[qubes-users] XSAs released on 2021-09-08

2021-09-08 Thread Andrew David Wong

Dear Qubes Community,

The Xen Project has released one or more Xen Security Advisories (XSAs).
The security of Qubes OS *is not affected* by one or more of these XSAs.
Therefore, *no user action is required*.


XSAs that affect the security of Qubes OS (user action required)


The following XSAs *do affect* the security of Qubes OS:

 - (None)


XSAs that do not affect the security of Qubes OS (no user action required)
--

The following XSAs *do not affect* the security of Qubes OS, and no user 
action is necessary:


 - XSA-384 (already covered by the fix for QSB-070)


Related links
-

 - Xen Project XSA list: 
 - Qubes XSA tracker: 
 - Qubes security pack (qubes-secpack): 

 - Qubes security bulletins (QSBs): 




This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/09/08/xsas-released-on-2021-09-08/

--
Andrew David Wong
Community Manager
The Qubes OS Project
https://www.qubes-os.org

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f5f6e66f-2656-0a7e-d86a-9d3d9a22f450%40qubes-os.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-users] qvm-usb is broken in qubes 4 / debian-10

2021-09-08 Thread Vitali Andrusevich

Small update:

Upgraded Debian Template From Debian-10 to Debian-11.
It didn't help unfortunately. Problem persists.

BTW, USB attachment to VM running Fedora-32 Template still works without 
any problems.


Regards,
Vit

On 9/8/21 3:12 PM, Vitali Andrusevich wrote:

Hi.

After recent update my qvm-usb got broken:

[user@dom0 ~]$ qvm-usb
BACKEND:DEVID  DESCRIPTION  USED BY
sys-usb:2-1    Generic_EMV_Smartcard_Reader
sys-usb:2-10   8087_0aaa
sys-usb:2-3    Yubico_Yubikey_4_U2F+CCID
sys-usb:2-8    SunplusIT_Inc_Integrated_Camera
sys-usb:2-9    06cb_00bd_949e07fbc025



[user@dom0 ~]$ qvm-usb a myvm sys-usb:2-3
Device attach failed: /usr/lib/qubes/usb-import: 50: 
/usr/lib/qubes/usb-import: cannot open 
/sys/devices/platform/vhci_hcd/status: No such fileNo unused port found! 
VM: "work-term" File: "/usr/lib/qubes/usb-import" Version Control: 
https://github.com/QubesOS/qubes-app-linux-usb-proxy/blob/master/src/usb-import/usr/lib/qubes/usb-import: 
81: /usr/lib/qubes/usb-import: cannot create 
/sys/devices/platform/vhci_hcd/attach: Directory nonexistent

[user@dom0 ~]$


[user@dom0 ~]$ rpm -q -a | grep -i usb | grep -i qub
qubes-usb-proxy-dom0-1.1.0-1.fc25.noarch

Template VM is debian-10

user@debian-10:~$ dpkg -l | grep -i qub | grep -i usb
ii  qubes-usb-proxy   1.1.0+deb10u1  
amd64    USBIP wrapper to run it over Qubes RPC connection



Regards,
Vitali



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/900af89e-f808-853a-e991-41c066347ccf%40premium-security.com.


[qubes-users] HCL - Purism Librem Mini (v1)

2021-09-08 Thread Matt DeVillier


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5cedc1baa3ac5719175671da82fe8cc1fb084155.camel%40puri.sm.


Qubes-HCL-Purism-Librem_Mini-20210908-105956.yml
Description: application/yaml


signature.asc
Description: This is a digitally signed message part


[qubes-users] HCL - Purism Librem Mini v2

2021-09-08 Thread Matt DeVillier


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ae0a2d0f66c9b5c49ba137e3ce5097209f3bc974.camel%40puri.sm.


Qubes-HCL-Purism-librem_mini_v2-20210908-104209.yml
Description: application/yaml


signature.asc
Description: This is a digitally signed message part


[qubes-users] HCL - Purism Librem 14

2021-09-08 Thread Matt DeVillier


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/300a400c536f64602908b8c2d14ba4fd0a8db7bf.camel%40puri.sm.


Qubes-HCL-Purism-librem_14-20210908-102000.yml
Description: application/yaml


signature.asc
Description: This is a digitally signed message part


[qubes-users] qvm-usb is broken in qubes 4 / debian-10

2021-09-08 Thread Vitali Andrusevich

Hi.

After recent update my qvm-usb got broken:

[user@dom0 ~]$ qvm-usb
BACKEND:DEVID  DESCRIPTION  USED BY
sys-usb:2-1Generic_EMV_Smartcard_Reader
sys-usb:2-10   8087_0aaa
sys-usb:2-3Yubico_Yubikey_4_U2F+CCID
sys-usb:2-8SunplusIT_Inc_Integrated_Camera
sys-usb:2-906cb_00bd_949e07fbc025



[user@dom0 ~]$ qvm-usb a myvm sys-usb:2-3
Device attach failed: /usr/lib/qubes/usb-import: 50: 
/usr/lib/qubes/usb-import: cannot open 
/sys/devices/platform/vhci_hcd/status: No such fileNo unused port found! 
VM: "work-term" File: "/usr/lib/qubes/usb-import" Version Control: 
https://github.com/QubesOS/qubes-app-linux-usb-proxy/blob/master/src/usb-import/usr/lib/qubes/usb-import: 
81: /usr/lib/qubes/usb-import: cannot create 
/sys/devices/platform/vhci_hcd/attach: Directory nonexistent

[user@dom0 ~]$


[user@dom0 ~]$ rpm -q -a | grep -i usb | grep -i qub
qubes-usb-proxy-dom0-1.1.0-1.fc25.noarch

Template VM is debian-10

user@debian-10:~$ dpkg -l | grep -i qub | grep -i usb
ii  qubes-usb-proxy   1.1.0+deb10u1 
 amd64USBIP wrapper to run it over Qubes RPC connection



Regards,
Vitali

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/03525643-6284-4774-d20b-27d1d6c79df3%40premium-security.com.