<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="7cd7dff5951cf6310603096b81b16922"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp2-gecko-sdk-5654"
    timestamp="1222988837"
    engine="1.0">
  <yum:name>sdkp2-gecko-sdk</yum:name>
  <summary lang="en">Security update for Mozilla</summary>
  <summary lang="de">Security update for Mozilla</summary>
  <description lang="en">This update backports lots of security fixes to
mozilla-xulrunner package of SLES 10.

It contains among others the following security fixes: MFSA
2008-45 / CVE-2008-4069: XBM image uninitialized memory
reading

MFSA 2008-44 / CVE-2008-4067 / CVE-2008-4068: resource:
traversal vulnerabilities

MFSA 2008-43: BOM characters stripped from JavaScript
before execution CVE-2008-4065: Stripped BOM characters bug
CVE-2008-4066: HTML escaped low surrogates bug

MFSA 2008-42 Crashes with evidence of memory corruption
(rv:1.9.0.2/1.8.1.17): CVE-2008-4061: Jesse Ruderman
reported a crash in the layout engine. CVE-2008-4062: Igor
Bukanov, Philip Taylor, Georgi Guninski, and Antoine Labour
reported crashes in the JavaScript engine. CVE-2008-4063:
Jesse Ruderman, Bob Clary, and Martijn Wargers reported
crashes in the layout engine which only affected Firefox 3.
CVE-2008-4064: David Maciejak and Drew Yao reported crashes
in graphics rendering which only affected Firefox 3.

MFSA 2008-41 Privilege escalation via XPCnativeWrapper
pollution CVE-2008-4058: XPCnativeWrapper pollution bugs
CVE-2008-4059: XPCnativeWrapper pollution (Firefox 2)
CVE-2008-4060: Documents without script handling objects

MFSA 2008-40 / CVE-2008-3837: Forced mouse drag

MFSA 2008-39 / CVE-2008-3836: Privilege escalation using
feed preview page and XSS flaw

MFSA 2008-38 / CVE-2008-3835:
nsXMLDocument::OnChannelRedirect() same-origin violation

MFSA 2008-37 / CVE-2008-0016: UTF-8 URL stack buffer
overflow

For more details:
http://www.mozilla.org/security/known-vulnerabilities/firefo
x20.html
</description>
  <description lang="de">This update backports lots of security fixes to
mozilla-xulrunner package of SLES 10.

It contains among others the following security fixes: MFSA
2008-45 / CVE-2008-4069: XBM image uninitialized memory
reading

MFSA 2008-44 / CVE-2008-4067 / CVE-2008-4068: resource:
traversal vulnerabilities

MFSA 2008-43: BOM characters stripped from JavaScript
before execution CVE-2008-4065: Stripped BOM characters bug
CVE-2008-4066: HTML escaped low surrogates bug

MFSA 2008-42 Crashes with evidence of memory corruption
(rv:1.9.0.2/1.8.1.17): CVE-2008-4061: Jesse Ruderman
reported a crash in the layout engine. CVE-2008-4062: Igor
Bukanov, Philip Taylor, Georgi Guninski, and Antoine Labour
reported crashes in the JavaScript engine. CVE-2008-4063:
Jesse Ruderman, Bob Clary, and Martijn Wargers reported
crashes in the layout engine which only affected Firefox 3.
CVE-2008-4064: David Maciejak and Drew Yao reported crashes
in graphics rendering which only affected Firefox 3.

MFSA 2008-41 Privilege escalation via XPCnativeWrapper
pollution CVE-2008-4058: XPCnativeWrapper pollution bugs
CVE-2008-4059: XPCnativeWrapper pollution (Firefox 2)
CVE-2008-4060: Documents without script handling objects

MFSA 2008-40 / CVE-2008-3837: Forced mouse drag

MFSA 2008-39 / CVE-2008-3836: Privilege escalation using
feed preview page and XSS flaw

MFSA 2008-38 / CVE-2008-3835:
nsXMLDocument::OnChannelRedirect() same-origin violation

MFSA 2008-37 / CVE-2008-0016: UTF-8 URL stack buffer
overflow

For more details:
http://www.mozilla.org/security/known-vulnerabilities/firefo
x20.html
</description>
  <yum:version ver="5654" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="gecko-sdk" epoch="0" ver="1.8.0.14eol" rel="0.7" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>gecko-sdk</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.8.0.14eol" rel="0.7"/>
      <checksum type="sha" pkgid="YES">a62a14020ca0174a1f761d479e39ced861cf1850</checksum>
      <time file="1222990359" build="1222988837"/>
      <size package="3147435" installed="18286602" archive="18683732"/>
      <location xml:base="media://#1" href="suse/i586/gecko-sdk-1.8.0.14eol-0.12.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="gecko-sdk" epoch="0" ver="1.8.0.14eol" rel="0.7" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="gecko-sdk"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
