SUSE-SU-2015:1925-1

Source
https://www.suse.com/support/update/announcement/2015/suse-su-20151925-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2015:1925-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2015:1925-1
Upstream
Related
Published
2015-10-08T17:38:13Z
Modified
2025-05-08T17:01:19.522280Z
Summary
Security update for libvdpau
Details

libvdpau was updated to use secure_getenv() instead of getenv() for several variables so it can be more safely used in setuid applications.

  • CVE-2015-5198: libvdpau: incorrect check for security transition (bnc#943967)
  • CVE-2015-5199: libvdpau: directory traversal in dlopen (bnc#943968)
  • CVE-2015-5200: libvdpau: vulnerability in trace functionality (bnc#943969)
References

Affected packages

SUSE:Linux Enterprise Desktop 11 SP3 / libvdpau

Package

Name
libvdpau
Purl
pkg:rpm/suse/libvdpau&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.1-16.20.2

Ecosystem specific

{
    "binaries": [
        {
            "libvdpau1": "0.4.1-16.20.2",
            "libvdpau1-32bit": "0.4.1-16.20.2"
        }
    ]
}

SUSE:Linux Enterprise Desktop 11 SP4 / libvdpau

Package

Name
libvdpau
Purl
pkg:rpm/suse/libvdpau&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.1-16.20.2

Ecosystem specific

{
    "binaries": [
        {
            "libvdpau1": "0.4.1-16.20.2",
            "libvdpau1-32bit": "0.4.1-16.20.2"
        }
    ]
}