https://bugzilla.novell.com/show_bug.cgi?id=212767 Summary: Buffer Overflow in NVIDIA Binary Graphics Driver For Linux causes local (or remote?) root exploit Product: SUSE Linux 10.1 Version: Final Platform: x86-64 OS/Version: SuSE Linux 10.1 Status: NEW Severity: Blocker Priority: P5 - None Component: Security AssignedTo: security-team@suse.de ReportedBy: martin@oneiros.de QAContact: qa@suse.de http://download2.rapid7.com/r7-0025/ http://kerneltrap.org/node/7228 A recent security advisory announced today by Rapid7 explains, "the NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root. This bug can be exploited both locally or remotely (via a remote X client or an X client which visits a malicious web page). A working proof-of-concept root exploit is attached to this advisory." The advisory goes on to note that the FreeBSD and Solaris binary drivers are also likely vulnerable to the same flaw and cautions, "it is our opinion that NVIDIA's binary driver remains an unacceptable security risk based on the large numbers of reproducible, unfixed crashes that have been reported in public forums and bug databases." NVidia claims this is fixed in version 1.0-9625 (beta!) of their driver. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.