It was discovered that Chromium did not properly consider the scheme when determining whether a URL is associated with a WebUI SiteInstance. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass security restrictions. (CVE-2015-1266)
It was discovered that Blink did not properly restrict the creation context during creation of a DOM wrapper. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. (CVE-2015-1267, CVE-2015-1268)
It was discovered that Chromium did not properly canonicalize DNS hostnames before comparing to HSTS or HPKP preload entries. An attacker could potentially exploit this to bypass intended access restrictions. (CVE-2015-1269)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.7.9-0ubuntu0.14.04.1",
"binary_name": "liboxideqt-qmlplugin"
},
{
"binary_version": "1.7.9-0ubuntu0.14.04.1",
"binary_name": "liboxideqtcore0"
},
{
"binary_version": "1.7.9-0ubuntu0.14.04.1",
"binary_name": "liboxideqtquick0"
},
{
"binary_version": "1.7.9-0ubuntu0.14.04.1",
"binary_name": "oxideqmlscene"
},
{
"binary_version": "1.7.9-0ubuntu0.14.04.1",
"binary_name": "oxideqt-chromedriver"
},
{
"binary_version": "1.7.9-0ubuntu0.14.04.1",
"binary_name": "oxideqt-codecs"
},
{
"binary_version": "1.7.9-0ubuntu0.14.04.1",
"binary_name": "oxideqt-codecs-extra"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2652-1.json"
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"id": "CVE-2015-1266",
"severity": [
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2015-1267",
"severity": [
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2015-1268",
"severity": [
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2015-1269",
"severity": [
{
"score": "medium",
"type": "Ubuntu"
}
]
}
]
}