{"id":"USN-2877-1","summary":"oxide-qt vulnerabilities","details":"A bad cast was discovered in V8. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this to\ncause a denial of service via renderer crash or execute arbitrary code\nwith the privileges of the sandboxed render process. (CVE-2016-1612)\n\nAn issue was discovered when initializing the UnacceleratedImageBufferSurface\nclass in Blink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to obtain sensitive\ninformation. (CVE-2016-1614)\n\nAn issue was discovered with the CSP implementation in Blink. If a user\nwere tricked in to opening a specially crafted website, an attacker could\npotentially exploit this to determine whether specific HSTS sites had been\nvisited by reading a CSP report. (CVE-2016-1617)\n\nAn issue was discovered with random number generator in Blink. An attacker\ncould potentially exploit this to defeat cryptographic protection\nmechanisms. (CVE-2016-1618)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2016-1620)\n\nMultiple security issues were discovered in V8. If a user were tricked\nin to opening a specially crafted website, an attacker could potentially\nexploit these to read uninitialized memory, cause a denial of service via\nrenderer crash or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2016-2051)\n\nMultiple security issues were discovered in Harfbuzz. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service via renderer\ncrash or execute arbitrary code with the privileges of the sandboxed\nrender process. (CVE-2016-2052)\n","modified":"2026-02-10T04:40:57Z","published":"2016-01-27T16:19:49Z","related":["UBUNTU-CVE-2016-1612","UBUNTU-CVE-2016-1614","UBUNTU-CVE-2016-1617","UBUNTU-CVE-2016-1618","UBUNTU-CVE-2016-1620","UBUNTU-CVE-2016-2051","UBUNTU-CVE-2016-2052"],"upstream":["CVE-2016-1612","CVE-2016-1614","CVE-2016-1617","CVE-2016-1618","CVE-2016-1620","CVE-2016-2051","CVE-2016-2052","UBUNTU-CVE-2016-1612","UBUNTU-CVE-2016-1614","UBUNTU-CVE-2016-1617","UBUNTU-CVE-2016-1618","UBUNTU-CVE-2016-1620","UBUNTU-CVE-2016-2051","UBUNTU-CVE-2016-2052"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2877-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1612"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1614"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1617"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1618"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1620"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2051"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2052"}],"affected":[{"package":{"name":"oxide-qt","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/oxide-qt@1.12.5-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.5-0ubuntu0.14.04.1"}]}],"versions":["1.0.0~bzr437-0ubuntu1","1.0.0~bzr452-0ubuntu1","1.0.0~bzr475-0ubuntu1","1.0.0~bzr490-0ubuntu1","1.0.0~bzr501-0ubuntu1","1.0.0~bzr501-0ubuntu2","1.0.4-0ubuntu0.14.04.1","1.0.5-0ubuntu0.14.04.1","1.1.2-0ubuntu0.14.04.1","1.2.5-0ubuntu0.14.04.1","1.3.4-0ubuntu0.14.04.1","1.4.2-0ubuntu0.14.04.1","1.4.3-0ubuntu0.14.04.1","1.5.5-0ubuntu0.14.04.3","1.5.6-0ubuntu0.14.04.2","1.6.5-0ubuntu0.14.04.1","1.6.6-0ubuntu0.14.04.1","1.7.8-0ubuntu0.14.04.1","1.7.9-0ubuntu0.14.04.1","1.8.4-0ubuntu0.14.04.2","1.9.1-0ubuntu0.14.04.2","1.9.5-0ubuntu0.14.04.1","1.10.3-0ubuntu0.14.04.1","1.11.3-0ubuntu0.14.04.1","1.11.4-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.12.5-0ubuntu0.14.04.1","binary_name":"liboxideqt-qmlplugin"},{"binary_version":"1.12.5-0ubuntu0.14.04.1","binary_name":"liboxideqtcore0"},{"binary_version":"1.12.5-0ubuntu0.14.04.1","binary_name":"liboxideqtquick0"},{"binary_version":"1.12.5-0ubuntu0.14.04.1","binary_name":"oxideqmlscene"},{"binary_version":"1.12.5-0ubuntu0.14.04.1","binary_name":"oxideqt-chromedriver"},{"binary_version":"1.12.5-0ubuntu0.14.04.1","binary_name":"oxideqt-codecs"},{"binary_version":"1.12.5-0ubuntu0.14.04.1","binary_name":"oxideqt-codecs-extra"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2016-1612","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1614","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1617","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1618","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1620","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-2051","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-2052","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2877-1.json"}}],"schema_version":"1.7.3"}