<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1489-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-06-03T05:21:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-06-03T05:21:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-06-03T05:21:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Chromium was updated to 51.0.2704.79 to fix a number of security issues. [boo#982719]

- CVE-2016-1696: Cross-origin bypass in Extension bindings
- CVE-2016-1697: Cross-origin bypass in Blink
- CVE-2016-1698: Information leak in Extension bindings
- CVE-2016-1699: Parameter sanitization failure in DevTools
- CVE-2016-1700: Use-after-free in Extensions
- CVE-2016-1701: Use-after-free in Autofill
- CVE-2016-1702: Out-of-bounds read in Skia
- CVE-2016-1703: Various fixes from internal audits, fuzzing and other initiatives</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1489-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-51.0.2704.79-54.1">
      <FullProductName ProductID="chromedriver-51.0.2704.79-54.1">chromedriver-51.0.2704.79-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-51.0.2704.79-54.1">
      <FullProductName ProductID="chromium-51.0.2704.79-54.1">chromium-51.0.2704.79-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-gnome-51.0.2704.79-54.1">
      <FullProductName ProductID="chromium-desktop-gnome-51.0.2704.79-54.1">chromium-desktop-gnome-51.0.2704.79-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-kde-51.0.2704.79-54.1">
      <FullProductName ProductID="chromium-desktop-kde-51.0.2704.79-54.1">chromium-desktop-kde-51.0.2704.79-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-51.0.2704.79-54.1">
      <FullProductName ProductID="chromium-ffmpegsumo-51.0.2704.79-54.1">chromium-ffmpegsumo-51.0.2704.79-54.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-51.0.2704.79-54.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1">chromedriver-51.0.2704.79-54.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-51.0.2704.79-54.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-51.0.2704.79-54.1">chromium-51.0.2704.79-54.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-gnome-51.0.2704.79-54.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1">chromium-desktop-gnome-51.0.2704.79-54.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-kde-51.0.2704.79-54.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1">chromium-desktop-kde-51.0.2704.79-54.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-51.0.2704.79-54.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1">chromium-ffmpegsumo-51.0.2704.79-54.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1696.html</URL>
        <Description>CVE-2016-1696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1697.html</URL>
        <Description>CVE-2016-1697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition.</Note>
    </Notes>
    <CVE>CVE-2016-1698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1698.html</URL>
        <Description>CVE-2016-1698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL.</Note>
    </Notes>
    <CVE>CVE-2016-1699</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1699.html</URL>
        <Description>CVE-2016-1699</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions.</Note>
    </Notes>
    <CVE>CVE-2016-1700</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1700.html</URL>
        <Description>CVE-2016-1700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1690.</Note>
    </Notes>
    <CVE>CVE-2016-1701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1701.html</URL>
        <Description>CVE-2016-1701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.</Note>
    </Notes>
    <CVE>CVE-2016-1702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1702.html</URL>
        <Description>CVE-2016-1702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.79-54.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.79-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1703.html</URL>
        <Description>CVE-2016-1703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
