enigmail-1.4.0+10.0.3-8.2> A AlpA?OkGvmGmOU3{|־Gg2}7X?Xsd   H 6<D$$ $ d$ $ $  $$P$($ s   ( 8 59 5:&5FMGM$HM$IN8$XN\YNd\N$]O$^QtbWacWdXGeXLfXQlXSzXcCenigmail1.4.0+10.0.38.2OpenPGP addon for Thunderbird and SeaMonkeyThis package contains the Enigmail OpenPGP Addon for Thunderbird and SeaMonkey.O build02[mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+Productivity/Networking/Email/Clientshttp://enigmail.mozdev.orglinuxi586vR^{} 9  h h6[Ϛ#~DWIPAAAAA큤A큤AA큤A큤A큤AAAA큤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../{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootthunderbird-esr-10.0.3-8.2.src.rpmenigmailenigmail(x86-32)    /usr/bin/gpgpinentry-guirpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-1 MozillaThunderbirdthunderbird10.0.310.0.34.8.0OOU@O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - update enigmail to 1.3.5 - added mozilla-disable-neon-option.patch to be able to disable neon on ARM - removed obsolete PPC64 patch- update to version 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling