Vulnerability Description
The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libvdpau Project | Libvdpau | <= 1.1.0 |
| Canonical | Ubuntu Linux | 12.04 |
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170637.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165546.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167469.
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html
- http://lists.x.org/archives/xorg-announce/2015-August/002630.html
- http://www.debian.org/security/2015/dsa-3355
- http://www.securityfocus.com/bid/76636
- http://www.ubuntu.com/usn/USN-2729-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1253827
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170637.h
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165546.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167469.
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html
- http://lists.x.org/archives/xorg-announce/2015-August/002630.html
- http://www.debian.org/security/2015/dsa-3355
FAQ
What is CVE-2015-5200?
CVE-2015-5200 is a vulnerability with a CVSS score of 6.3 (MEDIUM). The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
How severe is CVE-2015-5200?
CVE-2015-5200 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5200?
Check the references section above for vendor advisories and patch information. Affected products include: Libvdpau Project Libvdpau, Canonical Ubuntu Linux.