NVIDIA confirms that there is a security vulnerability in the NVIDIA UNIX
Graphics drivers, versions 1.0-8762 and 1.0-8774, as reported in Security
Advisory R7-0025, "Buffer Overflow in NVIDIA Binary Graphics Driver For Linux"
The root cause is as described in the security advisory:
*
a scratch buffer was allocated in system memory for glyph rendering
*
the scratch buffer allocation was clamped to a maximum size
*
the glyph list rendered was not clamped using the same clamping criteria
as the scratch buffer
This bug was in the NVIDIA X driver's Render acceleration layer. The bug can
be avoided in affected drivers by disabling Render acceleration via the
"RenderAccel" X configuration option.
NVIDIA can confirm that this bug is only present in the NVIDIA UNIX Graphics
drivers 1.0-8762 and 1.0-8774, and is fixed starting with 1.0-8776. Also, this
bug is not present in driver versions older than 1.0-8762. For example,
versions 1.0-8178 or 1.0-7184 are not affected by this bug.
There is some confusion between this NVIDIA driver bug and a previously fixed
core XFree86/X.Org server bug. This confusion mistakenly led the security
advisory to the conclusion that the NVIDIA driver bug was reported and known as
early as 2004.
【 在 snnn (snnn) 的大作中提到: 】
: 是cool
: 但是一个buffer overflow漏洞04年就被爆出来了,到今天还没有解决。
NVIDIA确认其UNIX Graphics驱动1.0-8762及1.0-8774版本存在缓冲区溢出安全漏洞。该漏洞源于驱动程序在渲染字体时未正确限制内存使用。通过禁用渲染加速可以规避此问题,漏洞已在1.0-8776版本中修复。
1191

被折叠的 条评论
为什么被折叠?



