artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
dot.kde.org/1150310128/
mail.gnome.org/archives/beast/2006-December/msg00025.html
secunia.com/advisories/20677
secunia.com/advisories/20786
secunia.com/advisories/20827
secunia.com/advisories/20868
secunia.com/advisories/20899
secunia.com/advisories/25032
secunia.com/advisories/25059
security.gentoo.org/glsa/glsa-200704-22.xml
securitytracker.com/id?1016298
slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.468256
www.gentoo.org/security/en/glsa/glsa-200606-22.xml
www.kde.org/info/security/advisory-20060614-2.txt
www.mandriva.com/security/advisories?name=MDKSA-2006:107
www.novell.com/linux/security/advisories/2006_38_security.html
www.osvdb.org/26506
www.securityfocus.com/archive/1/437362/100/0/threaded
www.securityfocus.com/bid/18429
www.securityfocus.com/bid/23697
www.vupen.com/english/advisories/2006/2357
www.vupen.com/english/advisories/2007/0409
exchange.xforce.ibmcloud.com/vulnerabilities/27221