First published: Fri Dec 14 2007(Updated: )
The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/0.9.8 | <5. | 5. |
All of | ||
Any of | ||
=2007.1 | ||
=2007.1 | ||
=2008.0 | ||
=2008.0 | ||
=7 | ||
=8 | ||
Any of | ||
=0.9.6 | ||
=0.9.8 | ||
Mandrakesoft Mandrake Linux | =2007.1 | |
Mandrakesoft Mandrake Linux | =2007.1 | |
Mandrakesoft Mandrake Linux | =2008.0 | |
Mandrakesoft Mandrake Linux | =2008.0 | |
Redhat Fedora | =7 | |
Redhat Fedora | =8 | |
Pulseaudio Pulseaudio | =0.9.6 | |
Pulseaudio Pulseaudio | =0.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.