Thanks for your comment, between that and this follow-up discussion on
IRC:
13:28 < jdstrand> jhodapp: ok, so, unless there are implementation flaws (which
are just bugs that we can fix later on), a malicious app with access to
/android/micshm can't do anything to DoS the service or to record in the
background, correct?
13:29 < jhodapp> jdstrand: correct, because there technically would be a reader
on the Android side always open, but it won't be doing any reads unless
triggered by kicking off the recording process
I see no reason to not include /android/micshm in the camera policy
group. Trust store integration is being tracked in bug #1230366. Thanks!
I'll get this added in apparmor-easyprof-ubuntu 1.2.9 which should be
uploaded later today.
** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337582
Title:
camera-app needs access to shared pipe
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor-easyprof-ubuntu/+bug/1337582/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs