From b198591537a01f5b35c9301ca28a24c70864bcbd Mon Sep 17 00:00:00 2001 From: Patrick Schleizer Date: Tue, 14 Jan 2025 03:49:42 -0500 Subject: [PATCH] comment --- usr/lib/permission-hardener.d/25_default_whitelist_qubes.conf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/usr/lib/permission-hardener.d/25_default_whitelist_qubes.conf b/usr/lib/permission-hardener.d/25_default_whitelist_qubes.conf index aca4ca1..f8c85db 100644 --- a/usr/lib/permission-hardener.d/25_default_whitelist_qubes.conf +++ b/usr/lib/permission-hardener.d/25_default_whitelist_qubes.conf @@ -8,7 +8,7 @@ ## TODO: research ## https://github.com/QubesOS/qubes-core-agent-linux/blob/master/qubes-rpc/qfile-unpacker.c ## -## Qubes upstream security issue: +## Historic Qubes upstream security issue: ## qfile-unpacker allows unprivileged users in VMs to gain root privileges ## https://github.com/QubesOS/qubes-issues/issues/8633 ##