[pkg-apparmor] Bug#1127671: WARNING: Glycin running without sandbox

Simon McVittie smcv at debian.org
Sun Feb 22 12:33:54 GMT 2026


Control: retitle -1 "WARNING: Glycin running without sandbox" when AppArmor profile doesn't allow the sandbox to work
Control: affects -1 + libreoffice thunderbird evince papers

On Sun, 22 Feb 2026 at 12:59:41 +0100, Marc Haber wrote:
>On Wed, Feb 11, 2026 at 02:48:06PM +0100, Vincent Lefevre wrote:
>> Each time I run libreoffice, I now get:
>>
>> WARNING: Glycin running without sandbox.
>>
>I see the same warning (over and over, tens of times a second) when I
>start thunderbird 1:140.7.1esr-1+b1.

The common factor is that these apps have an AppArmor profile that 
doesn't allow glycin's sandboxed image loaders to operate as designed: 
one layer of security hardening is breaking another. There does not seem 
to be any easy solution to this.

For thunderbird, this is <https://bugs.debian.org/1127710>. A mitigation 
is that thunderbird's AppArmor profile is not (meant to be?) enabled by 
default, so only users whose systems have it enabled (for whatever 
reason) are affected. It seems that the most likely resolution to that 
bug report will be to remove thunderbird's AppArmor profile (which is 
probably not an effective security boundary in practice because it 
already has to allow so much, in order to not break expected 
functionality) which would result in gdk-pixbuf / glycin / bwrap working 
as intended.

evince is another affected app (<https://bugs.debian.org/1127935>) and I 
sent some prototype AppArmor profile changes to 
https://salsa.debian.org/gnome-team/extras/evince/-/merge_requests/10, 
but it really needs help from an AppArmor expert (which I am not) to 
turn that prototype into something releaseable.

For the other affected apps such as libreoffice and papers, I think the 
solution will have to involve either extending their AppArmor profiles 
so that the sandboxed image loaders can work (if the AppArmor profile is 
providing value), or removing/disabling the AppArmor profile (if it 
isn't practically helpful to mitigate/prevent attacks and is only 
causing us problems).

     smcv



More information about the pkg-apparmor-team mailing list