ASA-201902-27 log generated external raw

[ASA-201902-27] elasticsearch: privilege escalation
Arch Linux Security Advisory ASA-201902-27 ========================================== Severity: High Date : 2019-02-25 CVE-ID : CVE-2019-7611 Package : elasticsearch Type : privilege escalation Remote : Yes Link : Summary ======= The package elasticsearch before version 6.6.1-1 is vulnerable to privilege escalation. Resolution ========== Upgrade to 6.6.1-1. # pacman -Syu "elasticsearch>=6.6.1-1" The problem has been fixed upstream in version 6.6.1. Workaround ========== None. Description =========== A permission issue was found in Elasticsearch when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index. Impact ====== An authenticated remote user can gain additional privileges on a index. References ==========