Qubes OS

@QubesOS
2.4K Followers
0 Following
227 Posts
Qubes OS is a security-oriented operating system that allows you to compartmentalize your data and activities into isolated environments called "qubes" so that a single cyberattack can't take down your entire digital life in one fell swoop.
Websitehttps://www.qubes-os.org/
Downloadshttps://www.qubes-os.org/downloads/
Donatehttps://www.qubes-os.org/donate/
Help & Supporthttps://www.qubes-os.org/support/
XSAs released on 2026-04-17

The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is affected. XSAs that DO affect the security of Qubes OS The following XSAs do affect the security of Qubes OS: XSA-488 See QSB-112 XSAs that DO NOT affect the security of Qubes OS The fol...

Qubes OS

QSB-112: Floating Point Divider State Sampling (XSA-488)

https://www.qubes-os.org/news/2026/04/19/qsb-112/

QSB-112: Floating Point Divider State Sampling (XSA-488)

We have published Qubes Security Bulletin (QSB) 112: Floating Point Divider State Sampling (XSA-488). The text of this QSB and its accompanying cryptographic signatures are reproduced below, followed by a general explanation of this announcement and authentication instructions. Qubes Se...

Qubes OS

QSB-111: xfce4-screensaver login bypass

https://www.qubes-os.org/news/2026/04/15/qsb-111/

QSB-111: xfce4-screensaver login bypass

We have published Qubes Security Bulletin (QSB) 111: xfce4-screensaver login bypass. The text of this QSB and its accompanying cryptographic signatures are reproduced below, followed by a general explanation of this announcement and authentication instructions. Qubes Security Bulletin 1...

Qubes OS

>$2,000 #bounty now available for creating a BusKill package on @QubesOS 💰🚀

👉 https://www.buskill.in/qubes-package-bounty/

Thanks to @novacustom for sponsoring better support for our FOSS #DeadManSwitch on #Qubes ❤️

QubesOS Bounty (Contrib Package) - BusKill

Earn $$ for contributing to BusKill! We have funding available for someone who creates a QubesOS contrib package.

BusKill

We love cool open-source projects like @BusKillin, a USB kill cord for laptops. However, installing its software, especially on @QubesOS, used to be complicated.

That’s why NovaCustom invested in BusKill, starting with a $200 no strings attached contribution. After discussions with lead developer @MichaelAltfield , we’ve now created a much simpler way to install BusKill on Qubes OS.

Want to read more? click the link below.

https://novacustom.com/bounty-available-for-buskill-contrib-package-in-qubes-os/

Bounty available for BusKill contrib package in Qubes OS - NovaCustom

We love cool and open source projects. One of such projects is BusKill, a USB kill cord for laptops. This project could still use some improvement, as installing the BusKill software used to be quite complicated. This is especially true for Qubes OS, which is the preferred operating system for most users of this accessory. ... Read more

NovaCustom
XSAs released on 2026-03-24

The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is not affected. XSAs that DO affect the security of Qubes OS The following XSAs do affect the security of Qubes OS: (none) XSAs that DO NOT affect the security of Qubes OS The following XS...

Qubes OS
XSAs released on 2026-03-17

The Xen Project has released one or more Xen security advisories (XSAs). The security of Qubes OS is affected. XSAs that DO affect the security of Qubes OS The following XSAs do affect the security of Qubes OS: XSA-480 See QSB-110 XSAs that DO NOT affect the security of Qubes OS The fol...

Qubes OS

QSB-110: Use after free of paging structures in EPT (XSA-480)

https://www.qubes-os.org/news/2026/03/17/qsb-110/

QSB-110: Use after free of paging structures in EPT (XSA-480)

We have published Qubes Security Bulletin (QSB) 110: Use after free of paging structures in EPT (XSA-480). The text of this QSB and its accompanying cryptographic signatures are reproduced below, followed by a general explanation of this announcement and authentication instructions. Qub...

Qubes OS
Fedora 43 templates available for Qubes OS 4.2

The following new Fedora 43 templates are now available for Qubes OS 4.2: fedora-43-xfce (default Fedora template with the Xfce desktop environment) fedora-43 (alternative Fedora template with the GNOME desktop environment) fedora-43-minimal (minimal template for advanced users) Note: T...

Qubes OS
Fedora 42 approaching end of life

Fedora 42 is currently scheduled to reach end of life (EOL) on 2026-05-13 (two months from the date of this announcement). Please upgrade all of your Fedora templates and standalones by that date. For more information, see Upgrading to avoid EOL. There are two ways to upgrade a template...

Qubes OS