** Description changed:
SDK applications need the following AppArmor policy to run:
- /dev/binder rw,
+ /dev/binder rw,
The writes to /dev/binder allow applications to attack binder directly
which weakens our application confinement policy.
+
+ Update 2013-08-08:
+ All apps currently need this access because of surface flinger. The following
are the binder services that Ubuntu currently uses:
+ - surface flinger
+ - audio flinger
+ - media service
+ - camera
+ - sensors
+
+ location was in this group but is already moved away. vibrate is not
+ implemented but when it is it will only use our API (ie, not binder). Of
+ the 5 remaining binder services listed above, surface flinger, audio
+ flinger and the media service are being moved to HAL (ie, don't use
+ binder but use the device directly via the generalized HAL API). Camera
+ should move to HAL in 14.04, and sensors may in 14.04 or later.
+
+ Therefore, when surface flinger is no longer used, we can remove
+ /dev/binder from the ubuntu-sdk apparmor template, and move it into the
+ various policy groups. As we move to HAL in the various services, we'll
+ update those policy groups to remove /dev/binder as well.
** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
Status: New => Triaged
** Also affects: apparmor-easyprof-ubuntu (Ubuntu Saucy)
Importance: Undecided
Status: Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1197134
Title:
SDK applications require access to /dev/binder
To manage notifications about this bug go to:
https://bugs.launchpad.net/touch-preview-images/+bug/1197134/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs