<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="9ac5f072355543bb38c9916ea1c73aba"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="slesp2-MozillaFirefox-6187"
    timestamp="1239967874"
    engine="1.0">
  <yum:name>slesp2-MozillaFirefox</yum:name>
  <summary lang="en">Security update for MozillaFirefox</summary>
  <summary lang="de">Security update for MozillaFirefox</summary>
  <description lang="en">The Mozilla Firefox Browser was refreshed to the current
MOZILLA_1_8 branch state around fix level 2.0.0.22. 

Security issues identified as being fixed are: MFSA 2009-01
/ CVE-2009-0352 / CVE-2009-0353: Mozilla developers
identified and fixed several stability bugs in the browser
engine used in Firefox and other Mozilla-based products.
Some of these crashes showed evidence of memory corruption
under certain circumstances and we presume that with enough
effort at least some of these could be exploited to run
arbitrary code.

MFSA 2009-07 / CVE-2009-0772 / CVE-2009-0774: Mozilla
developers identified and fixed several stability bugs in
the browser engine used in Firefox and other Mozilla-based
products. Some of these crashes showed evidence of memory
corruption under certain circumstances and we presume that
with enough effort at least some of these could be
exploited to run arbitrary code.

MFSA 2009-09 / CVE-2009-0776: Mozilla security researcher
Georgi Guninski reported that a website could use
nsIRDFService and a cross-domain redirect to steal
arbitrary XML data from another domain, a violation of the
same-origin policy. This vulnerability could be used by a
malicious website to steal private data from users
authenticated to the redirected website.

MFSA 2009-10 / CVE-2009-0040: Google security researcher
Tavis Ormandy reported several memory safety hazards to the
libpng project, an external library used by Mozilla to
render PNG images. These vulnerabilities could be used by a
malicious website to crash a victim's browser and
potentially execute arbitrary code on their computer.
libpng was upgraded to version 1.2.35 which containis fixes
for these flaws.

MFSA 2009-12 / CVE-2009-1169: Security researcher Guido
Landi discovered that a XSL stylesheet could be used to
crash the browser during a XSL transformation. An attacker
could potentially use this crash to run arbitrary code on a
victim's computer. This vulnerability was also previously
reported as a stability problem by Ubuntu community member,
Andre. Ubuntu community member Michael Rooney reported
Andre's findings to Mozilla, and Mozilla community member
Martin helped reduce Andre's original testcase and
contributed a patch to fix the vulnerability.
</description>
  <description lang="de">The Mozilla Firefox Browser was refreshed to the current
MOZILLA_1_8 branch state around fix level 2.0.0.22. 

Security issues identified as being fixed are: MFSA 2009-01
/ CVE-2009-0352 / CVE-2009-0353: Mozilla developers
identified and fixed several stability bugs in the browser
engine used in Firefox and other Mozilla-based products.
Some of these crashes showed evidence of memory corruption
under certain circumstances and we presume that with enough
effort at least some of these could be exploited to run
arbitrary code.

MFSA 2009-07 / CVE-2009-0772 / CVE-2009-0774: Mozilla
developers identified and fixed several stability bugs in
the browser engine used in Firefox and other Mozilla-based
products. Some of these crashes showed evidence of memory
corruption under certain circumstances and we presume that
with enough effort at least some of these could be
exploited to run arbitrary code.

MFSA 2009-09 / CVE-2009-0776: Mozilla security researcher
Georgi Guninski reported that a website could use
nsIRDFService and a cross-domain redirect to steal
arbitrary XML data from another domain, a violation of the
same-origin policy. This vulnerability could be used by a
malicious website to steal private data from users
authenticated to the redirected website.

MFSA 2009-10 / CVE-2009-0040: Google security researcher
Tavis Ormandy reported several memory safety hazards to the
libpng project, an external library used by Mozilla to
render PNG images. These vulnerabilities could be used by a
malicious website to crash a victim's browser and
potentially execute arbitrary code on their computer.
libpng was upgraded to version 1.2.35 which containis fixes
for these flaws.

MFSA 2009-12 / CVE-2009-1169: Security researcher Guido
Landi discovered that a XSL stylesheet could be used to
crash the browser during a XSL transformation. An attacker
could potentially use this crash to run arbitrary code on a
victim's computer. This vulnerability was also previously
reported as a stability problem by Ubuntu community member,
Andre. Ubuntu community member Michael Rooney reported
Andre's findings to Mozilla, and Mozilla community member
Martin helped reduce Andre's original testcase and
contributed a patch to fix the vulnerability.
</description>
  <yum:version ver="6187" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="MozillaFirefox" epoch="0" ver="2.0.0.21post" rel="0.3" flags="EQ"/>
    <rpm:entry kind="atom" name="MozillaFirefox-translations" epoch="0" ver="2.0.0.21post" rel="0.3" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.0.0.21post" rel="0.3"/>
      <checksum type="sha" pkgid="YES">7513493acb46c184d4884e3972d351f33212195f</checksum>
      <time file="1239971200" build="1239967874"/>
      <size package="8631922" installed="23145003" archive="23127408"/>
      <location xml:base="media://#1" href="suse/i586/MozillaFirefox-3.0.13-0.4.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="2.0.0.21post" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>i586</arch>
      <version epoch="0" ver="2.0.0.21post" rel="0.3"/>
      <checksum type="sha" pkgid="YES">13c56420e0d6f8b1773b86fee92074e7462ecba5</checksum>
      <time file="1239971204" build="1239967874"/>
      <size package="5113613" installed="28898683" archive="28911852"/>
      <location xml:base="media://#1" href="suse/i586/MozillaFirefox-translations-3.0.13-0.4.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="2.0.0.21post" rel="0.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
      </pkgfiles>
    </package>
  </atoms>
</patch>
