{"id":"USN-3113-1","summary":"oxide-qt vulnerabilities","details":"It was discovered that a long running unload handler could cause an\nincognito profile to be reused in some circumstances. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information. (CVE-2016-1586)\n\nMultiple security vulnerabilities were discovered in Chromium. If a user\nwere tricked in to opening a specially crafted website, an attacker could\npotentially exploit these to conduct cross-site scripting (XSS) attacks,\nspoof an application's URL bar, obtain sensitive information, cause a\ndenial of service via application crash, or execute arbitrary code.\n(CVE-2016-5181, CVE-2016-5182, CVE-2016-5185, CVE-2016-5186,\nCVE-2016-5187, CVE-2016-5188, CVE-2016-5189, CVE-2016-5192, CVE-2016-5194)\n","modified":"2026-02-10T04:41:02Z","published":"2016-11-02T15:03:06Z","related":["UBUNTU-CVE-2016-1586","UBUNTU-CVE-2016-5181","UBUNTU-CVE-2016-5182","UBUNTU-CVE-2016-5185","UBUNTU-CVE-2016-5186","UBUNTU-CVE-2016-5187","UBUNTU-CVE-2016-5188","UBUNTU-CVE-2016-5189","UBUNTU-CVE-2016-5192","UBUNTU-CVE-2016-5194"],"upstream":["CVE-2016-1586","CVE-2016-5181","CVE-2016-5182","CVE-2016-5185","CVE-2016-5186","CVE-2016-5187","CVE-2016-5188","CVE-2016-5189","CVE-2016-5192","CVE-2016-5194","UBUNTU-CVE-2016-1586","UBUNTU-CVE-2016-5181","UBUNTU-CVE-2016-5182","UBUNTU-CVE-2016-5185","UBUNTU-CVE-2016-5186","UBUNTU-CVE-2016-5187","UBUNTU-CVE-2016-5188","UBUNTU-CVE-2016-5189","UBUNTU-CVE-2016-5192","UBUNTU-CVE-2016-5194"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3113-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1586"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5181"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5182"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5185"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5186"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5187"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5188"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5189"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5192"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-5194"}],"affected":[{"package":{"name":"oxide-qt","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/oxide-qt@1.18.3-0ubuntu0.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.18.3-0ubuntu0.14.04.1"}]}],"versions":["1.0.0~bzr437-0ubuntu1","1.0.0~bzr452-0ubuntu1","1.0.0~bzr475-0ubuntu1","1.0.0~bzr490-0ubuntu1","1.0.0~bzr501-0ubuntu1","1.0.0~bzr501-0ubuntu2","1.0.4-0ubuntu0.14.04.1","1.0.5-0ubuntu0.14.04.1","1.1.2-0ubuntu0.14.04.1","1.2.5-0ubuntu0.14.04.1","1.3.4-0ubuntu0.14.04.1","1.4.2-0ubuntu0.14.04.1","1.4.3-0ubuntu0.14.04.1","1.5.5-0ubuntu0.14.04.3","1.5.6-0ubuntu0.14.04.2","1.6.5-0ubuntu0.14.04.1","1.6.6-0ubuntu0.14.04.1","1.7.8-0ubuntu0.14.04.1","1.7.9-0ubuntu0.14.04.1","1.8.4-0ubuntu0.14.04.2","1.9.1-0ubuntu0.14.04.2","1.9.5-0ubuntu0.14.04.1","1.10.3-0ubuntu0.14.04.1","1.11.3-0ubuntu0.14.04.1","1.11.4-0ubuntu0.14.04.1","1.12.5-0ubuntu0.14.04.1","1.12.6-0ubuntu0.14.04.1","1.12.7-0ubuntu0.14.04.1","1.13.6-0ubuntu0.14.04.1","1.14.7-0ubuntu0.14.04.1","1.14.9-0ubuntu0.14.04.1","1.15.7-0ubuntu0.14.04.1","1.15.8-0ubuntu0.14.04.1","1.16.5-0ubuntu0.14.04.1","1.17.7-0ubuntu0.14.04.1","1.17.9-0ubuntu0.14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"liboxideqt-qmlplugin"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"liboxideqtcore-dev"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"liboxideqtcore0"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"liboxideqtquick-dev"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"liboxideqtquick0"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"oxideqmlscene"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"oxideqt-chromedriver"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"oxideqt-codecs"},{"binary_version":"1.18.3-0ubuntu0.14.04.1","binary_name":"oxideqt-codecs-extra"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2016-1586","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5181","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5182","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5185","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5186","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5187","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5188","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5189","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5192","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3113-1.json"}},{"package":{"name":"oxide-qt","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/oxide-qt@1.18.3-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.18.3-0ubuntu0.16.04.1"}]}],"versions":["1.9.5-0ubuntu1","1.10.3-0ubuntu0.15.10.1","1.10.3-0ubuntu0.15.10.2","1.11.3-0ubuntu3","1.11.4-0ubuntu1","1.11.5-0ubuntu1","1.12.5-0ubuntu1","1.12.6-0ubuntu1","1.12.7-0ubuntu1","1.13.6-0ubuntu1","1.14.7-0ubuntu1","1.14.9-0ubuntu0.16.04.1","1.15.7-0ubuntu0.16.04.1","1.15.8-0ubuntu0.16.04.1","1.16.5-0ubuntu0.16.04.1","1.17.7-0ubuntu0.16.04.1","1.17.9-0ubuntu0.16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.18.3-0ubuntu0.16.04.1","binary_name":"liboxideqt-qmlplugin"},{"binary_version":"1.18.3-0ubuntu0.16.04.1","binary_name":"liboxideqtcore-dev"},{"binary_version":"1.18.3-0ubuntu0.16.04.1","binary_name":"liboxideqtcore0"},{"binary_version":"1.18.3-0ubuntu0.16.04.1","binary_name":"liboxideqtquick-dev"},{"binary_version":"1.18.3-0ubuntu0.16.04.1","binary_name":"liboxideqtquick0"},{"binary_version":"1.18.3-0ubuntu0.16.04.1","binary_name":"oxideqt-codecs"},{"binary_version":"1.18.3-0ubuntu0.16.04.1","binary_name":"oxideqt-codecs-extra"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2016-1586","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5181","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5182","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5185","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5186","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5187","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5188","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5189","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5192","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-5194","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3113-1.json"}}],"schema_version":"1.7.3"}