Qubes OS Project Qubes OS
  • Introduction
  • Downloads
  • Documentation
  • News
  • Team
  • Donate

News

Categories Statistics

XSA-248 through XSA-251 do not affect the security of Qubes OS

2017-12-12 by Andrew David Wong in Security

The Xen Project has published Xen Security Advisories 248 through 251 (XSA-248 through XSA-251). These XSAs do not affect the security of Qubes OS, and no user action is necessary.

These XSAs have been added to the XSA Tracker:

  • https://www.qubes-os.org/security/xsa/#248
  • https://www.qubes-os.org/security/xsa/#249
  • https://www.qubes-os.org/security/xsa/#250
  • https://www.qubes-os.org/security/xsa/#251

Recent news

  • Qubes-certified NovaCustom V54 and V56 Series laptops now available with Heads firmware Posted in Announcements on 2025-05-20
  • XSAs released on 2025-05-12 Posted in Security on 2025-05-15
  • QSB-107: Multiple CPU branch prediction vulnerabilities Posted in Security on 2025-05-15
  • Invisible Things Lab is hiring a Linux graphics stack developer to work on Qubes OS Posted in Announcements on 2025-05-08
  • Fedora 40 approaching end of life Posted in Announcements on 2025-03-16
  • Qubes Canary 042 Posted in Security on 2025-03-08
  • XSAs released on 2025-02-27 Posted in Security on 2025-02-27

Recent news

  • Qubes-certified NovaCustom V54 and V56 Series laptops now available with Heads firmware Posted in Announcements on 2025-05-20
  • XSAs released on 2025-05-12 Posted in Security on 2025-05-15
  • QSB-107: Multiple CPU branch prediction vulnerabilities Posted in Security on 2025-05-15
  • Invisible Things Lab is hiring a Linux graphics stack developer to work on Qubes OS Posted in Announcements on 2025-05-08
  • Fedora 40 approaching end of life Posted in Announcements on 2025-03-16
  • Qubes Canary 042 Posted in Security on 2025-03-08
  • XSAs released on 2025-02-27 Posted in Security on 2025-02-27

Search qubes-os.org

Introduction
  • What is Qubes OS?
  • Endorsements
  • Getting started
  • Video tours
  • Screenshots
  • FAQ
  • Help and support
  • Security center
  • Architecture
  • Code of conduct
Downloads
  • System requirements
  • Certified hardware
  • Compatibility list
  • Installation guide
  • Verifying signatures
  • Supported releases
  • Version scheme
  • Source code
  • Software license
  • Download mirrors
Documentation
  • Introduction
  • Choosing hardware
  • Installing and upgrading
  • How-to guides
  • Templates
  • Troubleshooting
  • Security in Qubes
  • Project security
  • Developer docs
  • External docs
News
  • Announcements
  • Userbase statistics
  • Research
  • GitHub
  • Qubes forum
  • Twitter
  • Mastodon
  • Reddit
  • LinkedIn
Team
  • Report a bug
  • Report a security Issue
  • Inquiries
  • Core team
  • Emeritus
  • Community contributors
Donate
  • How to donate
  • Qubes Partners
  • How to contribute
Qubes Qubes OS

© The Qubes OS Project and others
Website source code | Tor onion service | Privacy policy | Report a problem | Terms of use | Sitemap