*** This bug is a duplicate of bug 1795649 *** https://bugs.launchpad.net/bugs/1795649
For me bug still not fixed in Ubuntu 24.04.1. Disabling apparmor rules does nothing because those rules does not exist: $ LANG=C sudo apparmor_parser -R /etc/apparmor.d/usr.bin.evince apparmor_parser: Unable to remove "/usr/bin/evince". Profile doesn't exist I reported this error here: https://bugs.launchpad.net/evince/+bug/1795649 and here: https://gitlab.gnome.org/GNOME/evince/-/issues/1642 and it still exists ** Bug watch added: gitlab.gnome.org/GNOME/evince/-/issues #1642 https://gitlab.gnome.org/GNOME/evince/-/issues/1642 ** This bug has been marked a duplicate of bug 1795649 evince from snap doesn't save position in pdf document -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to apparmor in Ubuntu. https://bugs.launchpad.net/bugs/1969896 Title: Evince Document Viewer(42.0) does not remember last page in 22.04 and opens in a tiny window when launched Status in apparmor package in Ubuntu: Fix Released Status in evince package in Ubuntu: Invalid Status in apparmor source package in Jammy: Fix Released Status in evince source package in Jammy: Invalid Status in apparmor source package in Kinetic: Fix Released Status in evince source package in Kinetic: Invalid Bug description: [Impact] * Evince does not behave as expected and launches with a very small window resulting in a poor user experience * Fixing this requires only a minor change to the exo-open abstraction and results in correctly functioning evince * By removing the dbus deny rule in the exo-open abstraction, evince is able to correctly communicate with gvfs and start up as normal [Test Plan] * Start dbus-monitor to watch for AppArmor denials $ dbus-monitor --session | grep AppArmor * Launch evince and there should be no AppArmor message shown above from dbus-monitor [Where problems could occur] * By removing this deny rule from the exo-open abstraction, AppArmor will be more permissive for anything which uses the exo-open abstraction and potentially allow it access to gvfs where it did not before. * This should not result in any regressions as we are granting extra functionality which wasn't allowed before, however perhaps in the case of an application which expects *not* to be able to use gvfs as this was previously explicitly denied, it may now be able to (if it has a less specific allow rule) and hence it may function differently than before. [Other Info] * Whilst on the surface by removing this deny rule it may appear that this grants additional permissions to anything which uses the exo-open abstraction, this is not necessarily true as AppArmor denies all accesses by default unless explicitly allowed by a profile. And so in general this will not grant permission to use a DBus interface that an application did not have before. However, due to the way that deny rules take precedence over allow rules in AppArmor, if an application had been allowed generic dbus access to the user's session bus, the previous deny rule in the exo-open abstraction would then have denied them access to just gvfs via dbus. With this new proposed change, this is not explicitly denied and so is now allowed as expected. But for applcations which may have used the exo-open abstraction and which did *not* have DBus access before, this change will not result in them obtaining DBus access either. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1969896/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp