It was discovered that a race condition in beep (if configured as setuid via debconf) allows local privilege escalation. For the oldstable distribution (jessie), this problem has been fixed in version 1.3-3+deb8u1. For the stable distribution (stretch), this problem has been fixed in version 1.3-4+deb9u1. We recommend that you upgrade your beep packages. For the detailed security status of beep please refer to its security tracker page at: https://security-tracker.debian.org/tracker/beep
It was discovered that a race condition in beep (if configured as setuid via debconf) allows local privilege escalation.
For the oldstable distribution (jessie), this problem has been fixed in version 1.3-3+deb8u1.
For the stable distribution (stretch), this problem has been fixed in version 1.3-4+deb9u1.
We recommend that you upgrade your beep packages.
For the detailed security status of beep please refer to its security tracker page at: https://security-tracker.debian.org/tracker/beep