Jump to content

Advisories MDVSA-2009:152: pulseaudio


paul
 Share

Recommended Posts

A vulnerability has been found and corrected in pulseaudio:

 

Tavis Ormandy and Julien Tinnes of the Google Security Team discovered

that pulseaudio, when installed setuid root, does not drop privileges

before re-executing itself to achieve immediate bindings. This can

be exploited by a user who has write access to any directory on the

file system containing /usr/bin to gain local root access. The user

needs to exploit a race condition related to creating a hard link

(CVE-2009-1894).

 

This update provides fixes for this vulnerability.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...