Ensure that VM LVM volumes are not parsed by dom0 tools #2319
Labels
C: installer
C: other
P: major
Priority: major. Between "default" and "critical" in severity.
security
This issue pertains to the security of Qubes OS.
T: task
Type: task. An action item that is neither a bug nor an enhancement.
This scanning include:
This all should be easy to blacklist using appropriate udev rule, similar to this:
https://github.com/QubesOS/qubes-core-admin-linux/blob/master/system-config/00-qubes-ignore-devices.rules
QubesOS/qubes-core-admin-linux@ae7656e
It needs to be included in:
The text was updated successfully, but these errors were encountered: