This bug was fixed in the package nvidia-graphics-drivers-319-updates -
319.60-0ubuntu1

---------------
nvidia-graphics-drivers-319-updates (319.60-0ubuntu1) saucy; urgency=low

  [ Andy Dick ]
  * debian/templates/nvidia-graphics-drivers.preinst.in:
    - Attempt uninstallation of any existing .run file
      installation before installing Debian-packaged
      driver.
  * debian/templates/nvidia-graphics-drivers.postinst.in:
    - Add libcuda.so symlinks in /usr/lib*.
  * debian/rules:
    - Conditionalize the copying of Makefile.kbuild to
      Makefile. This adds support for newer drivers,
      while maintaining support for packaging older drivers.
    - Avoid extracting unnecessary .run files. The 64-bit
      package needs both the 32- and 64-bit .run files, but
      the 32-bit package does not. Change the unpackaging
      rules to unpack only the native package by default,
      and only unpack the 32-bit x86 package on amd64.
      Also, instead of changing the .run file permissions
      to ensure that the .run file is executable, just call
      it as an argument to sh.
    - Don't assume that extracted files are writable.
      The package contents extracted from some .run file
      installers may not have write permissions enabled.
      To work around this, move files instead of copying
      them to a temporary location before running sed
      scripts, and add force flags to applicable commands.
  * New upstream release:
    - Added support for the following GPU:
      o GeForce GTX 760 Ti OEM
    - Fixed a bug that could cause OpenGL applications to
      crash during the initialization of new threads.
    - Fixed a bug that caused the GPU and Memory clock
      frequencies for some PowerMizer performance levels
      on Kepler boards to be reported incorrectly in the
      nvidia-settings control panel.
    - Fixed a bug that caused the X server to fail to
      start on certain laptops when the boot display was
      on an external DisplayPort monitor, for example if
      the laptop was booted while the lid was closed.
    - Fixed a bug in nvidia-installer that caused the
      32-bit libGL.la libtool library file to be
      installed to the wrong location.
    - Updated the NVIDIA OpenGL driver to write temporary
      files to $TMPDIR if it is set, instead of
      unconditionally writing to /tmp (LP: #1212425).
    - Updated a fallback of writing temporary files to
      $HOME/.nvidia to use $HOME/.nv instead, as the
      latter path is already used for other NVIDIA driver
      related files.
 -- Alberto Milone <alberto.mil...@canonical.com>   Wed, 02 Oct 2013 11:31:10 
+0200

** Changed in: nvidia-graphics-drivers-319-updates (Ubuntu Saucy)
       Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nvidia-graphics-drivers-319-updates in
Ubuntu.
https://bugs.launchpad.net/bugs/1212425

Title:
  SDK applications require /tmp access with nvidia (should honor TMPDIR)

Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Fix Released
Status in “nvidia-graphics-drivers-319” package in Ubuntu:
  Triaged
Status in “nvidia-graphics-drivers-319-updates” package in Ubuntu:
  Fix Released
Status in “apparmor-easyprof-ubuntu” source package in Saucy:
  Fix Released
Status in “nvidia-graphics-drivers-319” source package in Saucy:
  Triaged
Status in “nvidia-graphics-drivers-319-updates” source package in Saucy:
  Fix Released
Status in “nvidia-graphics-drivers-tegra” source package in Saucy:
  Invalid
Status in “nvidia-graphics-drivers-tegra3” source package in Saucy:
  Invalid

Bug description:
  Nvidia desktop users need the following AppArmor permissions to avoid denials:
    owner /tmp/gl* mrw,

  But this rule breaks application confinement such that apps are able
  to tamper with each other. Interestingly, apps still run without the
  rule, so we can explicitly deny it for now.

  The use of /tmp is apparently hardcoded and does not honor TMPDIR 
(application confinement will setup TMPDIR to a private area for the app). 
strace confirms this:
  24603 mkdir("/tmp", 0777)               = -1 EEXIST (File exists)
  24603 open("/tmp/glBRPYmm", O_RDWR|O_CREAT|O_EXCL, 0600) = -1 EACCES 
(Permission denied)

  While the use of O_EXCL is safe, we don't allow access to /tmp for
  confined apps and libraries/applications should always honor TMPDIR.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1212425/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to