aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorBryan Drewery <bdrewery@FreeBSD.org>2013-04-09 01:18:58 +0000
committerBryan Drewery <bdrewery@FreeBSD.org>2013-04-09 01:18:58 +0000
commitea0abd42a9777bfd31ccb473b54ba0f42d330bce (patch)
tree4ecedd97f980df99ea8b383be488a6d45d6f09e7 /security
parent82b75f53c329f97da46af6311632a6a1d6bdf6c6 (diff)
downloadports-ea0abd42a9777bfd31ccb473b54ba0f42d330bce.tar.gz
ports-ea0abd42a9777bfd31ccb473b54ba0f42d330bce.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 67805e6e3723..d4614a147d55 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,40 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1431f2d6-a06e-11e2-b9e0-001636d274f3">
+ <topic>NVIDIA UNIX driver -- ARGB cursor buffer overflow in "NoScanout" mode</topic>
+ <affects>
+ <package>
+ <name>nvidia-driver</name>
+ <range><gt>304.88</gt><lt>310.44</lt></range>
+ <range><ge>195.22</ge><lt>304.88</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NVIDIA Unix security team reports:</p>
+ <blockquote cite="http://nvidia.custhelp.com/app/answers/detail/a_id/3290">
+ <p>When the NVIDIA driver for the X Window System is operated in
+ "NoScanout" mode, and an X client installs an ARGB cursor that
+ is larger than the expected size (64x64 or 256x256, depending on
+ the driver version), the driver will overflow a buffer. This
+ can cause a denial of service (e.g., an X server segmentation
+ fault), or could be exploited to achieve arbitrary code
+ execution. Because the X server runs as setuid root in many
+ configurations, an attacker could potentially use this
+ vulnerability in those configurations to gain root privileges.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-0131</cvename>
+ </references>
+ <dates>
+ <discovery>2013-03-27</discovery>
+ <entry>2013-04-08</entry>
+ </dates>
+ </vuln>
+
<vuln vid="cebed39d-9e6f-11e2-b3f5-003067c2616f">
<topic>opera -- moderately severe issue</topic>
<affects>