CVE-2013-0131
Publication date 3 April 2013
Last updated 24 July 2024
Ubuntu priority
Buffer overflow in the NVIDIA GPU driver before 304.88, 310.x before 310.44, and 313.x before 313.30 for the X Window System on UNIX, when NoScanout mode is enabled, allows remote authenticated users to execute arbitrary code via a large ARGB cursor.
Status
Package | Ubuntu Release | Status |
---|---|---|
nvidia-graphics-drivers | ||
nvidia-graphics-drivers-304 | ||
nvidia-graphics-drivers-304-updates | ||
nvidia-graphics-drivers-310 | ||
nvidia-graphics-drivers-310-updates | ||
nvidia-graphics-drivers-313-updates | ||
nvidia-graphics-drivers-experimental-304 | ||
nvidia-graphics-drivers-experimental-310 | ||
nvidia-graphics-drivers-updates | ||
nvidia-settings | ||
nvidia-settings-updates | ||
Notes
mdeslaur
upstream advisory says vulnerability is present since 195.22 fixed in 304.88, 310.44, 313.30 We aren't going to fix the experimental drivers. Users of the experimental drivers for who this issue is important are recommended to switch to production drivers. Doesn't actually affected nvidia-settings and nvidia-settings-updates. Updates are simply required for compatibility reasons.
jdstrand
no updates from NVIDIA for 195.36 (Ubuntu 10.04 LTS), 280.13 and 295.20 (Ubuntu 11.10) as of 2013-04-19
References
Related Ubuntu Security Notices (USN)
- USN-1799-1
- NVIDIA graphics drivers vulnerability
- 10 April 2013