libvdpau (1.1-1ubuntu1) wily; urgency=medium * SECURITY UPDATE: privilege escalation when used in setuid or setgid applications - debian/patches/CVE-2015-5xxx.patch: use secure_getenv and protect against directory traversal in configure.ac, src/Makefile.am, src/mesa_dri2.c, src/util.h, src/vdpau_wrapper.c, trace/vdpau_trace.cpp. - CVE-2015-5198 - CVE-2015-5199 - CVE-2015-5200
-- Marc Deslauriers <marc.deslauri...@ubuntu.com> Wed, 02 Sep 2015 08:38:06 -0400 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-5198 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-5199 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-5200 ** Changed in: libvdpau (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to libvdpau in Ubuntu. https://bugs.launchpad.net/bugs/1490826 Title: [CVE] NVIDIA's VDPAU Library Exposed To Security Issue Status in libvdpau package in Ubuntu: Fix Released Bug description: From a Phoronix post: http://lists.x.org/archives/xorg-announce/2015-August/002630.html http://anzwix.com/a/VDPAU/UseSecuregetenv3ToImproveSecurity NVIDIA released the libvdpau 1.1.1 library today to fix three new CVE security issues. Aaron Plattner of NVIDIA announced today: libvdpau versions 1.1 and earlier, when used in setuid or setgid applications, contain vulnerabilities related to environment variable handling that could allow an attacker to execute arbitrary code or overwrite arbitrary files. See CVE-2015-5198, CVE-2015-5199, and CVE-2015-5200 for more details. This release uses the secure_getenv() function, when available, to fix these problems. On platforms where secure_getenv() is not available, the VDPAU environment variables will not be honored by the library. The secure_getenv() call is used now rather than getenv() for obtaining the environment variable values of DRI_PRIME, VDPAU_DRIVER, VDPAU_DRIVER_PATH, VDPAU_TRACE, and VDPAU_TRACE_FILE, per this commit. The secure_getenv() call has been present since glibc 2.17 is GNU- specific and will return null in cases where secure execution is required, details via the man page. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvdpau/+bug/1490826/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp