<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="dd29bade9f7bbb05007b9a7cd8d845db"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="sledp3-mozilla-nspr-6631"
    timestamp="1257248767"
    engine="1.0">
  <yum:name>sledp3-mozilla-nspr</yum:name>
  <summary lang="en">Security update for mozilla-nspr</summary>
  <summary lang="de">Security update for mozilla-nspr</summary>
  <description lang="en">This update fixes a bug in the Mozilla NSPR helper
libraries, which could be used by remote attackers to
potentially execute code via javascript vectors.

MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad
Pop of Secunia Research reported a heap-based buffer
overflow in Mozilla's string to floating point number
conversion routines. Using this vulnerability an attacker
could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number
which would result in improper memory allocation and the
execution of an arbitrary memory location. This
vulnerability could thus be leveraged by the attacker to
run arbitrary code on a victim's computer.
</description>
  <description lang="de">This update fixes a bug in the Mozilla NSPR helper
libraries, which could be used by remote attackers to
potentially execute code via javascript vectors.

MFSA 2009-59 / CVE-2009-1563: Security researcher Alin Rad
Pop of Secunia Research reported a heap-based buffer
overflow in Mozilla's string to floating point number
conversion routines. Using this vulnerability an attacker
could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number
which would result in improper memory allocation and the
execution of an arbitrary memory location. This
vulnerability could thus be leveraged by the attacker to
run arbitrary code on a victim's computer.
</description>
  <yum:version ver="6631" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="mozilla-nspr" epoch="0" ver="4.8.2" rel="1.5.1" flags="EQ"/>
    <rpm:entry kind="atom" name="mozilla-nspr-32bit" epoch="0" ver="4.8.2" rel="1.5.1" flags="EQ"/>
    <rpm:entry kind="atom" name="mozilla-nspr-devel" epoch="0" ver="4.8.2" rel="1.5.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>mozilla-nspr</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="4.8.2" rel="1.5.1"/>
      <checksum type="sha" pkgid="YES">bee0d64785edc4ca605c6bed1d02502953a3991b</checksum>
      <time file="1257248777" build="1257248767"/>
      <size package="116542" installed="259264" archive="259796"/>
      <location xml:base="media://#1" href="suse/x86_64/mozilla-nspr-4.8.2-1.5.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="mozilla-nspr" epoch="0" ver="4.8.2" rel="1.5.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="mozilla-nspr"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>mozilla-nspr-32bit</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="4.8.2" rel="1.5.1"/>
      <checksum type="sha" pkgid="YES">7f687f2e8132f348366c16c56c512a69d6fdcce2</checksum>
      <time file="1257250602" build="1257250572"/>
      <size package="105111" installed="222900" archive="223420"/>
      <location xml:base="media://#1" href="suse/x86_64/mozilla-nspr-32bit-4.8.2-1.5.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="mozilla-nspr-32bit" epoch="0" ver="4.8.2" rel="1.5.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="mozilla-nspr-32bit"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>mozilla-nspr-devel</name>
      <arch>x86_64</arch>
      <version epoch="0" ver="4.8.2" rel="1.5.1"/>
      <checksum type="sha" pkgid="YES">8b6878a399f9bbb2a69a006535fd4ae5a2a07f32</checksum>
      <time file="1257248777" build="1257248767"/>
      <size package="213578" installed="1235770" archive="1036368"/>
      <location xml:base="media://#1" href="suse/x86_64/mozilla-nspr-devel-4.8.2-1.5.1.x86_64.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="mozilla-nspr-devel" epoch="0" ver="4.8.2" rel="1.5.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="mozilla-nspr-devel"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
