Hello Jamie, or anyone else affected,

Accepted nvidia-graphics-drivers-304-updates into precise-proposed. The
package will build now and be available at
http://launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-304-updates/304.116-0ubuntu0.0.1 in a few hours, and then in the
-proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.  Your feedback will aid us getting this update
out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-needed to verification-done. If it does not fix the
bug for you, please add a comment stating that, and change the tag to
verification-failed.  In either case, details of your testing will help
us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Tags added: verification-needed

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nvidia-graphics-drivers-319 in Ubuntu.
https://bugs.launchpad.net/bugs/1212425

Title:
  SDK applications require /tmp access with nvidia (should honor TMPDIR)

Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
  Fix Released
Status in “nvidia-graphics-drivers-319” package in Ubuntu:
  Fix Released
Status in “nvidia-graphics-drivers-319-updates” package in Ubuntu:
  Fix Released
Status in “apparmor-easyprof-ubuntu” source package in Saucy:
  Fix Released
Status in “nvidia-graphics-drivers-319” source package in Saucy:
  Triaged
Status in “nvidia-graphics-drivers-319-updates” source package in Saucy:
  Fix Released
Status in “nvidia-graphics-drivers-tegra” source package in Saucy:
  Invalid
Status in “nvidia-graphics-drivers-tegra3” source package in Saucy:
  Invalid

Bug description:
  Nvidia desktop users need the following AppArmor permissions to avoid denials:
    owner /tmp/gl* mrw,

  But this rule breaks application confinement such that apps are able
  to tamper with each other. Interestingly, apps still run without the
  rule, so we can explicitly deny it for now.

  The use of /tmp is apparently hardcoded and does not honor TMPDIR 
(application confinement will setup TMPDIR to a private area for the app). 
strace confirms this:
  24603 mkdir("/tmp", 0777)               = -1 EEXIST (File exists)
  24603 open("/tmp/glBRPYmm", O_RDWR|O_CREAT|O_EXCL, 0600) = -1 EACCES 
(Permission denied)

  While the use of O_EXCL is safe, we don't allow access to /tmp for
  confined apps and libraries/applications should always honor TMPDIR.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1212425/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to