First published: Fri Aug 14 2015(Updated: )
It was discovered that the trace functionality of libvdpau can be used to overwrite arbitrary files if the process underwent a trust transition at startup. This may allow local attackers gain additional privileges. Acknowledgements: This issue was discovered by Florian Weimer of Red Hat Product Security.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libvdpau Project Libvdpau | <=1.1.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.