<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1430-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-05-27T19:11:08Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-05-27T19:11:08Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-05-27T19:11:08Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Chromium was updated to 51.0.2704.63 to fix the following vulnerabilities (boo#981886):  

- CVE-2016-1672: Cross-origin bypass in extension bindings
- CVE-2016-1673: Cross-origin bypass in Blink
- CVE-2016-1674: Cross-origin bypass in extensions
- CVE-2016-1675: Cross-origin bypass in Blink
- CVE-2016-1676: Cross-origin bypass in extension bindings
- CVE-2016-1677: Type confusion in V8
- CVE-2016-1678: Heap overflow in V8
- CVE-2016-1679: Heap use-after-free in V8 bindings
- CVE-2016-1680: Heap use-after-free in Skia
- CVE-2016-1681: Heap overflow in PDFium
- CVE-2016-1682: CSP bypass for ServiceWorker
- CVE-2016-1683: Out-of-bounds access in libxslt
- CVE-2016-1684: Integer overflow in libxslt
- CVE-2016-1685: Out-of-bounds read in PDFium
- CVE-2016-1686: Out-of-bounds read in PDFium
- CVE-2016-1687: Information leak in extensions
- CVE-2016-1688: Out-of-bounds read in V8
- CVE-2016-1689: Heap buffer overflow in media
- CVE-2016-1690: Heap use-after-free in Autofill
- CVE-2016-1691: Heap buffer-overflow in Skia
- CVE-2016-1692: Limited cross-origin bypass in ServiceWorker
- CVE-2016-1693: HTTP Download of Software Removal Tool
- CVE-2016-1694: HPKP pins removed on cache clearance
- CVE-2016-1695: Various fixes from internal audits, fuzzing and other initiatives
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1430-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-51.0.2704.63-51.1">
      <FullProductName ProductID="chromedriver-51.0.2704.63-51.1">chromedriver-51.0.2704.63-51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-51.0.2704.63-51.1">
      <FullProductName ProductID="chromium-51.0.2704.63-51.1">chromium-51.0.2704.63-51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-gnome-51.0.2704.63-51.1">
      <FullProductName ProductID="chromium-desktop-gnome-51.0.2704.63-51.1">chromium-desktop-gnome-51.0.2704.63-51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-kde-51.0.2704.63-51.1">
      <FullProductName ProductID="chromium-desktop-kde-51.0.2704.63-51.1">chromium-desktop-kde-51.0.2704.63-51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-51.0.2704.63-51.1">
      <FullProductName ProductID="chromium-ffmpegsumo-51.0.2704.63-51.1">chromium-ffmpegsumo-51.0.2704.63-51.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-51.0.2704.63-51.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1">chromedriver-51.0.2704.63-51.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-51.0.2704.63-51.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-51.0.2704.63-51.1">chromium-51.0.2704.63-51.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-gnome-51.0.2704.63-51.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1">chromium-desktop-gnome-51.0.2704.63-51.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-kde-51.0.2704.63-51.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1">chromium-desktop-kde-51.0.2704.63-51.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-51.0.2704.63-51.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1">chromium-ffmpegsumo-51.0.2704.63-51.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1672.html</URL>
        <Description>CVE-2016-1672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1673</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1673.html</URL>
        <Description>CVE-2016-1673</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1674.html</URL>
        <Description>CVE-2016-1674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.</Note>
    </Notes>
    <CVE>CVE-2016-1675</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1675.html</URL>
        <Description>CVE-2016-1675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1676</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1676.html</URL>
        <Description>CVE-2016-1676</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."</Note>
    </Notes>
    <CVE>CVE-2016-1677</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1677.html</URL>
        <Description>CVE-2016-1677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1678.html</URL>
        <Description>CVE-2016-1678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google Chrome before 51.0.2704.63 does not properly restrict use of getters and setters, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1679</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1679.html</URL>
        <Description>CVE-2016-1679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1680</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1680.html</URL>
        <Description>CVE-2016-1680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2016-1681</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1681.html</URL>
        <Description>CVE-2016-1681</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration.</Note>
    </Notes>
    <CVE>CVE-2016-1682</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1682.html</URL>
        <Description>CVE-2016-1682</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.</Note>
    </Notes>
    <CVE>CVE-2016-1683</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1683.html</URL>
        <Description>CVE-2016-1683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.</Note>
    </Notes>
    <CVE>CVE-2016-1684</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1684.html</URL>
        <Description>CVE-2016-1684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, miscalculates certain index values, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2016-1685</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1685.html</URL>
        <Description>CVE-2016-1685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.</Note>
    </Notes>
    <CVE>CVE-2016-1686</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1686.html</URL>
        <Description>CVE-2016-1686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict public exposure of classes, which allows remote attackers to obtain sensitive information via vectors related to extensions.</Note>
    </Notes>
    <CVE>CVE-2016-1687</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1687.html</URL>
        <Description>CVE-2016-1687</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1688</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1688.html</URL>
        <Description>CVE-2016-1688</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome before 51.0.2704.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-1689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1689.html</URL>
        <Description>CVE-2016-1689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1701.</Note>
    </Notes>
    <CVE>CVE-2016-1690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1690.html</URL>
        <Description>CVE-2016-1690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted curves, related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp.</Note>
    </Notes>
    <CVE>CVE-2016-1691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1691.html</URL>
        <Description>CVE-2016-1691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before 51.0.2704.63, permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-1692</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1692.html</URL>
        <Description>CVE-2016-1692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.</Note>
    </Notes>
    <CVE>CVE-2016-1693</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1693.html</URL>
        <Description>CVE-2016-1693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.</Note>
    </Notes>
    <CVE>CVE-2016-1694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1694.html</URL>
        <Description>CVE-2016-1694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-51.0.2704.63-51.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-51.0.2704.63-51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1695.html</URL>
        <Description>CVE-2016-1695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981886</URL>
        <Description>SUSE Bug 981886</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
