aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorSimon L. B. Nielsen <simon@FreeBSD.org>2006-10-16 21:54:38 +0000
committerSimon L. B. Nielsen <simon@FreeBSD.org>2006-10-16 21:54:38 +0000
commit346b79b908d836ae12b08f3ee40743fc0688f99f (patch)
treeb9d61573f9cc9e8e0ce4a680d66eab8732a41d9b /security
parent1130dc0ae301a596b03ebd3079a4d596f1fa9d84 (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 188f271b1afe..dd1f3da92c29 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a6d9da4a-5d5e-11db-8faf-000c6ec775d9">
+ <topic>nvidia-driver -- arbitrary root code execution vulnerability</topic>
+ <affects>
+ <package>
+ <name>nvidia-driver</name>
+ <range><gt>0</gt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Rapid7 reports:</p>
+ <blockquote cite="http://www.rapid7.com/advisories/R7-0025.jsp">
+ <p>The NVIDIA Binary Graphics Driver for Linux is vulnerable
+ to a buffer overflow that allows an attacker to run
+ arbitrary code as root. This bug can be exploited both
+ locally or remotely (via a remote X client or an X client
+ which visits a malicious web page). A working
+ proof-of-concept root exploit is included with this
+ advisory.</p>
+ <p>The NVIDIA drivers for Solaris and FreeBSD are also
+ likely to be vulnerable.</p>
+ <p>4. Solution</p>
+ <p>Disable the binary blob driver and use the open-source
+ "nv" driver that is included by default with X.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.rapid7.com/advisories/R7-0025.jsp</url>
+ </references>
+ <dates>
+ <discovery>2006-10-16</discovery>
+ <entry>2006-10-16</entry>
+ </dates>
+ </vuln>
+
<vuln vid="8012a79d-5d21-11db-bb8d-00123ffe8333">
<topic>clamav -- CHM unpacker and PE rebuilding vulnerabilities</topic>
<affects>