1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-11 02:50:24 +00:00

Update entry for nvidia-driver -- arbitrary root code execution

vulnerability:

- Add new info about vulnerable versions from NVIDIA.
- Add workaround.
- Add more references.
- Remove suggestion to move to "nv" driver now that we have a simpler
  workaround.

Approved by:		portmgr (secteam blanket)
Parts submitted by:	mnag
This commit is contained in:
Simon L. B. Nielsen 2006-10-20 22:32:30 +00:00
parent 6c8a2f6065
commit 83d2fc7202
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=175442

View File

@ -239,7 +239,7 @@ Note: Please add new entries to the beginning of this file.
<affects>
<package>
<name>nvidia-driver</name>
<range><gt>0</gt></range>
<range><gt>1.0.8762</gt><lt>1.0.8776</lt></range>
</package>
</affects>
<description>
@ -255,18 +255,23 @@ Note: Please add new entries to the beginning of this file.
advisory.</p>
<p>The NVIDIA drivers for Solaris and FreeBSD are also
likely to be vulnerable.</p>
<p>4. Solution</p>
<p>Disable the binary blob driver and use the open-source
"nv" driver that is included by default with X.</p>
</blockquote>
<p>Disabling Render acceleration in the "nvidia" driver, via
the "RenderAccel" X configuration option, can be used as a
workaround for this issue.</p>
</body>
</description>
<references>
<certvu>147252</certvu>
<cvename>CVE-2006-5379</cvename>
<url>http://nvidia.custhelp.com/cgi-bin/nvidia.cfg/php/enduser/std_adp.php?p_faqid=1971</url>
<url>http://secunia.com/advisories/22419/</url>
<url>http://www.rapid7.com/advisories/R7-0025.jsp</url>
</references>
<dates>
<discovery>2006-10-16</discovery>
<entry>2006-10-16</entry>
<modified>2006-10-21</modified>
</dates>
</vuln>