*** This bug is a duplicate of bug 1795649 ***
    https://bugs.launchpad.net/bugs/1795649

For me bug still not fixed in Ubuntu 24.04.1.

Disabling apparmor rules does nothing because those rules does not
exist:

$ LANG=C sudo apparmor_parser -R /etc/apparmor.d/usr.bin.evince
apparmor_parser: Unable to remove "/usr/bin/evince".  Profile doesn't exist

I reported this error here:
https://bugs.launchpad.net/evince/+bug/1795649 and here:
https://gitlab.gnome.org/GNOME/evince/-/issues/1642 and it still exists

** Bug watch added: gitlab.gnome.org/GNOME/evince/-/issues #1642
   https://gitlab.gnome.org/GNOME/evince/-/issues/1642

** This bug has been marked a duplicate of bug 1795649
   evince from snap doesn't save position in pdf document

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1969896

Title:
  Evince Document Viewer(42.0) does not remember last page in 22.04 and
  opens in a tiny window when launched

Status in apparmor package in Ubuntu:
  Fix Released
Status in evince package in Ubuntu:
  Invalid
Status in apparmor source package in Jammy:
  Fix Released
Status in evince source package in Jammy:
  Invalid
Status in apparmor source package in Kinetic:
  Fix Released
Status in evince source package in Kinetic:
  Invalid

Bug description:
  [Impact]

   * Evince does not behave as expected and launches with a very small
  window resulting in a poor user experience

   * Fixing this requires only a minor change to the exo-open
  abstraction and results in correctly functioning evince

   * By removing the dbus deny rule in the exo-open abstraction, evince
  is able to correctly communicate with gvfs and start up as normal

  [Test Plan]

   * Start dbus-monitor to watch for AppArmor denials
   
   $ dbus-monitor --session | grep AppArmor

   * Launch evince and there should be no AppArmor message shown above
  from dbus-monitor

  [Where problems could occur]

   * By removing this deny rule from the exo-open abstraction, AppArmor
  will be more permissive for anything which uses the exo-open
  abstraction and potentially allow it access to gvfs where it did not
  before.

   * This should not result in any regressions as we are granting extra
  functionality which wasn't allowed before, however perhaps in the case
  of an application which expects *not* to be able to use gvfs as this
  was previously explicitly denied, it may now be able to (if it has a
  less specific allow rule) and hence it may function differently than
  before.

  [Other Info]
   
   * Whilst on the surface by removing this deny rule it may appear that this 
grants additional permissions to anything which uses the exo-open abstraction, 
this is not necessarily true as AppArmor denies all accesses by default unless 
explicitly allowed by a profile. And so in general this will not grant 
permission to use a DBus interface that an application did not have before. 
However, due to the way that deny rules take precedence over allow rules in 
AppArmor, if an application had been allowed generic dbus access to the user's 
session bus, the previous deny rule in the exo-open abstraction would then have 
denied them access to just gvfs via dbus. With this new proposed change, this 
is not explicitly denied and so is now allowed as expected. But for applcations 
which may have used the exo-open abstraction and which did *not* have DBus 
access before, this change will not result in them obtaining DBus access either.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1969896/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to