ASA-201902-27 generated external raw

[ASA-201902-27] elasticsearch: privilege escalation
Arch Linux Security Advisory ASA-201902-27 ========================================== Severity: High Date : 2019-02-25 CVE-ID : CVE-2019-7611 Package : elasticsearch Type : privilege escalation Remote : Yes Link : https://security.archlinux.org/AVG-912 Summary ======= The package <a href="/package/elasticsearch">elasticsearch</a> before version 6.6.1-1 is vulnerable to privilege escalation. Resolution ========== Upgrade to 6.6.1-1. # pacman -Syu "elasticsearch>=6.6.1-1" The problem has been fixed upstream in version 6.6.1. Workaround ========== None. Description =========== A permission issue was found in <a href="/package/elasticsearch">Elasticsearch</a> when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index. Impact ====== An authenticated remote user can gain additional privileges on a index. References ========== https://discuss.elastic.co/t/elastic-stack-6-6-1-and-5-6-15-security-update/169077 https://security.archlinux.org/CVE-2019-7611