Date: Wed, 8 Aug 2012 10:34:06 +0000 From: Alexey Dokuchaev <danfe@FreeBSD.org> To: Rainer Hurling <rhurlin@gwdg.de> Cc: freebsd security <freebsd-security@freebsd.org>, Doug Barton <dougb@FreeBSD.org>, freebsd-ports@FreeBSD.org, Oliver Pinter <oliver.pntr@gmail.com> Subject: Re: [Full-disclosure] nvidia linux binary driver priv escalation exploit Message-ID: <20120808103406.GA56960@FreeBSD.org> In-Reply-To: <501FAF5E.6090101@gwdg.de> References: <CAPjTQNHv9CiLYu-r3OHHZfF1HhHYL7yuiefjOD8BqZm8hi3o=Q@mail.gmail.com> <501F7A35.5080207@FreeBSD.org> <501FAF5E.6090101@gwdg.de>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Aug 06, 2012 at 01:49:50PM +0200, Rainer Hurling wrote: > Am 06.08.2012 10:03 (UTC+1) schrieb Doug Barton: > >On 08/01/2012 05:09, Oliver Pinter wrote: > >>I found this today on FD: > >> > >>http://seclists.org/fulldisclosure/2012/Aug/4 > > > >Apparently this affects us as well. Any news? > > Thanks for the info. I had been not aware of it before. > > NVidia has released a driver version 304.32 for FreeBSD i386 and amd64, > which should remedy these security issues. Luckily, they've released version 295.71 which is on Long Lived Branch. I will update the port shortly. VuXML entry will have to follow separately, as it is unclear whether new CVE number will be assigned or not. ./danfe
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120808103406.GA56960>