<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="f051a46244d3651669e49c559d7b5274"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="MozillaFirefox-1585"
    timestamp="1150143317"
    engine="1.0">
  <yum:name>MozillaFirefox</yum:name>
  <summary lang="en">MozillaFirefox 1.5.0.4 security update.</summary>
  <summary lang="de">MozillaFirefox 1.5.0.4 Sicherheitsupdate.</summary>
  <description lang="en">This updates fixes several security problems in the Mozilla 
Firefox 1.5 browser and brings it up to 1.5.0.4 bugfix 
level.  The full list is at: 
http://www.mozilla.org/projects/security/known-vulnerabiliti
es.html#firefox1.5.0.4  MFSA 2006-31/CVE-2006-2787: 
EvalInSandbox allows remote attackers to gain privileges 
via javascript that calls the valueOf method on objects 
that were created outside of the sandbox.  MFSA 
2006-32/CVE-2006-2780: An Integer overflow allows remote 
attackers to cause a denial of service (crash) and possibly 
execute arbitrary code via &quot;jsstr tagify,&quot; which leads to 
memory corruption.  MFSA 2006-32/CVE-2006-2779: Firefox 
allow remote attackers to cause a denial of service (crash) 
and possibly execute arbitrary code via (1) nested &lt;option&gt; 
tags in a select tag, (2) a DOMNodeRemoved mutation event, 
(3) &quot;Content-implemented tree views,&quot; (4) BoxObjects, (5) 
the XBL implementation, (6) an iframe that attempts to 
remove itself, which leads to memory corruption.  MFSA 
2006-33/CVE-2006-2786: HTTP response smuggling 
vulnerability in Mozilla Firefox, when used with certain 
proxy servers, allows remote attackers to cause Firefox to 
interpret certain responses as if they were responses from 
two different sites via (1) invalid HTTP response headers 
with spaces between the header name and the colon, which 
might not be ignored in some cases, or (2) HTTP 1.1 headers 
through an HTTP 1.0 proxy, which are ignored by the proxy 
but processed by the client.  MFSA 2006-34/CVE-2006-2785: 
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 
allows user-complicit remote attackers to inject arbitrary 
web script or HTML by tricking a user into (1) performing a 
&quot;View Image&quot; on a broken image in which the SRC attribute 
contains a Javascript URL, or (2) selecting &quot;Show only this 
frame&quot; on a frame whose SRC attribute contains a Javascript 
URL.  MFSA 2006-35/CVE-2006-2775: Mozilla Firefox 
associates XUL attributes with the wrong URL under certain 
unspecified circumstances, which might allow remote 
attackers to bypass restrictions by causing a persisted 
string to be associated with the wrong URL.  MFSA 
2006-36/CVE-2006-2784: The PLUGINSPAGE functionality in 
Mozilla Firefox allows remote user-complicit attackers to 
execute privileged code by tricking a user into installing 
missing plugins and selecting the &quot;Manual Install&quot; button, 
then using nested javascript: URLs.  MFSA 
2006-37/CVE-2006-2776: Certain privileged UI code in 
Mozilla Firefox calls content-defined setters on an object 
prototype, which allows remote attackers to execute code at 
a higher privilege than intended.  MFSA 
2006-38/CVE-2006-2778: The crypto.signText function in 
Mozilla Firefox allows remote attackers to execute 
arbitrary code via certain optional Certificate Authority 
name arguments, which causes an invalid array index and 
triggers a buffer overflow.  MFSA 2006-39/CVE-2006-1942: 
Mozilla Firefox allows user-complicit remote attackers to 
open local files via a web page with an IMG element 
containing a SRC attribute with a non-image file:// URL, 
then tricking the user into selecting View Image for the 
broken image, as demonstrated using a ,wma file to launch 
Windows Media Player, or by referencing an &quot;alternate web 
page.&quot;  MFSA-2006-41/CVE-2006-2782: Firefox does not fix 
all test cases associated with CVE-2006-1729, which allows 
remote attackers to read arbitrary files by inserting the 
target filename into a text box, then turning that box into 
a file upload control.  MFSA 2006-42/CVE-2006-2783: Mozilla 
Firefox strips the Unicode Byte-order-Mark (BOM) from a 
UTF-8 page before the page is passed to the parser, which 
allows remote attackers to conduct cross-site scripting 
(XSS) attacks via a BOM sequence in the middle of a 
dangerous tag such as SCRIPT.   MFSA 2006-43/CVE-2006-2777: 
Unspecified vulnerability in Mozilla Firefox allows remote 
attackers to execute arbitrary code by using the 
nsISelectionPrivate interface of the Selection object to 
add a SelectionListener and create notifications that are 
executed in a privileged context.
