FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  519779
Date:      2019-12-10
Time:      21:06:04Z
Committer: mfechner

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
1431f2d6-a06e-11e2-b9e0-001636d274f3NVIDIA UNIX driver -- ARGB cursor buffer overflow in "NoScanout" mode

NVIDIA Unix security team reports:

When the NVIDIA driver for the X Window System is operated in "NoScanout" mode, and an X client installs an ARGB cursor that is larger than the expected size (64x64 or 256x256, depending on the driver version), the driver will overflow a buffer. This can cause a denial of service (e.g., an X server segmentation fault), or could be exploited to achieve arbitrary code execution. Because the X server runs as setuid root in many configurations, an attacker could potentially use this vulnerability in those configurations to gain root privileges.


Discovery 2013-03-27
Entry 2013-04-08
nvidia-driver
ge 310.14 lt 310.44

ge 195.22 lt 304.88

CVE-2013-0131
http://nvidia.custhelp.com/app/answers/detail/a_id/3290
fdf72a0e-8371-11e4-bc20-001636d274f3NVIDIA UNIX driver -- remote denial of service or arbitrary code execution

NVIDIA Unix security team reports:

The GLX indirect rendering support supplied on NVIDIA products is subject to the recently disclosed X.Org vulnerabilities (CVE-2014-8093, CVE-2014-8098) as well as internally identified vulnerabilities (CVE-2014-8298).

Depending on how it is configured, the X server typically runs with raised privileges, and listens for GLX indirect rendering protocol requests from a local socket and potentially a TCP/IP port. The vulnerabilities could be exploited in a way that causes the X server to access uninitialized memory or overwrite arbitrary memory in the X server process. This can cause a denial of service (e.g., an X server segmentation fault), or could be exploited to achieve arbitrary code execution.


Discovery 2014-12-03
Entry 2014-12-14
nvidia-driver
lt 340.65

nvidia-driver-304
lt 304.125

nvidia-driver-173
le 173.14.35_3

nvidia-driver-96
le 96.43.23_2

nvidia-driver-71
le 71.86.15_4

CVE-2014-8298
CVE-2014-8093
CVE-2014-8098
057e6616-1885-11e7-bb4d-a0d3c19bfa21NVIDIA UNIX driver -- multiple vulnerabilities in the kernel mode layer handler

NVIDIA Unix security team reports:

NVIDIA GPU Display Driver contains vulnerabilities in the kernel mode layer handler where multiple integer overflows, improper access control, and improper validation of a user input may cause a denial of service or potential escalation of privileges.


Discovery 2017-02-14
Entry 2017-04-04
nvidia-driver
lt 375.39

nvidia-driver-340
lt 340.102

nvidia-driver-304
lt 304.135

CVE-2017-0309
CVE-2017-0310
CVE-2017-0311
CVE-2017-0318
CVE-2017-0321
http://nvidia.custhelp.com/app/answers/detail/a_id/4398