Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that DO affect the security of Qubes OS
The
Dear Qubes Community,
We're pleased to announce the first [release
candidate](#what-is-a-release-candidate) for Qubes 4.1.2! This [patch
release](#what-is-a-patch-release) aims to consolidate all the security
patches, bug fixes, and upstream template OS upgrades that have occurred since
prior
On 2/7/23 12:24 PM, Ulrich Windl wrote:
> How do you use a YubiKey (OpenPGP card, etc.) in Qubes OS?
In case you (or anyone else reading this) has not already seen it, there is a
documentation page on this:
https://www.qubes-os.org/doc/yubikey/
--
You received this message because you are
On 2/1/23 12:54 PM, davaiigoo wrote:
> According to the documentation, there is way to enable networking in Qubes
> templates for sources other than updates from apt-get or dnf .
>
> https://www.qubes-os.org/doc/how-to-install-software/#installing-software-from-other-sources
>
> Tried different
Dear Qubes Community,
The following is a guest post by Michal Zygowski from
[3mdeb](https://3mdeb.com/) on the work they've been doing to upgrade [Anti
Evil Maid (AEM)](https://www.qubes-os.org/doc/anti-evil-maid/). The original
post can be found on the [3mdeb
Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that DO affect the security of Qubes OS
The
Dear Qubes Community,
The Qubes OS Project is grateful to have been selected as one of the
beneficiaries of this year's Proton charity fundraiser alongside so many other
wonderful organizations. The continued support of the privacy community means
the world to us! For details about the
On 12/10/22 8:20 AM, Foilsurf wrote:
> Hello,
> Obsidian is quite simple tech (text-files), but quite clever for taking
> notes. And run under Linux (TheBrain e.g. not any more). Additionally it
> has the local principal, so it would be found a perfect place in a own VM,
> I think.
> Would it
Dear Qubes Community,
The Fedora Project has
[announced](https://lists.fedoraproject.org/archives/list/devel-annou...@lists.fedoraproject.org/thread/OGTVKLX7OXBYCEUQ66UY4YK3T6QHAYW5/)
that Fedora 35 will reach EOL
([end-of-life](https://fedoraproject.org/wiki/End_of_life)) on 2022-12-13. We
Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that DO affect the security of Qubes OS
The
Dear Qubes Community,
We have published Qubes Canary 033. The text of this canary is
reproduced below.
This canary and its accompanying signatures will always be available in
the Qubes security pack (qubes-secpack).
View Qubes Canary 033 in the qubes-secpack:
Dear Qubes Community,
We have just published [Qubes Security Bulletin (QSB) 087: Qrexec: Injection of
unsanitized data into log
output](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-087-2022.txt).
The text of this QSB is reproduced below. This QSB and its accompanying
Dear Qubes Community,
The [Xen Project](https://xenproject.org/) has released one or more [Xen
security advisories (XSAs)](https://xenbits.xen.org/xsa/).
The security of Qubes OS *is affected*.
Therefore, *user action is required*.
## XSAs that DO affect the security of Qubes OS
The following
Dear Qubes Community,
We have just published [Qubes Security Bulletin (QSB) 086: Speculative security
issues on AMD CPUs
(XSA-422)](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-086-2022.txt).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures
Dear Qubes Community,
The Xen Project has released one or more Xen Security Advisories (XSAs).
The security of Qubes OS *is affected*.
Therefore, *user action is required*.
## XSAs that DO affect the security of Qubes OS
The following XSAs *do affect* the security of Qubes OS:
- XSA-414
Dear Qubes Community,
We have just published [Qubes Security Bulletin (QSB) 085: Xenstore: Guests can
crash xenstored
(XSA-414)](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-085-2022.txt).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will
On 10/28/22 9:06 AM, Scat wrote:
> I just had a strange experience, here is what happened:
>
> - My computer accidentally shut down as the computer became unplugged
> - I am not sure if I accidentally hid the task bar?
>
> Regardless my task bar disappeared...not sure I am using the right term
Dear Qubes Community,
We have just published a new article:
"New user guide: How to organize your qubes"
https://www.qubes-os.org/news/2022/10/28/how-to-organize-your-qubes/
As a courtesy to plain-text email users, the plain-text source is reproduced
below.
