Ensure that non-native virtio-GPU contexts are disabled #8969
Labels
C: GPU acceleration
C: tests
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
security
This issue pertains to the security of Qubes OS.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
How to file a helpful issue
Qubes OS release (if applicable)
Something in the future.
Brief summary
Non-native virtio-GPU contexts have a huge attack surface and must not be supported. They should be build-time disabled to ensure that they cannot be turned on by mistake.
The text was updated successfully, but these errors were encountered: