ArchLinux: 201909-3: exim: arbitrary command execution
Summary
Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.
Resolution
Upgrade to 4.92.2-1.
# pacman -Syu "exim>=4.92.2-1"
The problem has been fixed upstream in version 4.92.2.
References
https://exim.org/static/doc/security/CVE-2019-15846.txt https://security.archlinux.org/CVE-2019-15846
Workaround
None.