Dear Qubes Community,
The Xen Project has released one or more Xen Security Advisories (XSAs).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that affect the security of Qubes OS (user action required)
The following XSAs *do affect* the security of
Dear Qubes Community,
We are pleased to announce that the Qubes OS Project is now accepting
[donations](https://www.qubes-os.org/donate/) on
[Ethereum](https://ethereum.org/) (Mainnet) at the following address:
```
0xDaa04647e8ecb616801F9bE89712771F6D291a0C
```
*Warning*: This [Gnosis
On 9/16/22 5:43 AM, Demi Marie Obenour wrote:
> On Fri, Sep 16, 2022 at 05:42:05AM -0700, Andrew David Wong wrote:
>> On 9/15/22 12:25 AM, Demi Marie Obenour wrote:
>>> On Thu, Sep 15, 2022 at 01:38:57AM +0200, Ulrich Windl wrote:
>>>> On 7/31/22 15:23, 'awokd' via q
On 9/15/22 12:25 AM, Demi Marie Obenour wrote:
> On Thu, Sep 15, 2022 at 01:38:57AM +0200, Ulrich Windl wrote:
>> On 7/31/22 15:23, 'awokd' via qubes-users wrote:
>>> 'felix' via qubes-users:
I want to reinstall Qubes 4.1, but I cannot select any templates in
the installer.
Dear Qubes Community,
We have published Qubes Canary 032. The text of this canary is
reproduced below.
This canary and its accompanying signatures will always be available in
the Qubes security pack (qubes-secpack).
View Qubes Canary 032 in the qubes-secpack:
Dear Qubes Community,
We've just published a new guest article by Michał Żygowski from 3mdeb about
the history of Qubes OS Summits. Thanks for sharing with us today, Michał!
"Qubes OS Summit: History from organizer's perspective"
by Michał Żygowski
On 9/3/22 5:56 AM, Ulrich Windl wrote:
> Hi !
>
> So eventually I decided to upgrade my Qubes OS installation by backup,
> install, then restore.
> Unfortunately I'm stuck, and here is my negative experience:
> First when using a custom disk layout, i.e.: reuse VG and LV from the current
>
On 9/3/22 2:18 PM, Ulrich Windl wrote:
> Hi!
>
> It seems in Qubes OS 4.0 I can't select debian-11 as template for a dvm. What
> are the reasons?
>
> Regards,
> Ulrich
>
Disposables cannot be based directly on regular templates. Instead, you must
first create an app qube and designate it as
On 8/24/22 2:31 PM, Franz wrote:
> Hello,
> the following command is intended to run an application in a new DVM:
>
> qvm-run --dispvm=debian-11-dvm --service qubes.StartApp+
>
> If in place of I put firefox-esr or brave-browser it works, the
> new DVM is opened and the application works as
On 8/22/22 5:42 PM, Franz wrote:
> Hello,
> in a higher resolution screen characters are too small in templates.
> Nothing seems to work to increase the text size of the user interface, such
> as the text in nautilus or bookmarks in firefox or brave-browser.
>
> I tried
> QT_SCALE_FACTOR=1.34
On 8/21/22 8:25 AM, Steve Coleman wrote:
> On Sun, Aug 21, 2022 at 10:29 AM 'unman' via qubes-users <
> qubes-users@googlegroups.com> wrote:
>
>> On Sat, Aug 13, 2022 at 10:02:15PM +0200, Qubes wrote:
>>
>> qubes-dom0-update --repo=qubes-contrib-dom0-r4.1-current --action=list
>>
> Q1: Is there
On 8/14/22 8:36 AM, 'Crsi' via qubes-users wrote:
> I also checked "verify backup" -- no error reported.
Just to clarify, the "verify only" option simulates a restore operation without
actually writing any data from the backup to disk. This has two implications:
1. This option is not at all
On 8/9/22 12:40 PM, Franz wrote:
> On Tue, Aug 9, 2022 at 4:33 PM Qubes wrote:
>
>> Franz wrote:
>>> Hello, dear friends
>>>
>>> New installation 4.1.1
>>>
>>> I am trying to set debian-11-mu-dvm as default disp vm template for the
>>> whole system, but the command
>>>
>>> qvm-prefs
On 8/9/22 7:00 AM, roger paranoia wrote:
> Hello
>
> I would like to install ttf-mscorefonts-installer with the following
> command:
>
> sudo apt install ttf-mscorefonts-installer
>
> but as it privative stuff, it is not directly available in the regular
> repositories. It actually tries to
Dear Qubes Community,
We have just published [Qubes Security Bulletin (QSB) 084: Split GPG: GnuPG
file descriptor confusion and file existence
leak](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-084-2022.txt).
