<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="af3b4d9fa7bc176fdabe13c7e21a5c64"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="591">
  <id>dbg111-MozillaFirefox</id>
  <title>MozillaFirefox: Security update to version 3.0.7</title>
  <release>openSUSE 11.1</release>
  <issued date="1236892043"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=478625" id="478625" title="bug number 478625" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=465284" id="465284" title="bug number 465284" type="bugzilla"/>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=479610" id="479610" title="bug number 479610" type="bugzilla"/>
  </references>
  <description>The Mozilla Firefox browser is updated to version 3.0.7
fixing various security and stability issues.

MFSA 2009-07 / CVE-2009-0771 / CVE-2009-0772 /
CVE-2009-0773 / CVE-2009-0774: Mozilla developers
identified and fixed several stability bugs in the browser
engine used in Firefox and other Mozilla-based products.
Some of these crashes showed evidence of memory corruption
under certain circumstances and we presume that with enough
effort at least some of these could be exploited to run
arbitrary code.

MFSA 2009-08 / CVE-2009-0775: An anonymous researcher, via
TippingPoint's Zero Day Initiative program, reported a
vulnerability in Mozilla's garbage collection process. The
vulnerability was caused by improper memory management of a
set of cloned XUL DOM elements which were linked as a
parent and child. After reloading the browser on a page
with such linked elements, the browser would crash when
attempting to access an object which was already destroyed.
An attacker could use this crash to run arbitrary code on
the victim's computer.

MFSA 2009-09 / CVE-2009-0776: Mozilla security researcher
Georgi Guninski reported that a website could use
nsIRDFService and a cross-domain redirect to steal
arbitrary XML data from another domain, a violation of the
same-origin policy. This vulnerability could be used by a
malicious website to steal private data from users
authenticated to the redirected website.

MFSA 2009-10 / CVE-2009-0040: libpng maintainer Glenn
Randers-Pehrson reported several memory safety hazards in
PNG libraries used by Mozilla. These vulnerabilities could
be used by a malicious website to crash a victim's browser
and potentially execute arbitrary code on their computer.
libpng was upgraded to a version which contained fixes for
these flaws.

MFSA 2009-11 / CVE-2009-0777: Mozilla contributor Masahiro
Yamada reported that certain invisible control characters
were being decoded when displayed in the location bar,
resulting in fewer visible characters than were present in
the actual location. An attacker could use this
vulnerability to spoof the location bar and display a
misleading URL for their malicious web page.
</description>
  <pkglist>
    <collection>
        <package name="MozillaFirefox-debuginfo" arch="i586" version="3.0.7" release="1.1.6">
          <filename>MozillaFirefox-debuginfo-3.0.7-1.1.6.i586.rpm</filename>
        </package>
        <package name="MozillaFirefox-debuginfo" arch="ppc" version="3.0.7" release="1.1.6">
          <filename>MozillaFirefox-debuginfo-3.0.7-1.1.6.ppc.rpm</filename>
        </package>
        <package name="MozillaFirefox-debuginfo" arch="x86_64" version="3.0.7" release="1.1.6">
          <filename>MozillaFirefox-debuginfo-3.0.7-1.1.6.x86_64.rpm</filename>
        </package>
        <package name="MozillaFirefox-debugsource" arch="i586" version="3.0.7" release="1.1.6">
          <filename>MozillaFirefox-debugsource-3.0.7-1.1.6.i586.rpm</filename>
        </package>
        <package name="MozillaFirefox-debugsource" arch="ppc" version="3.0.7" release="1.1.6">
          <filename>MozillaFirefox-debugsource-3.0.7-1.1.6.ppc.rpm</filename>
        </package>
        <package name="MozillaFirefox-debugsource" arch="x86_64" version="3.0.7" release="1.1.6">
          <filename>MozillaFirefox-debugsource-3.0.7-1.1.6.x86_64.rpm</filename>
        </package>
        <package name="mozilla-xulrunner190-debuginfo" arch="i586" version="1.9.0.7" release="1.2.2">
          <filename>mozilla-xulrunner190-debuginfo-1.9.0.7-1.2.2.i586.rpm</filename>
        </package>
        <package name="mozilla-xulrunner190-debuginfo" arch="ppc" version="1.9.0.7" release="1.2.2">
          <filename>mozilla-xulrunner190-debuginfo-1.9.0.7-1.2.2.ppc.rpm</filename>
        </package>
        <package name="mozilla-xulrunner190-debuginfo" arch="x86_64" version="1.9.0.7" release="1.2.2">
          <filename>mozilla-xulrunner190-debuginfo-1.9.0.7-1.2.2.x86_64.rpm</filename>
        </package>
        <package name="mozilla-xulrunner190-debugsource" arch="i586" version="1.9.0.7" release="1.2.2">
          <filename>mozilla-xulrunner190-debugsource-1.9.0.7-1.2.2.i586.rpm</filename>
        </package>
        <package name="mozilla-xulrunner190-debugsource" arch="ppc" version="1.9.0.7" release="1.2.2">
          <filename>mozilla-xulrunner190-debugsource-1.9.0.7-1.2.2.ppc.rpm</filename>
        </package>
        <package name="mozilla-xulrunner190-debugsource" arch="x86_64" version="1.9.0.7" release="1.2.2">
          <filename>mozilla-xulrunner190-debugsource-1.9.0.7-1.2.2.x86_64.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
