ASA-202102-39 log generated external raw

[ASA-202102-39] ipmitool: arbitrary code execution
Arch Linux Security Advisory ASA-202102-39 ========================================== Severity: High Date : 2021-02-27 CVE-ID : CVE-2020-5208 Package : ipmitool Type : arbitrary code execution Remote : Yes Link : Summary ======= The package ipmitool before version 1.8.18-7 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 1.8.18-7. # pacman -Syu "ipmitool>=1.8.18-7" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19. Impact ====== A remote server could execute arbitrary code on the client. References ==========