The following security advisories has been published for Arch Linux:
ASA-201805-1: powerdns: arbitrary code execution
ASA-201805-2: libraw: multiple issues
ASA-201805-3: freetype2: denial of service
ASA-201805-1: powerdns: arbitrary code execution
ASA-201805-2: libraw: multiple issues
ASA-201805-3: freetype2: denial of service
ASA-201805-1: powerdns: arbitrary code execution
Arch Linux Security Advisory ASA-201805-1
=========================================
Severity: High
Date : 2018-05-09
CVE-ID : CVE-2018-1046
Package : powerdns
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-686
Summary
=======
The package powerdns before version 4.1.2-1 is vulnerable to arbitrary
code execution.
Resolution
==========
Upgrade to 4.1.2-1.
# pacman -Syu "powerdns>=4.1.2-1"
The problem has been fixed upstream in version 4.1.2.
Workaround
==========
None.
Description
===========
An issue has been found in the dnsreplay tool provided with PowerDNS
Authoritative, where replaying a specially crafted PCAP file can
trigger a stack based buffer overflow, leading to a crash and
potentially arbitrary code execution. This buffer overflow only occurs
when the --ecs-stamp option of dnsreplay is used. Regardless of this
issue, the use of dnsreplay with untrusted PCAP files is not advised.
Impact
======
A local attacker is be able to cause a denial of service or execute
arbitrary code via a specially crafted PCAP file.
References
==========
https://marc.info/?l=oss-security&m=152585376901543
https://github.com/PowerDNS/pdns/commit/f9c57c98da1b1007a51680629b667d57d9b702b8
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-02.html
https://security.archlinux.org/CVE-2018-1046
ASA-201805-2: libraw: multiple issues
Arch Linux Security Advisory ASA-201805-2
=========================================
Severity: Critical
Date : 2018-05-09
CVE-ID : CVE-2018-10528 CVE-2018-10529
Package : libraw
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-681
Summary
=======
The package libraw before version 0.18.10-1 is vulnerable to multiple
issues including arbitrary code execution and information disclosure.
Resolution
==========
Upgrade to 0.18.10-1.
# pacman -Syu "libraw>=0.18.10-1"
The problems have been fixed upstream in version 0.18.10.
Workaround
==========
None.
Description
===========
- CVE-2018-10528 (arbitrary code execution)
A stack-based buffer overflow has been found in LibRaw before 0.18.10,
in the utf2char() function in libraw_cxx.cpp.
- CVE-2018-10529 (information disclosure)
An out-of-bounds read has been found in LibRaw before 0.18.10, in the
X3F property table list implementation in libraw_x3f.cpp and
libraw_cxx.cpp
Impact
======
A remote attacker is able to execute arbitrary code or disclose
information by providing a specially crafted file.
References
==========
https://bugs.archlinux.org/task/58393
https://github.com/LibRaw/LibRaw/issues/144
https://github.com/LibRaw/LibRaw/commit/895529fc2f2eb8bc633edd6b04b5b237eb4db564
https://github.com/LibRaw/LibRaw/commit/6f89e5505b1759b788f15cd14d0958b262b82f97
https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3
https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c
https://github.com/LibRaw/LibRaw/commit/6b08eae24034789b3543a1b66dd6af9c20230029
https://security.archlinux.org/CVE-2018-10528
https://security.archlinux.org/CVE-2018-10529
ASA-201805-3: freetype2: denial of service
Arch Linux Security Advisory ASA-201805-3
=========================================
Severity: Low
Date : 2018-05-09
CVE-ID : CVE-2018-6942
Package : freetype2
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-613
Summary
=======
The package freetype2 before version 2.9.1-1 is vulnerable to denial of
service.
Resolution
==========
Upgrade to 2.9.1-1.
# pacman -Syu "freetype2>=2.9.1-1"
The problem has been fixed upstream in version 2.9.1.
Workaround
==========
None.
Description
===========
An issue was discovered in FreeType 2 before 2.9.1. A NULL pointer
dereference in the Ins_GETVARIATION() function within ttinterp.c could
lead to denial of service via a crafted font file.
Impact
======
A remote attacker is able to cause a denial of service via a specially
crafted file.
References
==========
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5736
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef
https://security.archlinux.org/CVE-2018-6942