mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Recommend simpler template upgrade method
This commit is contained in:
parent
20148497cb
commit
5890169528
@ -31,8 +31,16 @@ Furthermore, if you are installing Qubes on a potentially compromised system, we
|
||||
Qubes 4.0.1 Warning
|
||||
-------------------
|
||||
|
||||
After installing Qubes 4.0.1, please install fresh APT-based (e.g., Debian and Whonix) TemplateVMs in order to be protected from the APT update mechanism vulnerability that was patched after the release of 4.0.1.
|
||||
For instructions and further details, please see [QSB #46].
|
||||
Immediately after installing Qubes 4.0.1, please upgrade all of your APT-based (e.g., Debian and Whonix) TemplateVMs by executing the following command in a dom0 terminal for each such TemplateVM:
|
||||
|
||||
$ sudo qubes-dom0-update --action=upgrade <template-package-name>
|
||||
|
||||
For example, the command for the `debian-9` TemplateVM would be:
|
||||
|
||||
$ sudo qubes-dom0-update --action=upgrade qubes-template-debian-9
|
||||
|
||||
These upgrades are required in order to be protected from the APT update mechanism vulnerability that was announced and patched in [QSB #46], which was after the release of Qubes 4.0.1.
|
||||
This method is simpler than the method recommended in [QSB #46], but it is just as safe and effective so long as it is performed immediately after installing Qubes OS.
|
||||
|
||||
|
||||
Hardware Requirements
|
||||
|
Loading…
Reference in New Issue
Block a user