{"id":"USN-2495-1","summary":"oxide-qt vulnerabilities","details":"A use-after-free bug was discovered in the DOM implementation in Blink. If\na user were tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to cause a denial of service via renderer\ncrash or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2015-1209)\n\nIt was discovered that V8 did not properly consider frame access\nrestrictions when throwing exceptions in some circumstances. If a user\nwere tricked in to opening a specially crafted website, an attacker could\npotentially exploit this to bypass same origin restrictions.\n(CVE-2015-1210)\n\nIt was discovered that Chromium did not properly restrict the URI scheme\nduring ServiceWorker registration. If a user were tricked in to\ndownloading and opening a specially crafted HTML file, an attacker could\npotentially exploit this to bypass security restrictions. (CVE-2015-1211)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1212)\n","modified":"2026-02-10T04:40:52Z","published":"2015-02-10T17:56:21Z","related":["UBUNTU-CVE-2015-1209","UBUNTU-CVE-2015-1210","UBUNTU-CVE-2015-1211","UBUNTU-CVE-2015-1212"],"upstream":["CVE-2015-1209","CVE-2015-1210","CVE-2015-1211","CVE-2015-1212","UBUNTU-CVE-2015-1209","UBUNTU-CVE-2015-1210","UBUNTU-CVE-2015-1211","UBUNTU-CVE-2015-1212"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2495-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1209"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1210"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1211"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1212"}],"affected":[{"package":{"name":"oxide-qt","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/oxide-qt@1.4.3-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.3-0ubuntu0.14.04.1"}]}],"versions":["1.0.0~bzr437-0ubuntu1","1.0.0~bzr452-0ubuntu1","1.0.0~bzr475-0ubuntu1","1.0.0~bzr490-0ubuntu1","1.0.0~bzr501-0ubuntu1","1.0.0~bzr501-0ubuntu2","1.0.4-0ubuntu0.14.04.1","1.0.5-0ubuntu0.14.04.1","1.1.2-0ubuntu0.14.04.1","1.2.5-0ubuntu0.14.04.1","1.3.4-0ubuntu0.14.04.1","1.4.2-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"liboxideqt-qmlplugin","binary_version":"1.4.3-0ubuntu0.14.04.1"},{"binary_name":"liboxideqtcore0","binary_version":"1.4.3-0ubuntu0.14.04.1"},{"binary_name":"liboxideqtquick0","binary_version":"1.4.3-0ubuntu0.14.04.1"},{"binary_name":"oxideqmlscene","binary_version":"1.4.3-0ubuntu0.14.04.1"},{"binary_name":"oxideqt-chromedriver","binary_version":"1.4.3-0ubuntu0.14.04.1"},{"binary_name":"oxideqt-codecs","binary_version":"1.4.3-0ubuntu0.14.04.1"},{"binary_name":"oxideqt-codecs-extra","binary_version":"1.4.3-0ubuntu0.14.04.1"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1209"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1210"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1211"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2015-1212"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2495-1.json"}}],"schema_version":"1.7.3"}