Comment 11 for bug 1166639

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package nvidia-graphics-drivers-304-updates - 304.88-0ubuntu1

---------------
nvidia-graphics-drivers-304-updates (304.88-0ubuntu1) raring; urgency=low

  * debian/templates/control.in:
    - Conflict/replace/provide nvidia-driver-binary
      which is specific to modern nvidia drivers.
  * debian/dkms/patches/allow_sublevel_greater_than_5.patch,
    debian/templates/dkms.conf.in:
    - Allow SUBLEVEL variables greater than 5 in the
      kernel Makefile (LP: #1166639).
  * New upstream release:
    - Fixed CVE-2013-0131: NVIDIA UNIX GPU Driver ARGB
      Cursor Buffer Overflow in "NoScanout" Mode. This
      buffer overflow, which occurred when an X client
      installed a large ARGB cursor on an X server
      running in NoScanout mode, could cause a denial
      of service (e.g., an X server segmentation fault),
      or could be exploited to achieve arbitrary code
      execution.
 -- Alberto Milone <email address hidden> Tue, 09 Apr 2013 17:23:25 +0200