|
|
Subscribe / Log in / New account

Ubuntu alert USN-2410-1 (oxide-qt)

From:  Chris Coulson <chris.coulson@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2410-1] Oxide vulnerabilities
Date:  Wed, 19 Nov 2014 20:35:14 +0000
Message-ID:  <546CFF02.80002@canonical.com>

========================================================================== Ubuntu Security Notice USN-2410-1 November 19, 2014 oxide-qt vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.10 - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Oxide. Software Description: - oxide-qt: Web browser engine library for Qt (QML plugin) Details: A buffer overflow was discovered in Skia. If a user were tricked in to opening a specially crafted website, an attacked could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7904) Multiple use-after-frees were discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacked could potentially exploit these to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7907) An integer overflow was discovered in media. If a user were tricked in to opening a specially crafted website, an attacked could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. (CVE-2014-7908) An uninitialized memory read was discovered in Skia. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash. (CVE-2014-7909) Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash or execute arbitrary code with the privileges of the user invoking the program. (CVE-2014-7910) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.10: liboxideqtcore0 1.3.4-0ubuntu0.14.10.1 oxideqt-codecs 1.3.4-0ubuntu0.14.10.1 oxideqt-codecs-extra 1.3.4-0ubuntu0.14.10.1 Ubuntu 14.04 LTS: liboxideqtcore0 1.3.4-0ubuntu0.14.04.1 oxideqt-codecs 1.3.4-0ubuntu0.14.04.1 oxideqt-codecs-extra 1.3.4-0ubuntu0.14.04.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2410-1 CVE-2014-7904, CVE-2014-7907, CVE-2014-7908, CVE-2014-7909, CVE-2014-7910 Package Information: https://launchpad.net/ubuntu/+source/oxide-qt/1.3.4-0ubun... https://launchpad.net/ubuntu/+source/oxide-qt/1.3.4-0ubun... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds