* debian/templates/control.in:
- Conflict/replace/provide nvidia-driver-binary
which is specific to modern nvidia drivers.
* debian/dkms/patches/allow_sublevel_greater_than_5.patch,
debian/templates/dkms.conf.in:
- Allow SUBLEVEL variables greater than 5 in the
kernel Makefile (LP: #1166639).
* New upstream release:
- Fixed CVE-2013-0131: NVIDIA UNIX GPU Driver ARGB
Cursor Buffer Overflow in "NoScanout" Mode. This
buffer overflow, which occurred when an X client
installed a large ARGB cursor on an X server
running in NoScanout mode, could cause a denial
of service (e.g., an X server segmentation fault),
or could be exploited to achieve arbitrary code
execution.
-- Alberto Milone <email address hidden> Tue, 09 Apr 2013 17:23:25 +0200
This bug was fixed in the package nvidia- graphics- drivers- 304-updates - 304.88-0ubuntu1
--------------- graphics- drivers- 304-updates (304.88-0ubuntu1) raring; urgency=low
nvidia-
* debian/ templates/ control. in: replace/ provide nvidia- driver- binary dkms/patches/ allow_sublevel_ greater_ than_5. patch, templates/ dkms.conf. in:
- Conflict/
which is specific to modern nvidia drivers.
* debian/
debian/
- Allow SUBLEVEL variables greater than 5 in the
kernel Makefile (LP: #1166639).
* New upstream release:
- Fixed CVE-2013-0131: NVIDIA UNIX GPU Driver ARGB
Cursor Buffer Overflow in "NoScanout" Mode. This
buffer overflow, which occurred when an X client
installed a large ARGB cursor on an X server
running in NoScanout mode, could cause a denial
of service (e.g., an X server segmentation fault),
or could be exploited to achieve arbitrary code
execution.
-- Alberto Milone <email address hidden> Tue, 09 Apr 2013 17:23:25 +0200