enigmail-1.1.2+3.1.18-0.23.1<>,SPqc/=„G3Ía0O#?ߕui/ܽz[MشJՁ67Lyr8-pKtc* N0%IcBx3JWݍSI䧅*R"zOXCQZfw1:>G95YZ#F𥳐5U_kuҀL-KO=8ScVߏpK; _vʋAcƧa/*QYL*xĸXJJvV߸>5F5?F%d   K 17<  ,   Xt(38<(9(: (F;G;H fixes build for 12.1 and above- security update to version 3.1.10 (bnc#689281) * MFSA 2011-12/ CVE-2011-0069 CVE-2011-0070 CVE-2011-0072 CVE-2011-0074 CVE-2011-0075 CVE-2011-0077 CVE-2011-0078 CVE-2011-0080 CVE-2011-0081 Miscellaneous memory safety hazards- Add mozilla-gcc46.patch: fix compilation with gcc 4.6 See the following bug reports: https://bugzilla.mozilla.org/show_bug.cgi?id=623116 https://bugzilla.mozilla.org/show_bug.cgi?id=623123 https://bugzilla.mozilla.org/show_bug.cgi?id=623126 https://bugzilla.mozilla.org/show_bug.cgi?id=628371- security update to version 3.1.8 (build3) (bnc#667155) * MFSA 2011-01/CVE-2011-0053/CVE-2011-0062 Miscellaneous memory safety hazards (rv:1.9.2.14/ 1.9.1.17) * MFSA 2011-08/CVE-2010-1585 (bmo#562547) ParanoidFragmentSink allows javascript: URLs in chrome documents * MFSA 2011-09/CVE-2011-0061 (bmo#610601) Crash caused by corrupted JPEG image- rename desktop file for 11.4 and above (bnc#664211)- add x-scheme-handler/mailto as mimetype to the desktop file as needed by newer Gnome environment- security update to version 3.1.7 (bnc#657016) * MFSA 2010-74/CVE-2010-3776/CVE-2010-3777/CVE-2010-3778 Miscellaneous memory safety hazards (rv:1.9.2.13/ 1.9.1.16) * MFSA 2010-75/CVE-2010-3769 (bmo#608336) Buffer overflow while line breaking after document.write with long string * MFSA 2010-78/CVE-2010-3768 (bmo#527276) Add support for OTS font sanitizer - provide versioned "thunderbird" symbol- security update to version 3.1.6 (bnc#649492) * MFSA 2010-73/CVE-2010-3765 (bmo#607222) Heap buffer overflow mixing document.write and DOM insertion- security update to version 3.1.5 (bnc#645315) * MFSA 2010-64/CVE-2010-3174/CVE-2010-3175/CVE-2010-3176 Miscellaneous memory safety hazards * MFSA 2010-65/CVE-2010-3179 (bmo#583077) Buffer overflow and memory corruption using document.write * MFSA 2010-66/CVE-2010-3180 (bmo#588929) Use-after-free error in nsBarProp * MFSA 2010-67/CVE-2010-3183 (bmo#598669) Dangling pointer vulnerability in LookupGetterOrSetter * MFSA 2010-69/CVE-2010-3178 (bmo#576616) Cross-site information disclosure via modal calls * MFSA 2010-70/CVE-2010-3170 (bmo#578697) SSL wildcard certificate matching IP addresses * MFSA 2010-71/CVE-2010-3182 (bmo#590753, bnc#642502) Unsafe library loading vulnerabilities * MFSA 2010-72/CVE-2010-3173 Insecure Diffie-Hellman key exchange * new extra locales * removed upstreamed mozilla-helper-app.patch - require mozilla-nss >= 3.12.8- update to version 3.1.4 * fixing startup topcrash- security update to version 3.1.3 (bnc#637303) * MFSA 2010-49/CVE-2010-3169 Miscellaneous memory safety hazards * MFSA 2010-50/CVE-2010-2765 (bmo#576447) Frameset integer overflow vulnerability * MFSA 2010-51/CVE-2010-2767 (bmo#584512) Dangling pointer vulnerability using DOM plugin array * MFSA 2010-53/CVE-2010-3166 (bmo#579655) Heap buffer overflow in nsTextFrameUtils::TransformText * MFSA 2010-54/CVE-2010-2760 (bmo#585815) Dangling pointer vulnerability in nsTreeSelection * MFSA 2010-55/CVE-2010-3168 (bmo#576075) XUL tree removal crash and remote code execution * MFSA 2010-56/CVE-2010-3167 (bmo#576070) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-57/CVE-2010-2766 (bmo#580445) Crash and remote code execution in normalizeDocument * MFSA 2010-59/CVE-2010-2762 (bmo#584180) SJOW creates scope chains ending in outer object * MFSA 2010-61/CVE-2010-2768 (bmo#579744) UTF-7 XSS by overriding document charset using type attribute * MFSA 2010-62/CVE-2010-2769 (bmo#520189) Copy-and-paste or drag-and-drop into designMode document allows XSS * MFSA 2010-63/CVE-2010-2764 (bmo#552090) Information leak via XMLHttpRequest statusText - ESD notification sound fix included upstream- fixed build with latest Gnome (mozilla-gdk-pixbuf.patch)- update to version 3.1.1 * based on the Gecko 1.9.2 platform * Faster Search Results * Quick Filter Toolbar * New Migration Assistant * Saved Files Manager - update to enigmail 1.1.2 - enable crashreporter and package buildsymbols - fixed esd sound output (notifications) (bmo#576365)- security update to 3.0.6 (bnc#622506) * MFSA 2010-34/CVE-2010-1211/CVE-2010-1212 Miscellaneous memory safety hazards * MFSA 2010-39/CVE-2010-2752 (bmo#574059) nsCSSValue::Array index integer overflow * MFSA 2010-40/CVE-2010-2753 (bmo#571106) nsTreeSelection dangling pointer remote code execution vulnerability * MFSA 2010-41/CVE-2010-1205 (bmo#570451) Remote code execution using malformed PNG image * MFSA 2010-42/CVE-2010-1213 (bmo#568148) Cross-origin data disclosure via Web Workers and importScripts * MFSA 2010-46/CVE-2010-0654 (bmo#524223) Cross-domain data theft using CSS * MFSA 2010-47/CVE-2010-2754 (bmo#568564) Cross-origin data leakage from script filename in error messages- security update to 3.0.5 (bnc#603356) * MFSA 2010-25/CVE-2010-1121 (bmo#555109) Re-use of freed object due to scope confusion * MFSA 2010-26/CVE-2010-1200/CVE-2010-1201/CVE-2010-1202/ CVE-2010-1203 Crashes with evidence of memory corruption (rv:1.9.1.10) * MFSA 2010-29/CVE-2010-1196 (bmo#534666) Heap buffer overflow in nsGenericDOMDataNode::SetTextInternal * MFSA 2010-30/CVE-2010-1199 (bmo#554255) Integer Overflow in XSLT Node Sorting- do not encode the RPM release number into the useragent to avoid non useful republishing (bnc#593807)- security update to 3.0.4 (bnc#586567) * MFSA 2010-16/CVE-2010-0173/CVE-2010-0174 Crashes with evidence of memory corruption * MFSA 2010-17/CVE-2010-0175 (bmo#540100,375928) Remote code execution with use-after-free in nsTreeSelection * MFSA 2010-18/CVE-2010-0176 (bmo#538308) Dangling pointer vulnerability in nsTreeContentView * MFSA 2010-22/CVE-2009-3555 (bmo#545755) Update NSS to support TLS renegotiation indication * MFSA 2010-24/CVE-2010-0182 (bmo#490790) XMLDocument::load() doesn't check nsIContentPolicy- update to 3.0.3 * Fix for missing folders or empty folder pane after updating to Thunderbird 3.0.2- security update to 3.0.2 (bnc#576969) * MFSA 2010-01/CVE-2010-0159 Crashes with evidence of memory corruption * MFSA 2010-03/CVE-2009-1571 Use-after-free crash in HTML parser * various stability improvements - update enigmail to 1.0.1 * Czech, Dutch, Polish and Portuguese (Brazilian) languages were added to the release. * there are several fixes related using OpenPGP Smartcards - use system hunspell again (bnc#582276)- update to 3.0.1 * fixed UI issues related to some combinations of installed addons (bmo#398702) - fixed session restore (bnc#528406, bmo#508986) - removed obsolete lightning stuff from spec file - removed obsolete orbit-devel build requirement- update to 3.0 (bnc#559819) - update enigmail to final version 1.0.0 - use --disable-updater and removed obsolete UI patch and pref changes - use internal cairo up to 11.1 (Gecko now requires at least 1.8.8) - added mozilla-clipboard.patch fixing a common crash (bmo#495392) - removed upstreamed patch thunderbird-cs-smtpauth.patch- fixed startup-notification (bnc#518603) (mozilla-startup-notification.patch)- fixed CS locale to allow SMTP AUTH sending of mails (bnc#542809)- update to 3.0b4 * removed upstreamed patches * based on Gecko 1.9.1.3 (inheriting security fixes) * new global search- reversioned enigmail to 0.96.99 (as it's actually 0.97a and 0.96 has been released already) - fixed RPM group for the translation subpackages- remove obsolete code for protocol handlers (bmo#389732) (mozilla-protocol_handler.patch) - new enigmail snapshot (20090813) - require pinentry-gui for 11.2 and up (bnc#441084)- Gtk filechooser allows alternative button order (as used in KDE) (bnc#527418) - translations{,-common} package doesn't provide en-US - split translations into -common and -other packages (bnc#529180)- fixed wrong %exclude by removing unwanted files at %install stage- major update to 3.0b3 - update enigmail to 0.96pre - created enigmail subpackage and install to system wide location for Thunderbird and SeaMonkey - define MOZ_APP_LAUNCHER for session management (bmo#453689) (mozilla-app-launcher.patch and mozilla.sh.in) - move opensuse.js prefs to all-opensuse.js prefs to be able to override prefs in all-thunderbird.js - move intl.locale.matchOS to all-opensuse.js - added mozilla-jemalloc_deepbind.patch to fix various possible crashes (bnc#503151, bmo#493541)- disable as-needed for this package as it fails to build with it- Fixed build issue for gcc 4.4 (mozilla-gcc44.patch)- security update to version 2.0.0.21 (bnc#484321) * MFSA 2009-07/CVE-2009-0771, CVE-2009-0772, CVE-2009-0773 CVE-2009-0774: Crashes with evidence of memory corruption (rv:1.9.0.7) * MFSA 2009-09/CVE-2009-0776: XML data theft via RDFXMLDataSource and cross-domain redirect * MFSA 2009-10/CVE-2009-0040: Upgrade PNG library to fix memory safety hazardsbuild14 1328128809 AT AU AO AR AS AP AS AY AZ A[ Ag A\ AV AX AW A^ A_1.1.2+3.1.18-0.23.11.1.2+3.1.18-0.23.1   mozillaextensions{3550f703-e582-4d05-9a08-453d09bdfdc6}{847b3a00-7ab1-11d4-8f02-006008948af5}chromechrome.manifestenigmail.jarcomponentsenigMsgCompFields.jsenigmail.jsenigmail.xptenigmime.xptenigprefs-service.jsipc.xptdefaultsprefenigmail.jspreferencesenigmail.jsinstall.rdfplatformLinux_x86-gcc3componentslibenigmime-x86-gcc3.solibipc-x86-gcc3.sowrappersgpg-agent-wrapper.shgpg-wrapper.sh{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}{847b3a00-7ab1-11d4-8f02-006008948af5}/usr/lib//usr/lib/mozilla//usr/lib/mozilla/extensions//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/chrome//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/components//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/defaults//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/defaults/pref//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/defaults/preferences//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/platform//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/platform/Linux_x86-gcc3//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/platform/Linux_x86-gcc3/components//usr/lib/mozilla/extensions/{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}/wrappers//usr/lib/mozilla/extensions/{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:11.4:Update:Test/standard/03143b257e903330d2116283cdde0ca0-MozillaThunderbirddrpmlzma5i586-suse-linux]\}=%Z-%?]"k%YqBnT8.g`b}-3^mOF1pGf.wGFB,g |!K ΜAf(Z{eޭ#K :)*%li^!"ZU峦QOsge V]Mrg59Ua; "eQ2D'}FpMg!>oo֭y q"}r[3qT{=tFIP⽶_B$:: Rvj3+7:ŎDI%?)^珈 J}b "~rU ք8+ U6XT?GYqşwq&ܹ UadRH˴=,h"5A'YzG?U;: Y+:g`2<wFrcpRWJҗ/e[s]+PD!zg^|1xA@FkK E( XUj!;0jI;]:+N&nTv /9ط;'D+EnA̓j~WHnW:;h;Ԇ"+4[-XA6`Ki|zX05IC.8 iQP:DX$Mqo^0AtPL}\ff v=*mS<ٜM0e8n+sd}omF6'ս ׈:ד|N*Z(Xe0s̑4w܏8\9ؘ7/0/?LUzo n}1Tp%ѬA5rՊN=O \"a?x`2Rzt<6u^ )VL/TlqT2kӌJ/p if\Q U(C_١R 4qJe*EL K ILCLȲN}& $Hv!h4G*~.~' -0M8swGg B#aalC5ru w=l6SIշj2&FE48L7 =g@W7J(o x hww98n5$Y8YE59q"s͐@Dhve?Mhn?Jp4#J+_~${C2^ ,K`f?EmT4%nOv?O:[VdMT15q2gob_|*ǣ`k3܉3 {4"`ٱ^1! ԩ  4J 4pi{Nؤnc Et)v&$)JA_]3~KqFˡ,.Xck 'h4LW|*g`2`gߠLFK4,z[/ei8-}X\ar?v~A՜1#A 8ٌHcQD_yˤ߭34reNWR!*#g| Z)Q~RhkA_iNb*AAJP LT kYl80T::bkOCse!s.]oe5q6["ۆIDvS27kGm'>5\|6=7Ts0wW: (vU4!VXK'7q*NٓHg\9ٙx +SpOH[q՝:ֽ;K&G7s6i`.b"1k~VgY>mH9}7KimEŚCl53T#uá$pJ5Y: wDig \WNQ> &4*o"Ʋ+!5B? TiF=ۄx|4G(94 A;qo*h?QHjGzR#z5Fg&*Y&ηŽbil