Summary: | <x11-drivers/nvidia-drivers-{304.88,310.44,313.30} - NVIDIA UNIX GPU Driver ARGB Cursor Buffer Overflow in "NoScanout" Mode (CVE-2013-0131) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | xarthisius |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://nvidia.custhelp.com/app/answers/detail/a_id/3290 | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
![]() Arch teams, please test and mark stable: =x11-drivers/nvidia-drivers-304.88 =x11-drivers/nvidia-drivers-310.44 =x11-drivers/nvidia-drivers-313.30 Stable KEYWORDS : amd64 x86 (In reply to comment #1) > Arch teams, please test and mark stable: > =x11-drivers/nvidia-drivers-304.88 > =x11-drivers/nvidia-drivers-310.44 > =x11-drivers/nvidia-drivers-313.30 > Stable KEYWORDS : amd64 x86 Done. Thanks, everyone. Added to - and updated - existing GLSA draft. This issue was resolved and addressed in GLSA 201304-01 at http://security.gentoo.org/glsa/glsa-201304-01.xml by GLSA coordinator Sean Amoss (ackle). CVE-2013-0131 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0131): Buffer overflow in the NVIDIA GPU driver before 304.88, 310.x before 310.44, and 313.x before 313.30 for the X Window System on UNIX, when NoScanout mode is enabled, allows remote authenticated users to execute arbitrary code via a large ARGB cursor. |