Dear Qubes Community,
The Xen Project has released one or more new Xen Security Advisories (XSAs).
The security of Qubes OS *is not affected* by these XSAs.
Therefore, *no user action is required*.
XSAs that affect the security of Qubes OS (user action required)
----------------------------------------------------------------
The following XSAs *do affect* the security of Qubes OS:
- (None)
XSAs that do not affect the security of Qubes OS (no user action required)
--------------------------------------------------------------------------
The following XSAs *do not affect* the security of Qubes OS, and no user
action is necessary:
- XSA-370 (Qubes OS does not support 32-bit PV guests. In Qubes 4.0,
PV guests cannot switch from 32-bit to 64-bit on their own, and we ship
only 64-bit kernels. In Qubes 4.1, 32-bit PV is disabled at build time.)
Related links
-------------
- Qubes Security Pack (qubes-secpack):
https://www.qubes-os.org/security/pack/
- Qubes Security Bulletins (QSBs):
https://www.qubes-os.org/security/bulletins/
- XSA Tracker:
https://www.qubes-os.org/security/xsa/
This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2021/05/04/xsas-released-on-2021-05-04/
--
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org