You are here
Home > Preporuke > Sigurnosni propusti programskog paketa oxide-qt

Sigurnosni propusti programskog paketa oxide-qt

  • Detalji os-a: LUB
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2410-1
November 19, 2014

oxide-qt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.10
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Oxide.

Software Description:
– oxide-qt: Web browser engine library for Qt (QML plugin)

Details:

A buffer overflow was discovered in Skia. If a user were tricked in to
opening a specially crafted website, an attacked could potentially exploit
this to cause a denial of service via renderer crash or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-7904)

Multiple use-after-frees were discovered in Blink. If a user were tricked
in to opening a specially crafted website, an attacked could potentially
exploit these to cause a denial of service via renderer crash or execute
arbitrary code with the privileges of the sandboxed render process.
(CVE-2014-7907)

An integer overflow was discovered in media. If a user were tricked in to
opening a specially crafted website, an attacked could potentially exploit
this to cause a denial of service via renderer crash or execute arbitrary
code with the privileges of the sandboxed render process. (CVE-2014-7908)

An uninitialized memory read was discovered in Skia. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via renderer crash.
(CVE-2014-7909)

Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial of
service via application crash or execute arbitrary code with the
privileges of the user invoking the program. (CVE-2014-7910)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
liboxideqtcore0 1.3.4-0ubuntu0.14.10.1
oxideqt-codecs 1.3.4-0ubuntu0.14.10.1
oxideqt-codecs-extra 1.3.4-0ubuntu0.14.10.1

Ubuntu 14.04 LTS:
liboxideqtcore0 1.3.4-0ubuntu0.14.04.1
oxideqt-codecs 1.3.4-0ubuntu0.14.04.1
oxideqt-codecs-extra 1.3.4-0ubuntu0.14.04.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2410-1
CVE-2014-7904, CVE-2014-7907, CVE-2014-7908, CVE-2014-7909,
CVE-2014-7910

Package Information:
https://launchpad.net/ubuntu/+source/oxide-qt/1.3.4-0ubuntu0.14.10.1
https://launchpad.net/ubuntu/+source/oxide-qt/1.3.4-0ubuntu0.14.04.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQEcBAEBAgAGBQJUbP8DAAoJEGEfvezVlG4PKKUIALGdfpMSPB6eueO33BmOZdlW
Djvxt4N8CHM7dx8mHKwJbFPzm3ncFj8gUKpYZN6g5MKvawD5eA75DbvnXmqC77GB
DfmUzoyoNrbd23mzJ5wS3m1EcbyqycT8oO5kV4uJSeVDmaJtxBj8fBmeMX0lYta/
N1vVxCN6LrynBALsrcRYmaTBe+3aTrp5d/ndnOLj4izpOSYuJgWcsJRaLKwh9jVe
chWjDJO2pzwqWolD5lT85LPZUGstQhnfSJjUv6bTWeuBI9Ac9Ln9aiQHTvnZ+BDd
uD+1n04jO8m/h/HZhiB4G7bE4XzijlNEZlGTdSUIGN4OzG7ws7qtWuzVap4/aTs=
=DzkK
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2014-11-0023-ADV
CveCVE-2014-7904 CVE-2014-7907 CVE-2014-7908 CVE-2014-7909 CVE-2014-7910
ID izvornikaUSN-2410-1
Proizvodoxide-qt
Izvorhttp://www.ubuntu.com
Top
More in Preporuke
Nadogradnja za java-1.6.0-ibm

Izdana je nadogradnja koja otklanja mnogobrojne kritične ranjivosti u radu programskog paketa java-1.6.0-ibm za RHEL 5 i 6 Supplementary. Ranjivosti...

Close