ArchLinux: 201509-5: libvdpau lib32vdpau: multiple issues
Summary
- CVE-2015-5198 (Local Privilege Escalation)
When used in a setuid or setgid application, libvdpau/lib32-libvdpau allows
local users to gain privileges via unspecified vectors, related to the
VDPAU_DRIVER_PATH environment variable.
- CVE-2015-5199 (Directory Traversal)
Directory traversal vulnerability in dlopen in libvdpau/lib32/libvdpau allows
local users to gain privileges via the VDPAU_DRIVER environment variable.
- CVE-2015-5200 (Directory Traversal)
The trace functionality in libvdpau/lib32-libvdpau, when used in a setuid or
setgid application, allows local users to write to arbitrary files via
unspecified vectors.
Resolution
Upgrade to 1.1.1-1
# pacman -Syu "libvdpau>=1.1.1-1"
if you need lib32-libvdpau:
# pacman -Syu "libvdpau>=1.1.1-1" "lib32-libvdpau>=1.1.1-1"
References
https://lists.x.org/archives/xorg-announce/2015-August/002630.html https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5198 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5199 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5200 https://cgit.freedesktop.org/~aplattner/libvdpau/commit/
Workaround
None.