This bug was fixed in the package nvidia-graphics-drivers-313-updates -
313.30-0ubuntu1
---------------
nvidia-graphics-drivers-313-updates (313.30-0ubuntu1) raring; urgency=low
* debian/dkms/patches/allow_sublevel_greater_than_5.patch,
debian/templates/dkms.conf.in:
- Allow SUBLEVEL variables greater than 5 in the
kernel Makefile (LP: #576648).
* New upstream release:
- Fixed CVE-2013-0131: NVIDIA UNIX GPU Driver ARGB
Cursor Buffer Overflow in "NoScanout" Mode. This
buffer overflow, which occurred when an X client
installed a large ARGB cursor on an X server
running in NoScanout mode, could cause a denial
of service (e.g., an X server segmentation fault),
or could be exploited to achieve arbitrary code
execution.
-- Alberto Milone <[email protected]> Wed, 10 Apr 2013 12:02:50
+0200
** Changed in: nvidia-graphics-drivers-313-updates (Ubuntu)
Status: In Progress => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0131
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/576648
Title:
package nvidia-* failed to install/upgrade: nvidia-* kernel module
failed to build (Unable to determine the target kernel version.)
To manage notifications about this bug go to:
https://bugs.launchpad.net/nvidia-drivers-ubuntu/+bug/576648/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs