Date: Sun, 14 Dec 2014 09:45:09 +0000 (UTC) From: Alexey Dokuchaev <danfe@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r374694 - head/security/vuxml Message-ID: <201412140945.sBE9j9cL068968@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: danfe Date: Sun Dec 14 09:45:08 2014 New Revision: 374694 URL: https://svnweb.freebsd.org/changeset/ports/374694 QAT: https://qat.redports.org/buildarchive/r374694/ Log: The GLX indirect rendering support supplied on NVIDIA products is subject to the recently disclosed X.Org vulnerabilities (CVE-2014-8093, CVE-2014-8098) as well as internally identified vulnerabilities (CVE-2014-8298). Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Dec 14 08:59:13 2014 (r374693) +++ head/security/vuxml/vuln.xml Sun Dec 14 09:45:08 2014 (r374694) @@ -40,7 +40,7 @@ QUICK GUIDE TO ADDING A NEW ENTRY 4. fix any errors 5. profit! -Addtional tests can be done this way: +Additional tests can be done this way: $ env PKG_DBDIR=/usr/ports/security/vuxml pkg audit py26-django-1.6 $ env PKG_DBDIR=/usr/ports/security/vuxml pkg audit py27-django-1.6.1 @@ -57,6 +57,60 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="fdf72a0e-8371-11e4-bc20-001636d274f3"> + <topic>NVIDIA UNIX driver -- remote denial of service or arbitrary code execution</topic> + <affects> + <package> + <name>nvidia-driver</name> + <range><lt>340.65</lt></range> + </package> + <package> + <name>nvidia-driver-304</name> + <range><lt>304.125</lt></range> + </package> + <package> + <name>nvidia-driver-173</name> + <range><le>173.14.35_3</le></range> + </package> + <package> + <name>nvidia-driver-96</name> + <range><le>96.43.23_2</le></range> + </package> + <package> + <name>nvidia-driver-71</name> + <range><le>71.86.15_4</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>NVIDIA Unix security team reports:</p> + <blockquote cite="http://nvidia.custhelp.com/app/answers/detail/a_id/3610"> + <p>The GLX indirect rendering support supplied on NVIDIA products + is subject to the recently disclosed X.Org vulnerabilities + (CVE-2014-8093, CVE-2014-8098) as well as internally identified + vulnerabilities (CVE-2014-8298).</p> + <p>Depending on how it is configured, the X server typically runs + with raised privileges, and listens for GLX indirect rendering + protocol requests from a local socket and potentially a TCP/IP + port. The vulnerabilities could be exploited in a way that + causes the X server to access uninitialized memory or overwrite + arbitrary memory in the X server process. This can cause a + denial of service (e.g., an X server segmentation fault), or + could be exploited to achieve arbitrary code execution.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-8298</cvename> + <cvename>CVE-2014-8093</cvename> + <cvename>CVE-2014-8098</cvename> + </references> + <dates> + <discovery>2014-12-03</discovery> + <entry>2014-12-14</entry> + </dates> + </vuln> + <vuln vid="ab3e98d9-8175-11e4-907d-d050992ecde8"> <topic>bind -- denial of service vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201412140945.sBE9j9cL068968>