diff options
author | Bryan Drewery <bdrewery@FreeBSD.org> | 2013-04-09 01:18:58 +0000 |
---|---|---|
committer | Bryan Drewery <bdrewery@FreeBSD.org> | 2013-04-09 01:18:58 +0000 |
commit | ea0abd42a9777bfd31ccb473b54ba0f42d330bce (patch) | |
tree | 4ecedd97f980df99ea8b383be488a6d45d6f09e7 /security | |
parent | 82b75f53c329f97da46af6311632a6a1d6bdf6c6 (diff) | |
download | ports-ea0abd42a9777bfd31ccb473b54ba0f42d330bce.tar.gz ports-ea0abd42a9777bfd31ccb473b54ba0f42d330bce.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 67805e6e3723..d4614a147d55 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,40 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1431f2d6-a06e-11e2-b9e0-001636d274f3"> + <topic>NVIDIA UNIX driver -- ARGB cursor buffer overflow in "NoScanout" mode</topic> + <affects> + <package> + <name>nvidia-driver</name> + <range><gt>304.88</gt><lt>310.44</lt></range> + <range><ge>195.22</ge><lt>304.88</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>NVIDIA Unix security team reports:</p> + <blockquote cite="http://nvidia.custhelp.com/app/answers/detail/a_id/3290"> + <p>When the NVIDIA driver for the X Window System is operated in + "NoScanout" mode, and an X client installs an ARGB cursor that + is larger than the expected size (64x64 or 256x256, depending on + the driver version), the driver will overflow a buffer. This + can cause a denial of service (e.g., an X server segmentation + fault), or could be exploited to achieve arbitrary code + execution. Because the X server runs as setuid root in many + configurations, an attacker could potentially use this + vulnerability in those configurations to gain root privileges.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-0131</cvename> + </references> + <dates> + <discovery>2013-03-27</discovery> + <entry>2013-04-08</entry> + </dates> + </vuln> + <vuln vid="cebed39d-9e6f-11e2-b3f5-003067c2616f"> <topic>opera -- moderately severe issue</topic> <affects> |