what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-171

Mandriva Linux Security Advisory 2009-171
Posted Jul 28, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-171 - Tavis Ormandy and Julien Tinnes of the Google Security Team discovered that pulseaudio, when installed setuid root, does not drop privileges before re-executing itself to achieve immediate bindings. This can be exploited by a user who has write access to any directory on the file system containing /usr/bin to gain local root access. The user needs to exploit a race condition related to creating a hard link. This update provides fixes for this vulnerability.

tags | advisory, local, root
systems | linux, mandriva
advisories | CVE-2009-1894
SHA-256 | 849044bfba62baf25c7bf418a0814ff3799bad71d9160681d6e575fa4b939f3e

Mandriva Linux Security Advisory 2009-171

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:171
http://www.mandriva.com/security/
_______________________________________________________________________

Package : pulseaudio
Date : July 28, 2009
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in pulseaudio:

Tavis Ormandy and Julien Tinnes of the Google Security Team discovered
that pulseaudio, when installed setuid root, does not drop privileges
before re-executing itself to achieve immediate bindings. This can
be exploited by a user who has write access to any directory on the
file system containing /usr/bin to gain local root access. The user
needs to exploit a race condition related to creating a hard link
(CVE-2009-1894).

This update provides fixes for this vulnerability.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1894
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
35263da527d3c116f4ee3b4c8d731aff mes5/i586/libpulseaudio0-0.9.10-11.2mdvmes5.i586.rpm
a59af74d922905188fdf4ea178932dce mes5/i586/libpulseaudio-devel-0.9.10-11.2mdvmes5.i586.rpm
f7d6650755863d585ba8c6abea12abcf mes5/i586/libpulsecore5-0.9.10-11.2mdvmes5.i586.rpm
8144b5ede76f077807b9d9098edc8a3f mes5/i586/libpulseglib20-0.9.10-11.2mdvmes5.i586.rpm
5a3caa0bde6750f2f9ab0c2f85364efd mes5/i586/libpulsezeroconf0-0.9.10-11.2mdvmes5.i586.rpm
5c390e77f1af097d842fa40ae624e11c mes5/i586/pulseaudio-0.9.10-11.2mdvmes5.i586.rpm
7f3d1edcfb4b94fde8492a66f6b4c128 mes5/i586/pulseaudio-esound-compat-0.9.10-11.2mdvmes5.i586.rpm
8076ecc212249f68c12ac52a0678562d mes5/i586/pulseaudio-module-bluetooth-0.9.10-11.2mdvmes5.i586.rpm
0b7509c4e072ffbc14bb8587b0b71005 mes5/i586/pulseaudio-module-gconf-0.9.10-11.2mdvmes5.i586.rpm
03a187bcd569dcbb9746109f17b3f874 mes5/i586/pulseaudio-module-jack-0.9.10-11.2mdvmes5.i586.rpm
0b8b4b195cdf034935c6d3c2893c050a mes5/i586/pulseaudio-module-lirc-0.9.10-11.2mdvmes5.i586.rpm
f15e18927d01349322a68243461e8d96 mes5/i586/pulseaudio-module-x11-0.9.10-11.2mdvmes5.i586.rpm
690aa7991fd65543b7d66946e17a4e13 mes5/i586/pulseaudio-module-zeroconf-0.9.10-11.2mdvmes5.i586.rpm
1b5ef05e4d872714b3120928712cfa74 mes5/i586/pulseaudio-utils-0.9.10-11.2mdvmes5.i586.rpm
8dd24c52eddc3e726571e7744ca11fa1 mes5/SRPMS/pulseaudio-0.9.10-11.2mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
e523b867171192dcbebe665ca3a39879 mes5/x86_64/lib64pulseaudio0-0.9.10-11.2mdvmes5.x86_64.rpm
b4a9a98a88f012e6d4fe1e4f9641ba72 mes5/x86_64/lib64pulseaudio-devel-0.9.10-11.2mdvmes5.x86_64.rpm
00b5d21e69f9a1a381eaa5e270135400 mes5/x86_64/lib64pulsecore5-0.9.10-11.2mdvmes5.x86_64.rpm
529cd0903d2834f430dfbddfa1ae4518 mes5/x86_64/lib64pulseglib20-0.9.10-11.2mdvmes5.x86_64.rpm
20cb6eb254ceefd42bc3a2b9cf99b5c4 mes5/x86_64/lib64pulsezeroconf0-0.9.10-11.2mdvmes5.x86_64.rpm
d381b7945a67a740ca386b44375fac7a mes5/x86_64/pulseaudio-0.9.10-11.2mdvmes5.x86_64.rpm
0534b9d40644a689a6c9d2804dc33d0a mes5/x86_64/pulseaudio-esound-compat-0.9.10-11.2mdvmes5.x86_64.rpm
69dc0286ad6d48709afa6b89cd77d372 mes5/x86_64/pulseaudio-module-bluetooth-0.9.10-11.2mdvmes5.x86_64.rpm
6498bc00b71e2108511e9e9869f8cbb0 mes5/x86_64/pulseaudio-module-gconf-0.9.10-11.2mdvmes5.x86_64.rpm
ac05f2c0583ffd90998547f9fcf6c694 mes5/x86_64/pulseaudio-module-jack-0.9.10-11.2mdvmes5.x86_64.rpm
ce28fc14459e5acd902ba47376337c58 mes5/x86_64/pulseaudio-module-lirc-0.9.10-11.2mdvmes5.x86_64.rpm
4365ea42d1984105dc7be39ba7e9188f mes5/x86_64/pulseaudio-module-x11-0.9.10-11.2mdvmes5.x86_64.rpm
ff98c415fa77bd333aa5e6b5b456a916 mes5/x86_64/pulseaudio-module-zeroconf-0.9.10-11.2mdvmes5.x86_64.rpm
09e2752435aa07c91f548a3f9ccdb1dc mes5/x86_64/pulseaudio-utils-0.9.10-11.2mdvmes5.x86_64.rpm
8dd24c52eddc3e726571e7744ca11fa1 mes5/SRPMS/pulseaudio-0.9.10-11.2mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKb1ehmqjQ0CJFipgRAnhxAJwJRZVaVoGUpytAgHBEhDwDTQ5rHACfa/zF
EzVO7WfiwvN2ARCO33wm3Po=
=V82S
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close