<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2310-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-14T21:28:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-14T21:28:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-14T21:28:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Chromium was updated to 53.0.2785.113 to fix a number of security issues and bugs.

The following vulnerabilities were fixed:

- CVE-2016-5170: Use after free in Blink
- CVE-2016-5171: Use after free in Blink
- CVE-2016-5172: Arbitrary Memory Read in v8
- CVE-2016-5173: Extension resource access
- CVE-2016-5174: Popup not correctly suppressed
- CVE-2016-5175: Various fixes from internal audits, fuzzing and other initiatives
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00011.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2310-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-53.0.2785.113-123.1">
      <FullProductName ProductID="chromedriver-53.0.2785.113-123.1">chromedriver-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-debuginfo-53.0.2785.113-123.1">
      <FullProductName ProductID="chromedriver-debuginfo-53.0.2785.113-123.1">chromedriver-debuginfo-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-53.0.2785.113-123.1">
      <FullProductName ProductID="chromium-53.0.2785.113-123.1">chromium-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-debuginfo-53.0.2785.113-123.1">
      <FullProductName ProductID="chromium-debuginfo-53.0.2785.113-123.1">chromium-debuginfo-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-gnome-53.0.2785.113-123.1">
      <FullProductName ProductID="chromium-desktop-gnome-53.0.2785.113-123.1">chromium-desktop-gnome-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-kde-53.0.2785.113-123.1">
      <FullProductName ProductID="chromium-desktop-kde-53.0.2785.113-123.1">chromium-desktop-kde-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-53.0.2785.113-123.1">
      <FullProductName ProductID="chromium-ffmpegsumo-53.0.2785.113-123.1">chromium-ffmpegsumo-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1">
      <FullProductName ProductID="chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1">chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromedriver-53.0.2785.113-123.1">chromedriver-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromedriver-debuginfo-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromedriver-debuginfo-53.0.2785.113-123.1">chromedriver-debuginfo-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-53.0.2785.113-123.1">chromium-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-debuginfo-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-debuginfo-53.0.2785.113-123.1">chromium-debuginfo-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-gnome-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-desktop-gnome-53.0.2785.113-123.1">chromium-desktop-gnome-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-kde-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-desktop-kde-53.0.2785.113-123.1">chromium-desktop-kde-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-ffmpegsumo-53.0.2785.113-123.1">chromium-ffmpegsumo-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1">chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Indexed Database (aka IndexedDB) API calls.</Note>
    </Notes>
    <CVE>CVE-2016-5170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5170.html</URL>
        <Description>CVE-2016-5170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/bindings/templates/interface.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not prevent certain constructor calls, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-5171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5171.html</URL>
        <Description>CVE-2016-5171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-5172</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5172.html</URL>
        <Description>CVE-2016-5172</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions subsystem in Google Chrome before 53.0.2785.113 does not properly restrict access to Object.prototype, which allows remote attackers to load unintended resources, and consequently trigger unintended JavaScript function calls and bypass the Same Origin Policy via an indirect interception attack.</Note>
    </Notes>
    <CVE>CVE-2016-5173</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5173.html</URL>
        <Description>CVE-2016-5173</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">browser/ui/cocoa/browser_window_controller_private.mm in Google Chrome before 53.0.2785.113 does not process fullscreen toggle requests during a fullscreen transition, which allows remote attackers to cause a denial of service (unsuppressed popup) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-5174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5174.html</URL>
        <Description>CVE-2016-5174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.113 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5175</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:chromedriver-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromedriver-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-debuginfo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-gnome-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-desktop-kde-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-53.0.2785.113-123.1</ProductID>
        <ProductID>openSUSE 13.2:chromium-ffmpegsumo-debuginfo-53.0.2785.113-123.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5175.html</URL>
        <Description>CVE-2016-5175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998743</URL>
        <Description>SUSE Bug 998743</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
