Secunia Security Advisory - Debian has issued an update for common-lisp-controller. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.
ee2e5f6fa90ddae43f2942a8ad2e866608cdcb3ab9d701b05d83f607f62609b4
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
https://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Debian update for common-lisp-controller
SECUNIA ADVISORY ID:
SA16823
VERIFY ADVISORY:
https://secunia.com/advisories/16823/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
Debian GNU/Linux 3.1
https://secunia.com/product/5307/
Debian GNU/Linux unstable alias sid
https://secunia.com/product/530/
DESCRIPTION:
Debian has issued an update for common-lisp-controller. This fixes a
vulnerability, which can be exploited by malicious, local users to
gain escalated privileges.
For more information:
SA16822
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 3.1 alias sarge --
Source archives:
https://security.debian.org/pool/updates/main/c/common-lisp-controller/common-lisp-controller_4.15sarge2.dsc
Size/MD5 checksum: 599 bcb4fb7eb8c11f08446b6e4105f2a822
https://security.debian.org/pool/updates/main/c/common-lisp-controller/common-lisp-controller_4.15sarge2.tar.gz
Size/MD5 checksum: 25058 cdcdf88a0ff8e5bf836769d623e25638
Architecture independent components:
https://security.debian.org/pool/updates/main/c/common-lisp-controller/common-lisp-controller_4.15sarge2_all.deb
Size/MD5 checksum: 24090 156cd8800e862992ff0feed5d8f59a47
-- Debian GNU/Linux unstable alias sid --
Fixed in version 4.18.
OTHER REFERENCES:
SA16822:
https://secunia.com/advisories/16822/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------