The text of this QSB is reproduced below. This QSB and its
Dear Qubes Community,
As [previously
announced](https://www.qubes-os.org/news/2022/07/04/qubes-os-4-0-eol-on-2022-08-04/),
all releases in the Qubes 4.0 series (which includes the most recent 4.0.4
patch release) have officially reached EOL (end-of-life) as of today,
2022-08-04. We strongly
Dear Qubes Community,
In conjunction with [3mdeb](https://3mdeb.com/), the fourth edition of our
Qubes OS Summit will be held live this year from September 9 to 11 in Berlin,
Germany! For more information about this event, including the CFP (which is
open until August 29), please see:
Dear Qubes Community,
The Xen Project has released one or more Xen Security Advisories (XSAs).
The security of Qubes OS *is not affected*.
Therefore, *no user action is required*.
## XSAs that affect the security of Qubes OS (user action required)
The following XSAs *do affect* the security of
On 7/25/22 4:53 PM, 'taran1s' via qubes-users wrote:
> I tried this but didn't succeed.
>
> sudo qubes-dom0-update qt5-qtstyleplugins
> sudo qubes-dom0-update
> export QT_QPA_PLATFORMTHEME=gtk2
>
> cat /etc/environment QT_QPA_PLATFORMTHEME=gtk2
> cat: 'QT_QPA_PLATFORMTHEME=gtk2': No such file or
On 7/22/22 7:07 PM, Demi Marie Obenour wrote:
> [...]
>
> That reminds me: Marek, should we set repo_gpgcheck=1 and/or
> %_pkgverify_level all in dom0, to protect against mistakes like this?
FWIW: https://github.com/QubesOS/qubes-issues/issues/7628
--
You received this message because you are
are you seeing 4.1.2?
Also, this announcement isn't actually that long, but it's divided up
into small sections anyway, so feel free to skim and skip the ones that
aren't relevant to you.
Best,
Andrew
P.S. -- Please avoid top-posting.
On Monday, July 18, 2022 at 6:59:52 PM UTC-7 a...@qubes
Dear Qubes Community,
We're pleased to announce the stable release of Qubes 4.1.1! This
release aims to consolidate all the security patches, bug fixes, and
upstream template OS upgrades that have occurred since the initial Qubes
4.1.0 release in February. Our goal is to provide a secure and
bes website:
https://www.qubes-os.org/news/2022/07/13/xsas-released-on-2022-07-12/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from t
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 083: Retbleed:
Arbitrary speculative code execution with return instructions (XSA-407).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be available in the Qubes Security
announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/07/05/xsas-released-on-2022-07-05/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qube
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 082: Memory
management issues in PV frontend drivers. The text of this QSB is
reproduced below. This QSB and its accompanying signatures will always
be available in the Qubes Security Pack (qubes-secpack).
View QSB-082
oc/upgrade/4.1/#in-place-upgrade
[7] https://www.qubes-os.org/downloads/#qubes-release-4-1-0
[8] https://www.qubes-os.org/news/2022/06/27/qubes-4-1-1-rc1/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/07/04/qubes-os-4-0-eol-on-2022-08-04/
--
Andrew
/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/06/27/fedora-36-templates-available/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
s.org/news/2022/06/27/qubes-4-1-1-rc1/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails fr
bes website:
https://www.qubes-os.org/news/2022/06/17/xsas-released-on-2022-06-14/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from t
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 081: x86: MMIO
Stale Data vulnerabilities (XSA-404). The text of this QSB is reproduced
below. This QSB and its accompanying signatures will always be available
in the Qubes Security Pack (qubes-secpack).
View QSB-081 in
contained" from a security perspective and nothing malicious
need be afoot. It could just be that the underlying hardware is failing
under load, which often manifests as spontaneous hard reboots.
This is just one possibility to consider.
--
Andrew David Wong
Community Manager
The Qu
Dear Qubes Community,
We have published Qubes Canary 031. The text of this canary is
reproduced below.
This canary and its accompanying signatures will always be available in
the Qubes security pack (qubes-secpack).
