mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Merge branch 'qsb-46-install-warning'
This commit is contained in:
commit
485db97eb1
@ -31,8 +31,14 @@ Furthermore, if you are installing Qubes on a potentially compromised system, we
|
||||
Qubes 4.0.1 Warning
|
||||
-------------------
|
||||
|
||||
After installing Qubes 4.0.1, please install fresh APT-based (e.g., Debian and Whonix) TemplateVMs in order to be protected from the APT update mechanism vulnerability that was patched after the release of 4.0.1.
|
||||
For instructions and further details, please see [QSB #46].
|
||||
Immediately after installing Qubes 4.0.1, please upgrade all of your Debian and Whonix TemplateVMs by executing the following commands in a dom0 terminal, as applicable for the templates you chose to install:
|
||||
|
||||
$ sudo qubes-dom0-update --action=upgrade qubes-template-debian-9
|
||||
$ sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=upgrade qubes-template-whonix-gw-14
|
||||
$ sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=upgrade qubes-template-whonix-ws-14
|
||||
|
||||
These upgrades are required in order to be protected from the APT update mechanism vulnerability that was announced and patched in [QSB #46], which was after the release of Qubes 4.0.1.
|
||||
This method is simpler than the method recommended in [QSB #46], but it is just as safe and effective so long as it is performed immediately after installing Qubes OS.
|
||||
|
||||
|
||||
Hardware Requirements
|
||||
|
Loading…
Reference in New Issue
Block a user