Branches for Precise

Name Status Last Modified Last Commit
lp:ubuntu/precise/nvidia-graphics-drivers-updates bug 2 Mature 2012-04-12 16:56:17 UTC
12. * New upstream release: - Added sup...

Author: Alberto Milone
Revision Date: 2012-04-12 17:24:57 UTC

* New upstream release:
  - Added support for the following GPUs:
    o GeForce GT 635M
    o GeForce 610M
  - SECURITY UPDATE: privilege escalation via kernel
    memory access (LP: #959842).
  - Fixed a bug that caused DisplayPort devices to
    occasionally fail to turn back on after the system
    is resumed from suspend.
  - Added a ModeValidation X configuration option token,
    "AllowNon3DVisionModes", to allow modes that are not
    optimized for NVIDIA 3D Vision to be validated on 3D
    Vision monitors.

lp:ubuntu/precise-proposed/nvidia-graphics-drivers-updates bug 2 Mature 2013-01-29 15:23:02 UTC
16. * debian/control{.in}: - Drop all t...

Author: Alberto Milone
Revision Date: 2013-01-17 12:01:32 UTC

* debian/control{.in}:
  - Drop all the dependencies on the linux-headers (LP: #1080588).
* debian/substvars:
  - Add an alternative dependency on xserver-xorg-core-lts-quantal
    (LP: #1080588).
  - Drop versioned dependency on the xserver.

lp:ubuntu/precise-security/nvidia-graphics-drivers-updates 2 Mature 2013-04-04 13:40:29 UTC
14. * SECURITY UPDATE: ARGB Cursor Buffer...

Author: Alberto Milone
Revision Date: 2013-04-04 13:40:29 UTC

* SECURITY UPDATE: ARGB Cursor Buffer Overflow in "NoScanout" Mode
  - CVE-2013-0131

* New upstream release
  - Fixed CVE-2013-0131:
    NVIDIA UNIX GPU Driver ARGB Cursor Buffer Overflow in
    "NoScanout" Mode. This buffer overflow, which occurred
    when an X client installed a large ARGB cursor on an
    X server running in NoScanout mode, could cause a denial
    of service (e.g., an X server segmentation fault), or
    could be exploited to achieve arbitrary code execution.

[ Alberto Milone ]
* debian/dkms.conf{.in}:
  - Drop all the patches.
* debian/substvars:
  - Add support for xorg-video-abi-14.

lp:ubuntu/precise-updates/nvidia-graphics-drivers-updates 2 Mature 2013-04-04 13:40:29 UTC
14. * SECURITY UPDATE: ARGB Cursor Buffer...

Author: Alberto Milone
Revision Date: 2013-04-04 13:40:29 UTC

* SECURITY UPDATE: ARGB Cursor Buffer Overflow in "NoScanout" Mode
  - CVE-2013-0131

* New upstream release
  - Fixed CVE-2013-0131:
    NVIDIA UNIX GPU Driver ARGB Cursor Buffer Overflow in
    "NoScanout" Mode. This buffer overflow, which occurred
    when an X client installed a large ARGB cursor on an
    X server running in NoScanout mode, could cause a denial
    of service (e.g., an X server segmentation fault), or
    could be exploited to achieve arbitrary code execution.

[ Alberto Milone ]
* debian/dkms.conf{.in}:
  - Drop all the patches.
* debian/substvars:
  - Add support for xorg-video-abi-14.

14 of 4 results