="1447298" archive="0"/>
          <base-version epoch="0" ver="2.0" rel="30" md5sum="b8a897973110e47260a34fb3b409f3e3" buildtime="1164967895" sequence_info="MozillaFirefox-2.0-30-2ce7a3efa05a6751a7cc4c532f93eacfeb30"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-2.0.0.14_2.0.0.15-0.1.i586.delta.rpm"/>
          <checksum type="sha">5b7b33897e855076cdf82a12294c63974b449a90</checksum>
          <time file="1215614210" build="1215526951"/>
          <size package="1389005" archive="0"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1" md5sum="0006aba72a9f3d1b32c75f3a930a48e3" buildtime="1209289457" sequence_info="MozillaFirefox-2.0.0.14-0.1-c13195ec5ced0b0b2d4b30a8c8cdb756d1161119a11be112"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>ppc</arch>
      <version epoch="0" ver="2.0.0.15" rel="0.1"/>
      <checksum type="sha" pkgid="YES">6c1dff4f6c7e3d1bc079b69090bdc11d86e359fb</checksum>
      <time file="1215610510" build="1215528562"/>
      <size package="8140440" installed="24584902" archive="24620264"/>
      <location href="rpm/ppc/MozillaFirefox-2.0.0.15-0.1.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="2.0.0.15" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/MozillaFirefox-2.0.0.15-0.1.ppc.patch.rpm"/>
          <checksum type="sha">4621671a1af26dae515ef9dba3d50b92eef8e252</checksum>
          <time file="1215614253" build="1215528562"/>
          <size package="6926651" archive="22246400"/>
          <base-version epoch="0" ver="2.0" rel="30"/>
          <base-version epoch="0" ver="2.0.0.1" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.10" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.12" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.13" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.2" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.4" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.5" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.8" rel="1.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-2.0_2.0.0.15-30_0.1.ppc.delta.rpm"/>
          <checksum type="sha">7ff34b12d29949d42519901beca445acee72e975</checksum>
          <time file="1215614270" build="1215528562"/>
          <size package="1363005" archive="0"/>
          <base-version epoch="0" ver="2.0" rel="30" md5sum="ec22c7aae3d3c8879b1d08d1ba8df947" buildtime="1164968665" sequence_info="MozillaFirefox-2.0-30-4681a93335e6f8e1d6d64711d1c3ee26eb30"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-2.0.0.14_2.0.0.15-0.1.ppc.delta.rpm"/>
          <checksum type="sha">014fde40a9e54e3f086f7a554acfd4e9dff72bec</checksum>
          <time file="1215614285" build="1215528562"/>
          <size package="1287088" archive="0"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1" md5sum="e242e8d3a7b80652b7652c9002208af9" buildtime="1209292213" sequence_info="MozillaFirefox-2.0.0.14-0.1-5e7d558d4619ee722cd174155af40f4fd1161119a11be112"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.0.0.15" rel="0.1"/>
      <checksum type="sha" pkgid="YES">a5ad49c9d9f7efc7a955c588dfe020711800ff91</checksum>
      <time file="1215610470" build="1215527364"/>
      <size package="9070639" installed="25694049" archive="25729860"/>
      <location href="rpm/x86_64/MozillaFirefox-2.0.0.15-0.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="2.0.0.15" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/x86_64/MozillaFirefox-2.0.0.15-0.1.x86_64.patch.rpm"/>
          <checksum type="sha">d4361dd6b2f9a78fe1bc6e651359c073ace27aff</checksum>
          <time file="1215614323" build="1215527364"/>
          <size package="7819377" archive="23318404"/>
          <base-version epoch="0" ver="2.0" rel="30"/>
          <base-version epoch="0" ver="2.0.0.1" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.10" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.12" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.13" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.2" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.4" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.5" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.8" rel="1.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/x86_64/MozillaFirefox-2.0.0.14_2.0.0.15-0.1.x86_64.delta.rpm"/>
          <checksum type="sha">662843dfad01a91dd3e309ded8c24d68427cbeff</checksum>
          <time file="1215614342" build="1215527364"/>
          <size package="1816436" archive="0"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1" md5sum="ea428c370e7c552094b01bf3a6a30407" buildtime="1209289302" sequence_info="MozillaFirefox-2.0.0.14-0.1-acd27d89e01a90dab5e60f684d104c0ad1161119a11be112"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.0.0.15" rel="0.1"/>
      <checksum type="sha" pkgid="YES">4f60cfef6d0a6eba1941b9d7468c643149170ada</checksum>
      <time file="1215610712" build="1215526951"/>
      <size package="4797472" installed="26937822" archive="26950120"/>
      <location href="rpm/i586/MozillaFirefox-translations-2.0.0.15-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="2.0.0.15" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/MozillaFirefox-translations-2.0.0.15-0.1.i586.patch.rpm"/>
          <checksum type="sha">681dec5408cfbf16bd9d754c8203d4c781378303</checksum>
          <time file="1215614371" build="1215526951"/>
          <size package="4796418" archive="26912548"/>
          <base-version epoch="0" ver="2.0" rel="30"/>
