Sidebar Sponsor |
 |
Random Distribution | 
TurnKey Linux
TurnKey Linux is a Debian-based virtual appliance library that integrates some of the best open-source software into ready-to-use solutions. Each virtual appliance is optimised for ease of use and can be deployed in just a few minutes on bare metal, a virtual machine and in the cloud. The growing list of virtual appliances, each of which is available as a CD image or virtual machine image, include Bugzilla, Django, Drupal, File Server, Joomla, LAMP, Magento, Mantis, MediaWiki, MoinMoin, Moodle, MovableType, MySQL, Openbravo, phpBB, PostgreSQL, ProjectPier, Rails, Revision Control, StatusNet, Apache Tomcat, Torrent Server, Trac, TWiki, vtiger, WordPress, Zimra and others.
Status: Active
| |
Latest News and Updates |
|
2014-04-20 |
NEW • Development Release: Qubes OS 2 RC1 |
Rate this project
|
Joanna Rutkowska has announced the availability of the first release candidate for Qubes OS 2, a Fedora-based distribution with strong desktop security via integrated Xen virtualisation: "Today we're releasing Qubes OS R2 RC1 (release candidate), which is expected to be the last milestone before the final Qubes OS R2 release. As mentioned previously today's release is bringing mainly UI improvements and polishing and lots of bug fixes, as well as some last new features. Both Dom0 and VMs have been upgraded to Fedora 20. Support for full templates download via two new repo definitions - templates-itl and templates-community. With a bit of imagination we could call it Qubes 'AppStore' for VMs. Currently we have only published one template there – the new default FC20-based template, but we plan to upload more templates in the coming weeks." Read the rest of the release announcement for further details. Download (MD5): Qubes-R2-rc1-x86_64-DVD.iso (2,824MB). |
|
About Qubes
|
Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes. These qubes, which are implemented as virtual machines (VMs). This allows each component of the operating system to be isolated from other pieces, preenting compromises from spreading or information from leaking.
|
Screenshots |
| |
Recent Related News and Releases |
2025-02-19 |
Distribution Release: Qubes OS 4.2.4 |
 |
Qubes OS, a security-oriented operating system that uses Xen-based virtualization to create and manage isolated compartments called qubes, has been updated to version 4.2.4. Besides the usual security updates and bug fixes, the new version also upgrades the included Fedora template to version 41. "We are pleased to announce the stable release of Qubes OS 4.2.4. This patch release aims to consolidate all the security patches, bug fixes and other updates that have occurred since the previous stable release. Our goal is to provide a secure and convenient way for users to install (or reinstall) the latest stable Qubes release with an up-to-date ISO image. The ISO image and associated verification files are available on the downloads page. What's new in Qubes 4.2.4? All security updates to date; all bug fixes to date; included Fedora template upgraded from Fedora 40 to 41. For more information about the changes included in this version, see the Qubes OS 4.2 release notes and the full list of issues completed since the previous stable release." See the complete release announcement for further details. Download: Qubes-R4.2.4-x86_64.iso (6,929MB, SHA256, signature, torrent, pkglist). |
|
2024-07-14 |
Distribution Release: Qubes OS 4.2.2 |
 |
The Qubes OS team have announced a new update to the project's security-focused operating system. One of the significant changes in Qubes OS 4.2.2 is an adjustment to how files are transferreed between isolated envirnonments, called qubes. "Qubes 4.2.2 includes a fix for #8332: File-copy qrexec service is overly restrictive. As explained in the issue comments, we introduced a change in Qubes 4.2.0 that caused inter-qube file-copy/move actions to reject filenames containing, e.g., non-Latin characters and certain symbols. The rationale for this change was to mitigate the security risks associated with unusual unicode characters and invalid encoding in filenames, which some software might handle in an unsafe manner and which might cause confusion for users. Such a change represents a trade-off between security and usability. After the change went live, we received several user reports indicating more severe usability problems than we had anticipated. Moreover, these problems were prompting users to resort to dangerous workarounds (such as packing files into an archive format prior to copying) that carry far more risk than the original risk posed by the unrestricted filenames. In addition, we realized that this was a backward-incompatible change that should not have been introduced in a minor release in the first place." Additional information is available in the release announcement. Download: Qubes-R4.2.2-x86_64.iso (6,577MB, SHA256, signature, torrent, pkglist). |
