qubes-doc/user/common-tasks/updating-qubes-os.md
Andrew David Wong 9eea4db0a6
Update documentation on updating Qubes OS
- Warn against using direct commands (in part due to
  QubesOS/qubes-issues#6275).
- Remove duplicate content from dom0 and domU pages. Link to main update
  page instead.
- Add information on command-line equivalents to the Qubes Update tool,
  since many Qubes users prefer to run updates via the command-line.
2021-05-06 06:34:50 -07:00

3.7 KiB

lang layout permalink ref title
en doc /doc/updating-qubes-os/ 200 Updating Qubes OS

Updating Qubes OS

This page is about updating your system while staying on the same supported version of Qubes OS. If you're instead looking to upgrade from your current version of Qubes OS to a newer version, see the Upgrade Guides.

Warning: Updating with direct commands such as qubes-dom0-update, dnf update, and apt update is not recommended, since these bypasses built-in Qubes OS update security measures. Instead, we strongly recommend using the Qubes Update tool or its command-line equivalents, as described below. (By contrast, installing packages using direct package manager commands is fine.)

It is very important to keep your Qubes OS system up-to-date to ensure you have the latest security updates, as well as the latest non-security enhancements and bug fixes.

Fully updating your Qubes OS system means updating:

You can accomplish this using the Qubes Update tool.

Qubes Update

By default, the Qubes Update tool will appear as an icon in the Notification Area when updates are available.

Qube Updates Available

However, you can also start the tool manually by selecting it in the Applications Menu under "System Tools." Even if no updates have been detected, you can use this tool to check for updates manually at any time by selecting "Enable updates for qubes without known available updates," then selecting all desired items from the list and clicking "Next."

Note: For the command-line equivalents of using the Qubes Update tool, see the Salt formulae update.qubes-dom0 and update.qubes-vm.

The final step is to make sure that all of your VMs are running a supported operating system so that they're all receiving upstream security updates. For example, you might be using a Fedora TemplateVM. The Fedora Project is independent of the Qubes OS Project. They set their own schedule for when each Fedora release reaches end-of-life (EOL). You can always find out when an operating system reaches EOL from the upstream project that maintains it, but we also make EOL announcements and publish guides for official TemplateVM operating systems as a convenience to Qubes users. When this happens, you should make sure to follow the guide to upgrade to a supported version of that operating system (see the Fedora upgrade guides and the Debian upgrade guides). The one exception is dom0, which doesn't have to be upgraded.