ASA-202107-40 log generated external raw

[ASA-202107-40] openvswitch: arbitrary code execution
Arch Linux Security Advisory ASA-202107-40 ========================================== Severity: Medium Date : 2021-07-20 CVE-ID : CVE-2021-36980 Package : openvswitch Type : arbitrary code execution Remote : No Link : Summary ======= The package openvswitch before version 2.15.1-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 2.15.1-1. # pacman -Syu "openvswitch>=2.15.1-1" The problem has been fixed upstream in version 2.15.1. Workaround ========== None. Description =========== Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after- free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action. Impact ====== An attacker could execute arbitrary code through crafted Open vSwitch Actions. References ==========