enigmail-1.3.5+10.0.2-5.2> A AlpA?OFkGvmPV<~ #vd/<zMxfW%f)w:4130a1c81d4537d942af36fc2fa5f4d52c9ee282Q&[G/Ӵ?OFkGvmgp.VC@"Av=I?DgX޹]c>4S?Rd   H 6<D"" " T" " >" "8"""<Xp( 8 39 3: L3FGGG"HHl"IH"XIYI \ID"]I"^KbQcRjdReRfRlRzRCenigmail1.3.5+10.0.25.2OpenPGP addon for Thunderbird and SeaMonkeyThis package contains the Enigmail OpenPGP Addon for Thunderbird and SeaMonkey.OFbuild10Mmozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+Productivity/Networking/Email/Clientshttp://enigmail.mozdev.orglinuxi5865R  h h6[@XXWIPAAAAA큤A큤AA큤A큤A큤AAAA큤AOFOFOFOFOFOF;OF?OFOFOFOF;OF)OFOF#OFOFOF:OFOF:OF;OFOFOFOFOFOFOFOFOFOFOF;OF;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../{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootMozillaThunderbird-10.0.2-5.2.src.rpmenigmailenigmail(x86-32)    /usr/bin/gpgpinentry-guirpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-14.8.0O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - update enigmail to 1.3.5 - added mozilla-disable-neon-option.patch to be able to disable neon on ARM - removed obsolete PPC64 patch- update to version 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling