[qubes-users] Re: [qubes-announce] QSB #33: Xen hypervisor (XSA-231 through XSA-234)

2017-09-13 Thread michael-q

On 09/12/2017 10:31 AM, qubester wrote:


1)

So, for discussion do most folks "patch immediately"   or  "wait for 
stable" ??


2)
Guess, I need to start  studying  the  PBRM(above)   as I imagine I'll 
be on 3.2  for some time, maybe  till  it's no longer updated  if there 
is going to be NO GUI VM Manager  ever ??


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/938deccb-6c11-9a47-f8d4-0ff6f06955dd%40gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-announce] QSB #33: Xen hypervisor (XSA-231 through XSA-234)

2017-09-12 Thread qubester


--
Therefore, all the bugs in this bulletin affect
Qubes 3.2, and users should patch immediately.



Compromise Recovery


Starting with Qubes 3.2, we offer Paranoid Backup Restore Mode, which
was designed specifically to aid in the recovery of a (potentially)
compromised Qubes OS system. Thus, if you believe your system might have
been compromised (perhaps because of the bugs discussed in this
bulletin), then you should read and follow the procedure described here:

https://www.qubes-os.org/news/2017/04/26/qubes-compromise-recovery/

Patching
=

The specific packages that resolve the problems discussed in this
bulletin are as follows:

  For Qubes 3.2:
  - Xen packages, version 4.6.6-30

  For Qubes 4.0:
  - Xen packages, version 4.8.2-2

The packages are to be installed in dom0 via the Qubes VM Manager or via
the qubes-dom0-update command, as follows:

  For updates from the stable repository (not immediately available):
  $ sudo qubes-dom0-update

  For updates from the security-testing repository:
  $ sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing

A system restart will be required afterwards.

These packages will migrate from the security-testing repository to the
current (stable) repository over the next two weeks after being tested
by the community.


1)

So, for discussion do most folks "patch immediately"   or  "wait for 
stable" ??


2)
Guess, I need to start  studying  the  PBRM(above)   as I imagine I'll 
be on 3.2  for some time, maybe  till  it's no longer updated  if there 
is going to be NO GUI VM Manager  ever ??


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/cb1cb021-2d6c-338f-22f3-456081d668dc%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: [qubes-announce] QSB #33: Xen hypervisor (XSA-231 through XSA-234)

2017-09-12 Thread yreb-qusw

maybe could consider removing
"Occasionally fuckups happen,"   ..unless one is going for the 
unprofesional vulgarity crowd IMHO


2cents ,

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e5705dc3-9942-6349-32a7-764c01e83a1f%40riseup.net.
For more options, visit https://groups.google.com/d/optout.