<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:1499-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-09-22T08:22:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-09-22T08:22:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-09-22T08:22:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for chromium fixes the following issues:

Chromium was updated to version 85.0.4183.102 (bsc#1176306) fixing:

- CVE-2020-6573: Use after free in video.
- CVE-2020-6574: Insufficient policy enforcement in installer. 
- CVE-2020-6575: Race in Mojo.
- CVE-2020-6576: Use after free in offscreen canvas. 
- CVE-2020-15959: Insufficient policy enforcement in networking.

Chromium was updated to version 85.0.4183.83 (boo#1175757) fixing:

- CVE-2020-6558: Insufficient policy enforcement in iOS
- CVE-2020-6559: Use after free in presentation API
- CVE-2020-6560: Insufficient policy enforcement in autofill
- CVE-2020-6561: Inappropriate implementation in Content Security Policy
- CVE-2020-6562: Insufficient policy enforcement in Blink
- CVE-2020-6563: Insufficient policy enforcement in intent handling.
- CVE-2020-6564: Incorrect security UI in permissions
- CVE-2020-6565: Incorrect security UI in Omnibox.
- CVE-2020-6566: Insufficient policy enforcement in media.
- CVE-2020-6567: Insufficient validation of untrusted input in command line handling.
- CVE-2020-6568: Insufficient policy enforcement in intent handling.
- CVE-2020-6569: Integer overflow in WebUSB.
- CVE-2020-6570: Side-channel information leakage in WebRTC.
- CVE-2020-6571: Incorrect security UI in Omnibox.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-1499</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:1499-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175757</URL>
      <Description>SUSE Bug 1175757</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176306</URL>
      <Description>SUSE Bug 1176306</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1176450</URL>
      <Description>SUSE Bug 1176450</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15959/</URL>
      <Description>SUSE CVE CVE-2020-15959 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6558/</URL>
      <Description>SUSE CVE CVE-2020-6558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6559/</URL>
      <Description>SUSE CVE CVE-2020-6559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6560/</URL>
      <Description>SUSE CVE CVE-2020-6560 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6561/</URL>
      <Description>SUSE CVE CVE-2020-6561 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6562/</URL>
      <Description>SUSE CVE CVE-2020-6562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6563/</URL>
      <Description>SUSE CVE CVE-2020-6563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6564/</URL>
      <Description>SUSE CVE CVE-2020-6564 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6565/</URL>
      <Description>SUSE CVE CVE-2020-6565 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6566/</URL>
      <Description>SUSE CVE CVE-2020-6566 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6567/</URL>
      <Description>SUSE CVE CVE-2020-6567 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6568/</URL>
      <Description>SUSE CVE CVE-2020-6568 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6569/</URL>
      <Description>SUSE CVE CVE-2020-6569 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6570/</URL>
      <Description>SUSE CVE CVE-2020-6570 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6571/</URL>
      <Description>SUSE CVE CVE-2020-6571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6573/</URL>
      <Description>SUSE CVE CVE-2020-6573 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6574/</URL>
      <Description>SUSE CVE CVE-2020-6574 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6575/</URL>
      <Description>SUSE CVE CVE-2020-6575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-6576/</URL>
      <Description>SUSE CVE CVE-2020-6576 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-85.0.4183.102-lp152.2.30.1">
      <FullProductName ProductID="chromedriver-85.0.4183.102-lp152.2.30.1">chromedriver-85.0.4183.102-lp152.2.30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-85.0.4183.102-lp152.2.30.1">
      <FullProductName ProductID="chromium-85.0.4183.102-lp152.2.30.1">chromium-85.0.4183.102-lp152.2.30.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-85.0.4183.102-lp152.2.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1">chromedriver-85.0.4183.102-lp152.2.30.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-85.0.4183.102-lp152.2.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1">chromium-85.0.4183.102-lp152.2.30.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromedriver-85.0.4183.102-lp152.2.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1">chromedriver-85.0.4183.102-lp152.2.30.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-85.0.4183.102-lp152.2.30.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1">chromium-85.0.4183.102-lp152.2.30.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.</Note>
    </Notes>
    <CVE>CVE-2020-15959</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15959.html</URL>
        <Description>CVE-2020-15959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176306</URL>
        <Description>SUSE Bug 1176306</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in iOSWeb in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6558.html</URL>
        <Description>CVE-2020-6558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in presentation API in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6559.html</URL>
        <Description>CVE-2020-6559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6560.html</URL>
        <Description>CVE-2020-6560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Content Security Policy in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6561</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6561.html</URL>
        <Description>CVE-2020-6561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in Blink in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6562.html</URL>
        <Description>CVE-2020-6562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6563.html</URL>
        <Description>CVE-2020-6563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6564</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6564.html</URL>
        <Description>CVE-2020-6564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6565</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6565.html</URL>
        <Description>CVE-2020-6565</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6566.html</URL>
        <Description>CVE-2020-6566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6567.html</URL>
        <Description>CVE-2020-6567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6568.html</URL>
        <Description>CVE-2020-6568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6569.html</URL>
        <Description>CVE-2020-6569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Information leakage in WebRTC in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information via a crafted WebRTC interaction.</Note>
    </Notes>
    <CVE>CVE-2020-6570</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6570.html</URL>
        <Description>CVE-2020-6570</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient data validation in Omnibox in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.</Note>
    </Notes>
    <CVE>CVE-2020-6571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6571.html</URL>
        <Description>CVE-2020-6571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1175757</URL>
        <Description>SUSE Bug 1175757</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6573.html</URL>
        <Description>CVE-2020-6573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176306</URL>
        <Description>SUSE Bug 1176306</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.</Note>
    </Notes>
    <CVE>CVE-2020-6574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6574.html</URL>
        <Description>CVE-2020-6574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176306</URL>
        <Description>SUSE Bug 1176306</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6575.html</URL>
        <Description>CVE-2020-6575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176306</URL>
        <Description>SUSE Bug 1176306</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2020-6576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.1:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromedriver-85.0.4183.102-lp152.2.30.1</ProductID>
        <ProductID>openSUSE Leap 15.2:chromium-85.0.4183.102-lp152.2.30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVLIV2CRZYKLIUJ6AKW5DXJ5TG44WR3E/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-6576.html</URL>
        <Description>CVE-2020-6576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1176306</URL>
        <Description>SUSE Bug 1176306</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
