Standardize orthography

This commit is contained in:
Andrew David Wong 2021-08-07 05:03:00 -07:00
parent c6cd68fad6
commit 0ff86df211
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17
4 changed files with 13 additions and 13 deletions

View File

@ -9,9 +9,9 @@ ref: 208
title: Qubes canaries
---
A **Qubes Canary** is a security announcement periodically issued by the [Qubes
Security Team](/security/#qubes-security-team) through the [Qubes Security
Pack](/security/pack/) consisting of several statements to the effect that the
A **Qubes canary** is a security announcement periodically issued by the [Qubes
security team](/security/#qubes-security-team) through the [Qubes security
pack](/security/pack/) consisting of several statements to the effect that the
signers of the canary have not been compromised. The idea is that, as long as
signed canaries including such statements continue to be published, all is
well. However, if the canaries should suddenly cease, if one or more signers

View File

@ -13,9 +13,9 @@ ref: 218
title: Qubes security bulletins (QSBs)
---
A **Qubes Security Bulletin (QSB)** is a security announcement issued by the
A **Qubes security bulletin (QSB)** is a security announcement issued by the
[Qubes Security Team](/security/#qubes-security-team) through the [Qubes
Security Pack](/security/pack/). A QSB typically provides a summary and impact
security pack](/security/pack/). A QSB typically provides a summary and impact
analysis of one or more recently-discovered software vulnerabilities, including
details about patching to address them.

View File

@ -18,7 +18,7 @@ ref: 213
title: Qubes security pack (qubes-secpack)
---
The **Qubes Security Pack** (qubes-secpack) is a Git repository that contains:
The **Qubes security pack (qubes-secpack)** is a Git repository that contains:
- [Qubes security bulletins (QSBs)](/security/qsb/)
- [Qubes canaries](/security/canary/)

View File

@ -6,10 +6,10 @@ ref: 214
title: Xen security advisory (XSA) tracker
---
This tracker shows whether Qubes OS is affected by any given [Xen Security
Advisory (XSA)](https://xenbits.xen.org/xsa/). Shortly after a new XSA is
This tracker shows whether Qubes OS is affected by any given [Xen security
advisory (XSA)](https://xenbits.xen.org/xsa/). Shortly after a new XSA is
published, we will add a new row to this tracker. Whenever Qubes is
significantly affected by an XSA, a [Qubes Security Bulletin
significantly affected by an XSA, a [Qubes security bulletin
(QSB)](/security/qsb/) is published, and a link to that QSB is added to
the row for the associated XSA.
@ -19,7 +19,7 @@ or **No**.
* **Yes** means that the *security* of Qubes OS *is* affected.
* **No** means that the *security* of Qubes OS is *not* affected.
## Important Notes
## Important notes
* For the purpose of this tracker, we do *not* classify mere [denial-of-service
(DoS) attacks](https://en.wikipedia.org/wiki/Denial-of-service_attack) as
@ -33,10 +33,10 @@ or **No**.
any XSAs on this page, since patches are almost always published concurrently
with QSBs. Please read the QSB (if any) for each XSA for patching details.
* Embargoed XSAs are excluded from this tracker until they are publicly
released, since the [Xen Security
Policy](https://www.xenproject.org/security-policy.html) does not permit us
released, since the [Xen security
policy](https://www.xenproject.org/security-policy.html) does not permit us
to state whether Qubes is affected prior to the embargo date.
* Unused and withdrawn XSA numbers are included in the tracker for the sake of
completeness, but they are excluded from the [Statistics](#statistics)
completeness, but they are excluded from the [statistics](#statistics)
section for the sake of accuracy.
* All dates are in UTC.