<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="a8d90b51fe9f6e085ade64278ece8e87"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sdkp3-MozillaFirefox-7083"
    timestamp="1277903409"
    engine="1.0">
  <yum:name>sdkp3-MozillaFirefox</yum:name>
  <summary lang="en">Security update for Mozilla Firefox</summary>
  <description lang="en">
Mozilla Firefox has been updated to version 3.5.10, fixing various bugs and 
security issues.

    * 

      Security researcher Amit Klein reported that it was possible to
      reverse engineer the value used to seed Math.random(). Since the
      pseudo-random number generator was only seeded once per browsing
      session, this seed value could be used as a unique token to identify
      and track users across different web sites. (MFSA 2010-33
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-33.html&gt; / 
      CVE-2008-5913
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913&gt; )

    * 

      Security researcher Ilja van Sprundel of IOActive reported that the 
      Content-Disposition: attachment HTTP header was ignored when
      `Content-Type: multipart` was also present. This issue could
      potentially lead to XSS problems in sites that allow users to upload
      arbitrary files and specify a content type but rely on 
      Content-Disposition: attachment to prevent the content from being
      displayed inline. (MFSA 2010-32
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-32.html&gt; / 
      CVE-2010-1197
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197&gt; )

    * 

      Google security researcher Michal Zalewski reported that focus() 
      could be used to change a user's cursor focus while they are typing,
      potentially directing their keyboard input to an unintended location.
      This behaviour was also present across origins when content from one
      domain was embedded within another via an iframe. A malicious web
      page could use this behaviour to steal keystrokes from a victim while
      they were typing sensitive information such as a password. (MFSA
      2010-31
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-31.html&gt; / 
      CVE-2010-1125
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125&gt; )

    * 

      Security researcher Martin Barbella reported via TippingPoint's Zero
      Day Initiative that an XSLT node sorting routine contained an integer
      overflow vulnerability. In cases where one of the nodes to be sorted
      contained a very large text value, the integer used to allocate a
      memory buffer to store its value would overflow, resulting in too
      small a buffer being created. An attacker could use this
      vulnerability to write data past the end of the buffer, causing the
      browser to crash and potentially running arbitrary code on a victim's
      computer. (MFSA 2010-30
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-30.html&gt; / 
      CVE-2010-1199
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199&gt; )

    * 

      Security researcher Nils of MWR InfoSecurity reported that the
      routine for setting the text value for certain types of DOM nodes
      contained an integer overflow vulnerability. When a very long string
      was passed to this routine, the integer value used in creating a new
      memory buffer to hold the string would overflow, resulting in too
      small a buffer being allocated. An attacker could use this
      vulnerability to write data past the end of the buffer, causing a
      crash and potentially running arbitrary code on a victim's computer.
      (MFSA 2010-29
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-29.html&gt; / 
      CVE-2010-1196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196&gt; )

    * 

      Microsoft Vulnerability Research reported that two plugin instances
      could interact in a way in which one plugin gets a reference to an
      object owned by a second plugin and continues to hold that reference
      after the second plugin is unloaded and its object is destroyed. In
      these cases, the first plugin would contain a pointer to freed memory
      which, if accessed, could be used by an attacker to execute arbitrary
      code on a victim's computer. (MFSA 2010-28
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-28.html&gt; / 
      CVE-2010-1198
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198&gt; )

    * 

      Security researcher Wushi of Team509 reported that the frame
      construction process for certain types of menus could result in a
      menu containing a pointer to a previously freed menu item. During the
      cycle collection process, this freed item could be accessed,
      resulting in the execution of a section of code potentially
      controlled by an attacker. (MFSA 2010-27
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-27.html&gt; / 
      CVE-2010-0183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0183&gt; )

    * 

      Mozilla developers identified and fixed several stability bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these crashes showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code. (MFSA 2010-26
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-26.html&gt; / 
      CVE-2010-1200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200&gt; , 
      CVE-2010-1201
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201&gt; , 
      CVE-2010-1202
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202&gt; , 
      CVE-2010-1203
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203&gt; )

    * 

      A memory corruption flaw leading to code execution was reported by
      security researcher Nils of MWR InfoSecurity during the 2010 Pwn2Own
      contest sponsored by TippingPoint's Zero Day Initiative. By moving
      DOM nodes between documents, Nils found a case where the moved node
      incorrectly retained its old scope. If garbage collection could be
      triggered at the right time then Firefox would later use this freed
      object. The exploit only affects Firefox 3.6 and not earlier
      versions. Updated (June 22, 2010): Firefox 3.5, SeaMonkey 2.0, and
      Thunderbird 3.0 based on earlier versions of the browser engine were
      patched just in case there is an alternate way of triggering the
      underlying flaw. (MFSA 2010-25
      &lt;http://www.mozilla.org/security/announce/2010/mfsa2010-25.html&gt; / 
      CVE-2010-1121
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121&gt; )

</description>
  <yum:version ver="7083" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="MozillaFirefox-branding-upstream" epoch="0" ver="3.5.10" rel="0.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="mozilla-xulrunner191-devel" epoch="0" ver="1.9.1.10" rel="1.4.1" flags="EQ"/>
    <rpm:entry kind="atom" name="python-xpcom191" epoch="0" ver="1.9.1.10" rel="1.4.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-branding-upstream</name>
      <arch>i586</arch>
      <version epoch="0" ver="3.5.10" rel="0.4.1"/>
      <checksum type="sha" pkgid="YES">4c231721db711530815ee1c8b6de21e8c9a410fd</checksum>
      <time file="1277903440" build="1277903409"/>
      <size package="56056" installed="6516" archive="6956"/>
      <location xml:base="media://#1" href="suse/i586/MozillaFirefox-branding-upstream-3.5.10-0.4.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-branding-upstream" epoch="0" ver="3.5.10" rel="0.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-branding-upstream"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>mozilla-xulrunner191-devel</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.9.1.10" rel="1.4.1"/>
      <checksum type="sha" pkgid="YES">54cec6ca972217903177e825dd76b4ca04e01536</checksum>
      <time file="1277903166" build="1277903016"/>
      <size package="3413258" installed="26707742" archive="27343508"/>
      <location xml:base="media://#1" href="suse/i586/mozilla-xulrunner191-devel-1.9.1.10-1.4.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="mozilla-xulrunner191-devel" epoch="0" ver="1.9.1.10" rel="1.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="mozilla-xulrunner191-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>python-xpcom191</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.9.1.10" rel="1.4.1"/>
      <checksum type="sha" pkgid="YES">803fbf3e977b160207535b46fe75daebb3799c8b</checksum>
      <time file="1277903167" build="1277903016"/>
      <size package="121680" installed="354528" archive="359604"/>
      <location xml:base="media://#1" href="suse/i586/python-xpcom191-1.9.1.10-1.4.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="python-xpcom191" epoch="0" ver="1.9.1.10" rel="1.4.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="python-xpcom191"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
