Qubes OS 4.2.0 has been released!

44 views
Skip to first unread message

Andrew David Wong

unread,
Dec 18, 2023, 8:13:07 PM12/18/23
to qubes-announce, qubes-devel, qubes-users
Dear Qubes Community,

Qubes OS 4.2.0 brings a host of new features, major improvements, and numerous bug fixes. The ISO and associated [verification files](https://www.qubes-os.org/security/verifying-signatures/) are available on the [downloads](https://www.qubes-os.org/downloads/) page.

## What's new in Qubes OS 4.2.0?

- Dom0 upgraded to Fedora 37 ([#6982](https://github.com/QubesOS/qubes-issues/issues/6982))
- Xen upgraded to version 4.17
- Default Debian template upgraded to Debian 12
- Default Fedora and Debian templates use Xfce instead of GNOME ([#7784](https://github.com/QubesOS/qubes-issues/issues/7784))
- SELinux support in Fedora templates ([#4239](https://github.com/QubesOS/qubes-issues/issues/4239))
- Several GUI applications rewritten, including:
- Applications Menu (also available as preview in R4.1) ([#6665](https://github.com/QubesOS/qubes-issues/issues/6665)), ([#5677](https://github.com/QubesOS/qubes-issues/issues/5677))
- Qubes Global Settings ([#6898](https://github.com/QubesOS/qubes-issues/issues/6898))
- Create New Qube
- Qubes Update ([#7443](https://github.com/QubesOS/qubes-issues/issues/7443))
- Unified `grub.cfg` location for both UEFI and legacy boot ([#7985](https://github.com/QubesOS/qubes-issues/issues/7985))
- PipeWire support ([#6358](https://github.com/QubesOS/qubes-issues/issues/6358))
- fwupd integration for firmware updates ([#4855](https://github.com/QubesOS/qubes-issues/issues/4855))
- Optional automatic clipboard clearing ([#3415](https://github.com/QubesOS/qubes-issues/issues/3415))
- Official packages built using Qubes Builder v2 ([#6486](https://github.com/QubesOS/qubes-issues/issues/6486))
- Split GPG management in Qubes Global Settings
- Qrexec services use new qrexec policy format by default (but old format is still supported) ([#8000](https://github.com/QubesOS/qubes-issues/issues/8000))

For further details, see the [Qubes 4.2 release notes](https://www.qubes-os.org/doc/releases/4.2/release-notes/) and the [full list of issues completed for Qubes 4.2](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+is%3Aclosed+reason%3Acompleted+milestone%3A%22Release+4.2%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3A%22R%3A+declined%22+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+not+applicable%22+-label%3A%22R%3A+self-closed%22+-label%3A%22R%3A+upstream+issue%22+).

## Known issues in Qubes OS 4.2.0

DomU firewalls have completely switched to nftables. Users should add their custom rules to the `custom-input` and `custom-forward` chains. (For more information, see issues [#5031](https://github.com/QubesOS/qubes-issues/issues/5031) and [#6062](https://github.com/QubesOS/qubes-issues/issues/6062).)

Also see the [full list of open bug reports affecting Qubes 4.2](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+label%3Aaffects-4.2+label%3A%22T%3A+bug%22+is%3Aopen).

We strongly recommend [updating Qubes OS](https://www.qubes-os.org/doc/how-to-update/) immediately after installation in order to apply all available bug fixes.

## How to get Qubes OS 4.2.0

- If you don't have Qubes OS installed, or if you're currently on Qubes 4.0 or earlier, follow the [installation guide](https://www.qubes-os.org/doc/installation-guide/).
- If you're currently on Qubes 4.1, learn [how to upgrade to Qubes 4.2](https://www.qubes-os.org/doc/upgrade/4.2/).
- If you're currently on a Qubes 4.2 release candidate (RC), [update normally](https://www.qubes-os.org/doc/how-to-update/).

In all cases, we strongly recommend [making a full backup](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/) beforehand.

## Reminder: new release signing key for Qubes 4.2

As a reminder, we published the following special announcement in [Qubes Canary 032](https://www.qubes-os.org/news/2022/09/14/canary-032/) on 2022-09-14:

> We plan to create a new Release Signing Key (RSK) for Qubes OS 4.2. Normally, we have only one RSK for each major release. However, for the 4.2 release, we will be using Qubes Builder version 2, which is a complete rewrite of the Qubes Builder. Out of an abundance of caution, we would like to isolate the build processes of the current stable 4.1 release and the upcoming 4.2 release from each other at the cryptographic level in order to minimize the risk of a vulnerability in one affecting the other. We are including this notice as a canary special announcement since introducing a new RSK for a minor release is an exception to our usual RSK management policy.

As always, we encourage you to [authenticate](https://www.qubes-os.org/security/pack/#how-to-obtain-and-authenticate) this canary by [verifying its PGP signatures](https://www.qubes-os.org/security/verifying-signatures/). Specific instructions are also included in the [canary announcement](https://www.qubes-os.org/news/2022/09/14/canary-032/).

As with all Qubes signing keys, we also encourage you to [authenticate](https://www.qubes-os.org/security/verifying-signatures/#how-to-import-and-authenticate-release-signing-keys) the new Qubes OS Release 4.2 Signing Key, which is available in the [Qubes Security Pack (qubes-secpack)](https://www.qubes-os.org/security/pack/) as well as on the [downloads](https://www.qubes-os.org/downloads/) page under the Qubes OS 4.2.0-rc5 ISO.

## Support for older releases

In accordance with our [release support policy](https://www.qubes-os.org/doc/supported-releases/#qubes-os), Qubes 4.1 will remain supported for six months after the release of Qubes 4.2, until 2024-06-18. After that, Qubes 4.1 will no longer receive security updates or bug fixes.

[Whonix templates](https://www.whonix.org/wiki/Qubes) are created and supported by our partner, the [Whonix Project](https://www.whonix.org/). The Whonix Project has set its own support policy for Whonix templates in Qubes. For more information, see [Qubes-Whonix version support policy](https://www.whonix.org/wiki/About#Qubes_Hosts).

## Thank you to our partners, donors, contributors, and testers!

This release would not be possible without generous support from our [partners](https://www.qubes-os.org/partners/) and [donors](https://www.qubes-os.org/donate/), as well as [contributions](https://www.qubes-os.org/doc/contributing/) from our active community members, especially [bug reports](https://www.qubes-os.org/doc/issue-tracking/) from our [testers](https://www.qubes-os.org/doc/testing/). We are eternally grateful to our excellent community for making the Qubes OS Project a great example of open-source collaboration.


This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2023/12/18/qubes-os-4-2-0-has-been-released/

Leo28C

unread,
Dec 19, 2023, 7:29:35 AM12/19/23
to qubes-users
I'm gonna make it a fun day project to upgrade my Qubes system. Long live Qubes!!

--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2188aeef-3a2a-4cb2-bd10-04ee792fa952%40qubes-os.org.
Reply all
Reply to author
Forward
0 new messages