Updated Thunderbird and Chromium packages has been released for Arch Linux:
ASA-201906-10: thunderbird: multiple issues
ASA-201906-11: chromium: arbitrary code execution
ASA-201906-10: thunderbird: multiple issues
ASA-201906-11: chromium: arbitrary code execution
ASA-201906-10: thunderbird: multiple issues
Arch Linux Security Advisory ASA-201906-10
==========================================
Severity: High
Date : 2019-06-14
CVE-ID : CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-980
Summary
=======
The package thunderbird before version 60.7.1-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.
Resolution
==========
Upgrade to 60.7.1-1.
# pacman -Syu "thunderbird>=60.7.1-1"
The problems have been fixed upstream in version 60.7.1.
Workaround
==========
None.
Description
===========
- CVE-2019-11703 (arbitrary code execution)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in parser_get_next_char when processing certain
email messages, resulting in a potentially exploitable crash.
- CVE-2019-11704 (arbitrary code execution)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in icalmemory_strdup_and_dequote when processing
certain email messages, resulting in a potentially exploitable crash.
- CVE-2019-11705 (arbitrary code execution)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
stack buffer overflow in icalrecur_add_bydayrules when processing
certain email messages, resulting in a potentially exploitable crash.
- CVE-2019-11706 (denial of service)
A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
type confusion in icaltimezone_get_vtimezone_properties when processing
certain email messages, resulting in a crash.
Impact
======
A remote attacker can crash thunderbird or execute arbitrary code on
the affected host via a crafted email message.
References
==========
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11703
https://bugzilla.mozilla.org/show_bug.cgi?id=1553820
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11704
https://bugzilla.mozilla.org/show_bug.cgi?id=1553814
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11705
https://bugzilla.mozilla.org/show_bug.cgi?id=1553808
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11706
https://security.archlinux.org/CVE-2019-11703
https://security.archlinux.org/CVE-2019-11704
https://security.archlinux.org/CVE-2019-11705
https://security.archlinux.org/CVE-2019-11706
--pQnIIhdWEtn6IrJVwRue7hPVF6eVFBv15--
ASA-201906-11: chromium: arbitrary code execution
Arch Linux Security Advisory ASA-201906-11
==========================================
Severity: High
Date : 2019-06-14
CVE-ID : CVE-2019-5842
Package : chromium
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-981
Summary
=======
The package chromium before version 75.0.3770.90-1 is vulnerable to
arbitrary code execution.
Resolution
==========
Upgrade to 75.0.3770.90-1.
# pacman -Syu "chromium>=75.0.3770.90-1"
The problem has been fixed upstream in version 75.0.3770.90.
Workaround
==========
None.
Description
===========
A use-after-free vulnerability has been found in the Blink component of
the chromium browser before 75.0.3770.90.
Impact
======
A remote attacker might be able to execute arbitrary code on the
affected host.
References
==========
https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop_13.html
https://crbug.com/961413
https://security.archlinux.org/CVE-2019-5842