<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="aee536ea9ad121d2314cd1c9a3cb8cec"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="3422">
  <id>dbg111-MozillaFirefox</id>
  <title>MozillaFirefox: Update to version 3.6.12</title>
  <release>openSUSE 11.1 DEBUGINFO</release>
  <issued date="1288304076"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=645315" id="645315" title="bug number 645315" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=649492" id="649492" title="bug number 649492" type="bugzilla"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" id="CVE-2010-3170" title="CVE-2010-3170" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" id="CVE-2010-3174" title="CVE-2010-3174" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" id="CVE-2010-3175" title="CVE-2010-3175" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" id="CVE-2010-3176" title="CVE-2010-3176" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" id="CVE-2010-3177" title="CVE-2010-3177" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" id="CVE-2010-3178" title="CVE-2010-3178" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" id="CVE-2010-3179" title="CVE-2010-3179" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" id="CVE-2010-3180" title="CVE-2010-3180" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" id="CVE-2010-3182" title="CVE-2010-3182" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" id="CVE-2010-3183" title="CVE-2010-3183" type="cve"/>
    <reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" id="CVE-2010-3765" title="CVE-2010-3765" type="cve"/>
  </references>
  <description>This update brings Mozilla Firefox to version 3.6.12,
fixing various bugs and security issues.

The following security  issues were fixed: MFSA 2010-64:
Mozilla developers identified and fixed several memory
safety bugs in the browser engine used in Firefox and other
Mozilla-based products. Some of these bugs showed evidence
of memory corruption under certain circumstances, and we
presume that with enough effort at least some of these
could be exploited to run arbitrary code. References

Paul Nickerson, Jesse Ruderman, Olli Pettay, Igor Bukanov
and Josh Soref reported memory safety problems that
affected Firefox 3.6 and Firefox 3.5.
    * Memory safety bugs - Firefox 3.6, Firefox 3.5
    * CVE-2010-3176

Gary Kwong, Martijn Wargers and Siddharth Agarwal reported
memory safety problems that affected Firefox 3.6 only.
    * Memory safety bugs - Firefox 3.6
    * CVE-2010-3175

MFSA 2010-65 / CVE-2010-3179: Security researcher Alexander
Miller reported that passing an excessively long string to
document.write could cause text rendering routines to end
up in an inconsistent state with sections of stack memory
being overwritten with the string data. An attacker could
use this flaw to crash a victim's browser and potentially
run arbitrary code on their computer.


MFSA 2010-66 / CVE-2010-3180: Security researcher Sergey
Glazunov reported that it was possible to access the
locationbar property of a window object after it had been
closed. Since the closed window's memory could have been
subsequently reused by the system it was possible that an
attempt to access the locationbar property could result in
the execution of attacker-controlled memory.


MFSA 2010-67 / CVE-2010-3183: Security researcher
regenrecht reported via TippingPoint's Zero Day Initiative
that when window.__lookupGetter__ is called with no
arguments the code assumes the top JavaScript stack value
is a property name. Since there were no arguments passed
into the function, the top value could represent
uninitialized memory or a pointer to a previously freed
JavaScript object. Under such circumstances the value is
passed to another subroutine which calls through the
dangling pointer, potentially executing attacker-controlled
memory.

MFSA 2010-68 / CVE-2010-3177: Google security researcher
Robert Swiecki reported that functions used by the Gopher
parser to convert text to HTML tags could be exploited to
turn text into executable JavaScript. If an attacker could
create a file or directory on a Gopher server with the
encoded script as part of its name the script would then
run in a victim's browser within the context of the site.

MFSA 2010-69 / CVE-2010-3178: Security researcher Eduardo
Vela Nava reported that if a web page opened a new window
and used a javascript: URL to make a modal call, such as
alert(), then subsequently navigated the page to a
different domain, once the modal call returned the opener
of the window could get access to objects in the navigated
window. This is a violation of the same-origin policy and
could be used by an attacker to steal information from
another web site.


MFSA 2010-70 / CVE-2010-3170: Security researcher Richard
Moore reported that when an SSL certificate was created
with a common name containing a wildcard followed by a
partial IP address a valid SSL connection could be
established with a server whose IP address matched the
wildcard range by browsing directly to the IP address. It
is extremely unlikely that such a certificate would be
issued by a Certificate Authority.

