Mandriva Linux Security Advisory 2009-152 – Tavis Ormandy and Julien Tinnes of the Google Security Team discovered that pulseaudio, when installed setuid root, does not drop privileges before re-executing itself to achieve immediate bindings. This can be exploited by a user who has write access to any directory on the file system containing /usr/bin to gain local root access. The user needs to exploit a race condition related to creating a hard link. This update provides fixes for this vulnerability.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/79359/MDVSA-2009-152.txt
Source: https://packetstormsecurity.com/files/79359/Mandriva-Linux-Security-Advisory-2009-152.html