Bugzilla – Bug 212767
Buffer Overflow in NVIDIA Binary Graphics Driver For Linux causes local (or remote?) root exploit
Last modified: 2006-11-14 10:51:56 UTC
http://download2.rapid7.com/r7-0025/ http://kerneltrap.org/node/7228 A recent security advisory announced today by Rapid7 explains, "the NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root. This bug can be exploited both locally or remotely (via a remote X client or an X client which visits a malicious web page). A working proof-of-concept root exploit is attached to this advisory." The advisory goes on to note that the FreeBSD and Solaris binary drivers are also likely vulnerable to the same flaw and cautions, "it is our opinion that NVIDIA's binary driver remains an unacceptable security risk based on the large numbers of reproducible, unfixed crashes that have been reported in public forums and bug databases." NVidia claims this is fixed in version 1.0-9625 (beta!) of their driver.
We are not shipping the nvidia driver, nvidia does it for us. Please go and tell it to NVIDIA. But thanks for the report!
CVE-2006-5379
according to sndirsch the nvidia drivers installed by our YOU scripts in 9.2, 9.3 and 10.0 are _not_ affected by this problem. Only 10.1 / SLED 10 are. These have problems with the KMP update process currently, which we will have to force a bit.