          <base-version epoch="0" ver="2.0.0.1" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.10" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.12" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.13" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.2" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.4" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.5" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.8" rel="1.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-translations-2.0_2.0.0.15-30_0.1.i586.delta.rpm"/>
          <checksum type="sha">302469002727dff1b45a1c90ab019052cc23f2ba</checksum>
          <time file="1215614382" build="1215526951"/>
          <size package="283189" archive="0"/>
          <base-version epoch="0" ver="2.0" rel="30" md5sum="bb512f3cdb578d99cc83fe0030cf6402" buildtime="1164967895" sequence_info="MozillaFirefox-translations-2.0-30-3c325acd5789eb73819ade6be6f59bbbcc10"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-translations-2.0.0.14_2.0.0.15-0.1.i586.delta.rpm"/>
          <checksum type="sha">890bd02dcc42e0c60a4225b7a85b5a1d4b3380b8</checksum>
          <time file="1215614389" build="1215526951"/>
          <size package="46745" archive="0"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1" md5sum="31a702a0aa5742b2ab4dcf97bc61326b" buildtime="1209289457" sequence_info="MozillaFirefox-translations-2.0.0.14-0.1-90952bcb2f7e20becfff031985bb21bdaa10"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>ppc</arch>
      <version epoch="0" ver="2.0.0.15" rel="0.1"/>
      <checksum type="sha" pkgid="YES">4855e7e5ed9f65bb07f173738edc18ff3eb87ab5</checksum>
      <time file="1215610516" build="1215528562"/>
      <size package="4796283" installed="26937822" archive="26950120"/>
      <location href="rpm/ppc/MozillaFirefox-translations-2.0.0.15-0.1.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="2.0.0.15" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/MozillaFirefox-translations-2.0.0.15-0.1.ppc.patch.rpm"/>
          <checksum type="sha">57cc456f2fa8ebcd9dd8671f6f165c2a481999aa</checksum>
          <time file="1215614446" build="1215528562"/>
          <size package="4796509" archive="26912548"/>
          <base-version epoch="0" ver="2.0" rel="30"/>
          <base-version epoch="0" ver="2.0.0.1" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.10" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.12" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.13" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.2" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.4" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.5" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.8" rel="1.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-translations-2.0_2.0.0.15-30_0.1.ppc.delta.rpm"/>
          <checksum type="sha">f44d8048bedf888d6d326ce07a2a2a56638a194e</checksum>
          <time file="1215614461" build="1215528562"/>
          <size package="282982" archive="0"/>
          <base-version epoch="0" ver="2.0" rel="30" md5sum="34d7847267488cc8c6a5473fc4e9833b" buildtime="1164968665" sequence_info="MozillaFirefox-translations-2.0-30-3c325acd5789eb73819ade6be6f59bbbcc10"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-translations-2.0.0.14_2.0.0.15-0.1.ppc.delta.rpm"/>
          <checksum type="sha">d26111c0822f813fe16c4c2663e1d1fe71a4568d</checksum>
          <time file="1215614470" build="1215528562"/>
          <size package="46716" archive="0"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1" md5sum="e26d0f3ff98a84a072c07e60ab1d2834" buildtime="1209292213" sequence_info="MozillaFirefox-translations-2.0.0.14-0.1-90952bcb2f7e20becfff031985bb21bdaa10"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="2.0.0.15" rel="0.1"/>
      <checksum type="sha" pkgid="YES">82216b3bc448e3823274555ff91de697f24177e6</checksum>
      <time file="1215610473" build="1215527364"/>
      <size package="4796666" installed="26937822" archive="26950228"/>
      <location href="rpm/x86_64/MozillaFirefox-translations-2.0.0.15-0.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="2.0.0.15" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/x86_64/MozillaFirefox-translations-2.0.0.15-0.1.x86_64.patch.rpm"/>
          <checksum type="sha">3f3bf8c9688c954a493a8593851aa84f9b82e7e6</checksum>
          <time file="1215614491" build="1215527364"/>
          <size package="4795919" archive="26912556"/>
          <base-version epoch="0" ver="2.0" rel="30"/>
          <base-version epoch="0" ver="2.0.0.1" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.10" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.12" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.13" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1"/>
          <base-version epoch="0" ver="2.0.0.2" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.4" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.5" rel="1.1"/>
          <base-version epoch="0" ver="2.0.0.8" rel="1.1"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/x86_64/MozillaFirefox-translations-2.0.0.14_2.0.0.15-0.1.x86_64.delta.rpm"/>
          <checksum type="sha">62ea27f3942518ec70d64c3959fbff2bca878508</checksum>
          <time file="1215614501" build="1215527364"/>
          <size package="46743" archive="0"/>
          <base-version epoch="0" ver="2.0.0.14" rel="0.1" md5sum="f91be14698d8335d3462435fb9a8131e" buildtime="1209289302" sequence_info="MozillaFirefox-translations-2.0.0.14-0.1-9cd8311ea68f3a114239a00eb524af5faa10"/>
        </deltarpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
