From owner-svn-ports-head@FreeBSD.ORG Sun Dec 14 09:45:10 2014 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 43B45BF7; Sun, 14 Dec 2014 09:45:10 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 23992265; Sun, 14 Dec 2014 09:45:10 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id sBE9jA06068969; Sun, 14 Dec 2014 09:45:10 GMT (envelope-from danfe@FreeBSD.org) Received: (from danfe@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id sBE9j9cL068968; Sun, 14 Dec 2014 09:45:09 GMT (envelope-from danfe@FreeBSD.org) Message-Id: <201412140945.sBE9j9cL068968@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: danfe set sender to danfe@FreeBSD.org using -f From: Alexey Dokuchaev Date: Sun, 14 Dec 2014 09:45:09 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r374694 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 14 Dec 2014 09:45:10 -0000 Author: danfe Date: Sun Dec 14 09:45:08 2014 New Revision: 374694 URL: https://svnweb.freebsd.org/changeset/ports/374694 QAT: https://qat.redports.org/buildarchive/r374694/ Log: The GLX indirect rendering support supplied on NVIDIA products is subject to the recently disclosed X.Org vulnerabilities (CVE-2014-8093, CVE-2014-8098) as well as internally identified vulnerabilities (CVE-2014-8298). Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Dec 14 08:59:13 2014 (r374693) +++ head/security/vuxml/vuln.xml Sun Dec 14 09:45:08 2014 (r374694) @@ -40,7 +40,7 @@ QUICK GUIDE TO ADDING A NEW ENTRY 4. fix any errors 5. profit! -Addtional tests can be done this way: +Additional tests can be done this way: $ env PKG_DBDIR=/usr/ports/security/vuxml pkg audit py26-django-1.6 $ env PKG_DBDIR=/usr/ports/security/vuxml pkg audit py27-django-1.6.1 @@ -57,6 +57,60 @@ Notes: --> + + NVIDIA UNIX driver -- remote denial of service or arbitrary code execution + + + nvidia-driver + 340.65 + + + nvidia-driver-304 + 304.125 + + + nvidia-driver-173 + 173.14.35_3 + + + nvidia-driver-96 + 96.43.23_2 + + + nvidia-driver-71 + 71.86.15_4 + + + + +

NVIDIA Unix security team reports:

+
+

The GLX indirect rendering support supplied on NVIDIA products + is subject to the recently disclosed X.Org vulnerabilities + (CVE-2014-8093, CVE-2014-8098) as well as internally identified + vulnerabilities (CVE-2014-8298).

+

Depending on how it is configured, the X server typically runs + with raised privileges, and listens for GLX indirect rendering + protocol requests from a local socket and potentially a TCP/IP + port. The vulnerabilities could be exploited in a way that + causes the X server to access uninitialized memory or overwrite + arbitrary memory in the X server process. This can cause a + denial of service (e.g., an X server segmentation fault), or + could be exploited to achieve arbitrary code execution.

+
+ +
+ + CVE-2014-8298 + CVE-2014-8093 + CVE-2014-8098 + + + 2014-12-03 + 2014-12-14 + +
+ bind -- denial of service vulnerability