opensuse-su-2017:1502-1
Vulnerability from csaf_opensuse
Published
2017-06-07 16:57
Modified
2017-06-07 16:57
Summary
Security update for chromium

Notes

Title of the patch
Security update for chromium
Description of the patch
This update to Chromium 59.0.3071.86 fixes the following security issues: - CVE-2017-5070: Type confusion in V8 - CVE-2017-5071: Out of bounds read in V8 - CVE-2017-5072: Address spoofing in Omnibox - CVE-2017-5073: Use after free in print preview - CVE-2017-5074: Use after free in Apps Bluetooth - CVE-2017-5075: Information leak in CSP reporting - CVE-2017-5086: Address spoofing in Omnibox - CVE-2017-5076: Address spoofing in Omnibox - CVE-2017-5077: Heap buffer overflow in Skia - CVE-2017-5078: Possible command injection in mailto handling - CVE-2017-5079: UI spoofing in Blink - CVE-2017-5080: Use after free in credit card autofill - CVE-2017-5081: Extension verification bypass - CVE-2017-5082: Insufficient hardening in credit card editor - CVE-2017-5083: UI spoofing in Blink - CVE-2017-5085: Inappropriate javascript execution on WebUI pages
Patchnames
openSUSE-2017-661
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for chromium",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update to Chromium 59.0.3071.86 fixes the following security issues:\n\n- CVE-2017-5070: Type confusion in V8\n- CVE-2017-5071: Out of bounds read in V8\n- CVE-2017-5072: Address spoofing in Omnibox\n- CVE-2017-5073: Use after free in print preview\n- CVE-2017-5074: Use after free in Apps Bluetooth\n- CVE-2017-5075: Information leak in CSP reporting\n- CVE-2017-5086: Address spoofing in Omnibox\n- CVE-2017-5076: Address spoofing in Omnibox\n- CVE-2017-5077: Heap buffer overflow in Skia\n- CVE-2017-5078: Possible command injection in mailto handling\n- CVE-2017-5079: UI spoofing in Blink\n- CVE-2017-5080: Use after free in credit card autofill\n- CVE-2017-5081: Extension verification bypass\n- CVE-2017-5082: Insufficient hardening in credit card editor\n- CVE-2017-5083: UI spoofing in Blink\n- CVE-2017-5085: Inappropriate javascript execution on WebUI pages\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2017-661",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_1502-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2017:1502-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2017:1502-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKZE63LEN77JSLVLIISIQUKH4RZFGZIS/#QKZE63LEN77JSLVLIISIQUKH4RZFGZIS"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1042833",
        "url": "https://bugzilla.suse.com/1042833"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5070 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5070/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5071 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5071/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5072 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5072/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5073 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5073/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5074 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5075 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5075/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5076 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5076/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5077 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5077/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5078 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5078/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5079 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5079/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5080 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5081 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5082 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5083 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5085 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5085/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5086 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5086/"
      }
    ],
    "title": "Security update for chromium",
    "tracking": {
      "current_release_date": "2017-06-07T16:57:03Z",
      "generator": {
        "date": "2017-06-07T16:57:03Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2017:1502-1",
      "initial_release_date": "2017-06-07T16:57:03Z",
      "revision_history": [
        {
          "date": "2017-06-07T16:57:03Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "chromedriver-59.0.3071.86-20.1.x86_64",
                "product": {
                  "name": "chromedriver-59.0.3071.86-20.1.x86_64",
                  "product_id": "chromedriver-59.0.3071.86-20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "chromium-59.0.3071.86-20.1.x86_64",
                "product": {
                  "name": "chromium-59.0.3071.86-20.1.x86_64",
                  "product_id": "chromium-59.0.3071.86-20.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Package Hub 12 SP2",
                "product": {
                  "name": "SUSE Package Hub 12 SP2",
                  "product_id": "SUSE Package Hub 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:packagehub:12:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromedriver-59.0.3071.86-20.1.x86_64 as component of SUSE Package Hub 12 SP2",
          "product_id": "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64"
        },
        "product_reference": "chromedriver-59.0.3071.86-20.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-59.0.3071.86-20.1.x86_64 as component of SUSE Package Hub 12 SP2",
          "product_id": "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        },
        "product_reference": "chromium-59.0.3071.86-20.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 12 SP2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-5070",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5070"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5070",
          "url": "https://www.suse.com/security/cve/CVE-2017-5070"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5070",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5070"
    },
    {
      "cve": "CVE-2017-5071",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5071"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows and Mac, and 59.0.3071.92 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5071",
          "url": "https://www.suse.com/security/cve/CVE-2017-5071"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5071",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5071"
    },
    {
      "cve": "CVE-2017-5072",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5072"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Omnibox in Google Chrome prior to 59.0.3071.92 for Android allowed a remote attacker to perform domain spoofing with RTL characters via a crafted URL page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5072",
          "url": "https://www.suse.com/security/cve/CVE-2017-5072"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5072",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5072"
    },
    {
      "cve": "CVE-2017-5073",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5073"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in print preview in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5073",
          "url": "https://www.suse.com/security/cve/CVE-2017-5073"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5073",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5073"
    },
    {
      "cve": "CVE-2017-5074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free in Chrome Apps in Google Chrome prior to 59.0.3071.86 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page, related to Bluetooth.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5074",
          "url": "https://www.suse.com/security/cve/CVE-2017-5074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5074",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5074"
    },
    {
      "cve": "CVE-2017-5075",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5075"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in CSP reporting in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to obtain the value of url fragments via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5075",
          "url": "https://www.suse.com/security/cve/CVE-2017-5075"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5075",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5075"
    },
    {
      "cve": "CVE-2017-5076",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5076"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5076",
          "url": "https://www.suse.com/security/cve/CVE-2017-5076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5076",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5076"
    },
    {
      "cve": "CVE-2017-5077",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5077"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient validation of untrusted input in Skia in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5077",
          "url": "https://www.suse.com/security/cve/CVE-2017-5077"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5077",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5077"
    },
    {
      "cve": "CVE-2017-5078",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5078"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient validation of untrusted input in Blink\u0027s mailto: handling in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac allowed a remote attacker to perform command injection via a crafted HTML page, a similar issue to CVE-2004-0121. For example, characters such as * have an incorrect interaction with xdg-email in xdg-utils, and a space character can be used in front of a command-line argument.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5078",
          "url": "https://www.suse.com/security/cve/CVE-2017-5078"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5078",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5078"
    },
    {
      "cve": "CVE-2017-5079",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5079"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5079",
          "url": "https://www.suse.com/security/cve/CVE-2017-5079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5079",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5079"
    },
    {
      "cve": "CVE-2017-5080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use after free in credit card autofill in Google Chrome prior to 59.0.3071.86 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5080",
          "url": "https://www.suse.com/security/cve/CVE-2017-5080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5080",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5080"
    },
    {
      "cve": "CVE-2017-5081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Lack of verification of an extension\u0027s locale folder in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed an attacker with local write access to modify extensions by modifying extension files.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5081",
          "url": "https://www.suse.com/security/cve/CVE-2017-5081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5081",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5081"
    },
    {
      "cve": "CVE-2017-5082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Failure to take advantage of available mitigations in credit card autofill in Google Chrome prior to 59.0.3071.92 for Android allowed a local attacker to take screen shots of credit card information via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5082",
          "url": "https://www.suse.com/security/cve/CVE-2017-5082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5082",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5082"
    },
    {
      "cve": "CVE-2017-5083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5083",
          "url": "https://www.suse.com/security/cve/CVE-2017-5083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5083",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5083"
    },
    {
      "cve": "CVE-2017-5085",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5085"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Bookmarks in Google Chrome prior to 59 for iOS allowed a remote attacker who convinced the user to perform certain operations to run JavaScript on chrome:// pages via a crafted bookmark.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5085",
          "url": "https://www.suse.com/security/cve/CVE-2017-5085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5085",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5085"
    },
    {
      "cve": "CVE-2017-5086",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5086"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
          "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5086",
          "url": "https://www.suse.com/security/cve/CVE-2017-5086"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1042833 for CVE-2017-5086",
          "url": "https://bugzilla.suse.com/1042833"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 12 SP2:chromedriver-59.0.3071.86-20.1.x86_64",
            "SUSE Package Hub 12 SP2:chromium-59.0.3071.86-20.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-06-07T16:57:03Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5086"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…