enigmail-1.4.1+12.0.1-4.1> A AlpA?O,kGvmcTDgֿ\"&!dOe>yܑN%B^MAWgd2babcd349e04d27217d692ff77a269aa095605cKmŜpCt? ?O,kGvm;"GVYǤ a3_[Q8r pX>7^?^d   H 6<D## # \# # # ##;## W x | ( 8 89 t8:'8FSGS#HTX#IT#XUYU\U4#]U#^Xb]c^d^pe^uf^zl^|z^Cenigmail1.4.1+12.0.14.1OpenPGP addon for Thunderbird and SeaMonkeyThis package contains the Enigmail OpenPGP Addon for Thunderbird and SeaMonkey.Obuild048,mozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+Productivity/Networking/Email/Clientshttp://enigmail.mozdev.orglinuxi586vHdRyX  h h9Y#}WPAAAAA큤A큤AA큤A큤A큤AAAAODODODODODO{O{ODO{|O{|O{O{O{|O{ODODO{OO{O{ODO{|O{|O{|O{|O{{O{{O{{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../{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootMozillaThunderbird-12.0.1-4.1.src.rpmenigmailenigmail(x86-32)    /usr/bin/gpgpinentry-guirpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-1thunderbird-esr4.8.0O@O@OqOYOKp@O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - update enigmail to 1.3.5 - added mozilla-disable-neon-option.patch to be able to disable neon on ARM - removed obsolete PPC64 patch- update to version 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling