mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-26 06:26:18 -05:00
Replace old HTTPS repo warning with APT vuln warning
This commit is contained in:
parent
683939b5a9
commit
20148497cb
@ -28,37 +28,11 @@ Therefore, we *strongly* recommended that, prior to starting the Qubes installer
|
||||
Furthermore, if you are installing Qubes on a potentially compromised system, we *strongly* recommended that you wipe your target installation disk before starting the installer.
|
||||
|
||||
|
||||
Qubes 4.0 Warning
|
||||
-----------------
|
||||
Qubes 4.0.1 Warning
|
||||
-------------------
|
||||
|
||||
In new installations of Qubes 4.0, the following steps may need to be applied in dom0 and Fedora 26 TemplateVMs in order to receive updates (see [#3737]).
|
||||
|
||||
Steps for dom0 updates:
|
||||
|
||||
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||
2. Select `Terminal Emulator`.
|
||||
3. In the window that opens, enter this command:
|
||||
|
||||
sudo nano /etc/yum.repos.d/qubes-dom0.repo
|
||||
|
||||
4. This opens the nano text editor. Change all four instances of `http` to `https`.
|
||||
5. Press `CTRL+X`, then `Y`, then `ENTER` to save changes and exit.
|
||||
6. Check for updates normally.
|
||||
|
||||
Steps for Fedora 26 TemplateVM updates:
|
||||
|
||||
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||
2. Select `Template: fedora-26`, then `fedora-26: Terminal`.
|
||||
3. In the window that opens, enter the command for your version:
|
||||
|
||||
[Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo
|
||||
[Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo
|
||||
|
||||
4. This opens the gedit text editor in a window. Change all four instances of `http` to `https`.
|
||||
5. Click the "Save" button in the top-right corner of the window.
|
||||
6. Close the window.
|
||||
7. Check for updates normally.
|
||||
8. Shut down the TemplateVM.
|
||||
After installing Qubes 4.0.1, please install fresh APT-based (e.g., Debian and Whonix) TemplateVMs in order to be protected from the APT update mechanism vulnerability that was patched after the release of 4.0.1.
|
||||
For instructions and further details, please see [QSB #46].
|
||||
|
||||
|
||||
Hardware Requirements
|
||||
@ -168,7 +142,7 @@ Getting Help
|
||||
[Bug 1374983]: https://bugzilla.redhat.com/show_bug.cgi?id=1374983
|
||||
[Bug 1268700]: https://bugzilla.redhat.com/show_bug.cgi?id=1268700
|
||||
[#2835]: https://github.com/QubesOS/qubes-issues/issues/2835
|
||||
[#3737]: https://github.com/QubesOS/qubes-issues/issues/3737
|
||||
[QSB #46]: /news/2019/01/23/qsb-46/
|
||||
[system requirements]: /doc/system-requirements/
|
||||
[Hardware Compatibility List]: /hcl/
|
||||
[live USB]: /doc/live-usb/
|
||||
|
Loading…
x
Reference in New Issue
Block a user