mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-25 07:19:33 -05:00
Update QSB page link
This commit is contained in:
parent
7b1c4c6938
commit
6cc2f9932b
@ -443,7 +443,7 @@ making contributions, please try to observe the following style conventions:
|
||||
use relative (rather than absolute) links, e.g., `/doc/doc-guidelines/`
|
||||
instead of `https://www.qubes-os.org/doc/doc-guidelines/`. Examples of
|
||||
exceptions:
|
||||
* The signed plain text portions of [QSBs](/security/bulletins/) and
|
||||
* The signed plain text portions of [QSBs](/security/qsb/) and
|
||||
[Canaries](/security/canaries/)
|
||||
* URLs that appear inside code blocks (e.g., in comments and document
|
||||
templates)
|
||||
|
@ -325,7 +325,7 @@ required for any of these mailing lists.
|
||||
|
||||
This is a read-only list for those who wish to receive only very important,
|
||||
infrequent messages. Only the core Qubes team can post to this list. Only
|
||||
[Qubes Security Bulletins (QSBs)](/security/bulletins/), new stable releases,
|
||||
[Qubes Security Bulletins (QSBs)](/security/qsb/), new stable releases,
|
||||
and end-of-life notices are announced here.
|
||||
|
||||
To subscribe, send a blank email to
|
||||
|
@ -20,7 +20,7 @@ title: Qubes Security Bulletin (QSB) Checklist
|
||||
* Upload packages to `security-testing` and `current-testing` repositories
|
||||
* Push QSB to public repository
|
||||
* Publish a [news post](/news/) using the [QSB
|
||||
Template](/security/bulletins/template/)
|
||||
Template](/security/qsb/template/)
|
||||
* Send the content of the news post to the appropriate [mailing
|
||||
lists](/support/)
|
||||
* Share link to news post on social media
|
||||
|
@ -22,7 +22,7 @@ The **Qubes Security Pack** (`qubes-secpack`) is a Git repository that
|
||||
contains:
|
||||
|
||||
* [Qubes PGP keys](https://keys.qubes-os.org/keys/)
|
||||
* [Qubes Security Bulletins (QSBs)](/security/bulletins/)
|
||||
* [Qubes Security Bulletins (QSBs)](/security/qsb/)
|
||||
* [Qubes Canaries](https://github.com/QubesOS/qubes-secpack/tree/master/canaries)
|
||||
* [Qubes fund information](https://github.com/QubesOS/qubes-secpack/tree/master/fund)
|
||||
* Security-related information and announcements (e.g., key revocations)
|
||||
|
@ -22,7 +22,7 @@ see [Security in Qubes](/doc/#security-in-qubes). The following is a list of
|
||||
important project security pages:
|
||||
|
||||
- [Qubes Security Pack (`qubes-secpack`)](/security/pack/)
|
||||
- [Qubes Security Bulletins (QSBs)](/security/bulletins/)
|
||||
- [Qubes Security Bulletins (QSBs)](/security/qsb/)
|
||||
- [Qubes Canaries](/security/canaries/)
|
||||
- [Xen Security Advisory (XSA) Tracker](/security/xsa/)
|
||||
- [Verifying signatures](/security/verifying-signatures/)
|
||||
@ -36,7 +36,7 @@ directly or indirectly (e.g. the issue affects Xen in a configuration that is
|
||||
used in Qubes OS), then we would be more than happy to hear from you! We
|
||||
promise to treat any reported issue seriously and, if the investigation
|
||||
confirms that it affects Qubes, to patch it within a reasonable time and
|
||||
release a public [Qubes Security Bulletin](/security/bulletins/) that describes
|
||||
release a public [Qubes Security Bulletin](/security/qsb/) that describes
|
||||
the issue, discusses the potential impact of the vulnerability, references
|
||||
applicable patches or workarounds, and credits the discoverer.
|
||||
|
||||
@ -56,7 +56,7 @@ particular, the QST is responsible for:
|
||||
- Evaluating whether [XSAs](/security/xsa/) affect the security of Qubes OS
|
||||
- Writing, applying, and/or distributing security patches to fix
|
||||
vulnerabilities in Qubes OS
|
||||
- Writing, signing, and publishing [Security Bulletins](/security/bulletins/)
|
||||
- Writing, signing, and publishing [Security Bulletins](/security/qsb/)
|
||||
- Writing, signing, and publishing [Canaries](/security/canaries/)
|
||||
- Generating, safeguarding, and using the project's [PGP
|
||||
Keys](https://keys.qubes-os.org/keys/)
|
||||
|
@ -10,7 +10,7 @@ This tracker shows whether Qubes OS is affected by any given [Xen Security
|
||||
Advisory (XSA)](https://xenbits.xen.org/xsa/). Shortly after a new XSA is
|
||||
published, we will add a new row to this tracker. Whenever Qubes is
|
||||
significantly affected by an XSA, a [Qubes Security Bulletin
|
||||
(QSB)](/security/bulletins/) is published, and a link to that QSB is added to
|
||||
(QSB)](/security/qsb/) is published, and a link to that QSB is added to
|
||||
the row for the associated XSA.
|
||||
|
||||
Under the "Is Qubes Affected?" column, there are two possible values: **Yes**
|
||||
|
@ -415,7 +415,7 @@ remain secure against new threats.
|
||||
### Security
|
||||
|
||||
The Qubes OS Project occasionally issues [Qubes Security Bulletins
|
||||
(QSBs)](/security/bulletins/) as part of the [Qubes Security Pack
|
||||
(QSBs)](/security/qsb/) as part of the [Qubes Security Pack
|
||||
(qubes-secpack)](/security/pack/). It is important to make sure that you
|
||||
receive all QSBs in a timely manner so that you can take action to keep your
|
||||
system secure. (While [updating](#updating) will handle most security needs,
|
||||
|
@ -17,7 +17,7 @@ see the [Upgrade Guides](/doc/upgrade/).*
|
||||
|
||||
Security updates are an extremely important part of keeping your Qubes
|
||||
installation secure. When there is an important security issue, we will issue a
|
||||
[Qubes Security Bulletin (QSB)](/security/bulletins/) via the [Qubes Security
|
||||
[Qubes Security Bulletin (QSB)](/security/qsb/) via the [Qubes Security
|
||||
Pack (`qubes-secpack`)](/security/pack/). It is very important to read each new
|
||||
QSB and follow any user instructions it contains. Most of the time, simply
|
||||
[updating your system normally](#routine-updates) will be sufficient to obtain
|
||||
|
Loading…
Reference in New Issue
Block a user