<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:2290-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-12-17T08:13:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-12-17T08:13:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-12-17T08:13:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Chromium was updated to 47.0.2526.80 to fix security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-6788: Type confusion in extensions
* CVE-2015-6789: Use-after-free in Blink
* CVE-2015-6790: Escaping issue in saved pages
* CVE-2015-6791: Various fixes from internal audits, fuzzing and other initiatives

The following vulnerabilities were fixed in 47.0.2526.73:

* CVE-2015-6765: Use-after-free in AppCache
* CVE-2015-6766: Use-after-free in AppCache
* CVE-2015-6767: Use-after-free in AppCache
* CVE-2015-6768: Cross-origin bypass in DOM
* CVE-2015-6769: Cross-origin bypass in core
* CVE-2015-6770: Cross-origin bypass in DOM
* CVE-2015-6771: Out of bounds access in v8
* CVE-2015-6772: Cross-origin bypass in DOM
* CVE-2015-6764: Out of bounds access in v8
* CVE-2015-6773: Out of bounds access in Skia
* CVE-2015-6774: Use-after-free in Extensions
* CVE-2015-6775: Type confusion in PDFium
* CVE-2015-6776: Out of bounds access in PDFium
* CVE-2015-6777: Use-after-free in DOM
* CVE-2015-6778: Out of bounds access in PDFium
* CVE-2015-6779: Scheme bypass in PDFium
* CVE-2015-6780: Use-after-free in Infobars
* CVE-2015-6781: Integer overflow in Sfntly
* CVE-2015-6782: Content spoofing in Omnibox
* CVE-2015-6783: Signature validation issue in Android Crazy Linker.
* CVE-2015-6784: Escaping issue in saved pages
* CVE-2015-6785: Wildcard matching issue in CSP
* CVE-2015-6786: Scheme bypass in CSP
* CVE-2015-6787: Various fixes from internal audits, fuzzing  and other initiatives.
* Multiple vulnerabilities in V8 fixed at the tip of the 4.7 branch (currently 4.7.80.23)</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:2290-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-47.0.2526.80-7.1">
      <FullProductName ProductID="chromedriver-47.0.2526.80-7.1">chromedriver-47.0.2526.80-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-47.0.2526.80-7.1">
      <FullProductName ProductID="chromium-47.0.2526.80-7.1">chromium-47.0.2526.80-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-gnome-47.0.2526.80-7.1">
      <FullProductName ProductID="chromium-desktop-gnome-47.0.2526.80-7.1">chromium-desktop-gnome-47.0.2526.80-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-desktop-kde-47.0.2526.80-7.1">
      <FullProductName ProductID="chromium-desktop-kde-47.0.2526.80-7.1">chromium-desktop-kde-47.0.2526.80-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-ffmpegsumo-47.0.2526.80-7.1">
      <FullProductName ProductID="chromium-ffmpegsumo-47.0.2526.80-7.1">chromium-ffmpegsumo-47.0.2526.80-7.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-47.0.2526.80-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1">chromedriver-47.0.2526.80-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-47.0.2526.80-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-47.0.2526.80-7.1">chromium-47.0.2526.80-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-gnome-47.0.2526.80-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1">chromium-desktop-gnome-47.0.2526.80-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-desktop-kde-47.0.2526.80-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1">chromium-desktop-kde-47.0.2526.80-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-ffmpegsumo-47.0.2526.80-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1">chromium-ffmpegsumo-47.0.2526.80-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2015-6764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6764.html</URL>
        <Description>CVE-2015-6764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956902</URL>
        <Description>SUSE Bug 956902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in content/browser/appcache/appcache_update_job.cc in Google Chrome before 47.0.2526.73 allows remote attackers to execute arbitrary code or cause a denial of service by leveraging the mishandling of AppCache update jobs.</Note>
    </Notes>
    <CVE>CVE-2015-6765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6765.html</URL>
        <Description>CVE-2015-6765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers with renderer access to cause a denial of service or possibly have unspecified other impact by leveraging incorrect AppCacheUpdateJob behavior associated with duplicate cache selection.</Note>
    </Notes>
    <CVE>CVE-2015-6766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6766.html</URL>
        <Description>CVE-2015-6766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in content/browser/appcache/appcache_dispatcher_host.cc in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect pointer maintenance associated with certain callbacks.</Note>
    </Notes>
    <CVE>CVE-2015-6767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6767.html</URL>
        <Description>CVE-2015-6767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770.</Note>
    </Notes>
    <CVE>CVE-2015-6768</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6768.html</URL>
        <Description>CVE-2015-6768</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The provisional-load commit implementation in WebKit/Source/bindings/core/v8/WindowProxy.cpp in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy by leveraging a delay in window proxy clearing.</Note>
    </Notes>
    <CVE>CVE-2015-6769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6769.html</URL>
        <Description>CVE-2015-6769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.</Note>
    </Notes>
    <CVE>CVE-2015-6770</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6770.html</URL>
        <Description>CVE-2015-6770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">js/array.js in Google V8, as used in Google Chrome before 47.0.2526.73, improperly implements certain map and filter operations for arrays, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2015-6771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6771.html</URL>
        <Description>CVE-2015-6771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin.</Note>
    </Notes>
    <CVE>CVE-2015-6772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6772.html</URL>
