Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 Aug 2012 10:34:06 +0000
From:      Alexey Dokuchaev <danfe@FreeBSD.org>
To:        Rainer Hurling <rhurlin@gwdg.de>
Cc:        freebsd security <freebsd-security@freebsd.org>, Doug Barton <dougb@FreeBSD.org>, freebsd-ports@FreeBSD.org, Oliver Pinter <oliver.pntr@gmail.com>
Subject:   Re: [Full-disclosure] nvidia linux binary driver priv escalation exploit
Message-ID:  <20120808103406.GA56960@FreeBSD.org>
In-Reply-To: <501FAF5E.6090101@gwdg.de>
References:  <CAPjTQNHv9CiLYu-r3OHHZfF1HhHYL7yuiefjOD8BqZm8hi3o=Q@mail.gmail.com> <501F7A35.5080207@FreeBSD.org> <501FAF5E.6090101@gwdg.de>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Aug 06, 2012 at 01:49:50PM +0200, Rainer Hurling wrote:
> Am 06.08.2012 10:03 (UTC+1) schrieb Doug Barton:
> >On 08/01/2012 05:09, Oliver Pinter wrote:
> >>I found this today on FD:
> >>
> >>http://seclists.org/fulldisclosure/2012/Aug/4
> >
> >Apparently this affects us as well. Any news?
> 
> Thanks for the info. I had been not aware of it before.
> 
> NVidia has released a driver version 304.32 for FreeBSD i386 and amd64, 
> which should remedy these security issues.

Luckily, they've released version 295.71 which is on Long Lived Branch.  I
will update the port shortly.

VuXML entry will have to follow separately, as it is unclear whether new CVE
number will be assigned or not.

./danfe



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120808103406.GA56960>