-
-
XSA-264, XSA-265, and XSA-266 have been published. These XSAs do not affect the security of Qubes OS, and no user action is necessary. https://www.qubes-os.org/news/2018/06/27/xsa-264-265-266-qubes-not-affected/ …
-
Qubes Security Bulletin #40: Information leaks due to processor speculative store bypass (XSA-263) https://www.qubes-os.org/news/2018/05/24/qsb-40/ …
-
Qubes Security Bulletin #39: Xen vulnerability (XSA-260) and GUI daemon issue https://www.qubes-os.org/news/2018/05/08/qsb-39/ …
-
In addition, XSA-259, which was also announced today, does not affect the security of Qubes: https://www.qubes-os.org/news/2018/04/25/xsa-258-259-qubes-not-affected/ …https://twitter.com/rootkovska/status/989131301868404737 …
-
XSA-252, XSA-255, and XSA-256 do not affect the security of Qubes OS: https://www.qubes-os.org/news/2018/02/27/xsa-252-255-256-qubes-not-affected/ …
-
We've just updated Qubes Security Bulletin #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Spectre) https://www.qubes-os.org/news/2018/01/24/qsb-37-update/ …
-
So, when I was making the comment above yesterday, I only knew about XSA 253 (which doesn't affect Qubes), no details on XSA 254 was discussed on Xen pre-disclosure list back then...
-
Qubes Security Bulletin #36: Xen hypervisor issue in populate-on-demand code (XSA-247) https://www.qubes-os.org/news/2017/11/28/qsb-36/ …
-
Qubes Security Bulletin #35: Xen hypervisor issue related to grant tables (XSA-236) https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-035-2017.txt …
-
Qubes Security Bulletin #33: Xen hypervisor (XSA-231 through XSA-234) https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-033-2017.txt …
-
Qubes Security Bulletin #32: Xen hypervisor and Linux kernel vulnerabilities (XSA-226 through XSA-230): https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-032-2017.txt …
-
Qubes Security Bulletin #31: Several Xen bugs, practical impact unclear (XSA 216-224): https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-031-2017.txt …
-
Qubes Security Bulletin #30: Critical Xen bugs related to PV memory virtualization (XSA-213, XSA-214) https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-030-2017.txt …
-
And qubes is a glorified xen instance? I'm pretty sure grsec/apparmor has a way better track record than xen. How many xsa's this year? ;D
-
XSA-206 does *not* affect the security of Qubes OS, and no user action is necessary. View on the XSA tracker: https://www.qubes-os.org/security/xsa/#206 …
-
Yeah, the point was to show how much Xen bugs affect Qubes OS on average. AKA: how often to panic when new XSA comes out ;)
-
But XSA 148 & 182 were fatal inded and so we're going to ditch PV in Qubes 4. See https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt …
-
How to exploit a Xen guest-to-host bug – XSA-182 aka CVE-2016-6258 – and screw over a Qubes OS box http://reg.cx/2n7j
-
#Security readings: Xen exploitation part 3: XSA-182, Qubes escape http://blog.quarkslab.com/xen-exploitation-part-3-xsa-182-qubes-escape.html …, see more http://tweetedtimes.com/LinuxSec?s=tnp
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.