<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1502-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-07T16:57:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-07T16:57:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-07T16:57:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Chromium 59.0.3071.86 fixes the following security issues:

- CVE-2017-5070: Type confusion in V8
- CVE-2017-5071: Out of bounds read in V8
- CVE-2017-5072: Address spoofing in Omnibox
- CVE-2017-5073: Use after free in print preview
- CVE-2017-5074: Use after free in Apps Bluetooth
- CVE-2017-5075: Information leak in CSP reporting
- CVE-2017-5086: Address spoofing in Omnibox
- CVE-2017-5076: Address spoofing in Omnibox
- CVE-2017-5077: Heap buffer overflow in Skia
- CVE-2017-5078: Possible command injection in mailto handling
- CVE-2017-5079: UI spoofing in Blink
- CVE-2017-5080: Use after free in credit card autofill
- CVE-2017-5081: Extension verification bypass
- CVE-2017-5082: Insufficient hardening in credit card editor
- CVE-2017-5083: UI spoofing in Blink
- CVE-2017-5085: Inappropriate javascript execution on WebUI pages
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2017-661</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1502-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1042833</URL>
      <Description>SUSE Bug 1042833</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5070/</URL>
      <Description>SUSE CVE CVE-2017-5070 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5071/</URL>
      <Description>SUSE CVE CVE-2017-5071 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5072/</URL>
      <Description>SUSE CVE CVE-2017-5072 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5073/</URL>
      <Description>SUSE CVE CVE-2017-5073 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5074/</URL>
      <Description>SUSE CVE CVE-2017-5074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5075/</URL>
      <Description>SUSE CVE CVE-2017-5075 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5076/</URL>
      <Description>SUSE CVE CVE-2017-5076 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5077/</URL>
      <Description>SUSE CVE CVE-2017-5077 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5078/</URL>
      <Description>SUSE CVE CVE-2017-5078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5079/</URL>
      <Description>SUSE CVE CVE-2017-5079 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5080/</URL>
      <Description>SUSE CVE CVE-2017-5080 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5081/</URL>
      <Description>SUSE CVE CVE-2017-5081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5082/</URL>
      <Description>SUSE CVE CVE-2017-5082 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5083/</URL>
      <Description>SUSE CVE CVE-2017-5083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5085/</URL>
      <Description>SUSE CVE CVE-2017-5085 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5086/</URL>
      <Description>SUSE CVE CVE-2017-5086 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12 SP2">
      <Branch Type="Product Name" Name="SUSE Package Hub 12 SP2">
        <FullProductName ProductID="SUSE Package Hub 12 SP2" CPE="cpe:/o:suse:packagehub:12:sp2">SUSE Package Hub 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-59.0.3071.86-20.1">
      <FullProductName ProductID="chromedriver-59.0.3071.86-20.1">chromedriver-59.0.3071.86-20.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-59.0.3071.86-20.1">
      <FullProductName ProductID="chromium-59.0.3071.86-20.1">chromium-59.0.3071.86-20.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-59.0.3071.86-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP2">
      <FullProductName ProductID="SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1">chromedriver-59.0.3071.86-20.1 as a component of SUSE Package Hub 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-59.0.3071.86-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP2">
      <FullProductName ProductID="SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1">chromium-59.0.3071.86-20.1 as a component of SUSE Package Hub 12 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5070</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5070.html</URL>
        <Description>CVE-2017-5070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows and Mac, and 59.0.3071.92 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5071</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5071.html</URL>
        <Description>CVE-2017-5071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Omnibox in Google Chrome prior to 59.0.3071.92 for Android allowed a remote attacker to perform domain spoofing with RTL characters via a crafted URL page.</Note>
    </Notes>
    <CVE>CVE-2017-5072</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5072.html</URL>
        <Description>CVE-2017-5072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in print preview in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5073</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5073.html</URL>
        <Description>CVE-2017-5073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free in Chrome Apps in Google Chrome prior to 59.0.3071.86 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page, related to Bluetooth.</Note>
    </Notes>
    <CVE>CVE-2017-5074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5074.html</URL>
        <Description>CVE-2017-5074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in CSP reporting in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to obtain the value of url fragments via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5075</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5075.html</URL>
        <Description>CVE-2017-5075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.</Note>
    </Notes>
    <CVE>CVE-2017-5076</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5076.html</URL>
        <Description>CVE-2017-5076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in Skia in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5077</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5077.html</URL>
        <Description>CVE-2017-5077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in Blink's mailto: handling in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac allowed a remote attacker to perform command injection via a crafted HTML page, a similar issue to CVE-2004-0121. For example, characters such as * have an incorrect interaction with xdg-email in xdg-utils, and a space character can be used in front of a command-line argument.</Note>
    </Notes>
    <CVE>CVE-2017-5078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5078.html</URL>
        <Description>CVE-2017-5078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5079.html</URL>
        <Description>CVE-2017-5079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free in credit card autofill in Google Chrome prior to 59.0.3071.86 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5080.html</URL>
        <Description>CVE-2017-5080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Lack of verification of an extension's locale folder in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed an attacker with local write access to modify extensions by modifying extension files.</Note>
    </Notes>
    <CVE>CVE-2017-5081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5081.html</URL>
        <Description>CVE-2017-5081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Failure to take advantage of available mitigations in credit card autofill in Google Chrome prior to 59.0.3071.92 for Android allowed a local attacker to take screen shots of credit card information via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5082</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5082.html</URL>
        <Description>CVE-2017-5082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2017-5083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5083.html</URL>
        <Description>CVE-2017-5083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Bookmarks in Google Chrome prior to 59 for iOS allowed a remote attacker who convinced the user to perform certain operations to run JavaScript on chrome:// pages via a crafted bookmark.</Note>
    </Notes>
    <CVE>CVE-2017-5085</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5085.html</URL>
        <Description>CVE-2017-5085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.</Note>
    </Notes>
    <CVE>CVE-2017-5086</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5086.html</URL>
        <Description>CVE-2017-5086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042833</URL>
        <Description>SUSE Bug 1042833</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