View Qubes Canary 031 in the qubes-secpack:
le on the Qubes website:
https://www.qubes-os.org/news/2022/06/09/xsas-released-on-2022-06-09/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 080:
Issues with PV domains and PCI passthrough (XSA-401, XSA-402).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be available in the Qubes Security Pack
(qubes-secpack).
-and-eol
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/06/07/fedora-34-eol/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-
-os.org/news/2022/05/26/fedora-34-approaching-eol-fedora-35-templates-available/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
Dear Qubes Community,
A new article has just been published on the Qubes website:
"Automated OS testing on physical laptops"
by Marek Marczykowski-Górecki
https://www.qubes-os.org/news/2022/05/05/automated-os-testing-on-physical-laptops/
The original Markdown source is reproduced below as a
/#qubes-os
[4] https://www.qubes-os.org/doc/supported-releases/#note-on-whonix-support
[5] https://www.qubes-os.org/doc/upgrade/4.1/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/04/20/whonix-support-for-qubes-4-0-has-ended/
--
Andrew David Wong
Dear Qubes Community,
We've just published a new guest article by Ivan Kardykov from
tabit-pro, who we've invited to explain the work
the tabit-pro team contributed to Qubes 4.1.
"Windows integration work in Qubes 4.1 by the tabit-pro team"
by Ivan Kardykov
announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/04/05/xsas-released-on-2022-04-05/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qube
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 079: Two IOMMU-
related Xen issues (XSA-399, XSA-400). The text of this QSB is
reproduced below. This QSB and its accompanying signatures will always
be available in the Qubes Security Pack (qubes-secpack).
View QSB-079
://www.qubes-os.org/news/2022/03/23/qubes-os-configuration-survey/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
://www.qubes-os.org/news/2022/03/17/whonix-support-for-qubes-4-0-extended/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
in dom0.
You might also be able to use USB pass-through. That said, is there any
chance that SCSI pass-through could be supported, Marek?
Follow-up issue (for anyone following this thread):
https://github.com/QubesOS/qubes-issues/issues/7347
--
Andrew David Wong
Community Manager
The Qubes OS
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 078: Linux kernel
PV driver issues and LVM misconfiguration. The text of this QSB is
reproduced below. This QSB and its accompanying signatures will always
be available in the Qubes Security Pack (qubes-secpack).
View
Dear Qubes Community,
The Xen Project has released one or more Xen Security Advisories (XSAs).
The security of Qubes OS *is affected*.
Therefore, *user action is required*.
XSAs that affect the security of Qubes OS (user action required)
Dear Qubes Community,
The Xen Project has released one or more Xen Security Advisories (XSAs).
The security of Qubes OS *is affected*.
Therefore, *user action is required*.
XSAs that affect the security of Qubes OS (user action required)
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 077: Multiple
speculative security issues (XSA-398). The text of this QSB is
reproduced below. This QSB and its accompanying signatures will always
be available in the Qubes Security Pack (qubes-secpack).
View QSB-077 in
be
entirely removed or entirely replaced with an empty string. Google
Groups will not allow it.
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubs
Dear Qubes Community,
We have published Qubes Canary 030. The text of this canary is
reproduced below.
This canary and its accompanying signatures will always be available in
the Qubes security pack (qubes-secpack).
View Qubes Canary 030 in the qubes-secpack:
hanged to some other
mechanism to display error messages.
Best regards, Peter Funk
Thanks for the bug report, Peter. I've copied it into qubes-issues:
https://github.com/QubesOS/qubes-issues/issues/7280
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You r
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 076: Intel
microcode updates. The text of this QSB is reproduced below. This QSB
and its accompanying signatures will always be available in the Qubes
Security Pack (qubes-secpack).
View QSB-076 in the qubes-secpack:
For a full list, including more detailed descriptions, please see here:
https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.1%22+label%3A%22release+notes%22+is%3Aclosed
This announcement is also available on the Qubes website:
https://www.qubes-os.or
ty/qsb/>
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/01/25/xsas-released-on-2022-01-25/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Goog
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 075: Insufficient
cleanup of passed-through device IRQs (XSA-395). The text of this QSB
is reproduced below. This QSB and its accompanying signatures will
always be available in the Qubes Security Pack (qubes-secpack).
