How Qubes Protects you from (Linux) Dirty Pipe Vulnerability

I just popped a root shell in my fully updated whonix-ws-16 and fedora-34. Fortunately Qubes’ compartmentalization stops this from compromising further qubes :slight_smile: .

For reference, the passwordless sudo @unman is talking about is documented here: