Arch Linux 811 Published by

Updated Thunderbird and Chromium packages has been released for Arch Linux:

ASA-201906-10: thunderbird: multiple issues
ASA-201906-11: chromium: arbitrary code execution



ASA-201906-10: thunderbird: multiple issues


Arch Linux Security Advisory ASA-201906-10
==========================================

Severity: High
Date : 2019-06-14
CVE-ID : CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706
Package : thunderbird
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-980

Summary
=======

The package thunderbird before version 60.7.1-1 is vulnerable to
multiple issues including arbitrary code execution and denial of
service.

Resolution
==========

Upgrade to 60.7.1-1.

# pacman -Syu "thunderbird>=60.7.1-1"

The problems have been fixed upstream in version 60.7.1.

Workaround
==========

None.

Description
===========

- CVE-2019-11703 (arbitrary code execution)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in parser_get_next_char when processing certain
email messages, resulting in a potentially exploitable crash.

- CVE-2019-11704 (arbitrary code execution)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
heap buffer overflow in icalmemory_strdup_and_dequote when processing
certain email messages, resulting in a potentially exploitable crash.

- CVE-2019-11705 (arbitrary code execution)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
stack buffer overflow in icalrecur_add_bydayrules when processing
certain email messages, resulting in a potentially exploitable crash.

- CVE-2019-11706 (denial of service)

A flaw in Thunderbird's implementation of iCal before 60.7.1 causes a
type confusion in icaltimezone_get_vtimezone_properties when processing
certain email messages, resulting in a crash.

Impact
======

A remote attacker can crash thunderbird or execute arbitrary code on
the affected host via a crafted email message.

References
==========

https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11703
https://bugzilla.mozilla.org/show_bug.cgi?id=1553820
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11704
https://bugzilla.mozilla.org/show_bug.cgi?id=1553814
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11705
https://bugzilla.mozilla.org/show_bug.cgi?id=1553808
https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/#CVE-2019-11706
https://security.archlinux.org/CVE-2019-11703
https://security.archlinux.org/CVE-2019-11704
https://security.archlinux.org/CVE-2019-11705
https://security.archlinux.org/CVE-2019-11706


--pQnIIhdWEtn6IrJVwRue7hPVF6eVFBv15--


ASA-201906-11: chromium: arbitrary code execution


Arch Linux Security Advisory ASA-201906-11
==========================================

Severity: High
Date : 2019-06-14
CVE-ID : CVE-2019-5842
Package : chromium
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-981

Summary
=======

The package chromium before version 75.0.3770.90-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 75.0.3770.90-1.

# pacman -Syu "chromium>=75.0.3770.90-1"

The problem has been fixed upstream in version 75.0.3770.90.

Workaround
==========

None.

Description
===========

A use-after-free vulnerability has been found in the Blink component of
the chromium browser before 75.0.3770.90.

Impact
======

A remote attacker might be able to execute arbitrary code on the
affected host.

References
==========

https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop_13.html
https://crbug.com/961413
https://security.archlinux.org/CVE-2019-5842