The following two security updates are available for Arch Linux:
ASA-201902-21: python-mysql-connector: authentication bypass
ASA-201902-22: msmtp: certificate verification bypass
ASA-201902-21: python-mysql-connector: authentication bypass
ASA-201902-22: msmtp: certificate verification bypass
ASA-201902-21: python-mysql-connector: authentication bypass
Arch Linux Security Advisory ASA-201902-21
==========================================
Severity: High
Date : 2019-02-17
CVE-ID : CVE-2019-2435
Package : python-mysql-connector
Type : authentication bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-898
Summary
=======
The package python-mysql-connector before version 8.0.15-1 is
vulnerable to authentication bypass.
Resolution
==========
Upgrade to 8.0.15-1.
# pacman -Syu "python-mysql-connector>=8.0.15-1"
The problem has been fixed upstream in version 8.0.15.
Workaround
==========
None.
Description
===========
A flaw was found in mysql-connector prior to version 8.0.13.
Unauthenticated attacker with network access via TLS could compromise
MySQL Connectors. Successful attacks require human interaction from a
person other than the attacker and can result in unauthorized creation,
deletion or modification access to critical data.
Impact
======
An unauthenticated attacker could serve malicious TLS traffic and
bypass authentication.
References
==========
https://bugs.archlinux.org/task/61758
https://github.com/mysql/mysql-connector-python/commit/069bc6737dd13b7f3a41d7fc23b789b659d8e205
https://security.netapp.com/advisory/ntap-20190118-0002/
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://security.archlinux.org/CVE-2019-2435
ASA-201902-22: msmtp: certificate verification bypass
Arch Linux Security Advisory ASA-201902-22
==========================================
Severity: High
Date : 2019-02-17
CVE-ID : CVE-2019-8337
Package : msmtp
Type : certificate verification bypass
Remote : Yes
Link : https://security.archlinux.org/AVG-905
Summary
=======
The package msmtp before version 1.8.3-1 is vulnerable to certificate
verification bypass.
Resolution
==========
Upgrade to 1.8.3-1.
# pacman -Syu "msmtp>=1.8.3-1"
The problem has been fixed upstream in version 1.8.3.
Workaround
==========
None.
Description
===========
In msmtp 1.8.2, when tls_trust_file has its default configuration,
certificate-verification results are not properly checked.
Impact
======
The default configuration would omit certification verification.
References
==========
https://marlam.de/msmtp/news/
https://gitlab.marlam.de/marlam/msmtp/commit/a81d0a5126304f9f8b29a75d058044dc67d07663
https://security.archlinux.org/CVE-2019-8337