Update QSB page link

This commit is contained in:
Andrew David Wong 2021-06-22 10:50:12 -07:00
parent 7b1c4c6938
commit 6cc2f9932b
No known key found for this signature in database
GPG key ID: 8CE137352A019A17
8 changed files with 10 additions and 10 deletions

View file

@ -20,7 +20,7 @@ title: Qubes Security Bulletin (QSB) Checklist
* Upload packages to `security-testing` and `current-testing` repositories
* Push QSB to public repository
* Publish a [news post](/news/) using the [QSB
Template](/security/bulletins/template/)
Template](/security/qsb/template/)
* Send the content of the news post to the appropriate [mailing
lists](/support/)
* Share link to news post on social media

View file

@ -22,7 +22,7 @@ The **Qubes Security Pack** (`qubes-secpack`) is a Git repository that
contains:
* [Qubes PGP keys](https://keys.qubes-os.org/keys/)
* [Qubes Security Bulletins (QSBs)](/security/bulletins/)
* [Qubes Security Bulletins (QSBs)](/security/qsb/)
* [Qubes Canaries](https://github.com/QubesOS/qubes-secpack/tree/master/canaries)
* [Qubes fund information](https://github.com/QubesOS/qubes-secpack/tree/master/fund)
* Security-related information and announcements (e.g., key revocations)

View file

@ -22,7 +22,7 @@ see [Security in Qubes](/doc/#security-in-qubes). The following is a list of
important project security pages:
- [Qubes Security Pack (`qubes-secpack`)](/security/pack/)
- [Qubes Security Bulletins (QSBs)](/security/bulletins/)
- [Qubes Security Bulletins (QSBs)](/security/qsb/)
- [Qubes Canaries](/security/canaries/)
- [Xen Security Advisory (XSA) Tracker](/security/xsa/)
- [Verifying signatures](/security/verifying-signatures/)
@ -36,7 +36,7 @@ directly or indirectly (e.g. the issue affects Xen in a configuration that is
used in Qubes OS), then we would be more than happy to hear from you! We
promise to treat any reported issue seriously and, if the investigation
confirms that it affects Qubes, to patch it within a reasonable time and
release a public [Qubes Security Bulletin](/security/bulletins/) that describes
release a public [Qubes Security Bulletin](/security/qsb/) that describes
the issue, discusses the potential impact of the vulnerability, references
applicable patches or workarounds, and credits the discoverer.
@ -56,7 +56,7 @@ particular, the QST is responsible for:
- Evaluating whether [XSAs](/security/xsa/) affect the security of Qubes OS
- Writing, applying, and/or distributing security patches to fix
vulnerabilities in Qubes OS
- Writing, signing, and publishing [Security Bulletins](/security/bulletins/)
- Writing, signing, and publishing [Security Bulletins](/security/qsb/)
- Writing, signing, and publishing [Canaries](/security/canaries/)
- Generating, safeguarding, and using the project's [PGP
Keys](https://keys.qubes-os.org/keys/)

View file

@ -10,7 +10,7 @@ This tracker shows whether Qubes OS is affected by any given [Xen Security
Advisory (XSA)](https://xenbits.xen.org/xsa/). Shortly after a new XSA is
published, we will add a new row to this tracker. Whenever Qubes is
significantly affected by an XSA, a [Qubes Security Bulletin
(QSB)](/security/bulletins/) is published, and a link to that QSB is added to
(QSB)](/security/qsb/) is published, and a link to that QSB is added to
the row for the associated XSA.
Under the "Is Qubes Affected?" column, there are two possible values: **Yes**