On 10/05/2017 01:52 AM, Ilpo Järvinen wrote:
On Wed, 4 Oct 2017, Ron Hunter-Duvar wrote:
Saw the news earlier today about the major dnsmasq vulnerabilities (remote
code execution), and already received the update for the debian-8 template,
but not for the fedora-23 template or dom0.
Anyone know of an ETA for this?
dom0 does not have network connectivity.
Yeah, I wondered about that. Any reason for it to even have dnsmasq
installed? Because it does.
FC23 has been EOL'ed for long time, you should upgrade your template to
FC25 or later (as FC24 likewise, is EOL'ed). The easiest alternative is to
install fedora-25 template that is nowadays included to qubes repositories
(IIRC). Then change your AppVMs having fedora-23 as their template to use
fedora-25 template.
I wondered about that too. Why does Qubes 3.2 still use FC23? Wasn't it
EOL in 2015?
I use debian-8 for all my appvms. I changed the default before I created
any of them.
But I still need it for my servicevms. Especially since they're the ones
exposed to the internet (although still behind a separate firewall, but
that's potentially affected too).
Haven't had time to look into how to setup a new template and convert
the servicevms. But for this, if there's no fix coming, I guess I'll
have to deal with it.
Thanks,
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/ad369241-56f8-8920-f558-aea94c030ab7%40shaw.ca.
For more options, visit https://groups.google.com/d/optout.