passwordless-root: policykit: restrict access to group qubes
Without this restriction system users can start processes with root privileges: $ sudo -u mail systemd-run --pipe -q id uid=0(root) gid=0(root) groups=0(root)
This commit is contained in:
parent
a695902d68
commit
a8b29c3fa6
@ -1,5 +1,5 @@
|
|||||||
[Qubes allow all]
|
[Qubes allow all]
|
||||||
Identity=*
|
Identity=unix-group:qubes
|
||||||
Action=*
|
Action=*
|
||||||
ResultAny=yes
|
ResultAny=yes
|
||||||
ResultInactive=yes
|
ResultInactive=yes
|
||||||
|
Loading…
Reference in New Issue
Block a user