enigmail-1.4.3+14.0-3.1> A AlpA?P8zkGvmB?QTUyYiEۏLi9IdAv593c5578fa624b1b9a9a5b7e5563ba657150e309sAI'JzI8]i?P8zkGvmf|ƾkJj"kQB(hf>h>7i2?i"d   F 6<D$$ $ d$ $ $ ,$$p$$H$     ( 8 >9 >:>F^#G^8$H^$I_X$X_|Y_\_$]`4$^bbhchdhehfiliziCenigmail1.4.3+14.03.1OpenPGP addon for Thunderbird and SeaMonkeyThis package contains the Enigmail OpenPGP Addon for Thunderbird and SeaMonkey.P0build24GEmozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+Productivity/Networking/Email/Clientshttp://enigmail.mozdev.orglinuxi586vJԒX  h h;Yy-##PAAAAA큤A큤AA큤A큤A큤AAAAP+P+P+P+P+P'P'P+P'P'P'P'P'P'P+P+P'P,P'P'P+P'P'P'P'P'P'P'P'P+P+P. P. P. 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../{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootMozillaThunderbird-14.0-3.1.src.rpmenigmailenigmail(x86-32)    /usr/bin/gpgpinentry-guirpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-1thunderbird-esr4.8.0POO#O@OO~O@O@OqOYOKp@O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - update enigmail to 1.3.5 - added mozilla-disable-neon-option.patch to be able to disable neon on ARM - removed obsolete PPC64 patch- update to version 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling