Skip to content

Latest commit

 

History

History
13 lines (8 loc) · 892 Bytes

2023-10-25.md

File metadata and controls

13 lines (8 loc) · 892 Bytes

Security Advisory 2023-10-25

For users testing our new Qubes integration (beta), please note that our instructions were missing a configuration detail for disposable VMs which is necessary to fully harden the configuration.

These instructions apply to users who followed the setup instructions before October 25, 2023.

What you need to do: run the following command in dom0:

qvm-prefs dz-dvm default_dispvm ''

Explanation: In Qubes OS, the default template for disposable VMs is network-connected. For this reason, we instruct users to create their own disposable VM (dz-dvm). However, adversaries with the ability to execute commands on dz-dvm would also be able open new disposable VMs with the default settings. By setting the default_dispvm to "none" we prevent this bypass.