The following updates has been released for Arch Linux:
ASA-201806-3: krb5: insufficient validation
The package krb5 before version 1.16.1-1 is vulnerable to insufficient validation.
ASA-201806-4: chromium: access restriction bypass
The package chromium before version 67.0.3396.79-1 is vulnerable to access restriction bypass.
ASA-201806-3: krb5: insufficient validation
The package krb5 before version 1.16.1-1 is vulnerable to insufficient validation.
ASA-201806-4: chromium: access restriction bypass
The package chromium before version 67.0.3396.79-1 is vulnerable to access restriction bypass.
ASA-201806-3: krb5: insufficient validation
Arch Linux Security Advisory ASA-201806-3
=========================================
Severity: Medium
Date : 2018-06-05
CVE-ID : CVE-2018-5729 CVE-2018-5730
Package : krb5
Type : insufficient validation
Remote : Yes
Link : https://security.archlinux.org/AVG-586
Summary
=======
The package krb5 before version 1.16.1-1 is vulnerable to insufficient
validation.
Resolution
==========
Upgrade to 1.16.1-1.
# pacman -Syu "krb5>=1.16.1-1"
The problems have been fixed upstream in version 1.16.1.
Workaround
==========
None.
Description
===========
- CVE-2018-5729 (insufficient validation)
A flaw was found in MIT krb5 1.6 or later, an authenticated kadmin user
with permission to add principals to an LDAP Kerberos database can
cause a null dereference in kadmind, or circumvent a DN container
check, by supplying tagged data intended to be internal to the database
module.
- CVE-2018-5730 (insufficient validation)
A flaw was found in MIT krb5 1.6 or later, an authenticated kadmin user
with permission to add principals to an LDAP Kerberos database can
circumvent a DN containership check by supplying both a "linkdn" and
"containerdn" database argument, or by supplying a DN string which is a
left extension of a container DN string but is not hierarchically
within the container DN.
Impact
======
An authenticated kadmin user can elevate privileges or crash the
application via a crafted DN.
References
==========
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
https://security.archlinux.org/CVE-2018-5729
https://security.archlinux.org/CVE-2018-5730
ASA-201806-4: chromium: access restriction bypass
Arch Linux Security Advisory ASA-201806-4
=========================================
Severity: High
Date : 2018-06-07
CVE-ID : CVE-2018-6148
Package : chromium
Type : access restriction bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-712
Summary
=======
The package chromium before version 67.0.3396.79-1 is vulnerable to
access restriction bypass.
Resolution
==========
Upgrade to 67.0.3396.79-1.
# pacman -Syu "chromium>=67.0.3396.79-1"
The problem has been fixed upstream in version 67.0.3396.79.
Workaround
==========
None.
Description
===========
An incorrect handling of CSP header has been found in chromium before
67.0.3396.79.
Impact
======
A remote attacker can bypass the content security policy.
References
==========
https://chromereleases.googleblog.com/2018/06/stable-channel-update-for-desktop.html
https://crbug.com/845961
https://security.archlinux.org/CVE-2018-6148