</description>
  <description lang="de">Dieses Update behebt mehrere Sicherheitsprobleme im Mozilla 
Firefox 1.5 Browser und bringt ihn damit auf Version 
1.5.0.4.  Die komplette Liste aller Problem ist auf: 
http://www.mozilla.org/projects/security/known-vulnerabiliti
es.html#firefox1.5.0.4 zu finden.
</description>
  <yum:version ver="1585" rel="0"/>
  <rpm:requires>
  <rpm:entry kind="atom" name="MozillaFirefox" epoch="0" ver="1.5.0.4" rel="1.3" flags="EQ"/>
  <rpm:entry kind="atom" name="MozillaFirefox-translations" epoch="0" ver="1.5.0.4" rel="1.3" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0.4" rel="1.3"/>
      <checksum type="sha" pkgid="YES">6c54bc8407893a41bfc23759d3937b2918d98e38</checksum>
      <time file="1150213745" build="1150143317"/>
      <size package="7209666" installed="18747734" archive="18781744"/>
      <location href="rpm/i586/MozillaFirefox-1.5.0.4-1.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="1.5.0.4" rel="1.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/MozillaFirefox-1.5.0.4-1.3.i586.patch.rpm"/>
          <checksum type="sha">2de01900507820f0319b79e1403df162b269ab0f</checksum>
          <time file="1150214417" build="1150143317"/>
          <size package="5227027" archive="13899008"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-1.5.0.3_1.5.0.4-7_1.3.i586.delta.rpm"/>
          <checksum type="sha">e250bc3d6611ce4baa1a931366621fcdff3395cf</checksum>
          <time file="1150214431" build="1150143317"/>
          <size package="516172" archive="0"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7" md5sum="7b8339c824bba3828f8d7bf05b0030b0" buildtime="1146621086" sequence_info="MozillaFirefox-1.5.0.3-7-f278b756b1638aad1a236d9d5d02a6f1ca30"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>ppc</arch>
      <version epoch="0" ver="1.5.0.4" rel="1.3"/>
      <checksum type="sha" pkgid="YES">1096dfd4a7f5462c5dc5ea69183eff7690e3cce4</checksum>
      <time file="1150213649" build="1150146297"/>
      <size package="7341506" installed="21941974" archive="21975984"/>
      <location href="rpm/ppc/MozillaFirefox-1.5.0.4-1.3.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="1.5.0.4" rel="1.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/MozillaFirefox-1.5.0.4-1.3.ppc.patch.rpm"/>
          <checksum type="sha">ef52601cf487d9972825564acb3f0b2023d1376c</checksum>
          <time file="1150214451" build="1150146297"/>
          <size package="5347898" archive="16957100"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-1.5.0.3_1.5.0.4-7_1.3.ppc.delta.rpm"/>
          <checksum type="sha">c0e6f7269f7e25debf83a96fe7191be2ebc229e7</checksum>
          <time file="1150214464" build="1150146297"/>
          <size package="471560" archive="0"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7" md5sum="56603a3fddfcae8b426f413978329c84" buildtime="1146627070" sequence_info="MozillaFirefox-1.5.0.3-7-e8db1de78dc8f13cd00f6db16038708fca30"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0.4" rel="1.3"/>
      <checksum type="sha" pkgid="YES">295dc9fb01926856afeefac9c46f01e80fb863ff</checksum>
      <time file="1150213756" build="1150143317"/>
      <size package="3547628" installed="19369629" archive="19378948"/>
      <location href="rpm/i586/MozillaFirefox-translations-1.5.0.4-1.3.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="1.5.0.4" rel="1.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/MozillaFirefox-translations-1.5.0.4-1.3.i586.patch.rpm"/>
          <checksum type="sha">685cd57afdf027a8f9a1d3d5a052373e8f376157</checksum>
          <time file="1150214472" build="1150143317"/>
          <size package="29465" archive="124"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
        </patchrpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>ppc</arch>
      <version epoch="0" ver="1.5.0.4" rel="1.3"/>
      <checksum type="sha" pkgid="YES">030d9d5a3a087b9e5ec5ee9b68aed6bc6a51c843</checksum>
      <time file="1150213657" build="1150146297"/>
      <size package="3547924" installed="19369629" archive="19378948"/>
      <location href="rpm/ppc/MozillaFirefox-translations-1.5.0.4-1.3.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="1.5.0.4" rel="1.3" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/MozillaFirefox-translations-1.5.0.4-1.3.ppc.patch.rpm"/>
          <checksum type="sha">7489aeb24549a895e2437e2c5ae07b5abe152457</checksum>
          <time file="1150214487" build="1150146297"/>
          <size package="29453" archive="124"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
        </patchrpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
