Ubuntu 3041-1: Oxide vulnerabilities

    Date 05 Aug 2016
    74
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in Oxide.
    ==========================================================================
    Ubuntu Security Notice USN-3041-1
    August 05, 2016
    
    oxide-qt vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    
    Summary:
    
    Several security issues were fixed in Oxide.
    
    Software Description:
    - oxide-qt: Web browser engine for Qt (QML plugin)
    
    Details:
    
    Multiple security issues were discovered in Chromium. If a user were
    tricked in to opening a specially crafted website, an attacker could
    potentially exploit these to read uninitialized memory, cause a denial
    of service (application crash) or execute arbitrary code. (CVE-2016-1705)
    
    It was discovered that the PPAPI implementation does not validate the
    origin of IPC messages to the plugin broker process. A remote attacker
    could potentially exploit this to bypass sandbox protection mechanisms.
    (CVE-2016-1706)
    
    It was discovered that Blink does not prevent window creation by a
    deferred frame. A remote attacker could potentially exploit this to bypass
    same origin restrictions. (CVE-2016-1710)
    
    It was discovered that Blink does not disable frame navigation during a
    detach operation on a DocumentLoader object. A remote attacker could
    potentially exploit this to bypass same origin restrictions.
    (CVE-2016-1711)
    
    A use-after-free was discovered in Blink. If a user were tricked in to
    opening a specially crafted website, an attacker could potentially exploit
    this to cause a denial of service via renderer process crash, or execute
    arbitrary code. (CVE-2016-5127)
    
    It was discovered that objects.cc in V8 does not prevent API interceptors
    from modifying a store target without setting a property. A remote
    attacker could potentially exploit this to bypass same origin
    restrictions. (CVE-2016-5128)
    
    A memory corruption was discovered in V8. If a user were tricked in to
    opening a specially crafted website, an attacker could potentially exploit
    this to cause a denial of service via renderer process crash, or execute
    arbitrary code. (CVE-2016-5129)
    
    A security issue was discovered in Chromium. A remote attacker could
    potentially exploit this to spoof the currently displayed URL.
    (CVE-2016-5130)
    
    A use-after-free was discovered in libxml. If a user were tricked in to
    opening a specially crafted website, an attacker could potentially exploit
    this to cause a denial of service via renderer process crash, or execute
    arbitrary code. (CVE-2016-5131)
    
    The Service Workers implementation in Chromium does not properly implement
    the Secure Contexts specification during decisions about whether to
    control a subframe. A remote attacker could potentially exploit this to
    bypass same origin restrictions. (CVE-2016-5132)
    
    It was discovered that Chromium mishandles origin information during proxy
    authentication. A man-in-the-middle attacker could potentially exploit this
    to spoof a proxy authentication login prompt. (CVE-2016-5133)
    
    It was discovered that the Proxy Auto-Config (PAC) feature in Chromium
    does not ensure that URL information is restricted to a scheme, host and
    port. A remote attacker could potentially exploit this to obtain sensitive
    information. (CVE-2016-5134)
    
    It was discovered that Blink does not consider referrer-policy information
    inside an HTML document during a preload request. A remote attacker could
    potentially exploit this to bypass Content Security Policy (CSP)
    protections. (CVE-2016-5135)
    
    It was discovered that the Content Security Policy (CSP) implementation in
    Blink does not apply http :80 policies to https :443 URLs. A remote
    attacker could potentially exploit this to determine whether a specific
    HSTS web site has been visited by reading a CSP report. (CVE-2016-5137)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 16.04 LTS:
      liboxideqtcore0                 1.16.5-0ubuntu0.16.04.1
    
    Ubuntu 14.04 LTS:
      liboxideqtcore0                 1.16.5-0ubuntu0.14.04.1
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://www.ubuntu.com/usn/usn-3041-1
      CVE-2016-1705, CVE-2016-1706, CVE-2016-1710, CVE-2016-1711,
      CVE-2016-5127, CVE-2016-5128, CVE-2016-5129, CVE-2016-5130,
      CVE-2016-5131, CVE-2016-5132, CVE-2016-5133, CVE-2016-5134,
      CVE-2016-5135, CVE-2016-5137
    
    Package Information:
      https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.16.04.1
      https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.14.04.1
    
    
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"7","type":"x","order":"1","pct":63.64,"resources":[]},{"id":"121","title":"No ","votes":"4","type":"x","order":"2","pct":36.36,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.