Qubes OS Project Qubes OS
  • Introduction
  • Downloads
  • Documentation
  • News
  • Team
  • Donate

News

Categories Statistics

XSAs 317, 319, 327, and 328 do not affect the security of Qubes OS

2020-07-07 by Andrew David Wong in Security

The Xen Project has published Xen Security Advisories 317, 319, 327, and 328 (XSA-317, XSA-319, XSA-327, and XSA-328, respectively). These XSAs do not affect the security of Qubes OS, and no user action is necessary.

These XSAs have been added to the XSA Tracker:

https://www.qubes-os.org/security/xsa/#317
https://www.qubes-os.org/security/xsa/#319
https://www.qubes-os.org/security/xsa/#327
https://www.qubes-os.org/security/xsa/#328

Recent news

  • TrenchBoot Anti Evil Maid for Qubes OS Posted in Articles on 2023-01-31
  • XSAs released on 2023-01-25 Posted in Security on 2023-01-27
  • Support the Qubes OS Project via Proton's charity fundraiser! Posted in Announcements on 2022-12-16
  • Fedora 35 reaches EOL on 2022-12-13 Posted in Announcements on 2022-12-08
  • XSAs released on 2022-12-06 Posted in Security on 2022-12-06
  • Qubes Canary 033 Posted in Security on 2022-12-04
  • QSB-087: Qrexec: Injection of unsanitized data into log output Posted in Security on 2022-11-23

Recent news

  • TrenchBoot Anti Evil Maid for Qubes OS Posted in Articles on 2023-01-31
  • XSAs released on 2023-01-25 Posted in Security on 2023-01-27
  • Support the Qubes OS Project via Proton's charity fundraiser! Posted in Announcements on 2022-12-16
  • Fedora 35 reaches EOL on 2022-12-13 Posted in Announcements on 2022-12-08
  • XSAs released on 2022-12-06 Posted in Security on 2022-12-06
  • Qubes Canary 033 Posted in Security on 2022-12-04
  • QSB-087: Qrexec: Injection of unsanitized data into log output Posted in Security on 2022-11-23

Search qubes-os.org

Introduction
  • What is Qubes OS?
  • Endorsements
  • Getting started
  • Video tours
  • Screenshots
  • FAQ
  • Help and support
  • Security center
  • Architecture
  • Code of conduct
Downloads
  • System requirements
  • Certified hardware
  • Compatibility list
  • Installation guide
  • Verifying signatures
  • Supported versions
  • Version scheme
  • Source code
  • Software license
  • Download mirrors
Documentation
  • Introduction
  • Choosing hardware
  • Installing and upgrading
  • How-to guides
  • Templates
  • Troubleshooting
  • Security in Qubes
  • Project security
  • Developer docs
  • External docs
News
  • Announcements
  • Userbase statistics
  • Research
  • GitHub
  • Qubes forum
  • Twitter
  • Mastodon
  • Reddit
  • Facebook
  • LinkedIn
Team
  • Report a bug
  • Report a security Issue
  • Inquiries
  • Core team
  • Emeritus
  • Community contributors
Donate
  • How to donate
  • Qubes partners
  • How to contribute
Qubes Qubes OS

© The Qubes OS Project and others
Website source code | Tor onion service | Privacy policy | Report a problem | Terms of use | Sitemap