Source: papers
Severity: normal
X-Debbugs-Cc: [email protected], [email protected], Jamie 
Strandboge <[email protected]>
Control: affects -1 + src:apparmor

Similar to the corresponding bug in src:evince, the papers package 
(which replaces evince as upstream GNOME's document viewer) has a 
downstream-added AppArmor profile, heavily based on the one for evince, 
which originated in Ubuntu.

In theory the benefit of this profile (if I'm guessing the history 
correctly) is that it mitigates security vulnerabilities that might 
exist in poppler and similar libraries, making it harder for an attacker 
to exploint those vulnerabilities by supplying a crafted 
PDF/Postscript/etc. document. However, as with src:evince, in practice 
there are sandbox escapes that would allow an attacker to bypass it, so 
at best it makes attacks more difficult.

Meanwhile, the cost of this profile is that any time papers or one of 
its dependencies needs to do something for its normal operation that the 
author of the profile didn't foresee, that feature will not work, in 
particular the recent addition of sandboxed image loaders (using glycin 
via gdk-pixbuf).

In papers' short history, we already have a couple of bugs that appear 
to be caused by the AppArmor profile: <https://bugs.debian.org/1120163>, 
<https://bugs.debian.org/1099688>. I'm sure there are more, they just 
haven't been reported yet.

Just like evince, I'm now questioning whether the benefit of the 
AppArmor profile is worth its cost. Would we be better off without it?

    smcv

Reply via email to