Control: retitle -1 "WARNING: Glycin running without sandbox" when AppArmor 
profile doesn't allow the sandbox to work
Control: affects -1 + libreoffice thunderbird evince papers

On Sun, 22 Feb 2026 at 12:59:41 +0100, Marc Haber wrote:
On Wed, Feb 11, 2026 at 02:48:06PM +0100, Vincent Lefevre wrote:
Each time I run libreoffice, I now get:

WARNING: Glycin running without sandbox.

I see the same warning (over and over, tens of times a second) when I
start thunderbird 1:140.7.1esr-1+b1.

The common factor is that these apps have an AppArmor profile that doesn't allow glycin's sandboxed image loaders to operate as designed: one layer of security hardening is breaking another. There does not seem to be any easy solution to this.

For thunderbird, this is <https://bugs.debian.org/1127710>. A mitigation is that thunderbird's AppArmor profile is not (meant to be?) enabled by default, so only users whose systems have it enabled (for whatever reason) are affected. It seems that the most likely resolution to that bug report will be to remove thunderbird's AppArmor profile (which is probably not an effective security boundary in practice because it already has to allow so much, in order to not break expected functionality) which would result in gdk-pixbuf / glycin / bwrap working as intended.

evince is another affected app (<https://bugs.debian.org/1127935>) and I sent some prototype AppArmor profile changes to https://salsa.debian.org/gnome-team/extras/evince/-/merge_requests/10, but it really needs help from an AppArmor expert (which I am not) to turn that prototype into something releaseable.

For the other affected apps such as libreoffice and papers, I think the solution will have to involve either extending their AppArmor profiles so that the sandboxed image loaders can work (if the AppArmor profile is providing value), or removing/disabling the AppArmor profile (if it isn't practically helpful to mitigate/prevent attacks and is only causing us problems).

    smcv

Reply via email to