/#release-schedule
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2022/01/18/qubes-4-1-0-rc4/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
not aware of an actual Thunderbird extension for it, but you can set
it up yourself by following the instructions here, for example:
https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/tips-and-tricks.md#opening-links-in-your-preferred-appvm
--
Andrew David Wong
Community
at this stage of the R4.1-rc series).
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails fro
-schedule
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/12/21/qubes-4-1-rc3/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-
ecurity pack (qubes-secpack):
<https://www.qubes-os.org/security/pack/>
- Qubes security bulletins (QSBs): <https://www.qubes-os.org/security/qsb/>
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/12/20/xsas-released-on-2021-12-20/
--
And
are. Simply hover over one of the release subheadings,
then click on the link icon that appears. You'll get a URL like this:
https://www.qubes-os.org/doc/template/debian/upgrade/#debian-11-bullseye
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received
Dear Qubes Community,
We have published Qubes Canary 029. The text of this canary is
reproduced below.
This canary and its accompanying signatures will always be available in
the Qubes security pack (qubes-secpack).
View Qubes Canary 029 in the qubes-secpack:
/debian-11-templates-available/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, sen
On 11/30/21 10:18 AM, Ulrich Windl wrote:
On 11/30/21 12:32 PM, Andrew David Wong wrote:
On 11/29/21 12:06 PM, 'Rune Philosof' via qubes-users wrote:
When I follow the guide
on https://www.qubes-os.org/security/verifying-signatures/
I get the following result
```
[vagrant@fedora ~]$ gpg2
-releases/#templates
[8] https://www.qubes-os.org/doc/supported-releases/#note-on-dom0-and-eol
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/11/30/fedora-33-eol/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You
likely will at some point, but it's not an action to be taken lightly.
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
lt;https://www.qubes-os.org/security/qsb/>
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/11/24/xsas-released-on-2021-11-23/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because yo
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 074:
Xen issues related to populate-on-demand (XSA-388, XSA-389).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be available in the Qubes Security Pack
(qubes-secpack).
(qubes-secpack):
<https://www.qubes-os.org/security/pack/>
- Qubes security bulletins (QSBs): <https://www.qubes-os.org/security/qsb/>
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/11/19/xsas-released-on-2021-11-19/
--
Andrew David Wong
Com
On 11/17/21 3:22 AM, taran1s wrote:
Andrew David Wong:
Dear Qubes Community,
We're pleased to announce the second release candidate for Qubes 4.1!
[...]
Is there any HCL list for Qubes 4.1? [...]
Yes, simply go here and click on the "Qubes" column header to sort by
Qubes releas
/4.1/
[16] https://www.qubes-os.org/doc/version-scheme/#release-schedule
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/11/17/qubes-4-1-rc2/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received
-os.org/news/2021/11/14/whonix-15-eol/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails fro
Dear Qubes Community,
A new article has just been published on the Qubes website:
"New Qubes application menu" by Marta Marczykowska-Górecka
https://www.qubes-os.org/news/2021/11/12/new-qubes-application-menu/
As a courtesy to plain text email readers, the original Markdown source
of the
://www.qubes-os.org/doc/supported-releases/#note-on-dom0-and-eol
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/11/11/fedora-33-approaching-eol-fedora-34-templates-available/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
from `firefox`?
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to q
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) 073: Race condition
when setting override-redirect flag. The text of this QSB is reproduced
below. This QSB and its accompanying signatures will always be available
in the Qubes Security Pack (qubes-secpack).
View
, but I'm still
experiencing on 4.0, as well. I've just gotten in the habit of trying
not to let my backups run between ~1-6am. :\
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
on the Qubes website:
https://www.qubes-os.org/news/2021/10/11/qubes-4-1-rc1/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
Dear Qubes Community,
A new article has just been published on the Qubes website:
"Reproducible builds for Debian: a big step forward" by Frédéric Pierret
https://www.qubes-os.org/news/2021/10/08/reproducible-builds-for-debian-a-big-step-forward/
For your convenience, the original Markdown
s-os.org/news/2021/10/07/xsas-released-on-2021-10-05/
--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop recei
/supported-releases/#note-on-whonix-support
[5] https://www.whonix.org/wiki/Qubes/Install
[6] https://www.whonix.org/wiki/Release_Upgrade_Whonix_15_to_Whonix_16
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/09/30/whonix-16-template-available/
--
Andrew
101 - 200 of 1727 matches
Mail list logo