Security update for libvdpau

Announcement ID: SUSE-SU-2015:1925-1
Rating: moderate
References:
Cross-References:
CVSS scores:
Affected Products:
  • SUSE Linux Enterprise Desktop 11 SP3
  • SUSE Linux Enterprise Desktop 11 SP4

An update that solves three vulnerabilities can now be installed.

Description:

libvdpau was updated to use secure_getenv() instead of getenv() for several variables so it can be more safely used in setuid applications.

  • CVE-2015-5198: libvdpau: incorrect check for security transition (bnc#943967)
  • CVE-2015-5199: libvdpau: directory traversal in dlopen (bnc#943968)
  • CVE-2015-5200: libvdpau: vulnerability in trace functionality (bnc#943969)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Desktop 11 SP3
    zypper in -t patch sledsp3-libvdpau-12192=1
  • SUSE Linux Enterprise Desktop 11 SP4
    zypper in -t patch sledsp4-libvdpau-12192=1

Package List:

  • SUSE Linux Enterprise Desktop 11 SP3 (x86_64 i586)
    • libvdpau1-0.4.1-16.20.2
  • SUSE Linux Enterprise Desktop 11 SP3 (x86_64)
    • libvdpau1-32bit-0.4.1-16.20.2
  • SUSE Linux Enterprise Desktop 11 SP4 (x86_64 i586)
    • libvdpau1-0.4.1-16.20.2
  • SUSE Linux Enterprise Desktop 11 SP4 (x86_64)
    • libvdpau1-32bit-0.4.1-16.20.2

References: