This bug was fixed in the package nvidia-graphics-drivers-313-updates - 313.30-0ubuntu1
--------------- nvidia-graphics-drivers-313-updates (313.30-0ubuntu1) raring; urgency=low * debian/dkms/patches/allow_sublevel_greater_than_5.patch, debian/templates/dkms.conf.in: - Allow SUBLEVEL variables greater than 5 in the kernel Makefile (LP: #576648). * New upstream release: - Fixed CVE-2013-0131: NVIDIA UNIX GPU Driver ARGB Cursor Buffer Overflow in "NoScanout" Mode. This buffer overflow, which occurred when an X client installed a large ARGB cursor on an X server running in NoScanout mode, could cause a denial of service (e.g., an X server segmentation fault), or could be exploited to achieve arbitrary code execution. -- Alberto Milone <alberto.mil...@canonical.com> Wed, 10 Apr 2013 12:02:50 +0200 ** Changed in: nvidia-graphics-drivers-313-updates (Ubuntu) Status: In Progress => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0131 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/576648 Title: package nvidia-* failed to install/upgrade: nvidia-* kernel module failed to build (Unable to determine the target kernel version.) To manage notifications about this bug go to: https://bugs.launchpad.net/nvidia-drivers-ubuntu/+bug/576648/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs