Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread john s.
>> >> Tasket, >> >> Does this mean that a upgrade to testing  is as good as   uninstalling - >> re-installing templates ? > > Yes. Everything in the template's root and private volumes is wiped > before the new package is added. > > However we found out this doesn't work for Whonix if your

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread Chris Laprise
On 01/25/2019 03:01 PM, John S.Recdep wrote: On 1/23/19 9:52 PM, Chris Laprise wrote: On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: Patching = If you are a Qubes user, you should remove all APT-based (including Debian and Whonix) TemplateVMs and StandaloneVMs, then

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread Chris Laprise
On 01/25/2019 02:03 PM, gone wrote: Chris Laprise wrote on Wed, 23 January 2019 21:52 On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: A shortened update procedure for debian-9: . This method also works with whonix-gw-14 and whonix-ws-14 templates. -- This worked very well on

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-25 Thread Chris Laprise
On 01/24/2019 10:12 PM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 23/01/2019 3.52 PM, Chris Laprise wrote: On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: Patching = If you are a Qubes user, you should remove all APT-based (including

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-24 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 23/01/2019 3.52 PM, Chris Laprise wrote: > On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: > >> Patching >> = >> >> If you are a Qubes user, you should remove all APT-based (including >> Debian and Whonix) TemplateVMs and

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-24 Thread Fidel Ramos
‐‐‐ Original Message ‐‐‐ On Wednesday, January 23, 2019 9:52 PM, Chris Laprise wrote: > On 01/23/2019 12:05 PM, Marek Marczykowski-Górecki wrote: > > > Patching > > > > = > > > > If you are a Qubes user, you should remove all APT-based (including > > Debian and Whonix)

Re: [qubes-users] Re: [qubes-devel] QSB #46: APT update mechanism vulnerability

2019-01-23 Thread goldsmith
On 2019-01-23 21:08, gone wrote: > unfortunately the reboot brought no change. Still the > 201812091508 version. Try sudo qubes-dom0-update --enablerepo=qubes-templates-itl-testing qubes-template-debian-9 -- You received this message because you are subscribed to the Google Groups