Thanks for your comment, between that and this follow-up discussion on
IRC:

13:28 < jdstrand> jhodapp: ok, so, unless there are implementation flaws (which 
are just bugs that we can fix later on), a malicious app with access to 
/android/micshm can't do anything to DoS the service or to record in the 
background, correct?
13:29 < jhodapp> jdstrand: correct, because there technically would be a reader 
on the Android side always open, but it won't be doing any reads unless 
triggered by kicking off the recording process

I see no reason to not include /android/micshm in the camera policy
group. Trust store integration is being tracked in bug #1230366. Thanks!
I'll get this added in apparmor-easyprof-ubuntu 1.2.9 which should be
uploaded later today.

** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
       Status: Incomplete => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337582

Title:
  camera-app needs access to shared pipe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1337582/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to