<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="dc35806221ee6f931de1f2f9ae2d1fab"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="MozillaFirefox-2699"
    timestamp="1172729542"
    engine="1.0">
  <yum:name>MozillaFirefox</yum:name>
  <summary lang="en">MozillaFirefox: Security update to version 1.5.0.10</summary>
  <summary lang="de">MozillaFirefox: Securityupdate auf Version 1.5.0.10</summary>
  <description lang="en">This update brings Mozilla Firefox to security update
version 1.5.0.10.

- MFSA 2007-01: As part of the Firefox 2.0.0.2  and
  1.5.0.10 update releases several bugs were fixed to
  improve the stability of the browser. Some of these were
  crashes that showed evidence of memory corruption and we
  presume that with enough effort at least some of these
  could be exploited to run arbitrary code. These fixes
  affected the layout engine (CVE-2007-0775), SVG renderer
  (CVE-2007-0776) and javascript engine (CVE-2007-0777).

- MFSA 2007-02: Various enhancements were done to make XSS
  exploits against websites less effective. These included
  fixes for invalid trailing characters (CVE-2007-0995),
  child frame character set inheritance (CVE-2007-0996),
  password form injection (CVE-2006-6077), and the Adobe
  Reader universal XSS problem.

- MFSA 2007-03/CVE-2007-0778: AAd reported a potential disk
  cache collision that could be exploited by remote
  attackers to steal confidential data or execute code.

- MFSA 2007-04/CVE-2007-0779: David Eckel reported that
  browser UI elements--such as the host name and security
  indicators--could be spoofed by using a large, mostly
  transparent, custom cursor and adjusting the CSS3 hotspot
  property so that the visible part of the cursor floated
  outside the browser content area.

- MFSA 2007-05: Manually opening blocked popups could be
  exploited by remote attackers to allow XSS attacks
  (CVE-2007-0780) or to execute code in local files
  (CVE-2007-0800).

- MFSA 2007-06: Two buffer overflows were found in the NSS
  handling of Mozilla.

  CVE-2007-0008: SSL clients such as Firefox and
Thunderbird can suffer a buffer overflow if a malicious
server presents a certificate with a public key that is too
small to encrypt the entire &quot;Master Secret&quot;. Exploiting
this overflow appears to be unreliable but possible if the
SSLv2 protocol is enabled.

  CVE-2007-0009: Servers that use NSS for the SSLv2
protocol can be exploited by a client that presents a
&quot;Client Master Key&quot; with invalid length values in any of
several fields that are used without adequate error
checking. This can lead to a buffer overflow that
presumably could be exploitable.

- MFSA 2007-06/CVE-2007-0981: Michal Zalewski demonstrated
  that setting location.hostname to a value with embedded
  null characters can confuse the browsers domain checks.
  Setting the value triggers a load, but the networking
  software reads the hostname only up to the null character
  while other checks for &quot;parent domain&quot; start at the right
  and so can have a completely different idea of what the
  current host is.
</description>
  <description lang="de">Der Webbrowser Mozilla Firefox wurde auf Version 1.5.0.10
gebracht, der folgende Fehler behebt:

- MFSA 2007-01: Viele Fehler wurden behoben, die die
  allgemeine Stabilität des Browser verbessern. Einige der
  behobenen Fehler deuten auf Memorykorruption hin und
  einige hätten potentiell zum Ausführen von Schadcode
  benutzt werden können. Es wurden Probleme in der Layout
  Engine (CVE-2007-0775), im SVG Renderer (CVE-2007-0776)
  und in der Javascript Engine (CVE-2007-0777) behoben.

- MFSA 2007-02: Mehrere Verbesserungen wurden vorgenommen,
  die Cross site Scripting Exploits gegen Websites weniger
  effektiv machen. Diese beinhalten Fixes in der Behandlung
  von ungültigen Zeichen am Ende der URL (CVE-2007-0995),
  Vererbung von Zeichensätzen an Kindframes
  (CVE-2007-0996), Ausfüllen von Passwortformularen
  falscher Webseiten (CVE-2006-6077), und Fixes für die
  Adobe Reader universal XSS Probleme.

- MFSA 2007-03/CVE-2007-0778: AAd berichtet einen
  Kollisionsangriff gegen den Mozilla Diskcache, der durch
  entfernte Angreifer potentiell benutzt werden kann, um
  vertrauliche Daten zu stehlen oder Code auszuführen.

- MFSA 2007-04/CVE-2007-0779: David Eckel berichtet, dass
  Browseroberflächenelemente wie z.B. Hostname und
  Sicherheitsindikatoren durch grosse grösstenteils
  transparente Cursors und Anpassen der CSS3
  Hotspotproperty manipuliert werden konnten so dass der
  sichtbare Teil des Cursors sich ausserhalb des
  Dokumentbereichs befindet.

- MFSA 2007-05: Das manuelle Erlauben verbotener Popups
  könnte von bösen Webseiten dazu benutzt werden um XSS
  Angriffe auszuüben (CVE-2007-0780) oder potentiell
  Schadcode in lokalen Dateien auszuführen (CVE-2007-0800).

- MFSA 2007-06: Zwei Pufferüberläufe wurden in den NSS
  Bibliotheken von Mozilla behoben.

  CVE-2007-0008: SSL Clients wie z.B. Firefox und
Thunderbird können durch einen Pufferüberlauf betroffen
sein, wenn ein böser Server ein Zertifikat mit einem Public
Key präsentiert das zu klein ist, um das ganze &quot;Master
Secret&quot; zu verschlüsseln. Das Ausnutzen dieses Problems
scheint schwierig aber nicht unmöglich zu sein wenn das
SSLv2 Protokoll angeschaltet ist.

  CVE-2007-0009: Servers die NSS für das SSLv2 Protokoll
benutzen können durch einen Client exploitet werden, der
einen &quot;Client Master Key&quot; mit ungültigen Längenangaben
übergibt in einigen der Feldern ohne adequate
Fehlerbehandlung. Das kann zu einem potentiell exploitbaren
Pufferüberlauf führen.

- MFSA 2007-06/CVE-2007-0981: Michal Zalewski zeigte, dass
  das Setzen von location.hostname auf einem Wert mit
  enthaltenem Null Character die Browserdomainchecks
  verwirren kann. Setzen des Wertes triggert einen Load,
  aber die Netzwerkkomponenten lesen den Hostnamen nur bis
  zum Null Character während andere Tests über &quot;parent
  domain&quot; über diese Null hinweglesen und so eine andere
  Sicht des Hostnamens haben.
</description>
  <yum:version ver="2699" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="MozillaFirefox" epoch="0" ver="1.5.0.10" rel="0.2" flags="EQ"/>
    <rpm:entry kind="atom" name="MozillaFirefox-translations" epoch="0" ver="1.5.0.10" rel="0.2" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0.10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">fbea7ed56e4e08eb9641578e1a605a516a77b108</checksum>
      <time file="1173178645" build="1172729542"/>
      <size package="7236392" installed="18823084" archive="18857716"/>
      <location href="rpm/i586/MozillaFirefox-1.5.0.10-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="1.5.0.10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/MozillaFirefox-1.5.0.10-0.2.i586.patch.rpm"/>
          <checksum type="sha">06a2d050cf933c1b8c691946c84b478a8428c363</checksum>
          <time file="1173180858" build="1172729542"/>
          <size package="5850160" archive="15524720"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
          <base-version epoch="0" ver="1.5.0.4" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.6" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.2"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.5"/>
          <base-version epoch="0" ver="1.5.0.8" rel="0.2"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-1.5.0.3_1.5.0.10-7_0.2.i586.delta.rpm"/>
          <checksum type="sha">94c1c2b6310a5bd1c913dec8898f438fda98fca6</checksum>
          <time file="1173180873" build="1172729542"/>
          <size package="1105723" archive="0"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7" md5sum="7b8339c824bba3828f8d7bf05b0030b0" buildtime="1146621086" sequence_info="MozillaFirefox-1.5.0.3-7-f278b756b1638aad1a236d9d5d02a6f1ca30"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-1.5.0.9_1.5.0.10-0.2.i586.delta.rpm"/>
          <checksum type="sha">ee042be628733c88535c3b7a06664221061a2359</checksum>
          <time file="1173180887" build="1172729542"/>
          <size package="1688567" archive="0"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2" md5sum="fa3a6d10cb1a6dd801668e8881424036" buildtime="1166623268" sequence_info="MozillaFirefox-1.5.0.9-0.2-5c68c101d70f2a2743c6923bad328559d116111961b1161af112"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox</name>
      <arch>ppc</arch>
      <version epoch="0" ver="1.5.0.10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">4d60d27affb55e3b4c3d0422426bd1ff167c5dd1</checksum>
      <time file="1173178892" build="1172729316"/>
      <size package="7360945" installed="22028184" archive="22062816"/>
      <location href="rpm/ppc/MozillaFirefox-1.5.0.10-0.2.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox" epoch="0" ver="1.5.0.10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/MozillaFirefox-1.5.0.10-0.2.ppc.patch.rpm"/>
          <checksum type="sha">378eb2857e4bbe63b459f71fb4c8adb18d1e3fd8</checksum>
          <time file="1173180926" build="1172729316"/>
          <size package="5986948" archive="18729820"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
          <base-version epoch="0" ver="1.5.0.4" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.6" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.2"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.5"/>
          <base-version epoch="0" ver="1.5.0.8" rel="0.2"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-1.5.0.3_1.5.0.10-7_0.2.ppc.delta.rpm"/>
          <checksum type="sha">b332c841be13f84e8b2b971e19dc654e236ecf33</checksum>
          <time file="1173180941" build="1172729316"/>
          <size package="1077814" archive="0"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7" md5sum="56603a3fddfcae8b426f413978329c84" buildtime="1146627070" sequence_info="MozillaFirefox-1.5.0.3-7-e8db1de78dc8f13cd00f6db16038708fca30"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-1.5.0.9_1.5.0.10-0.2.ppc.delta.rpm"/>
