Hi,

Simon McVittie (2026-02-20):
> Any package that has a non-trivial AppArmor profile and uses gdk-pixbuf, 
> such as papers, will need something similar. Perhaps the AppArmor team 
> could help to generalize this into something that isn't a sandbox 
> escape, and doesn't require something this extensive in every affected 
> package?

If we determine it's worth the effort (#1128767), yes, I'm happy to
help (which could include trying to pull more skilled people and
coordinating the work).

A good next step could be to check if we have affected packages whose
policy is useful enough to be worth the effort. I'm adding this to my
list. Either I find time for it tomorrow or it'll have to wait until
mid-March, so help is welcome.

> (I do find myself wondering whether the AppArmor profiles for evince and 
> papers actually protect us against anything: they allow enough things 
> that I imagine there's probably at least one sandbox escape available 
> already. Identifying and isolating the particularly high-risk parts, 
> like glycin does, or isolating entire apps, like Flatpak does, are 
> probably better ways in the long term.)

+1

Cheers,
-- 
intrigeri

Reply via email to