==========================================================================
Ubuntu Security Notice USN-2652-1
June 30, 2015
oxide-qt vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.04
– Ubuntu 14.10
– Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Oxide.
Software Description:
– oxide-qt: Web browser engine library for Qt (QML plugin)
Details:
It was discovered that Chromium did not properly consider the scheme when
determining whether a URL is associated with a WebUI SiteInstance. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to bypass security restrictions.
(CVE-2015-1266)
It was discovered that Blink did not properly restrict the creation
context during creation of a DOM wrapper. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to bypass same-origin restrictions. (CVE-2015-1267, CVE-2015-1268)
It was discovered that Chromium did not properly canonicalize DNS hostnames
before comparing to HSTS or HPKP preload entries. An attacker could
potentially exploit this to bypass intended access restrictions.
(CVE-2015-1269)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
liboxideqtcore0 1.7.9-0ubuntu0.15.04.1
Ubuntu 14.10:
liboxideqtcore0 1.7.9-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
liboxideqtcore0 1.7.9-0ubuntu0.14.04.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2652-1
CVE-2015-1266, CVE-2015-1267, CVE-2015-1268, CVE-2015-1269
Package Information:
https://launchpad.net/ubuntu/+source/oxide-qt/1.7.9-0ubuntu0.15.04.1
https://launchpad.net/ubuntu/+source/oxide-qt/1.7.9-0ubuntu0.14.10.1
https://launchpad.net/ubuntu/+source/oxide-qt/1.7.9-0ubuntu0.14.04.1
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQEcBAEBAgAGBQJVkn3lAAoJEGEfvezVlG4Pz08H/0EBWXJw9laW2UVNeD4Y8dij
dPeaZmH2GH5Vpst0aU7qPSHH1LTq9T/62EwLp1EokR24aGAnFFBEfD2dgC5ho6SU
9vS2Xfgtu8krbf72LmXu7y7a2zvlblVgYyhFaRzjaE9ojbthDj/6OH/gILNoB4Bn
9LDydYUiGc6tRtFyxKq1lrAeqohMFA9qIMLup1H5kL4536FSD7d6s7KwxvDXErTY
WAWy94uJXhFouH/eVeY8ats7BtC/DtaLS53jNRiI/tz6LDoQYyqFAAyDiIrct57n
M+iF7cr0+9nnaN79Cyo6xmorTZr9l/JwWj/jY1Ebe/HRItiBE67YbQi9i8LqN2k=
=62L4
—–END PGP SIGNATURE—–
—