ngd 510 new stuff
Andreas Beckmann
anbe at debian.org
Sat Feb 5 12:15:15 GMT 2022
Hi Luca,
the 510 driver comes with two new things:
* libnvidia-compiler-next.so.#VERSION#
which has the same soname as libnvidia-compiler.so.#VERSION#
How is that intended to be used?
* nvidia-powerd
comes with a nvidia-dbus.conf that lintian does not like
<busconfig>
<type>system</type>
<policy context="default">
<allow own="nvidia.powerd.client"/>
<allow own="nvidia.powerd.server"/>
<allow send_requested_reply="true"/>
<allow receive_requested_reply="true"/>
</policy>
</busconfig>
E: nvidia-powerd: dbus-policy-excessively-broad usr/share/dbus-1/system.d/nvidia-dbus.conf (rule 3) <policy context="default"><allow send_requested_reply="true"/>
N:
N: The package contains D-Bus policy configuration that matches broad classes
N: of messages. This will cause strange side-effects, is almost certainly
N: unintended, and is a probable security flaw.
N:
N: For instance,
N:
N: <policy user="daemon">
N: <allow send_type="method_call"/>
N: <allow send_destination="com.example.Bees"/>
N: </policy>
N:
N: in any system bus policy file would allow the daemon user to send any
N: method call to any service, including method calls which are meant to be
N: restricted to root-only for security, such as
N: org.freedesktop.systemd1.Manager.StartTransientUnit. (In addition, it
N: allows that user to send any message to the com.example.Bees service.)
N:
N: The intended policy for that particular example was probably more like
N:
N: <policy user="daemon">
N: <allow send_type="method_call" send_destination="com.example.Bees"/>
N: </policy>
N:
N: which correctly allows method calls to that particular service only.
N:
N: Please refer to http://www.openwall.com/lists/oss-security/2015/01/27/25
N: for details.
N:
N: Visibility: error
N: Show-Always: no
N: Check: desktop/dbus
W: nvidia-powerd: dbus-policy-without-send-destination usr/share/dbus-1/system.d/nvidia-dbus.conf (rule 3) <policy context="default"><allow send_requested_reply="true"/>
N:
N: The package contains D-Bus policy configuration that uses one of the
N: send_* conditions, but does not specify a send_destination, and is not
N: specific to root.
N:
N: Rules of the form
N:
N: <allow send_interface="com.example.MyInterface"/>
N:
N: allow messages with the given interface to be sent to *any* service, not
N: just the one installing the rule, which is rarely what was intended.
N:
N: Similarly, on the system bus, rules of the form
N:
N: <deny send_interface="com.example.MyInterface"/>
N:
N: are redundant with the system bus's default-deny policy, and have
N: unintended effects on other services.
N:
N: This check ignores rules of the form
N:
N: <policy user="root">
N: <allow ... />
N: </policy>
N:
N: which are commonly used for the "agent" pattern seen in services like
N: BlueZ and NetworkManager: a root-privileged daemon calls out to one or
N: more per-user user interface agent processes with no specific name, so
N: send_destination is not easily applicable. However, such rules should
N: still be made as specific as possible to avoid undesired side-effects.
N:
N: Please refer to https://bugs.freedesktop.org/show_bug.cgi?id=18961 and
N: http://lists.freedesktop.org/archives/dbus/2008-February/009401.html for
N: details.
N:
N: Visibility: warning
N: Show-Always: no
N: Check: desktop/dbus
How could that be improved?
I have no clue how that stuff works.
Andreas
More information about the pkg-nvidia-devel
mailing list