summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-201805-15.xml
diff options
context:
space:
mode:
Diffstat (limited to 'metadata/glsa/glsa-201805-15.xml')
-rw-r--r--metadata/glsa/glsa-201805-15.xml44
1 files changed, 0 insertions, 44 deletions
diff --git a/metadata/glsa/glsa-201805-15.xml b/metadata/glsa/glsa-201805-15.xml
deleted file mode 100644
index f6d2e91d83e2..000000000000
--- a/metadata/glsa/glsa-201805-15.xml
+++ /dev/null
@@ -1,44 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
-<glsa id="201805-15">
- <title>beep: Local privilege escalation </title>
- <synopsis>A vulnerability in beep could allow local attackers to escalate
- privileges.
- </synopsis>
- <product type="ebuild">beep</product>
- <announced>2018-05-30</announced>
- <revised count="1">2018-05-30</revised>
- <bug>652330</bug>
- <access>remote</access>
- <affected>
- <package name="app-misc/beep" auto="yes" arch="*">
- <unaffected range="ge">1.3-r3</unaffected>
- <vulnerable range="lt">1.3-r3</vulnerable>
- </package>
- </affected>
- <background>
- <p>The advanced PC speaker beeper.</p>
- </background>
- <description>
- <p>A race condition, if setuid, was discovered in beep.</p>
- </description>
- <impact type="normal">
- <p>A local attacker could escalate privileges.</p>
- </impact>
- <workaround>
- <p>There is no known workaround at this time.</p>
- </workaround>
- <resolution>
- <p>All beep users should upgrade to the latest version:</p>
-
- <code>
- # emerge --sync
- # emerge --ask --oneshot --verbose "&gt;=app-misc/beep-1.3-r3"
- </code>
- </resolution>
- <references>
- <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-0492">CVE-2018-0492</uri>
- </references>
- <metadata tag="requester" timestamp="2018-05-28T02:25:00Z">b-man</metadata>
- <metadata tag="submitter" timestamp="2018-05-30T14:05:31Z">b-man</metadata>
-</glsa>