[ASA-201910-13] pacman: arbitrary command execution
Arch Linux Security Advisory ASA-201910-13 ========================================== Severity: High Date : 2019-10-23 CVE-ID : CVE-2019-18182 CVE-2019-18183 Package : pacman Type : arbitrary command execution Remote : Yes Link : https://security.archlinux.org/AVG-1049 Summary ======= The package pacman before version 5.2.0-1 is vulnerable to arbitrary command execution. Resolution ========== Upgrade to 5.2.0-1. # pacman -Syu "pacman>=5.2.0-1" The problems have been fixed upstream in version 5.2.0. Workaround ========== For CVE-2019-18182: Ensure `XferCommand` is commented out in `/etc/pacman.conf` For CVE-2019-18183: Ensure `UseDelta` is commented out in `/etc/pacman.conf` Description =========== - CVE-2019-18182 (arbitrary command execution) pacman before 5.2 is vulnerable to arbitrary command injection in src/pacman/conf.c in the download_with_xfercommand() function. This can be exploited when unsigned databases are used. To exploit the vulnerability, the user must enable a non-default XferCommand and retrieve an attacker-controlled crafted database and package. - CVE-2019-18183 (arbitrary command execution) pacman before 5.2 is vulnerable to arbitrary command injection in lib/libalpm/sync.c in the apply_deltas() function. This can be exploited when unsigned databases are used. To exploit the vulnerability, the user must enable the non-default delta feature and retrieve an attacker-controlled crafted database and delta file. Impact ====== A remote attacker is able to execute arbitrary commands on the host with a specially crafted database and a package or delta file. References ========== https://git.archlinux.org/pacman.git/tree/src/pacman/conf.c?h=v5.1.3#n263 https://git.archlinux.org/pacman.git/commit/?id=808a4f15ce82d2ed7eeb06de73d0... https://git.archlinux.org/pacman.git/tree/lib/libalpm/sync.c?h=v5.1.3#n767 https://git.archlinux.org/pacman.git/commit/?id=c0e9be7973be6c81b22fde91516f... https://security.archlinux.org/CVE-2019-18182 https://security.archlinux.org/CVE-2019-18183
participants (1)
-
Morten Linderud