Arch Linux 811 Published by

The following security advisories has been published for Arch Linux:

ASA-201805-1: powerdns: arbitrary code execution
ASA-201805-2: libraw: multiple issues
ASA-201805-3: freetype2: denial of service



ASA-201805-1: powerdns: arbitrary code execution

Arch Linux Security Advisory ASA-201805-1
=========================================

Severity: High
Date : 2018-05-09
CVE-ID : CVE-2018-1046
Package : powerdns
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-686

Summary
=======

The package powerdns before version 4.1.2-1 is vulnerable to arbitrary
code execution.

Resolution
==========

Upgrade to 4.1.2-1.

# pacman -Syu "powerdns>=4.1.2-1"

The problem has been fixed upstream in version 4.1.2.

Workaround
==========

None.

Description
===========

An issue has been found in the dnsreplay tool provided with PowerDNS
Authoritative, where replaying a specially crafted PCAP file can
trigger a stack based buffer overflow, leading to a crash and
potentially arbitrary code execution. This buffer overflow only occurs
when the --ecs-stamp option of dnsreplay is used. Regardless of this
issue, the use of dnsreplay with untrusted PCAP files is not advised.

Impact
======

A local attacker is be able to cause a denial of service or execute
arbitrary code via a specially crafted PCAP file.

References
==========

https://marc.info/?l=oss-security&m=152585376901543
https://github.com/PowerDNS/pdns/commit/f9c57c98da1b1007a51680629b667d57d9b702b8
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-02.html
https://security.archlinux.org/CVE-2018-1046


ASA-201805-2: libraw: multiple issues

Arch Linux Security Advisory ASA-201805-2
=========================================

Severity: Critical
Date : 2018-05-09
CVE-ID : CVE-2018-10528 CVE-2018-10529
Package : libraw
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-681

Summary
=======

The package libraw before version 0.18.10-1 is vulnerable to multiple
issues including arbitrary code execution and information disclosure.

Resolution
==========

Upgrade to 0.18.10-1.

# pacman -Syu "libraw>=0.18.10-1"

The problems have been fixed upstream in version 0.18.10.

Workaround
==========

None.

Description
===========

- CVE-2018-10528 (arbitrary code execution)

A stack-based buffer overflow has been found in LibRaw before 0.18.10,
in the utf2char() function in libraw_cxx.cpp.

- CVE-2018-10529 (information disclosure)

An out-of-bounds read has been found in LibRaw before 0.18.10, in the
X3F property table list implementation in libraw_x3f.cpp and
libraw_cxx.cpp

Impact
======

A remote attacker is able to execute arbitrary code or disclose
information by providing a specially crafted file.

References
==========

https://bugs.archlinux.org/task/58393
https://github.com/LibRaw/LibRaw/issues/144
https://github.com/LibRaw/LibRaw/commit/895529fc2f2eb8bc633edd6b04b5b237eb4db564
https://github.com/LibRaw/LibRaw/commit/6f89e5505b1759b788f15cd14d0958b262b82f97
https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396266a7607069901657c082e3
https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a5f69be2d0d4f250af6b1a6c
https://github.com/LibRaw/LibRaw/commit/6b08eae24034789b3543a1b66dd6af9c20230029
https://security.archlinux.org/CVE-2018-10528
https://security.archlinux.org/CVE-2018-10529


ASA-201805-3: freetype2: denial of service

Arch Linux Security Advisory ASA-201805-3
=========================================

Severity: Low
Date : 2018-05-09
CVE-ID : CVE-2018-6942
Package : freetype2
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-613

Summary
=======

The package freetype2 before version 2.9.1-1 is vulnerable to denial of
service.

Resolution
==========

Upgrade to 2.9.1-1.

# pacman -Syu "freetype2>=2.9.1-1"

The problem has been fixed upstream in version 2.9.1.

Workaround
==========

None.

Description
===========

An issue was discovered in FreeType 2 before 2.9.1. A NULL pointer
dereference in the Ins_GETVARIATION() function within ttinterp.c could
lead to denial of service via a crafted font file.

Impact
======

A remote attacker is able to cause a denial of service via a specially
crafted file.

References
==========

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5736
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef
https://security.archlinux.org/CVE-2018-6942