Get Mystery Box with random crypto!

Qubes OS📢

Logo of telegram channel qubesos — Qubes OS📢 Q
Logo of telegram channel qubesos — Qubes OS📢
Channel address: @qubesos
Categories: Technologies
Language: English
Subscribers: 1.03K
Description from channel

A reasonably secure operating system for personal computers.
Qubes-OS.org
⚠️ This channel is updated ASAP after devs make an announcement to the project.
Help?
English Group: t.me/joinchat/B8FHpkEToMfgdREGV7wzRQ
German Group: @QubesOS_user_de

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

1

2 stars

1

1 stars

0


The latest Messages 7

2021-03-05 14:34:47 Qubes OS pinned «Qubes OS 4.0.4 has been released! https://www.qubes-os.org/news/2021/03/04/qubes-4-0-4/ We’re pleased to announce the release of Qubes OS 4.0.4! This is the fourth stable release of Qubes 4.0. It includes many updates over the initial 4.0 release, including:…»
11:34
Open / Comment
2021-03-05 10:58:30 XSAs released on 2021-03-04
https://www.qubes-os.org/news/2021/03/04/xsas-released-on-2021-03-04/

The Xen Project released one or more new Xen Security Advisories (XSAs) on 2021-03-04.
The security of Qubes OS is not affected by these XSAs.
Therefore, no user action is required.

XSAs that affect the security of Qubes OS (user action required)

The following XSAs do affect the security of Qubes OS:

(None)
XSAs that do not affect the security of Qubes OS (no user action required)

The following XSAs do not affect the security of Qubes OS, and no user action is necessary:

XSA-367 (not affected; Qubes uses PVH/HVM)
XSA-369 (DoS only)
Related links

Qubes Security Pack (qubes-secpack) (https://www.qubes-os.org/security/pack/)
Qubes Security Bulletins (QSBs) (https://www.qubes-os.org/security/bulletins/)
XSA Tracker (https://www.qubes-os.org/security/xsa/)
464 views07:58
Open / Comment
2021-03-05 10:58:24 Qubes OS 4.0.4 has been released!
https://www.qubes-os.org/news/2021/03/04/qubes-4-0-4/

We’re pleased to announce the release of Qubes OS 4.0.4! This is the
fourth stable release of Qubes 4.0. It includes many updates over the
initial 4.0 release, including:

All 4.0 dom0 updates to date
Fedora 32 TemplateVM
Debian 10 TemplateVM
Whonix 15 Gateway and Workstation TemplateVMs
Linux kernel 5.4 by default
Qubes 4.0.4 is available on the downloads (https://www.qubes-os.org/downloads/) page.

What is a point release?

A point release does not designate a separate, new version of Qubes OS.
Rather, it designates its respective major or minor release (in this
case, 4.0) inclusive of all updates up to a certain point. Installing
Qubes 4.0 and fully updating (https://www.qubes-os.org/doc/updating-qubes-os/) it results in the same system as
installing Qubes 4.0.4.

What should I do?

If you installed Qubes 4.0, 4.0.1, 4.0.2, or 4.0.3 and have fully
updated (https://www.qubes-os.org/doc/updating-qubes-os/), then your system is already equivalent to a Qubes
4.0.4 installation. No further action is required.

Regardless of your current OS, if you wish to install (or reinstall)
Qubes 4.0 for any reason, then the 4.0.4 ISO makes this more convenient
and secure, since it bundles all Qubes 4.0 updates to date. Please see
the installation guide (https://www.qubes-os.org/doc/installation-guide/) for detailed instructions.

Thank you to all the release candidate users for testing this release
and reporting issues (https://www.qubes-os.org/doc/reporting-bugs/)!
375 views07:58
Open / Comment
2021-03-03 22:40:44 access to set any of the affected properties or features on any domain
(via the `admin.vm.property.Set` or `admin.vm.feature.Set` qrexec
services), it may use this access to elevate its privileges and
potentially take full control of the system.

Note that `qubes.FeaturesRequest` is enabled by default but *is not*
vulnerable for three reasons. First, feature names are read from
qubesd, which enforces a whitelist of permitted characters in paths.
None of the permitted characters are metacharacters in XML. Second,
none of the features for which dom0 will honor a request have their
values incorporated into libvirt XML. Third, `qubes.FeaturesRequest`
can only unset a feature or set its value to `1`.

Credits
========

This issue was discovered by Demi Marie Obenour.


References
===========

[1] https://www.qubes-os.org/doc/admin-api/

--
The Qubes Security Team
https://www.qubes-os.org/security/
368 views19:40
Open / Comment
2021-03-03 22:40:44 QSB-066: XML injection through libvirt domain configuration
https://www.qubes-os.org/news/2021/03/03/qsb-066/

We have just published Qubes Security Bulletin (QSB) 066:
XML injection through libvirt domain configuration.
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always be available in the Qubes Security Pack (qubes-secpack).

