Regarding the file permissions: since apps run in the user's session
under the user's UID, apps would have this access. Apps with the camera
policy group (a common policy group available to apps without
restriction) would then be able to access the socket. I'm not sure what
you mean by 'as a user by the same name'. Apps can fork and change their
exec line to fake being another app's executable. Can you elaborate?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1340345

Title:
  please use exclusive pipe access for /dev/socket/micshm

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtubuntu-camera/+bug/1340345/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to