ubuntu-phonedations-bugs team mailing list archive
-
ubuntu-phonedations-bugs team
-
Mailing list archive
-
Message #00012
[Bug 1197134] Re: All SDK applications require access to /dev/binder
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: lxc-android-config (Ubuntu T-series)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Phonedations bugs, which is a bug assignee.
https://bugs.launchpad.net/bugs/1197134
Title:
All SDK applications require access to /dev/binder
Status in Touch Preview Images:
New
Status in “apparmor-easyprof-ubuntu” package in Ubuntu:
Triaged
Status in “lxc-android-config” package in Ubuntu:
Confirmed
Status in “apparmor-easyprof-ubuntu” source package in Saucy:
Won't Fix
Status in “lxc-android-config” source package in Saucy:
Confirmed
Status in “apparmor-easyprof-ubuntu” source package in t-series:
Confirmed
Status in “lxc-android-config” source package in t-series:
Confirmed
Bug description:
SDK applications need the following AppArmor policy to run:
/dev/binder rw,
The writes to /dev/binder allow applications to attack binder directly
which weakens our application confinement policy because there is no
mediation between binder services.
All apps currently need this access because of the sensors service (even on mir). The following are the binder services that Ubuntu currently uses:
- camera
- sensors
- surface flinger (only used as fallback now)
location was in this group but is already moved away. vibrate is not
implemented but when it is it will only use our API (ie, not binder).
Of the remaining binder services listed above, camera is moving to HAL
in 14.04 and sensors shoudl also move there as well in 14.04.
This bug will be resolved when /dev/binder is no longer used or it is
only used by one service and therefore the /dev/binder access can move
into the appropriate policy group.
Right now, because all apps needs access to /dev/binder, all apps end
up with access to the camera and sensors services even when these
policy groups are not specified. Getting rid of /dev/binder access is
for fine-grained application confinement to work correctly.
To manage notifications about this bug go to:
https://bugs.launchpad.net/touch-preview-images/+bug/1197134/+subscriptions