enigmail-1.4.0+11.0-3.1> A AlpA?O_ʘkGvmu˃m0HR?A-=2KT,K G^mNX'v d9099dc50798c556f27245c65ff7f285d55c2634bПٗt?O_ʘkGvm[@U{AMCY( X{`MrZʈY>7T?Td   F 6<D$$ $ d$ $ $  $$P$($ s   ( 8 59 5:5FIGI4$HI$IJT$XJxYJ\J$]K0$^MbSycTdT_eTdfTilTkzT{Cenigmail1.4.0+11.03.1OpenPGP addon for Thunderbird and SeaMonkeyThis package contains the Enigmail OpenPGP Addon for Thunderbird and SeaMonkey.O_4build24[mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+Productivity/Networking/Email/Clientshttp://enigmail.mozdev.orglinuxi586vR^{} 9  h h6[Ϛ#~DWIPAAAAA큤A큤AA큤A큤A큤AAAA큤AO_RO_RO_RO_RO_RO_#O_&O_RO_O_O_#O_O_O_ O_RO_RO_#O_NO_#O_#O_RO_O_O_O_O_O_RO_RO_O_O_O_RO_#O_#O_RO_R1ce40677ee436bcab1bbd0cd3908175b6b01d49d0d645d00e4cd96871a6f0318c9585a75e3a50f3d1b7583b054952d17ee1537e60e29b5a15d0d12a0a56f887d445ff1a7e761806c349fce47f63baf9f8280f8431a244ca5de7eec25434d392c7d5b15b161a1f6468afb50e669c0e6e9540cc89b20fb6c8781008e6d0b01c9bf96fd7fb3787beab19920eebba354c8de96fd7fb3787beab19920eebba354c8defd00e7bc3835c178fc577314b162ab735df99bae8fa2408ab32e3c1c8960daab54afcda843bbcf8481149568b45a9284fdb1a00f09a253730ea8e43b253b9d8701339301e036c5c36d62d116fdd726d7d09f6e0730e05dfb6a41573143dfed7d41cf96c6e3f98bb02f15d0b04fa7318d700ad0a427ae906f43f638ae2e2ed3ce88f8459a7693d5c0f34f1787cf65825df03482d408e0ee02c9b6a3e67d2d1b25../{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootMozillaThunderbird-11.0-3.1.src.rpmenigmailenigmail(x86-32)    /usr/bin/gpgpinentry-guirpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-1thunderbird-esr4.8.0OYOKp@O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - update enigmail to 1.3.5 - added mozilla-disable-neon-option.patch to be able to disable neon on ARM - removed obsolete PPC64 patch- update to version 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling