ASA-201908-19 log generated external raw

[ASA-201908-19] pigeonhole: arbitrary code execution
Arch Linux Security Advisory ASA-201908-19 ========================================== Severity: Critical Date : 2019-08-28 CVE-ID : CVE-2019-11500 Package : pigeonhole Type : arbitrary code execution Remote : Yes Link : Summary ======= The package pigeonhole before version is vulnerable to arbitrary code execution. Resolution ========== Upgrade to # pacman -Syu "pigeonhole>=" The problem has been fixed upstream in version Workaround ========== None. Description =========== IMAP and ManageSieve protocol parsers in Dovecot before and Pigeonhole before do not properly handle NUL byte when scanning data in quoted strings, leading to out of bounds heap memory writes. Impact ====== A remote, unauthenticated attacker can access sensitive information or execute arbitrary code on the affected host via a crafted ManageSieve command. References ==========