View QSB-066 in the qubes-secpack:

https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-066-2021.txt

Learn about the qubes-secpack, including how to obtain, verify, and read it:

https://www.qubes-os.org/security/pack/

View all past QSBs:

https://www.qubes-os.org/security/bulletins/



---===[ Qubes Security Bulletin 066 ]===---

2021-03-03


XML injection through libvirt domain configuration


User action required
=====================

Users must install the following specific packages in order to address
the issues discussed in this bulletin:

For Qubes 4.0:
- qubes-core-dom0 package, version 4.0.58-1

For Qubes 4.1:
- qubes-core-dom0 package, version 4.1.20-1

The packages are to be installed in dom0 via the Qube Manager or via
the qubes-dom0-update command as follows:

For updates from the stable repository (not immediately available):
$ sudo qubes-dom0-update

For updates from the security-testing repository:
$ sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing

A system restart will be required afterwards. Alternatively, it is
possible to restart qubesd with the following command in dom0:

$ systemctl restart qubesd.service

These packages will migrate from the security-testing repository to the
current (stable) repository over the next two weeks after being tested
by the community.


Summary
========

The libvirt domain configuration is an XML file built by filling a
template with values specific to a particular domain -- mostly its
properties but, in a few cases, "features" (extra properties that can be
freely defined). While most of the properties have strictly-defined
formats, some allow for a very broad range of values -- broad enough to
allow characters that are otherwise special in XML. Using such
characters in XML values requires escaping them, which was not enabled
in the template engine we use (jinja2). The specific VM metadata
properties that allow free text and are used in libvirt XML are as
follows:

- `kernelopts` property
- `timezone` feature (although it is validated in the template itself)
- `video-model` feature
- `audio-model` feature (Qubes R4.1 only)

Normally, this wouldn't be an issue, since all VM settings come from a
trusted entity (dom0). However, with the introduction of the Admin API
[1] in Qubes 4.0, it is possible to allow less trusted domains (known as
"ManagementVMs") to manage a subset of VMs or their settings, including
the affected properties and features. This, in turn, can be used to
modify unintended parts of the libvirt XML. In the worst case, this
could lead to code execution in dom0.

To fix the issue, we're enabling the autoescape feature of the jinja2
template engine. This will cover the current problematic properties as
well as any others that might be introduced in the future. Additionally,
we're adding an extra validation step for "features" that are otherwise
used in a free text form context (specifically, `net.fake-*` features
are expected to be IP addresses, but they lacked such validation).

Note that a ManagementVM can still break a VM it has control over, for
example, by setting some property to an improper value in a given
context (e.g., too little memory or too short of a startup timeout).
However, after these changes, it should no longer be able to escalate
its permissions beyond what it has been assigned.


Impact
=======

Default Qubes 4.0 and 4.1 configurations are not affected.

If a less trusted domain (known as a "ManagementVM") is given Admin API
323 views19:40
Open / Comment
2021-03-02 19:58:00 Qubes OS pinned «Xen 4.15 RC1 – Please test https://xenproject.org/2021/03/02/xen-4-15-rc1-please-test/ Xen 4.15 is in code freeze, and we cut RC1 yesterday. Please help us test it to make sure Xen 4.15 is a high quality release (and that it works...»
16:58
Open / Comment
2021-03-02 19:43:53 Xen 4.15 RC1 – Please test
https://xenproject.org/2021/03/02/xen-4-15-rc1-please-test/

Xen 4.15 is in code freeze, and we cut RC1 yesterday. Please help us test it to make sure Xen 4.15 is a high quality release (and that it works...
1.5K views16:43
Open / Comment
2021-03-01 11:15:22 Successfully downloaded in-toto metadata 'rebuild.8deb0bef.link' from rebuilder 'https://mirror.notset.fr/qubes/rebuild/yum/r4.1/vm/'
Copy final product to verification directory
Load in-toto layout '/home/user/dnf-transport-in-toto/data/root.layout' (DNF global_info)
Load in-toto layout key(s) '['9fa64b92f95e706bf28e2ca6484010b5cdc576e2']' (DNF global_info)
Use gpg keyring '/home/user/dnf-transport-in-toto/data/gnupg' (DNF global_info)
Run in-toto verification
In-toto verification for 'qubes-u2f-1.2.8-1.fc33.noarch' passed! :)
Dependencies resolved.
=======================================================================================
Package Arch Version Repository Size
=======================================================================================
Installing:
qubes-u2f noarch 1.2.8-1.fc33 qubes-vm-r4.1-current-testing 264 k
Installing dependencies:
hidapi x86_64 0.9.0-4.fc33 fedora 45 k
python3-cryptography x86_64 3.2.1-2.fc33 updates 546 k
python3-hidapi x86_64 0.9.0.post2-2.fc33 fedora 50 k
python3-u2flib-host noarch 3.0.3-9.fc33 qubes-vm-r4.1-current-testing 49 k

Transaction Summary
=======================================================================================
Install 5 Packages

Total download size: 954 k
Installed size: 3.6 M


Next steps

As explained above, some parts still need finishing, as well as cleanups and proper documentation. But we are very close to the point where every Debian package we build can be independently verified. The very same tooling we’ve made can be used to verify native Debian packages, too, which should also be helpful for non-Qubes Debian users. Similar progress has already been made for Fedora, although some more work is needed on the Fedora side to allow reproducing native (not only Qubes-related) packages.

In the broader future, our ultimate goal is to make all parts of Qubes OS reproducible, including templates and the installation image. Reproducible packages are the first step toward this goal, which incidentally is also the most valuable step to our users and the broader community.

Acknowledgements

This work is possible thanks to generous support (https://www.qubes-os.org/news/2020/05/22/moss-mission-partners-award/) from Mozilla Open Source Support (MOSS) (https://www.mozilla.org/en-US/moss/).

I’d like also to thank GitLab for granting us a free GitLab Gold license, which enabled much higher service quotas.
324 views08:15
Open / Comment