First published: Tue Jul 07 2009(Updated: )
Tavis Ormandy and Julien Tinnes, Google Security Team, discovered a flaw in the pulseaudio, that allows local users to escalate their privileges to root, if pulseaudio is installed as setuid. When pulseaudio is built on Linux system with compiler optimization enabled, it tries to re-exec itself with LD_BIND_NOW environment variable set to 1. <a href="http://git.0pointer.de/?p=pulseaudio.git;a=blob;f=src/daemon/main.c;h=b58bb379#l403">http://git.0pointer.de/?p=pulseaudio.git;a=blob;f=src/daemon/main.c;h=b58bb379#l403</a> This happens before root privileges are dropped. Command to execute is extracted from /proc. This way is prone to race condition and can allow local user to execute different command with root privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
PulseAudio |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-510071 is critical due to the potential for local privilege escalation to root.
To fix REDHAT-BUG-510071, it is recommended to disable setuid for pulseaudio or to apply any available patches from the vendor.
Local users on systems where pulseaudio is installed with setuid permissions are affected by REDHAT-BUG-510071.
All versions of pulseaudio that are built with setuid permissions are impacted by REDHAT-BUG-510071.
Linux systems with pulseaudio installed as setuid are likely to be affected by REDHAT-BUG-510071.