        <Description>CVE-2015-6772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The convolution implementation in Skia, as used in Google Chrome before 47.0.2526.73, does not properly constrain row lengths, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted graphics data.</Note>
    </Notes>
    <CVE>CVE-2015-6773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6773.html</URL>
        <Description>CVE-2015-6773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data.</Note>
    </Notes>
    <CVE>CVE-2015-6774</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6774.html</URL>
        <Description>CVE-2015-6774</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">fpdfsdk/src/jsapi/fxjs_v8.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, does not use signatures, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."</Note>
    </Notes>
    <CVE>CVE-2015-6775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6775.html</URL>
        <Description>CVE-2015-6775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform.</Note>
    </Notes>
    <CVE>CVE-2015-6776</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6776.html</URL>
        <Description>CVE-2015-6776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the ContainerNode::notifyNodeInsertedInternal function in WebKit/Source/core/dom/ContainerNode.cpp in the DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOMCharacterDataModified events for certain detached-subtree insertions.</Note>
    </Notes>
    <CVE>CVE-2015-6777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6777.html</URL>
        <Description>CVE-2015-6777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CJBig2_SymbolDict class in fxcodec/jbig2/JBig2_SymbolDict.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a PDF document containing crafted data with JBIG2 compression.</Note>
    </Notes>
    <CVE>CVE-2015-6778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6778.html</URL>
        <Description>CVE-2015-6778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PDFium, as used in Google Chrome before 47.0.2526.73, does not properly restrict use of chrome: URLs, which allows remote attackers to bypass intended scheme restrictions via a crafted PDF document, as demonstrated by a document with a link to a chrome://settings URL.</Note>
    </Notes>
    <CVE>CVE-2015-6779</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6779.html</URL>
        <Description>CVE-2015-6779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the Infobars implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site, related to browser/ui/views/website_settings/website_settings_popup_view.cc.</Note>
    </Notes>
    <CVE>CVE-2015-6780</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6780.html</URL>
        <Description>CVE-2015-6780</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.</Note>
    </Notes>
    <CVE>CVE-2015-6781</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6781.html</URL>
        <Description>CVE-2015-6781</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2015-6782</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6782.html</URL>
        <Description>CVE-2015-6782</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive.</Note>
    </Notes>
    <CVE>CVE-2015-6783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6783.html</URL>
        <Description>CVE-2015-6783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The page serializer in Google Chrome before 47.0.2526.73 mishandles Mark of the Web (MOTW) comments for URLs containing a "--" sequence, which might allow remote attackers to inject HTML via a crafted URL, as demonstrated by an initial http://example.com?-- substring.</Note>
    </Notes>
    <CVE>CVE-2015-6784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6784.html</URL>
        <Description>CVE-2015-6784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains.</Note>
    </Notes>
    <CVE>CVE-2015-6785</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6785.html</URL>
        <Description>CVE-2015-6785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in opportunistic circumstances by leveraging a policy that relies on this pattern.</Note>
    </Notes>
    <CVE>CVE-2015-6786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6786.html</URL>
        <Description>CVE-2015-6786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-6787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6787.html</URL>
        <Description>CVE-2015-6787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ObjectBackedNativeHandler class in extensions/renderer/object_backed_native_handler.cc in the extensions subsystem in Google Chrome before 47.0.2526.80 improperly implements handler functions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."</Note>
    </Notes>
    <CVE>CVE-2015-6788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6788.html</URL>
        <Description>CVE-2015-6788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958481</URL>
        <Description>SUSE Bug 958481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the MutationObserver implementation in Blink, as used in Google Chrome before 47.0.2526.80, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact by leveraging unanticipated object deletion.</Note>
    </Notes>
    <CVE>CVE-2015-6789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6789.html</URL>
        <Description>CVE-2015-6789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958481</URL>
        <Description>SUSE Bug 958481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.</Note>
    </Notes>
    <CVE>CVE-2015-6790</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6790.html</URL>
        <Description>CVE-2015-6790</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958481</URL>
        <Description>SUSE Bug 958481</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.80 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-6791</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:chromedriver-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-gnome-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-desktop-kde-47.0.2526.80-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:chromium-ffmpegsumo-47.0.2526.80-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6791.html</URL>
        <Description>CVE-2015-6791</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957519</URL>
        <Description>SUSE Bug 957519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958481</URL>
        <Description>SUSE Bug 958481</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
