diff --git a/installing/installation-guide.md b/installing/installation-guide.md index a097583c..da52d683 100644 --- a/installing/installation-guide.md +++ b/installing/installation-guide.md @@ -31,8 +31,16 @@ Furthermore, if you are installing Qubes on a potentially compromised system, we Qubes 4.0.1 Warning ------------------- -After installing Qubes 4.0.1, please install fresh APT-based (e.g., Debian and Whonix) TemplateVMs in order to be protected from the APT update mechanism vulnerability that was patched after the release of 4.0.1. -For instructions and further details, please see [QSB #46]. +Immediately after installing Qubes 4.0.1, please upgrade all of your APT-based (e.g., Debian and Whonix) TemplateVMs by executing the following command in a dom0 terminal for each such TemplateVM: + + $ sudo qubes-dom0-update --action=upgrade + +For example, the command for the `debian-9` TemplateVM would be: + + $ sudo qubes-dom0-update --action=upgrade qubes-template-debian-9 + +These upgrades are required in order to be protected from the APT update mechanism vulnerability that was announced and patched in [QSB #46], which was after the release of Qubes 4.0.1. +This method is simpler than the method recommended in [QSB #46], but it is just as safe and effective so long as it is performed immediately after installing Qubes OS. Hardware Requirements