          <checksum type="sha">5fbbb21647ba98f2d4a031383cce6ba783ffe46e</checksum>
          <time file="1173180957" build="1172729316"/>
          <size package="1615953" archive="0"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2" md5sum="3d399bf2bab2611809add386b63c085a" buildtime="1166619579" sequence_info="MozillaFirefox-1.5.0.9-0.2-477f30a7dc3c9113809b17b67e5b7963d116111961b1161af112"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>i586</arch>
      <version epoch="0" ver="1.5.0.10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">13e02063b1808effdf0bc3d36f6ce95e02864d45</checksum>
      <time file="1173178662" build="1172729542"/>
      <size package="3761852" installed="20891090" archive="20900992"/>
      <location href="rpm/i586/MozillaFirefox-translations-1.5.0.10-0.2.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="1.5.0.10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/i586/MozillaFirefox-translations-1.5.0.10-0.2.i586.patch.rpm"/>
          <checksum type="sha">18b4c208229c41916c16d3a93fe932b1eb8bfa2e</checksum>
          <time file="1173180984" build="1172729542"/>
          <size package="3757607" archive="20871408"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
          <base-version epoch="0" ver="1.5.0.4" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.6" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.2"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.5"/>
          <base-version epoch="0" ver="1.5.0.8" rel="0.2"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-translations-1.5.0.3_1.5.0.10-7_0.2.i586.delta.rpm"/>
          <checksum type="sha">6194182650578c748e613f764eb04cb4fb8b6f73</checksum>
          <time file="1173180992" build="1172729542"/>
          <size package="250550" archive="0"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7" md5sum="3d4c72ac5f01f3c72e25037bfc2814b5" buildtime="1146621086" sequence_info="MozillaFirefox-translations-1.5.0.3-7-383ed4e6b0c9f95bb448dbbed59b04b0e7"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/MozillaFirefox-translations-1.5.0.9_1.5.0.10-0.2.i586.delta.rpm"/>
          <checksum type="sha">d461c699fae5c2ceab0418d8252ae1af655cfe89</checksum>
          <time file="1173181010" build="1172729542"/>
          <size package="2642234" archive="0"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2" md5sum="a40dc8d7e29aa8bb21ecb3c348e0cc05" buildtime="1166623268" sequence_info="MozillaFirefox-translations-1.5.0.9-0.2-ddcd45daa2f84f51f863b7a69baf2fdb013111111111111111111111111111111151111131111111111111111110"/>
        </deltarpm>
      </pkgfiles>
    </package>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>MozillaFirefox-translations</name>
      <arch>ppc</arch>
      <version epoch="0" ver="1.5.0.10" rel="0.2"/>
      <checksum type="sha" pkgid="YES">2525c880ba74ef093e15df7e92c86b0d8a5de205</checksum>
      <time file="1173178903" build="1172729316"/>
      <size package="3762284" installed="20891090" archive="20900992"/>
      <location href="rpm/ppc/MozillaFirefox-translations-1.5.0.10-0.2.ppc.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="MozillaFirefox-translations" epoch="0" ver="1.5.0.10" rel="0.2" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="MozillaFirefox-translations"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <patchrpm>
          <location href="rpm/ppc/MozillaFirefox-translations-1.5.0.10-0.2.ppc.patch.rpm"/>
          <checksum type="sha">66f07c493bccf4d69d9fc7d08379081bc4b0c015</checksum>
          <time file="1173181030" build="1172729316"/>
          <size package="3756934" archive="20871408"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7"/>
          <base-version epoch="0" ver="1.5.0.4" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.6" rel="1.3"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.2"/>
          <base-version epoch="0" ver="1.5.0.7" rel="1.5"/>
          <base-version epoch="0" ver="1.5.0.8" rel="0.2"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2"/>
        </patchrpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-translations-1.5.0.3_1.5.0.10-7_0.2.ppc.delta.rpm"/>
          <checksum type="sha">1e51fb17905919145533d2562433226d3e3fd416</checksum>
          <time file="1173181039" build="1172729316"/>
          <size package="250624" archive="0"/>
          <base-version epoch="0" ver="1.5.0.3" rel="7" md5sum="02f492be37e15c10a219a954e5da12f3" buildtime="1146627070" sequence_info="MozillaFirefox-translations-1.5.0.3-7-383ed4e6b0c9f95bb448dbbed59b04b0e7"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/ppc/MozillaFirefox-translations-1.5.0.9_1.5.0.10-0.2.ppc.delta.rpm"/>
          <checksum type="sha">22d4a3f86680bf26c013cc71ba0c896804a644c8</checksum>
          <time file="1173181057" build="1172729316"/>
          <size package="2643620" archive="0"/>
          <base-version epoch="0" ver="1.5.0.9" rel="0.2" md5sum="4a0223d379107cc45ef13d59369914dd" buildtime="1166619579" sequence_info="MozillaFirefox-translations-1.5.0.9-0.2-ddcd45daa2f84f51f863b7a69baf2fdb013111111111111111111111111111111151111131111111111111111110"/>
        </deltarpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
