Thanks for making the 'owner' changes. This should greatly help achieve the intended goal to "enforce the inaccessibility of any other user's data".
Regarding attack scenarios: the one I mentioned wrt poppler and evince is a good example. If there is a flaw in poppler that allows code execution, the a non-guest user's evince is confined via the evince apparmor profile, for the guest user it is not because the guest session profile does not allow transition to the evince profile. We should just allow 'Pix' for evince though, since the evince profile doesn't (currently) have owner match on files in @{HOME} and using Pix would then allow read of user's data. Though we could for tcpdump, which does have 'owner' in the profile. We can fix that in evince of course, but then there will be other cases like firefox, or eventually gnome- thumbnail-font, the various totem-previewers, telepathy backends, etc (all probably in oneiric). So it is a complicated problem wrt maintenance and the differing goals of gdm session profile and the other profiles on the system. I think it is ok to close this bug since you made the 'owner' changes. As for Pix and the other profiles on the system, I think this requires more thought and discussion. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/673034 Title: gdm-guest-session AppArmor profile improvements -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs