The fourth release candidate for Qubes OS has been released for testing. Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing based on Xen-based virtualization to allow for the creation and management of isolated compartments called qubes.
Qubes OS 4.2.0-rc4 is available for testing
We’re pleased to announce that the fourth release candidate (RC) for Qubes OS 4.2.0 is now available for testing.
Main changes from RC3 to RC4
- Fixed: “qvm-move fails, deletes origin file anyway” (#8516)
- Fixed: “
90-default.policy
not upgraded after in-place upgrade from 4.1 to 4.2” (#8458)- Fixed: “Qube Manager freezes while opening settings” (#8387)
- Fixed: “Error when attempting to update dom0 in the Qube Manager” (#8117)
- Fixed: “XScreenSaver & XScreenSaver Settings not opening window” (#8266)
- Fixed: “Setting no-strict-reset option via salt on already attached devices doesn’t work” (#8514)
- Fixed: “qvm-copy-to-vm incorrect progress report” (#1519)
- Fixed: “qubes-video-companion-receiver missing dependency on acl package” (#8426)
- Fixed: “OpenBSD 7.3 ISO doesn’t boot anymore” (#8502)
- Fixed: “Kernel compile bogs down rest of system” (#8176)
- Fixed: “rpm-oxide makes unjustified assumptions about RPM ABI” (#8522)
- Fixed: “yk-auth YubiKey PAM script incorrectly expects \0 to be appended to hash” (#8517)
- Fixed: “Qubes Application Menu isn’t updated when using salt to modify menu-items” (#8494)
- Fixed: “Different values for
menu-items
anddefault-menu-items
are not preserved when cloning templates” (#8518)- Fixed: “Fix handling of menu items in GUI VM” (#8528)
- Fixed: “Firefox does not start on 4.2-rc3 after upgrading template” (#8571)
- Fixed: “Qubes R4.2.0-rc2 Qubes OS Global Config tool not see qubes-u2f installed in sys-usb” (#8463)
- Fixed: “global config: policy rules for U2F incorrectly assume wildcard argument” (#8525)
- Fixed: “Pipewire on some systems causes a lot of underruns” (#8576)
- Fixed: “Listing PCI devices breaks when there is some with non-0000 PCI domain” (#6932)
- Done: “Prepare R4.1 -> R4.2 upgrade tool” (#7832)
- Done: “Phase out legacy qrexec policy files” (#8000)
- Done: “Better qrexec service configuration format” (#8153)
- Done: “QRexec services should be able to specify the user they must run as” (#6354)
- Done: “Qube Manager: Enable the ‘restart qube’ button for named disposables” (#8382)
- Done: “Utilize memory hotplug to add VM memory by qmemman” (#7956)
For an overview of major changes from Qubes 4.1 to 4.2, please see the Qubes OS 4.2.0 release notes.