On 10/05/2017 01:52 AM, Ilpo Järvinen wrote:
On Wed, 4 Oct 2017, Ron Hunter-Duvar wrote:

Saw the news earlier today about the major dnsmasq vulnerabilities (remote
code execution), and already received the update for the debian-8 template,
but not for the fedora-23 template or dom0.

Anyone know of an ETA for this?
dom0 does not have network connectivity.

Yeah, I wondered about that. Any reason for it to even have dnsmasq installed? Because it does.


FC23 has been EOL'ed for long time, you should upgrade your template to
FC25 or later (as FC24 likewise, is EOL'ed). The easiest alternative is to
install fedora-25 template that is nowadays included to qubes repositories
(IIRC). Then change your AppVMs having fedora-23 as their template to use
fedora-25 template.


I wondered about that too. Why does Qubes 3.2 still use FC23? Wasn't it EOL in 2015?

I use debian-8 for all my appvms. I changed the default before I created any of them.

But I still need it for my servicevms. Especially since they're the ones exposed to the internet (although still behind a separate firewall, but that's potentially affected too).

Haven't had time to look into how to setup a new template and convert the servicevms. But for this, if there's no fix coming, I guess I'll have to deal with it.

Thanks,
Ron

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ad369241-56f8-8920-f558-aea94c030ab7%40shaw.ca.
For more options, visit https://groups.google.com/d/optout.

Reply via email to