<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Recommended update for chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2309-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-14T21:25:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-14T21:25:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-14T21:25:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Recommended update for chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Chromium was updated to 53.0.2785.113 to fix a number of security issues and bugs.

The following vulnerabilities were fixed:

- CVE-2016-5170: Use after free in Blink
- CVE-2016-5171: Use after free in Blink
- CVE-2016-5172: Arbitrary Memory Read in v8
- CVE-2016-5173: Extension resource access
- CVE-2016-5174: Popup not correctly suppressed
- CVE-2016-5175: Various fixes from internal audits, fuzzing and other initiatives.

The following upstream fixes are included:

- SPDY crasher fixes
- Disable NV12 DXGI video on AMD
- Forward --password-store switch to os_crypt
- Tell the kernel to discard USB requests when they time out.
- disallow WKBackForwardListItem navigations for pushState pages
- arc: bluetooth: Fix advertised uuid
- fix conflicting PendingIntent for stop button and swipe away

The widevine plugin was re-enabled (boo#998328).</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2016-1084</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH/#VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2309-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998328</URL>
      <Description>SUSE Bug 998328</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/998743</URL>
      <Description>SUSE Bug 998743</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5170/</URL>
      <Description>SUSE CVE CVE-2016-5170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5171/</URL>
      <Description>SUSE CVE CVE-2016-5171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5172/</URL>
      <Description>SUSE CVE CVE-2016-5172 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5173/</URL>
      <Description>SUSE CVE CVE-2016-5173 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5174/</URL>
      <Description>SUSE CVE CVE-2016-5174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5175/</URL>
      <Description>SUSE CVE CVE-2016-5175 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-53.0.2785.113-100.1">
      <FullProductName ProductID="chromedriver-53.0.2785.113-100.1">chromedriver-53.0.2785.113-100.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-53.0.2785.113-100.1">
      <FullProductName ProductID="chromium-53.0.2785.113-100.1">chromium-53.0.2785.113-100.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-gnome-53.0.2785.113-100.1">
      <FullProductName ProductID="chromium-desktop-gnome-53.0.2785.113-100.1">chromium-desktop-gnome-53.0.2785.113-100.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-kde-53.0.2785.113-100.1">
      <FullProductName ProductID="chromium-desktop-kde-53.0.2785.113-100.1">chromium-desktop-kde-53.0.2785.113-100.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-53.0.2785.113-100.1">
      <FullProductName ProductID="chromium-ffmpegsumo-53.0.2785.113-100.1">chromium-ffmpegsumo-53.0.2785.113-100.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-53.0.2785.113-100.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:chromedriver-53.0.2785.113-100.1">chromedriver-53.0.2785.113-100.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-53.0.2785.113-100.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:chromium-53.0.2785.113-100.1">chromium-53.0.2785.113-100.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-gnome-53.0.2785.113-100.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:chromium-desktop-gnome-53.0.2785.113-100.1">chromium-desktop-gnome-53.0.2785.113-100.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-kde-53.0.2785.113-100.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:chromium-desktop-kde-53.0.2785.113-100.1">chromium-desktop-kde-53.0.2785.113-100.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-53.0.2785.113-100.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:chromium-ffmpegsumo-53.0.2785.113-100.1">chromium-ffmpegsumo-53.0.2785.113-100.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Indexed Database (aka IndexedDB) API calls.</Note>
    </Notes>
    <CVE>CVE-2016-5170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:chromedriver-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-gnome-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-kde-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-ffmpegsumo-53.0.2785.113-100.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH/#VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5170.html</URL>
        <Description>CVE-2016-5170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/bindings/templates/interface.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not prevent certain constructor calls, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-5171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:chromedriver-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-gnome-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-kde-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-ffmpegsumo-53.0.2785.113-100.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH/#VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5171.html</URL>
        <Description>CVE-2016-5171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-5172</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:chromedriver-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-gnome-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-kde-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-ffmpegsumo-53.0.2785.113-100.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH/#VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5172.html</URL>
        <Description>CVE-2016-5172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions subsystem in Google Chrome before 53.0.2785.113 does not properly restrict access to Object.prototype, which allows remote attackers to load unintended resources, and consequently trigger unintended JavaScript function calls and bypass the Same Origin Policy via an indirect interception attack.</Note>
    </Notes>
    <CVE>CVE-2016-5173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:chromedriver-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-gnome-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-kde-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-ffmpegsumo-53.0.2785.113-100.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH/#VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5173.html</URL>
        <Description>CVE-2016-5173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">browser/ui/cocoa/browser_window_controller_private.mm in Google Chrome before 53.0.2785.113 does not process fullscreen toggle requests during a fullscreen transition, which allows remote attackers to cause a denial of service (unsuppressed popup) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-5174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:chromedriver-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-gnome-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-kde-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-ffmpegsumo-53.0.2785.113-100.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH/#VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5174.html</URL>
        <Description>CVE-2016-5174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.113 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5175</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:chromedriver-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-gnome-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-desktop-kde-53.0.2785.113-100.1</ProductID>
        <ProductID>SUSE Package Hub 12:chromium-ffmpegsumo-53.0.2785.113-100.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH/#VU5JLFTK7OMH3L6COLWYBQWQJS4YB3QH</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5175.html</URL>
        <Description>CVE-2016-5175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