MFSA 2010-71 / CVE-2010-3182: Dmitri Gribenko reported that
the script used to launch Mozilla applications on Linux was
effectively including the current working directory in the
LD_LIBRARY_PATH environment variable. If an attacker was
able to place into the current working directory a
malicious shared library with the same name as a library
that the bootstrapping script depends on the attacker could
have their library loaded instead of the legitimate library.

MFSA 2010-73 / CVE-2010-3765: Morten Kråkvik of Telenor SOC
reported an exploit targeting particular versions of
Firefox 3.6 on Windows XP that Telenor found while
investigating an intrusion attempt on a customer network.
The underlying vulnerability, however, was present on both
the Firefox 3.5 and Firefox 3.6 development branches and
affected all supported platforms.
</description>
  <pkglist>
    <collection>
        <package name="MozillaFirefox-debuginfo" arch="i586" version="3.6.12" release="0.1.1">
          <filename>MozillaFirefox-debuginfo-3.6.12-0.1.1.i586.rpm</filename>
        </package>
        <package name="MozillaFirefox-debuginfo" arch="ppc" version="3.6.12" release="0.1.1">
          <filename>MozillaFirefox-debuginfo-3.6.12-0.1.1.ppc.rpm</filename>
        </package>
        <package name="MozillaFirefox-debuginfo" arch="x86_64" version="3.6.12" release="0.1.1">
          <filename>MozillaFirefox-debuginfo-3.6.12-0.1.1.x86_64.rpm</filename>
        </package>
        <package name="MozillaFirefox-debugsource" arch="i586" version="3.6.12" release="0.1.1">
          <filename>MozillaFirefox-debugsource-3.6.12-0.1.1.i586.rpm</filename>
        </package>
        <package name="MozillaFirefox-debugsource" arch="ppc" version="3.6.12" release="0.1.1">
          <filename>MozillaFirefox-debugsource-3.6.12-0.1.1.ppc.rpm</filename>
        </package>
        <package name="MozillaFirefox-debugsource" arch="x86_64" version="3.6.12" release="0.1.1">
          <filename>MozillaFirefox-debugsource-3.6.12-0.1.1.x86_64.rpm</filename>
        </package>
        <package name="mozilla-xulrunner192-debuginfo" arch="i586" version="1.9.2.12" release="0.1.1">
          <filename>mozilla-xulrunner192-debuginfo-1.9.2.12-0.1.1.i586.rpm</filename>
        </package>
        <package name="mozilla-xulrunner192-debuginfo" arch="ppc" version="1.9.2.12" release="0.1.1">
          <filename>mozilla-xulrunner192-debuginfo-1.9.2.12-0.1.1.ppc.rpm</filename>
        </package>
        <package name="mozilla-xulrunner192-debuginfo" arch="x86_64" version="1.9.2.12" release="0.1.1">
          <filename>mozilla-xulrunner192-debuginfo-1.9.2.12-0.1.1.x86_64.rpm</filename>
        </package>
        <package name="mozilla-xulrunner192-debuginfo-32bit" arch="x86_64" version="1.9.2.12" release="0.1.1">
          <filename>mozilla-xulrunner192-debuginfo-32bit-1.9.2.12-0.1.1.x86_64.rpm</filename>
        </package>
        <package name="mozilla-xulrunner192-debugsource" arch="i586" version="1.9.2.12" release="0.1.1">
          <filename>mozilla-xulrunner192-debugsource-1.9.2.12-0.1.1.i586.rpm</filename>
        </package>
        <package name="mozilla-xulrunner192-debugsource" arch="ppc" version="1.9.2.12" release="0.1.1">
          <filename>mozilla-xulrunner192-debugsource-1.9.2.12-0.1.1.ppc.rpm</filename>
        </package>
        <package name="mozilla-xulrunner192-debugsource" arch="x86_64" version="1.9.2.12" release="0.1.1">
          <filename>mozilla-xulrunner192-debugsource-1.9.2.12-0.1.1.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
