NVIDIA's VDPAU Library Exposed To Security Issue

Written by Michael Larabel in Linux Security on 31 August 2015 at 05:45 PM EDT. 1 Comment
NVIDIA released the libvdpau 1.1.1 library today to fix three new CVE security issues.

Aaron Plattner of NVIDIA announced today:
libvdpau versions 1.1 and earlier, when used in setuid or setgid applications, contain vulnerabilities related to environment variable handling that could allow an attacker to execute arbitrary code or overwrite arbitrary files. See CVE-2015-5198, CVE-2015-5199, and CVE-2015-5200 for more details.

This release uses the secure_getenv() function, when available, to fix these problems. On platforms where secure_getenv() is not available, the VDPAU environment variables will not be honored by the library.

The secure_getenv() call is used now rather than getenv() for obtaining the environment variable values of DRI_PRIME, VDPAU_DRIVER, VDPAU_DRIVER_PATH, VDPAU_TRACE, and VDPAU_TRACE_FILE, per this commit. The secure_getenv() call has been present since glibc 2.17 is GNU-specific and will return null in cases where secure execution is required, details via the man page.
Related News
About The Author
Author picture

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week