enigmail-1.4.4+15.0-2.1> A AlpA?P:rnkGvm$%{SqA ;Ur|,v"*Aٰvaa12cd55279e9d87c0596022bf087cf9ff2275cfook`&K?P:rnkGvma•2B=oW3'&MRpL(dY>7jB?j2d   F 6<D%% "% l% % % \%%%b%  8 P    ( 8 @9 @:G@F_G_(%H_%I`P%X`xY`\`%]a4%^cbi cidjej fjljzj"Cenigmail1.4.4+15.02.1OpenPGP addon for Thunderbird and SeaMonkeyThis package contains the Enigmail OpenPGP Addon for Thunderbird and SeaMonkey.P:kbuild21Smozilla / openSUSE_11.4obs://build.opensuse.org/mozillaMPL-1.1 or GPL-2.0+Productivity/Networking/Email/Clientshttp://enigmail.mozdev.orglinuxi586vKX  h hY_-#V#PAAAAA큤A큤AA큤A큤A큤AAAAP:fP:fP:fP:fP:fP:cP:cP:fP:coP:coP:cP:cvP:coP:csP:fP:fP:cP:gFP:cP:cP:fP:coP:coP:coP:coP:coP:cmP:cmP:cnP:cmP:fP:fP:h7P:h7P:h7P:fP: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../{3550f703-e582-4d05-9a08-453d09bdfdc6}/{847b3a00-7ab1-11d4-8f02-006008948af5}rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootMozillaThunderbird-15.0-2.1.src.rpmenigmailenigmail(x86-32)    /usr/bin/gpgpinentry-guirpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0.4-14.0-13.0.4-14.4.6-1thunderbird-esr4.8.0P:P%POO#O@OO~O@O@OqOYOKp@O element exposed across domains via name attribute * MFSA 2012-04/CVE-2011-3659 (bmo#708198) Child nodes from nsDOMAttribute still accessible after removal of nodes * MFSA 2012-05/CVE-2012-0446 (bmo#705651) Frame scripts calling into untrusted objects bypass security checks * MFSA 2012-06/CVE-2012-0447 (bmo#710079) Uninitialized memory appended when encoding icon images may cause information disclosure * MFSA 2012-07/CVE-2012-0444 (bmo#719612) Potential Memory Corruption When Decoding Ogg Vorbis files * MFSA 2012-08/CVE-2012-0449 (bmo#701806, bmo#702466) Crash with malformed embedded XSLT stylesheets - update enigmail to 1.3.5 - added mozilla-disable-neon-option.patch to be able to disable neon on ARM - removed obsolete PPC64 patch- update to version 9.0 (bnc#737533) * MFSA 2011-53/CVE-2011-3660 Miscellaneous memory safety hazards (rv:9.0) * MFSA 2011-54/CVE-2011-3661 (bmo#691299) Potentially exploitable crash in the YARR regular expression library * MFSA 2011-55/CVE-2011-3658 (bmo#708186) nsSVGValue out-of-bounds access * MFSA 2011-56/CVE-2011-3663 (bmo#704482) Key detection without JavaScript via SVG animation * MFSA 2011-58/VE-2011-3665 (bmo#701259) Crash scaling