aboutsummaryrefslogtreecommitdiffstats
path: root/markdown/2017_12_third-replicant-6-0-release.md
blob: 20f3dc89693039da4d81c041290beffb192b416a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
date: 2017-12-30T18:14:59+00:00
title: Third Replicant 6.0 release
authors: GNUtoo
tags: Replicant images release, Replicant news, GNUtoo
licenses: CC-BY-3.0 OR CC-BY-4.0
---
A new version (0003) of Replicant 6.0 has been released a few weeks ago.

It fixes an important issue that makes devices end up in a boot loop (the
devices were crashing during boot, endlessly) when installing certain
applications.

It also fixes a [security issue][1] that enables attackers to decrypt and/or
modify WiFi traffic.  
This can be problematic if your security is relying on the WiFi encryption.
This can be the case if you are using WiFi to connect to your device to use
applications like [Remote Keyboard][2] over telnet. This can also be
problematic if you share your Internet connection through WiFi and some
services of the phone operator you use are available without authentication.

Because of the above, updating to this new version is strongly recommended.  
See the update instructions [on the wiki][3] for that.

If your device is affected by the boot loop issue mentioned above, the update
instructions won't work, as they expect you to be able to easily reboot to
recovery.  
In that case, to reboot to the recovery you have to first boot in [safe
mode][4], and then to follow the update instructions to reboot to recovery.

 [1]: <https://en.wikipedia.org/wiki/KRACK>

 [2]: <https://f-droid.org/en/packages/de.onyxbits.remotekeyboard/>

 [3]:
<https://redmine.replicant.us/projects/replicant/wiki/Generic_minor_version_upgrade>

 [4]: <https://redmine.replicant.us/projects/replicant/wiki/Safe_mode>