enigmail-1.4.0+10.0.6-16.1> A AlpA?PkGvm;⻯@N0qG()F 86rk";Q]]5ac2d91da1b6db21f74a3fde41000f880c0d51dbX71kpGM@?PkGvm$7MX[g,tgNt <̳7`+?`d   I :@H$$  $ h$ $ $ $$T$,$ w   ( 8 79 7:T7FTGT$HUP$IU$XVYV \V0$]V$^Yb_ c_d_e_f_l_z` Cenigmail1.4.0+10.0.616.1OpenPGP addon for Thunderbird and SeaMonkeyThis package contains the Enigmail OpenPGP Addon for Thunderbird and SeaMonkey.Pbuild11[mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+Productivity/Networking/Email/Clientshttp://enigmail.mozdev.orglinuxi586vR^{} 9  h h6[Ϛ#~DWIPAAAAA큤A큤AA큤A큤A큤AAAA큤AP P P P P PPP PPPPPPP P PP PPP PPPPPP P P P P P PPP P 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../{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootthunderbird-esr-10.0.6-16.1.src.rpmenigmailenigmail(x86-32)    /usr/bin/gpgpinentry-guirpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-1 MozillaThunderbirdthunderbird10.0.610.0.64.8.0P_@OȮO@OU@O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - update enigmail to 1.3.5 - added mozilla-disable-neon-option.patch to be able to disable neon on ARM - removed obsolete PPC64 patch- update to version 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling