ASA-202106-13 log generated external raw

[ASA-202106-13] zint: arbitrary code execution
Arch Linux Security Advisory ASA-202106-13 ========================================== Severity: Medium Date : 2021-06-01 CVE-ID : CVE-2021-27799 Package : zint Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-1625 Summary ======= The package zint before version 2.9.1-2 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 2.9.1-2. # pacman -Syu "zint>=2.9.1-2" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.9.1 has a stack-based buffer overflow that is reachable from the C API through an application that includes the Zint Barcode Generator library code. Impact ====== An attacker could execute arbitrary code by supplying crafted input to generate an EAN barcode. References ========== https://bugs.archlinux.org/task/70051 https://sourceforge.net/p/zint/tickets/218/ https://sourceforge.net/p/zint/code/ci/7f8c8114f31c09a986597e0ba63a49f96150368a/ https://security.archlinux.org/CVE-2021-27799