From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1MRRji-0001AO-SK for garchives@archives.gentoo.org; Thu, 16 Jul 2009 14:15:03 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 5C5B3E0592; Thu, 16 Jul 2009 14:15:02 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 21613E0592 for ; Thu, 16 Jul 2009 14:15:02 +0000 (UTC) Received: from stork.gentoo.org (stork.gentoo.org [64.127.104.133]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTP id CBA5267502 for ; Thu, 16 Jul 2009 14:15:01 +0000 (UTC) Received: from rbu by stork.gentoo.org with local (Exim 4.69) (envelope-from ) id 1MRRjh-0007Y3-4l for gentoo-commits@lists.gentoo.org; Thu, 16 Jul 2009 14:15:01 +0000 From: "Robert Buchholz (rbu)" To: gentoo-commits@lists.gentoo.org Reply-To: gentoo-dev@lists.gentoo.org, rbu@gentoo.org Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-200907-13.xml X-VCS-Repository: gentoo X-VCS-Files: glsa-200907-13.xml X-VCS-Directories: xml/htdocs/security/en/glsa X-VCS-Committer: rbu X-VCS-Committer-Name: Robert Buchholz Content-Type: text/plain; charset=utf8 Message-Id: Sender: Robert Buchholz Date: Thu, 16 Jul 2009 14:15:01 +0000 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: quoted-printable X-Archives-Salt: d4ed3f50-beb6-41ed-adc5-3568010e34ce X-Archives-Hash: bffcaeded8f7307c0f276b0086b96253 rbu 09/07/16 14:15:01 Added: glsa-200907-13.xml Log: GLSA 200907-13 Revision Changes Path 1.1 xml/htdocs/security/en/glsa/glsa-200907-13.xml file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en= /glsa/glsa-200907-13.xml?rev=3D1.1&view=3Dmarkup plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en= /glsa/glsa-200907-13.xml?rev=3D1.1&content-type=3Dtext/plain Index: glsa-200907-13.xml =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D PulseAudio: Local privilege escalation A vulnerability in PulseAudio may allow a local user to execute code = with escalated privileges. pulseaudio July 16, 2009 July 16, 2009: 01 276986 local 0.9.9-r54 0.9.9-r54

PulseAudio is a network-enabled sound server with an advanced plug-in system.

Tavis Ormandy and Julien Tinnes of the Google Security Team discovere= d that the pulseaudio binary is installed setuid root, and does not dro= p privileges before re-executing itself. The vulnerability has independently been reported to oCERT by Yorick Koster.

A local user who has write access to any directory on the file system containing /usr/bin can exploit this vulnerability using a race condition to execute arbitrary code with root privileges.

Ensure that the file system holding /usr/bin does not contain directories that are writable for unprivileged users.

All PulseAudio users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=3Dmedia-sound/pulseaudi= o-0.9.9-r54"
CVE-2009-1894 rbu rbu