ASA-201911-3 log generated external raw

[ASA-201911-3] glibc: information disclosure
Arch Linux Security Advisory ASA-201911-3 ========================================= Severity: High Date : 2019-11-03 CVE-ID : CVE-2019-9169 Package : glibc Type : information disclosure Remote : No Link : Summary ======= The package glibc before version 2.30-1 is vulnerable to information disclosure. Resolution ========== Upgrade to 2.30-1. # pacman -Syu "glibc>=2.30-1" The problem has been fixed upstream in version 2.30. Workaround ========== None. Description =========== In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match. Impact ====== An attacker is able to use malicious regular expressions to get access to sensitive information. References ==========;a=commitdiff;h=583dd860d5b833037175247230a328f0050dbfe9