|
2023-12-19 |
Distribution Release: Qubes OS 4.2.0 |
 |
Qubes OS is a security-focused operating system which isolates system components and applications to minimialize the damage which can be done do to a security breech in any one aspect of the platform. The project's latest release, Qubes OS 4.2.0, offers both Debian and Fedora templates and shifts the default desktop from GNOME to Xfce. "Dom0 upgraded to Fedora 37. Xen upgraded to version 4.17. Default Debian template upgraded to Debian 12. Default Fedora and Debian templates use Xfce instead of GNOME. SELinux support in Fedora templates. Several GUI applications rewritten, including: Applications Menu (also available as preview in R4.1); Qubes Global Settings; create New Qube Qubes Update; Unified grub.cfg location for both UEFI and legacy boot; PipeWire support; fwupd integration for firmware updates; optional automatic clipboard clearing; Official packages built using Qubes Builder v2; Split GPG management in Qubes Global Settings; Qrexec services use new qrexec policy format by default (but old format is still supported)." Additional information is offered in the project's release announcement and in the release notes. Download: Qubes-R4.2.0-x86_64.iso (6,215MB, SHA256, signature, torrent, pkglist). |
|
2023-11-27 |
Development Release: Qubes OS 4.2.0 RC5 |
 |
Qubes OS is a security-focused operating system which isolates key system components and tasks from each other. The project's latest development snapshop, Qubes OS 4.2.0-rc5, includes the following changes and developments since the 4.1.0 release: "We're pleased to announce that the fifth release candidate (RC) for Qubes OS 4.2.0 is now available for testing. Dom0 upgraded to Fedora 37; Xen upgraded to version 4.17; default Debian template upgraded to Debian 12; default Fedora and Debian templates use Xfce instead of GNOME; SELinux support in Fedora templates; several GUI applications rewritten, including Applications Menu (also available as preview in R4.1), Qubes Global Settings, create New Qube Qubes Update; unified grub.cfg location for both UEFI and legacy boot PipeWire support; fwupd integration for firmware updates; optional automatic clipboard clearing; official packages built using Qubes Builder v2; split GPG management in Qubes Global Settings; Qrexec services use new qrexec policy format by default." Additional details can be found in the release announcement and in the release notes. Download: Qubes-R4.2.0-rc5-x86_64.iso (6,157MB, SHA256, signature, torrent, pkglist). |
|
2023-08-29 |
Development Release: Qubes OS 4.2.0 RC2 |
 |
Qubes OS is a security-oriented project which focuses on isolating the system components and data. The project has released Qubes OS 4.2.0-rc2 which introduces several key changes. The release announcement lists the highlights: "Dom0 upgraded to Fedora 37. Xen updated to version 4.17. Default Debian template upgraded to Debian 12. Default Fedora and Debian templates use Xfce instead of GNOME. SELinux support in Fedora templates. Several GUI applications rewritten, including: Applications Menu; Qubes Global Settings; Create New Qube; Qubes Update. Unified grub.cfg location for both UEFI and legacy boot. PipeWire support. fwupd integration for firmware updates. Optional automatic clipboard clearing. Official packages built using Qubes Builder v2. Split GPG and Split SSH management in Qubes Global Settings." The project's release notes offer additional details. Download: Qubes-R4.2.0-rc2-x86_64.iso (5,938MB, SHA256, signature, torrent, pkglist). |
|
2023-03-15 |
Distribution Release: Qubes OS 4.1.2 |
 |
