Arch Linux 811 Published by

The following updates has been released for Arch Linux:

ASA-201904-10: libpng: denial of service
ASA-201904-11: openssh: multiple issues
ASA-201904-12: chromium: multiple issues



ASA-201904-10: libpng: denial of service


Arch Linux Security Advisory ASA-201904-10
==========================================

Severity: Low
Date : 2019-04-24
CVE-ID : CVE-2019-7317
Package : libpng
Type : denial of service
Remote : No
Link : https://security.archlinux.org/AVG-868

Summary
=======

The package libpng before version 1.6.37-1 is vulnerable to denial of
service.

Resolution
==========

Upgrade to 1.6.37-1.

# pacman -Syu "libpng>=1.6.37-1"

The problem has been fixed upstream in version 1.6.37.

Workaround
==========

None.

Description
===========

png_image_free in png.c in libpng 1.6.36 has a use-after-free because
png_image_free_function is called under png_safe_execute.

Impact
======

A remote attacker can crash an application using libpng via a crafted
image.

References
==========

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
https://github.com/glennrp/libpng/issues/275
https://security.archlinux.org/CVE-2019-7317

ASA-201904-11: openssh: multiple issues


Arch Linux Security Advisory ASA-201904-11
==========================================

Severity: High
Date : 2019-04-24
CVE-ID : CVE-2018-20685 CVE-2019-6109 CVE-2019-6111
Package : openssh
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-951

Summary
=======

The package openssh before version 8.0p1-1 is vulnerable to multiple
issues including insufficient validation, arbitrary file overwrite and
content spoofing.

Resolution
==========

Upgrade to 8.0p1-1.

# pacman -Syu "openssh>=8.0p1-1"

The problems have been fixed upstream in version 8.0p1.

Workaround
==========

None.

Description
===========

- CVE-2018-20685 (insufficient validation)

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to
bypass intended access restrictions via the filename of . or an empty
filename.

- CVE-2019-6109 (content spoofing)

An issue was discovered in OpenSSH 7.9. Due to missing character
encoding in the progress display, a malicious server (or Man-in-The-
Middle attacker) can employ crafted object names to manipulate the
client output, e.g., by using ANSI control codes to hide additional
files being transferred. This affects refresh_progress_meter() in
progressmeter.c.

- CVE-2019-6111 (arbitrary file overwrite)

An issue was discovered in OpenSSH 7.9. Due to the scp implementation
being derived from 1983 rcp, the server chooses which files/directories
are sent to the client. However, the scp client only performs cursory
validation of the object name returned (only directory traversal
attacks are prevented). A malicious scp server (or Man-in-The-Middle
attacker) can overwrite arbitrary files in the scp client target
directory. If recursive operation (-r) is performed, the server can
manipulate subdirectories as well (for example, to overwrite the
.ssh/authorized_keys file).

Impact
======

A malicious SCP server can overwrite arbitrary files in the scp client
target directory.

References
==========

https://www.openssh.com/txt/release-8.0
https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
https://github.com/openssh/openssh-portable/commit/8976f1c4b2721c26e878151f52bdf346dfe2d54c
https://github.com/openssh/openssh-portable/commit/391ffc4b9d31fa1f4ad566499fef9176ff8a07dc
https://security.archlinux.org/CVE-2018-20685
https://security.archlinux.org/CVE-2019-6109
https://security.archlinux.org/CVE-2019-6111


ASA-201904-12: chromium: multiple issues

Arch Linux Security Advisory ASA-201904-12
==========================================

Severity: Critical
Date : 2019-04-24
CVE-ID : CVE-2019-5805 CVE-2019-5806 CVE-2019-5807 CVE-2019-5808
CVE-2019-5809 CVE-2019-5810 CVE-2019-5811 CVE-2019-5813
CVE-2019-5814 CVE-2019-5815 CVE-2019-5818 CVE-2019-5819
CVE-2019-5820 CVE-2019-5821 CVE-2019-5822 CVE-2019-5823
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-952

Summary
=======

The package chromium before version 74.0.3729.108-1 is vulnerable to
multiple issues including arbitrary code execution, access restriction
bypass, information disclosure and insufficient validation.

Resolution
==========

Upgrade to 74.0.3729.108-1.

# pacman -Syu "chromium>=74.0.3729.108-1"

The problems have been fixed upstream in version 74.0.3729.108.

Workaround
==========

None.

Description
===========

- CVE-2019-5805 (arbitrary code execution)

A use-after-free vulnerability has been found in the PDFium component
of the chromium browser before 74.0.3729.108.

- CVE-2019-5806 (arbitrary code execution)

An integer overflow vulnerability has been found in the Andle component
of the chromium browser before 74.0.3729.108.

- CVE-2019-5807 (arbitrary code execution)

A memory corruption vulnerability has been found in the V8 component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5808 (arbitrary code execution)

A use-after-free vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5809 (arbitrary code execution)

A use-after-free vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5810 (information disclosure)

A user information disclosure vulnerability has been found in the
Autofill component of the chromium browser before 74.0.3729.108.

- CVE-2019-5811 (access restriction bypass)

A CORS bypass vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5813 (information disclosure)

An out-of-bounds read vulnerability has been found in the V8 component
of the chromium browser before 74.0.3729.108.

- CVE-2019-5814 (access restriction bypass)

A CORS bypass vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5815 (arbitrary code execution)

A heap-based buffer overflow vulnerability has been found in the Blink
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5818 (information disclosure)

An uninitialized value vulnerability has been found in the media reader
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5819 (insufficient validation)

An incorrect escaping vulnerability has been found in the developer
tools component of the chromium browser before 74.0.3729.108.

- CVE-2019-5820 (arbitrary code execution)

An integer overflow vulnerability has been found in the PDFium
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5821 (arbitrary code execution)

An integer overflow vulnerability has been found in the PDFium
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5822 (access restriction bypass)

A CORS bypass vulnerability has been found in the download manager
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5823 (access restriction bypass)

A forced navigation from service worker vulnerability has been found in
the chromium browser before 74.0.3729.108.

Impact
======

A remote attacker can access sensitive information, bypass security
measures and execute arbitrary code on the affected host.

References
==========

https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html
https://crbug.com/913320
https://crbug.com/943087
https://crbug.com/945644
https://crbug.com/947029
https://crbug.com/941008
https://crbug.com/916838
https://crbug.com/771815
https://crbug.com/942699
https://crbug.com/930057
https://crbug.com/930663
https://crbug.com/929962
https://crbug.com/919356
https://crbug.com/919635
https://crbug.com/919640
https://crbug.com/926105
https://security.archlinux.org/CVE-2019-5805
https://security.archlinux.org/CVE-2019-5806
https://security.archlinux.org/CVE-2019-5807
https://security.archlinux.org/CVE-2019-5808
https://security.archlinux.org/CVE-2019-5809
https://security.archlinux.org/CVE-2019-5810
https://security.archlinux.org/CVE-2019-5811
https://security.archlinux.org/CVE-2019-5813
https://security.archlinux.org/CVE-2019-5814
https://security.archlinux.org/CVE-2019-5815
https://security.archlinux.org/CVE-2019-5818
https://security.archlinux.org/CVE-2019-5819
https://security.archlinux.org/CVE-2019-5820
https://security.archlinux.org/CVE-2019-5821
https://security.archlinux.org/CVE-2019-5822
https://security.archlinux.org/CVE-2019-5823