<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0491-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-02-17T07:06:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-02-17T07:06:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-02-17T07:06:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Chromium 48.0.2564.109 fixes the following issues:

Security fixes (boo#965999): 

- CVE-2016-1622: Same-origin bypass in Extensions
- CVE-2016-1623: Same-origin bypass in DOM
- CVE-2016-1624: Buffer overflow in Brotli
- CVE-2016-1625: Navigation bypass in Chrome Instant
- CVE-2016-1626: Out-of-bounds read in PDFium
- CVE-2016-1627: Various fixes from internal audits, fuzzing and other initiatives

Non-security bug fixes:

- boo#965738: resolve issues with specific banking websites when built against system libraries
- boo#966082: chromium: sandbox related stacktrace printed
- boo#965566: Drop libva support
- Prevent graphical issues related to libjpeg
- On KDE 5 kwallet5 is the default password store now</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0491-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-48.0.2564.109-21.1">
      <FullProductName ProductID="chromedriver-48.0.2564.109-21.1">chromedriver-48.0.2564.109-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-48.0.2564.109-21.1">
      <FullProductName ProductID="chromium-48.0.2564.109-21.1">chromium-48.0.2564.109-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-gnome-48.0.2564.109-21.1">
      <FullProductName ProductID="chromium-desktop-gnome-48.0.2564.109-21.1">chromium-desktop-gnome-48.0.2564.109-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-kde-48.0.2564.109-21.1">
      <FullProductName ProductID="chromium-desktop-kde-48.0.2564.109-21.1">chromium-desktop-kde-48.0.2564.109-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-48.0.2564.109-21.1">
      <FullProductName ProductID="chromium-ffmpegsumo-48.0.2564.109-21.1">chromium-ffmpegsumo-48.0.2564.109-21.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-48.0.2564.109-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromedriver-48.0.2564.109-21.1">chromedriver-48.0.2564.109-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-48.0.2564.109-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-48.0.2564.109-21.1">chromium-48.0.2564.109-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-gnome-48.0.2564.109-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-gnome-48.0.2564.109-21.1">chromium-desktop-gnome-48.0.2564.109-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-kde-48.0.2564.109-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-kde-48.0.2564.109-21.1">chromium-desktop-kde-48.0.2564.109-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-48.0.2564.109-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-ffmpegsumo-48.0.2564.109-21.1">chromium-ffmpegsumo-48.0.2564.109-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Extensions subsystem in Google Chrome before 48.0.2564.109 does not prevent use of the Object.defineProperty method to override intended extension behavior, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1622</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-48.0.2564.109-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1622.html</URL>
        <Description>CVE-2016-1622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965999</URL>
        <Description>SUSE Bug 965999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DOM implementation in Google Chrome before 48.0.2564.109 does not properly restrict frame-attach operations from occurring during or after frame-detach operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to FrameLoader.cpp, HTMLFrameOwnerElement.h, LocalFrame.cpp, and WebLocalFrameImpl.cpp.</Note>
    </Notes>
    <CVE>CVE-2016-1623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-48.0.2564.109-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1623.html</URL>
        <Description>CVE-2016-1623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965999</URL>
        <Description>SUSE Bug 965999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression.</Note>
    </Notes>
    <CVE>CVE-2016-1624</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-48.0.2564.109-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1624.html</URL>
        <Description>CVE-2016-1624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965999</URL>
        <Description>SUSE Bug 965999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Chrome Instant feature in Google Chrome before 48.0.2564.109 does not ensure that a New Tab Page (NTP) navigation target is on the most-visited or suggestions list, which allows remote attackers to bypass intended restrictions via unspecified vectors, related to instant_service.cc and search_tab_helper.cc.</Note>
    </Notes>
    <CVE>CVE-2016-1625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-48.0.2564.109-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1625.html</URL>
        <Description>CVE-2016-1625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965999</URL>
        <Description>SUSE Bug 965999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2016-1626</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-48.0.2564.109-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1626.html</URL>
        <Description>CVE-2016-1626</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965999</URL>
        <Description>SUSE Bug 965999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js.</Note>
    </Notes>
    <CVE>CVE-2016-1627</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-48.0.2564.109-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-48.0.2564.109-21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1627.html</URL>
        <Description>CVE-2016-1627</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965999</URL>
        <Description>SUSE Bug 965999</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
