|
|
Log in / Subscribe / Register

Ubuntu alert USN-3091-1 (oxide-qt)

From:  Chris Coulson <chris.coulson@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-3091-1] Oxide vulnerabilities
Date:  Fri, 7 Oct 2016 15:25:28 +0100
Message-ID:  <3a4e4bdc-cbaa-9ba9-d9a7-9d7db1dd23ba@canonical.com>

========================================================================== Ubuntu Security Notice USN-3091-1 October 07, 2016 oxide-qt vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Oxide. Software Description: - oxide-qt: Web browser engine for Qt (QML plugin) Details: A use-after-free was discovered in the V8 bindings in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5170) A use-after-free was discovered in the V8 bindings in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5171) An issue was discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to ontain sensitive information from arbitrary memory locations. (CVE-2016-5172) Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5175, CVE-2016-5178) A use-after-free was discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code. (CVE-2016-5177) It was discovered that Chromium does not ensure the recipient of a certain IPC message is a valid RenderFrame or RenderWidget. An attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitary code. (CVE-2016-7549) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: liboxideqtcore0 1.17.9-0ubuntu0.16.04.1 Ubuntu 14.04 LTS: liboxideqtcore0 1.17.9-0ubuntu0.14.04.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-3091-1 CVE-2016-5170, CVE-2016-5171, CVE-2016-5172, CVE-2016-5175, CVE-2016-5177, CVE-2016-5178, CVE-2016-7549 Package Information: https://launchpad.net/ubuntu/+source/oxide-qt/1.17.9-0ubu... https://launchpad.net/ubuntu/+source/oxide-qt/1.17.9-0ubu... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds