Dear Qubes Community, The Xen Project has released one or more new Xen Security Advisories (XSAs). The security of Qubes OS *is not affected* by these XSAs. Therefore, *no user action is required*.
XSAs that affect the security of Qubes OS (user action required) ---------------------------------------------------------------- The following XSAs *do affect* the security of Qubes OS: - (None) XSAs that do not affect the security of Qubes OS (no user action required) --------------------------------------------------------------------------The following XSAs *do not affect* the security of Qubes OS, and no user action is necessary:
- XSA-370 (Qubes OS does not support 32-bit PV guests. In Qubes 4.0, PV guests cannot switch from 32-bit to 64-bit on their own, and we ship only 64-bit kernels. In Qubes 4.1, 32-bit PV is disabled at build time.)
Related links -------------- Qubes Security Pack (qubes-secpack): https://www.qubes-os.org/security/pack/ - Qubes Security Bulletins (QSBs): https://www.qubes-os.org/security/bulletins/
- XSA Tracker: https://www.qubes-os.org/security/xsa/ This announcement is also available on the Qubes website: https://www.qubes-os.org/news/2021/05/04/xsas-released-on-2021-05-04/ -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e493ad60-518f-8fd3-594d-b96dfc11b296%40qubes-os.org.
OpenPGP_signature
Description: OpenPGP digital signature