libvdpau (1.1-1ubuntu1) wily; urgency=medium

  * SECURITY UPDATE: privilege escalation when used in setuid or setgid
    applications
    - debian/patches/CVE-2015-5xxx.patch: use secure_getenv and protect
      against directory traversal in configure.ac, src/Makefile.am,
      src/mesa_dri2.c, src/util.h, src/vdpau_wrapper.c,
      trace/vdpau_trace.cpp.
    - CVE-2015-5198
    - CVE-2015-5199
    - CVE-2015-5200

 -- Marc Deslauriers <[email protected]>  Wed, 02 Sep 2015
08:38:06 -0400

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-5198

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-5199

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-5200

** Changed in: libvdpau (Ubuntu)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1490826

Title:
  [CVE] NVIDIA's VDPAU Library Exposed To Security Issue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvdpau/+bug/1490826/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to