Arch Linux 804 Published by

The following two security updates are available for Arch Linux:

ASA-201902-21: python-mysql-connector: authentication bypass
ASA-201902-22: msmtp: certificate verification bypass



ASA-201902-21: python-mysql-connector: authentication bypass

Arch Linux Security Advisory ASA-201902-21
==========================================

Severity: High
Date : 2019-02-17
CVE-ID : CVE-2019-2435
Package : python-mysql-connector
Type : authentication bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-898

Summary
=======

The package python-mysql-connector before version 8.0.15-1 is
vulnerable to authentication bypass.

Resolution
==========

Upgrade to 8.0.15-1.

# pacman -Syu "python-mysql-connector>=8.0.15-1"

The problem has been fixed upstream in version 8.0.15.

Workaround
==========

None.

Description
===========

A flaw was found in mysql-connector prior to version 8.0.13.
Unauthenticated attacker with network access via TLS could compromise
MySQL Connectors. Successful attacks require human interaction from a
person other than the attacker and can result in unauthorized creation,
deletion or modification access to critical data.

Impact
======

An unauthenticated attacker could serve malicious TLS traffic and
bypass authentication.

References
==========

https://bugs.archlinux.org/task/61758
https://github.com/mysql/mysql-connector-python/commit/069bc6737dd13b7f3a41d7fc23b789b659d8e205
https://security.netapp.com/advisory/ntap-20190118-0002/
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://security.archlinux.org/CVE-2019-2435


ASA-201902-22: msmtp: certificate verification bypass

Arch Linux Security Advisory ASA-201902-22
==========================================

Severity: High
Date : 2019-02-17
CVE-ID : CVE-2019-8337
Package : msmtp
Type : certificate verification bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-905

Summary
=======

The package msmtp before version 1.8.3-1 is vulnerable to certificate
verification bypass.

Resolution
==========

Upgrade to 1.8.3-1.

# pacman -Syu "msmtp>=1.8.3-1"

The problem has been fixed upstream in version 1.8.3.

Workaround
==========

None.

Description
===========

In msmtp 1.8.2, when tls_trust_file has its default configuration,
certificate-verification results are not properly checked.

Impact
======

The default configuration would omit certification verification.

References
==========

https://marlam.de/msmtp/news/
https://gitlab.marlam.de/marlam/msmtp/commit/a81d0a5126304f9f8b29a75d058044dc67d07663
https://security.archlinux.org/CVE-2019-8337