Qubes OS 4.1.2, the latest "patch" release of the project's security-oriented operating system for single-user desktop computing, is now available. This version brings the Fedora template up to version 37 and adds an optional "kernel-latest" Linux kernel, version 6.1.12: "We are pleased to announce the stable release of Qubes 4.1.2. This release aims to consolidate all the security patches, bug fixes, and upstream template OS upgrades that have occurred since the initial Qubes 4.1.0 release. Our goal is to provide a secure and convenient way for users to install (or reinstall) the latest stable Qubes release with an up-to-date ISO. If you are already using any version of Qubes 4.1 (including 4.1.0, 4.1.1, 4.1.2-rc1, and 4.1.2-rc2), then you should simply update normally (which includes upgrading any EOL templates you might have) in order to make your system effectively equivalent to this stable Qubes 4.1.2 release. No reinstallation or other special action is required. Qubes 4.1.2 includes numerous updates over the initial 4.1.0 release, in particular: all 4.1 dom0 updates to date; Fedora 37 template; USB keyboard support in the installer; kernel-latest available as a boot option when starting the installer." Continue to the release announcement for further details. Download (mirrors): Qubes-R4.1.2-x86_64.iso (5,881MB, SHA512, signature, torrent, pkglist). |
|
2022-07-19 |
Distribution Release: Qubes OS 4.1.1 |
 |
Andrew David Wong has announced the release of Qubes OS 4.1.1, a "patch" release of the project's security-oriented operating system for single-user desktop computing. This version upgrades the Fedora template to version 36 and the Linux kernel to version 5.15: "We're pleased to announce the stable release of Qubes 4.1.1. This release aims to consolidate all the security patches, bug fixes, and upstream template OS upgrades that have occurred since the initial Qubes 4.1.0 release in February. Our goal is to provide a secure and convenient way for users to install (or reinstall) the latest stable Qubes release with an up-to-date ISO. If you are already using Qubes 4.1.0 or Qubes 4.1.1-rc1, then you should simply update normally (which includes upgrading any EOL templates you might have) in order to make your system essentially equivalent to this stable Qubes 4.1.1 release. No special action is required on your part. Qubes 4.1.1 includes numerous updates over the initial 4.1.0 release, in particular: 4.1.0 dom0 updates to date; Fedora 36 template (upgraded from Fedora 34); Linux kernel 5.15 (upgraded from 5.10)." See the release announcement for more details. Download (mirrors): Qubes-R4.1.1-x86_64.iso (5,523MB, SHA512, signature, torrent, pkglist). |
|
2022-02-05 |
Distribution Release: Qubes OS 4.1.0 |
 |
Andrew David Wong has announced the release of Qubes OS 4.1.0, a major new update from the project that focuses on Linux operating system security by isolating computing tasks into separate "qubes". This version brings a variety of improvements, bug fixes and component updates: "At long last, the Qubes 4.1.0 stable release has arrived. The culmination of years of development, this release brings a host of new features, major improvements and numerous bug fixes. The GUI domain is a qube separate from dom0 that handles all display-related tasks and some system management. This separation allows us to more securely isolate dom0 while granting the user more flexibility with respect to graphical interfaces. Qrexec is is an RPC (remote procedure call) mechanism that allows one qube to do something inside another qube. The qrexec policy system enforces 'who can do what and where.' Qubes 4.1 brings a new qrexec policy format, significant performance improvements, support for socket services and policy notifications that make it easier to detect problems." Read the rest of the release announcement for a complete list of new features. Download (mirrors): Qubes-R4.1.0-x86_64.iso (5,679MB, SHA512, signature, torrent, pkglist). |
|
2022-01-18 |
Development Release: Qubes OS 4.1.0 RC4 |
 |
Qubes OS is a security-oriented, desktop operating system which places a strong focus on isolating individual tasks. The project's latest development snapshot includes testing for Gentoo templates, Debian reproducible builds, and domain changes for the graphical interface. The release announcement states: "The fourth release candidate for Qubes 4.1.0 is here. There are no major changes to report. We've just focused on fixing bugs that were discovered and reported in the third release candidate. If you're currently using any Qubes 4.1.0 release candidate, a regular update is sufficient to upgrade to the latest one. Otherwise, read on for more about how to get started with testing Qubes 4.1.0-rc4. In case you still haven't heard, Qubes 4.1.0 includes several major new features, each of which is explained in depth in its own article: Qubes Architecture Next Steps: The GUI Domain; Qubes Architecture Next Steps: The New Qrexec Policy System; New Gentoo templates and maintenance infrastructure; Reproducible builds for Debian: a big step forward. There are also numerous other improvements and bug fixes listed in the release notes and in the issue tracker." Download: Qubes-R4.1.0-rc4-x86_64.iso (5,651MB, SHA256, signature, torrent, pkglist). |
|
|
|