mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-01 05:45:45 +00:00
Document "nvidia-driver -- arbitrary root code execution vulnerability".
Note that I haven't actually had time to make a test system to reproduce this on FreeBSD, but due to the nature of this issue and that there is a PoC exploit in the advisory, I'm adding this entry due to "better safe than sorry"... Approved by: portmgr (secteam blanket)
This commit is contained in:
parent
1130dc0ae3
commit
346b79b908
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=175362
@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="a6d9da4a-5d5e-11db-8faf-000c6ec775d9">
|
||||
<topic>nvidia-driver -- arbitrary root code execution vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>nvidia-driver</name>
|
||||
<range><gt>0</gt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Rapid7 reports:</p>
|
||||
<blockquote cite="http://www.rapid7.com/advisories/R7-0025.jsp">
|
||||
<p>The NVIDIA Binary Graphics Driver for Linux is vulnerable
|
||||
to a buffer overflow that allows an attacker to run
|
||||
arbitrary code as root. This bug can be exploited both
|
||||
locally or remotely (via a remote X client or an X client
|
||||
which visits a malicious web page). A working
|
||||
proof-of-concept root exploit is included with this
|
||||
advisory.</p>
|
||||
<p>The NVIDIA drivers for Solaris and FreeBSD are also
|
||||
likely to be vulnerable.</p>
|
||||
<p>4. Solution</p>
|
||||
<p>Disable the binary blob driver and use the open-source
|
||||
"nv" driver that is included by default with X.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>http://www.rapid7.com/advisories/R7-0025.jsp</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2006-10-16</discovery>
|
||||
<entry>2006-10-16</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="8012a79d-5d21-11db-bb8d-00123ffe8333">
|
||||
<topic>clamav -- CHM unpacker and PE rebuilding vulnerabilities</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user