Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-25 Thread yrebstv
On 2018-01-25 13:33, awokd wrote: > On Thu, January 25, 2018 10:51 pm, yreb...@riseup.net wrote: > >> *by this if I ran sudo qubes-dom0-update >> --enablerepo=qubes-dom0-security-testing*once, I take it , that >> I am still on the Stable Track "repo" so somehow magically I >>

Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-25 Thread yrebstv
On 2018-01-25 13:33, awokd wrote: > On Thu, January 25, 2018 10:51 pm, yreb...@riseup.net wrote: > >> *by this if I ran sudo qubes-dom0-update >> --enablerepo=qubes-dom0-security-testing*once, I take it , that >> I am still on the Stable Track "repo" so somehow magically I >>

Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-25 Thread 'awokd' via qubes-users
On Thu, January 25, 2018 10:51 pm, yreb...@riseup.net wrote: > *by this if I ran sudo qubes-dom0-update > --enablerepo=qubes-dom0-security-testing*once, I take it , that > I am still on the Stable Track "repo" so somehow magically I > have the current testing Xen version (I

Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-25 Thread yrebstv
On 2018-01-24 23:20, awokd wrote: > On Thu, January 25, 2018 2:17 am, yreb...@riseup.net wrote: >> On 2018-01-24 15:12, Andrew David Wong wrote: > >>> >>> These packages will migrate from the security-testing repository to the >>> current (stable) repository over the next two weeks after being

Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-25 Thread Vít Šesták
There actually is a GUI for checking dom0 updates. In Qubes VM manager, select dom0 and click the update button in top toolbar. Or you can also use the context menu. OTOH, in this case, the main benefit of the GUI are the notifications. The update process itself is usually more friendly from

Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-25 Thread 'awokd' via qubes-users
On Thu, January 25, 2018 2:17 am, yreb...@riseup.net wrote: > On 2018-01-24 15:12, Andrew David Wong wrote: >> >> These packages will migrate from the security-testing repository to the >> current (stable) repository over the next two weeks after being tested >> by the community. > > > 1) > The

Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-24 Thread yrebstv
On 2018-01-24 15:12, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2018-01-24 16:14, yreb...@riseup.net wrote: >> [...] >> >> So... there are packages *to be released *at some undefined point >> in the near future? -- The following packages contain the

Re: [qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-24 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2018-01-24 16:14, yreb...@riseup.net wrote: > [...] > > So... there are packages *to be released *at some undefined point > in the near future? -- The following packages contain the patches > described above: > > - Xen packages, version

[qubes-users] Re: [qubes-announce] [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-24 Thread yrebstv
On 2018-01-23 23:29, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Dear Qubes Community, > > We have just updated Qubes Security Bulletin (QSB) #37: > Information leaks due to processor speculative execution bugs. > > The text of the main changes are