<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3108-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-13T08:20:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-13T08:20:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-13T08:20:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Chromium 55.0.2883.75 fixes the following vulnerabilities:

- CVE-2016-9651: Private property access in V8
- CVE-2016-5208: Universal XSS in Blink
- CVE-2016-5207: Universal XSS in Blink
- CVE-2016-5206: Same-origin bypass in PDFium
- CVE-2016-5205: Universal XSS in Blink
- CVE-2016-5204: Universal XSS in Blink
- CVE-2016-5209: Out of bounds write in Blink
- CVE-2016-5203: Use after free in PDFium
- CVE-2016-5210: Out of bounds write in PDFium
- CVE-2016-5212: Local file disclosure in DevTools
- CVE-2016-5211: Use after free in PDFium
- CVE-2016-5213: Use after free in V8
- CVE-2016-5214: File download protection bypass
- CVE-2016-5216: Use after free in PDFium
- CVE-2016-5215: Use after free in Webaudio
- CVE-2016-5217: Use of unvalidated data in PDFium
- CVE-2016-5218: Address spoofing in Omnibox
- CVE-2016-5219: Use after free in V8
- CVE-2016-5221: Integer overflow in ANGLE
- CVE-2016-5220: Local file access in PDFium
- CVE-2016-5222: Address spoofing in Omnibox
- CVE-2016-9650: CSP Referrer disclosure
- CVE-2016-5223: Integer overflow in PDFium
- CVE-2016-5226: Limited XSS in Blink
- CVE-2016-5225: CSP bypass in Blink
- CVE-2016-5224: Same-origin bypass in SVG
- CVE-2016-9652: Various fixes from internal audits, fuzzing and other initiatives

The default bookmarks override was removed.

The following packaging changes are included:

- Switch to system libraries: harfbuzz, zlib, ffmpeg, where available.
- Chromium now requires harfbuzz &gt;= 1.3.0</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:3108-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-55.0.2883.75-99.2">
      <FullProductName ProductID="chromedriver-55.0.2883.75-99.2">chromedriver-55.0.2883.75-99.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-55.0.2883.75-99.2">
      <FullProductName ProductID="chromium-55.0.2883.75-99.2">chromium-55.0.2883.75-99.2</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-55.0.2883.75-99.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2">chromedriver-55.0.2883.75-99.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-55.0.2883.75-99.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-55.0.2883.75-99.2">chromium-55.0.2883.75-99.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromedriver-55.0.2883.75-99.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2">chromedriver-55.0.2883.75-99.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-55.0.2883.75-99.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:chromium-55.0.2883.75-99.2">chromium-55.0.2883.75-99.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2016-5203</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5203.html</URL>
        <Description>CVE-2016-5203</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Leaking of an SVG shadow tree leading to corruption of the DOM tree in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5204</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5204.html</URL>
        <Description>CVE-2016-5204</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac, incorrectly handles deferred page loads, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5205.html</URL>
        <Description>CVE-2016-5205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5206.html</URL>
        <Description>CVE-2016-5206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android, corruption of the DOM tree could occur during the removal of a full screen element, which allowed a remote attacker to achieve arbitrary code execution via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5207.html</URL>
        <Description>CVE-2016-5207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink in Google Chrome prior to 55.0.2883.75 for Linux and Windows, and 55.0.2883.84 for Android allowed possible corruption of the DOM tree during synchronous event handling, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5208.html</URL>
        <Description>CVE-2016-5208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bad casting in bitmap manipulation in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5209.html</URL>
        <Description>CVE-2016-5209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2016-5210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5210.html</URL>
        <Description>CVE-2016-5210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2016-5211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5211.html</URL>
        <Description>CVE-2016-5211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5212.html</URL>
        <Description>CVE-2016-5212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5213.html</URL>
        <Description>CVE-2016-5213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Google Chrome prior to 55.0.2883.75 for Windows mishandled downloaded files, which allowed a remote attacker to prevent the downloaded file from receiving the Mark of the Web via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5214.html</URL>
        <Description>CVE-2016-5214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5215</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5215.html</URL>
        <Description>CVE-2016-5215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2016-5216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5216.html</URL>
        <Description>CVE-2016-5216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly permitted access to privileged plugins, which allowed a remote attacker to bypass site isolation via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5217.html</URL>
        <Description>CVE-2016-5217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.</Note>
    </Notes>
    <CVE>CVE-2016-5218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5218.html</URL>
        <Description>CVE-2016-5218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5219.html</URL>
        <Description>CVE-2016-5219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013274</URL>
        <Description>SUSE Bug 1013274</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2016-5220</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5220.html</URL>
        <Description>CVE-2016-5220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5221</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5221.html</URL>
        <Description>CVE-2016-5221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5222.html</URL>
        <Description>CVE-2016-5222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2016-5223</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5223.html</URL>
        <Description>CVE-2016-5223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5224</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5224.html</URL>
        <Description>CVE-2016-5224</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-5225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5225.html</URL>
        <Description>CVE-2016-5225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac executed javascript: URLs entered in the URL bar in the context of the current tab, which allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.</Note>
    </Notes>
    <CVE>CVE-2016-5226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5226.html</URL>
        <Description>CVE-2016-5226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled iframes, which allowed a remote attacker to bypass a no-referrer policy via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9650</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9650.html</URL>
        <Description>CVE-2016-9650</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2016-9651</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9651.html</URL>
        <Description>CVE-2016-9651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 55.0.2883.75.</Note>
    </Notes>
    <CVE>CVE-2016-9652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromedriver-55.0.2883.75-99.2</ProductID>
        <ProductID>openSUSE Leap 42.2:chromium-55.0.2883.75-99.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00050.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9652.html</URL>
        <Description>CVE-2016-9652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013236</URL>
        <Description>SUSE Bug 1013236</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
