<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:4142-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-12-15T09:26:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-12-15T09:26:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-12-15T09:26:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Chromium 71.0.3578.98 fixes the following issues:

Security issues fixed (boo#1118529):

- CVE-2018-17480: Out of bounds write in V8
- CVE-2018-17481: Use after frees in PDFium
- CVE-2018-18335: Heap buffer overflow in Skia
- CVE-2018-18336: Use after free in PDFium
- CVE-2018-18337: Use after free in Blink
- CVE-2018-18338: Heap buffer overflow in Canvas
- CVE-2018-18339: Use after free in WebAudio
- CVE-2018-18340: Use after free in MediaRecorder
- CVE-2018-18341: Heap buffer overflow in Blink
- CVE-2018-18342: Out of bounds write in V8
- CVE-2018-18343: Use after free in Skia
- CVE-2018-18344: Inappropriate implementation in Extensions
- Multiple issues in SQLite via WebSQL
- CVE-2018-18345: Inappropriate implementation in Site Isolation
- CVE-2018-18346: Incorrect security UI in Blink
- CVE-2018-18347: Inappropriate implementation in Navigation
- CVE-2018-18348: Inappropriate implementation in Omnibox
- CVE-2018-18349: Insufficient policy enforcement in Blink
- CVE-2018-18350: Insufficient policy enforcement in Blink
- CVE-2018-18351: Insufficient policy enforcement in Navigation
- CVE-2018-18352: Inappropriate implementation in Media
- CVE-2018-18353: Inappropriate implementation in Network Authentication
- CVE-2018-18354: Insufficient data validation in Shell Integration
- CVE-2018-18355: Insufficient policy enforcement in URL Formatter
- CVE-2018-18356: Use after free in Skia
- CVE-2018-18357: Insufficient policy enforcement in URL Formatter
- CVE-2018-18358: Insufficient policy enforcement in Proxy
- CVE-2018-18359: Out of bounds read in V8
- Inappropriate implementation in PDFium
- Use after free in Extensions
- Inappropriate implementation in Navigation
- Insufficient policy enforcement in Navigation
- Insufficient policy enforcement in URL Formatter
- Various fixes from internal audits, fuzzing and other initiatives
- CVE-2018-17481: Use after free in PDFium (boo#1119364)

The following changes are included:

- advertisements posing as error messages are now blocked
- Automatic playing of content at page load mostly disabled
- New JavaScript API for relative time display
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:4142-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-71.0.3578.98-189.1">
      <FullProductName ProductID="chromedriver-71.0.3578.98-189.1">chromedriver-71.0.3578.98-189.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-71.0.3578.98-189.1">
      <FullProductName ProductID="chromium-71.0.3578.98-189.1">chromium-71.0.3578.98-189.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-71.0.3578.98-189.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1">chromedriver-71.0.3578.98-189.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-71.0.3578.98-189.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:chromium-71.0.3578.98-189.1">chromium-71.0.3578.98-189.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-17480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17480.html</URL>
        <Description>CVE-2018-17480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2018-17481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17481.html</URL>
        <Description>CVE-2018-17481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119364</URL>
        <Description>SUSE Bug 1119364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18335</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18335.html</URL>
        <Description>CVE-2018-18335</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect object lifecycle in PDFium in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.</Note>
    </Notes>
    <CVE>CVE-2018-18336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18336.html</URL>
        <Description>CVE-2018-18336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of stylesheets leading to a use after free in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18337</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18337.html</URL>
        <Description>CVE-2018-18337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect, thread-unsafe use of SkImage in Canvas in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18338.html</URL>
        <Description>CVE-2018-18338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect object lifecycle in WebAudio in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18339.html</URL>
        <Description>CVE-2018-18339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect object lifecycle in MediaRecorder in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18340.html</URL>
        <Description>CVE-2018-18340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow leading to a heap buffer overflow in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18341.html</URL>
        <Description>CVE-2018-18341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Execution of user supplied Javascript during object deserialization can update object length leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18342</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18342.html</URL>
        <Description>CVE-2018-18342</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handing of paths leading to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18343.html</URL>
        <Description>CVE-2018-18343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension.</Note>
    </Notes>
    <CVE>CVE-2018-18344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18344.html</URL>
        <Description>CVE-2018-18344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of blob URLS in Site Isolation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker who had compromised the renderer process to bypass site isolation protections via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18345.html</URL>
        <Description>CVE-2018-18345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of alert box display in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to present confusing browser UI via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18346.html</URL>
        <Description>CVE-2018-18346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of failed navigations with invalid URLs in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to trick a user into executing javascript in an arbitrary origin via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18347</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18347.html</URL>
        <Description>CVE-2018-18347</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.</Note>
    </Notes>
    <CVE>CVE-2018-18348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18348.html</URL>
        <Description>CVE-2018-18348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.</Note>
    </Notes>
    <CVE>CVE-2018-18349</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18349.html</URL>
        <Description>CVE-2018-18349</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of CSP enforcement during navigations in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass content security policy via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18350.html</URL>
        <Description>CVE-2018-18350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18351.html</URL>
        <Description>CVE-2018-18351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Service works could inappropriately gain access to cross origin audio in Media in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass same origin policy for audio content via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18352.html</URL>
        <Description>CVE-2018-18352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18353.html</URL>
        <Description>CVE-2018-18353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows prior to 71.0.3578.80 allowed a remote attacker to launch external programs via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18354.html</URL>
        <Description>CVE-2018-18354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.</Note>
    </Notes>
    <CVE>CVE-2018-18355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18355.html</URL>
        <Description>CVE-2018-18355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18356</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18356.html</URL>
        <Description>CVE-2018-18356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125396</URL>
        <Description>SUSE Bug 1125396</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.</Note>
    </Notes>
    <CVE>CVE-2018-18357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18357.html</URL>
        <Description>CVE-2018-18357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Lack of special casing of localhost in WPAD files in Google Chrome prior to 71.0.3578.80 allowed an attacker on the local network segment to proxy resources on localhost via a crafted WPAD file.</Note>
    </Notes>
    <CVE>CVE-2018-18358</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18358.html</URL>
        <Description>CVE-2018-18358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handling of Reflect.construct in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-18359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:chromedriver-71.0.3578.98-189.1</ProductID>
        <ProductID>openSUSE Leap 42.3:chromium-71.0.3578.98-189.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18359.html</URL>
        <Description>CVE-2018-18359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118529</URL>
        <Description>SUSE Bug 1118529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1125330</URL>
        <Description>SUSE Bug 1125330</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
