<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1496-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-06-05T11:05:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-06-05T11:05:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-06-05T11:05:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Chromium was updated to 51.0.2704.79 to fix the following vulnerabilities:
    
- CVE-2016-1696: Cross-origin bypass in Extension bindings
- CVE-2016-1697: Cross-origin bypass in Blink
- CVE-2016-1698: Information leak in Extension bindings
- CVE-2016-1699: Parameter sanitization failure in DevTools
- CVE-2016-1700: Use-after-free in Extensions
- CVE-2016-1701: Use-after-free in Autofill
- CVE-2016-1702: Out-of-bounds read in Skia
- CVE-2016-1703: Various fixes from internal audits, fuzzing and other initiatives
    
Also includes vulnerabilities fixed in 51.0.2704.63 (boo#981886):  

- CVE-2016-1672: Cross-origin bypass in extension bindings
- CVE-2016-1673: Cross-origin bypass in Blink
- CVE-2016-1674: Cross-origin bypass in extensions
- CVE-2016-1675: Cross-origin bypass in Blink
- CVE-2016-1676: Cross-origin bypass in extension bindings
- CVE-2016-1677: Type confusion in V8
- CVE-2016-1678: Heap overflow in V8
- CVE-2016-1679: Heap use-after-free in V8 bindings
- CVE-2016-1680: Heap use-after-free in Skia
- CVE-2016-1681: Heap overflow in PDFium
- CVE-2016-1682: CSP bypass for ServiceWorker
- CVE-2016-1683: Out-of-bounds access in libxslt
- CVE-2016-1684: Integer overflow in libxslt
- CVE-2016-1685: Out-of-bounds read in PDFium
- CVE-2016-1686: Out-of-bounds read in PDFium
- CVE-2016-1687: Information leak in extensions
- CVE-2016-1688: Out-of-bounds read in V8
- CVE-2016-1689: Heap buffer overflow in media
- CVE-2016-1690: Heap use-after-free in Autofill
- CVE-2016-1691: Heap buffer-overflow in Skia
- CVE-2016-1692: Limited cross-origin bypass in ServiceWorker
- CVE-2016-1693: HTTP Download of Software Removal Tool
- CVE-2016-1694: HPKP pins removed on cache clearance
- CVE-2016-1695: Various fixes from internal audits, fuzzing and other initiatives
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1496-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-51.0.2704.79-105.2">
      <FullProductName ProductID="chromedriver-51.0.2704.79-105.2">chromedriver-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-debuginfo-51.0.2704.79-105.2">
      <FullProductName ProductID="chromedriver-debuginfo-51.0.2704.79-105.2">chromedriver-debuginfo-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-51.0.2704.79-105.2">
      <FullProductName ProductID="chromium-51.0.2704.79-105.2">chromium-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-debuginfo-51.0.2704.79-105.2">
      <FullProductName ProductID="chromium-debuginfo-51.0.2704.79-105.2">chromium-debuginfo-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-debugsource-51.0.2704.79-105.2">
      <FullProductName ProductID="chromium-debugsource-51.0.2704.79-105.2">chromium-debugsource-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-gnome-51.0.2704.79-105.2">
      <FullProductName ProductID="chromium-desktop-gnome-51.0.2704.79-105.2">chromium-desktop-gnome-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-kde-51.0.2704.79-105.2">
      <FullProductName ProductID="chromium-desktop-kde-51.0.2704.79-105.2">chromium-desktop-kde-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-51.0.2704.79-105.2">
      <FullProductName ProductID="chromium-ffmpegsumo-51.0.2704.79-105.2">chromium-ffmpegsumo-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2">
      <FullProductName ProductID="chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2">chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromedriver-51.0.2704.79-105.2">chromedriver-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromedriver-debuginfo-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2">chromedriver-debuginfo-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-51.0.2704.79-105.2">chromium-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-debuginfo-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2">chromium-debuginfo-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-debugsource-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2">chromium-debugsource-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-gnome-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2">chromium-desktop-gnome-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-kde-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2">chromium-desktop-kde-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2">chromium-ffmpegsumo-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2">chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1672.html</URL>
        <Description>CVE-2016-1672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1673.html</URL>
        <Description>CVE-2016-1673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1674.html</URL>
        <Description>CVE-2016-1674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.</Note>
    </Notes>
    <CVE>CVE-2016-1675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1675.html</URL>
        <Description>CVE-2016-1675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1676</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1676.html</URL>
        <Description>CVE-2016-1676</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."</Note>
    </Notes>
    <CVE>CVE-2016-1677</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1677.html</URL>
        <Description>CVE-2016-1677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1678.html</URL>
        <Description>CVE-2016-1678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google Chrome before 51.0.2704.63 does not properly restrict use of getters and setters, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1679</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1679.html</URL>
        <Description>CVE-2016-1679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1680</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1680.html</URL>
        <Description>CVE-2016-1680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2016-1681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1681.html</URL>
        <Description>CVE-2016-1681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration.</Note>
    </Notes>
    <CVE>CVE-2016-1682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1682.html</URL>
        <Description>CVE-2016-1682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.</Note>
    </Notes>
    <CVE>CVE-2016-1683</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1683.html</URL>
        <Description>CVE-2016-1683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.</Note>
    </Notes>
    <CVE>CVE-2016-1684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1684.html</URL>
        <Description>CVE-2016-1684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, miscalculates certain index values, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2016-1685</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1685.html</URL>
        <Description>CVE-2016-1685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2016-1686</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1686.html</URL>
        <Description>CVE-2016-1686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict public exposure of classes, which allows remote attackers to obtain sensitive information via vectors related to extensions.</Note>
    </Notes>
    <CVE>CVE-2016-1687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1687.html</URL>
        <Description>CVE-2016-1687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1688.html</URL>
        <Description>CVE-2016-1688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome before 51.0.2704.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-1689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1689.html</URL>
        <Description>CVE-2016-1689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1701.</Note>
    </Notes>
    <CVE>CVE-2016-1690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1690.html</URL>
        <Description>CVE-2016-1690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted curves, related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp.</Note>
    </Notes>
    <CVE>CVE-2016-1691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1691.html</URL>
        <Description>CVE-2016-1691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before 51.0.2704.63, permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-1692</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1692.html</URL>
        <Description>CVE-2016-1692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.</Note>
    </Notes>
    <CVE>CVE-2016-1693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1693.html</URL>
        <Description>CVE-2016-1693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.</Note>
    </Notes>
    <CVE>CVE-2016-1694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1694.html</URL>
        <Description>CVE-2016-1694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1695.html</URL>
        <Description>CVE-2016-1695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1696</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1696.html</URL>
        <Description>CVE-2016-1696</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1697</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1697.html</URL>
        <Description>CVE-2016-1697</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition.</Note>
    </Notes>
    <CVE>CVE-2016-1698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1698.html</URL>
        <Description>CVE-2016-1698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL.</Note>
    </Notes>
    <CVE>CVE-2016-1699</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1699.html</URL>
        <Description>CVE-2016-1699</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions.</Note>
    </Notes>
    <CVE>CVE-2016-1700</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1700.html</URL>
        <Description>CVE-2016-1700</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1690.</Note>
    </Notes>
    <CVE>CVE-2016-1701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1701.html</URL>
        <Description>CVE-2016-1701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.</Note>
    </Notes>
    <CVE>CVE-2016-1702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1702.html</URL>
        <Description>CVE-2016-1702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-debugsource-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-51.0.2704.79-105.2</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-51.0.2704.79-105.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1703.html</URL>
        <Description>CVE-2016-1703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982719</URL>
        <Description>SUSE Bug 982719</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
