mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-03-13 09:16:35 -04:00
comment
This commit is contained in:
parent
6d282226ef
commit
eec2e2c8ee
@ -12,10 +12,13 @@
|
|||||||
## qfile-unpacker allows unprivileged users in VMs to gain root privileges
|
## qfile-unpacker allows unprivileged users in VMs to gain root privileges
|
||||||
## https://github.com/QubesOS/qubes-issues/issues/8633
|
## https://github.com/QubesOS/qubes-issues/issues/8633
|
||||||
##
|
##
|
||||||
## match both:
|
## matches both:
|
||||||
## - /usr/lib/qubes/qfile-unpacker whitelist
|
## - /usr/lib/qubes/qfile-unpacker whitelist
|
||||||
## - Not bit-for-bit identical to /usr/lib/qubes/qfile-unpacker.
|
## - Not bit-for-bit identical to /usr/lib/qubes/qfile-unpacker.
|
||||||
## - Stripping SUID from this does *not* break file copying.
|
## - Stripping SUID from this does *not* break file copying.
|
||||||
## - TODO: further reserach required on its purpose
|
## - TODO: further reserach required on its purpose
|
||||||
## - /usr/bin/qfile-unpacker
|
## - /usr/bin/qfile-unpacker
|
||||||
|
## - Appears to be an integral part of file transfer between qubes, stripping
|
||||||
|
## SUID from this in an AppVM results in that AppVM being unable to receive
|
||||||
|
## files any longer. (It can still send files to other qubes though.)
|
||||||
qfile-unpacker matchwhitelist
|
qfile-unpacker matchwhitelist
|
||||||
|
Loading…
x
Reference in New Issue
Block a user