diff --git a/installing/installation-guide.md b/installing/installation-guide.md index a097583c..b2f5b3c6 100644 --- a/installing/installation-guide.md +++ b/installing/installation-guide.md @@ -31,8 +31,14 @@ Furthermore, if you are installing Qubes on a potentially compromised system, we Qubes 4.0.1 Warning ------------------- -After installing Qubes 4.0.1, please install fresh APT-based (e.g., Debian and Whonix) TemplateVMs in order to be protected from the APT update mechanism vulnerability that was patched after the release of 4.0.1. -For instructions and further details, please see [QSB #46]. +Immediately after installing Qubes 4.0.1, please upgrade all of your Debian and Whonix TemplateVMs by executing the following commands in a dom0 terminal, as applicable for the templates you chose to install: + + $ sudo qubes-dom0-update --action=upgrade qubes-template-debian-9 + $ sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=upgrade qubes-template-whonix-gw-14 + $ sudo qubes-dom0-update --enablerepo=qubes-templates-community --action=upgrade qubes-template-whonix-ws-14 + +These upgrades are required in order to be protected from the APT update mechanism vulnerability that was announced and patched in [QSB #46], which was after the release of Qubes 4.0.1. +This method is simpler than the method recommended in [QSB #46], but it is just as safe and effective so long as it is performed immediately after installing Qubes OS. Hardware Requirements