-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4163-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff April 02, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : beep CVE ID : CVE-2018-0492 It was discovered that a race condition in beep (if configured as setuid via debconf) allows local privilege escalation. For the oldstable distribution (jessie), this problem has been fixed in version 1.3-3+deb8u1. For the stable distribution (stretch), this problem has been fixed in version 1.3-4+deb9u1. We recommend that you upgrade your beep packages. For the detailed security status of beep please refer to its security tracker page at: https://security-tracker.debian.org/tracker/beep Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlrCkpwACgkQEMKTtsN8 Tja78w/9G6gZCATTs7j0iPc8lSXK9b+4THFvzcpgu4LWHkr7BRMbOutRaUcNX8Qu qEvCN6Favnv9BSC2kyULh6qSY6cPn76UvjsNiM6gvzfHsqB480ITpvYfMnjQqZs5 EG7fhbT7RdBk15kbnvQbeQWHM9aa6WqxkoDa4pUMw9+C9ARdUrq5dD0dXdqpRo/I OFj7pj0rEpsg9VIR0DapOjaGmZ6ghwMdNYvbx9tEE4/JudmTQoNEZZTtYAjRNvhA bLUgNYwInByNFoPLyNHeXWwXE5V2nGueS6MGcRKcoWm132ulESBqzRz9goqlmw4c /6zMdGLjV3n0NsQ2t6BaCy5e3SgVKdfmuiDsSh/9z9qjILfvJecnh8WKzIvO4jOj mE1rJ9MKZ4zTHmfaqOHVo4/bYG8BibvIgaKX3TTaKWi6znIjf1GqMxEW/pnDgCv5 U3iNHiPzOMB71iP/LBWeZAf4Fm/m22qL3VvwktgtVrbNXsG0jG4h4ygB5ayMnOPy 26NH2X/4/5zB9fQj3i/9saYrkUtRAZDeD2DpRxCsAL9GpN+KONvY4UyydUNgbZoA 8zbAPxHzszRtVvWEE8wSzBgMvqc3y2QCSJG7/yShKr5GlZxm8NJ0wWyHvppdGAcT Trwrt0KRoEyplTdE2oJM61BUeWPR5cpG308Xj6+cOUwhCRPDHdw= =lQ2g -----END PGP SIGNATURE-----