Dear Qubes Community,

Qubes OS 4.2.0 brings a host of new features, major improvements, and numerous 
bug fixes. The ISO and associated [verification 
files](https://www.qubes-os.org/security/verifying-signatures/) are available 
on the [downloads](https://www.qubes-os.org/downloads/) page.

## What's new in Qubes OS 4.2.0?

- Dom0 upgraded to Fedora 37 
([#6982](https://github.com/QubesOS/qubes-issues/issues/6982))
- Xen upgraded to version 4.17
- Default Debian template upgraded to Debian 12
- Default Fedora and Debian templates use Xfce instead of GNOME 
([#7784](https://github.com/QubesOS/qubes-issues/issues/7784))
- SELinux support in Fedora templates 
([#4239](https://github.com/QubesOS/qubes-issues/issues/4239))
- Several GUI applications rewritten, including:
  - Applications Menu (also available as preview in R4.1) 
([#6665](https://github.com/QubesOS/qubes-issues/issues/6665)), 
([#5677](https://github.com/QubesOS/qubes-issues/issues/5677))
  - Qubes Global Settings 
([#6898](https://github.com/QubesOS/qubes-issues/issues/6898))
  - Create New Qube
  - Qubes Update ([#7443](https://github.com/QubesOS/qubes-issues/issues/7443))
- Unified `grub.cfg` location for both UEFI and legacy boot 
([#7985](https://github.com/QubesOS/qubes-issues/issues/7985))
- PipeWire support 
([#6358](https://github.com/QubesOS/qubes-issues/issues/6358))
- fwupd integration for firmware updates 
([#4855](https://github.com/QubesOS/qubes-issues/issues/4855))
- Optional automatic clipboard clearing 
([#3415](https://github.com/QubesOS/qubes-issues/issues/3415))
- Official packages built using Qubes Builder v2 
([#6486](https://github.com/QubesOS/qubes-issues/issues/6486))
- Split GPG management in Qubes Global Settings
- Qrexec services use new qrexec policy format by default (but old format is 
still supported) ([#8000](https://github.com/QubesOS/qubes-issues/issues/8000))

For further details, see the [Qubes 4.2 release 
notes](https://www.qubes-os.org/doc/releases/4.2/release-notes/) and the [full 
list of issues completed for Qubes 
4.2](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+is%3Aclosed+reason%3Acompleted+milestone%3A%22Release+4.2%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3A%22R%3A+declined%22+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+not+applicable%22+-label%3A%22R%3A+self-closed%22+-label%3A%22R%3A+upstream+issue%22+).

## Known issues in Qubes OS 4.2.0

DomU firewalls have completely switched to nftables. Users should add their 
custom rules to the `custom-input` and `custom-forward` chains. (For more 
information, see issues 
[#5031](https://github.com/QubesOS/qubes-issues/issues/5031) and 
[#6062](https://github.com/QubesOS/qubes-issues/issues/6062).)

Also see the [full list of open bug reports affecting Qubes 
4.2](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+label%3Aaffects-4.2+label%3A%22T%3A+bug%22+is%3Aopen).

We strongly recommend [updating Qubes 
OS](https://www.qubes-os.org/doc/how-to-update/) immediately after installation 
in order to apply all available bug fixes.

## How to get Qubes OS 4.2.0

- If you don't have Qubes OS installed, or if you're currently on Qubes 4.0 or 
earlier, follow the [installation 
guide](https://www.qubes-os.org/doc/installation-guide/).
- If you're currently on Qubes 4.1, learn [how to upgrade to Qubes 
4.2](https://www.qubes-os.org/doc/upgrade/4.2/).
- If you're currently on a Qubes 4.2 release candidate (RC), [update 
normally](https://www.qubes-os.org/doc/how-to-update/).

In all cases, we strongly recommend [making a full 
backup](https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/) 
beforehand.

## Reminder: new release signing key for Qubes 4.2

As a reminder, we published the following special announcement in [Qubes Canary 
032](https://www.qubes-os.org/news/2022/09/14/canary-032/) on 2022-09-14:

> We plan to create a new Release Signing Key (RSK) for Qubes OS 4.2. Normally, 
> we have only one RSK for each major release. However, for the 4.2 release, we 
> will be using Qubes Builder version 2, which is a complete rewrite of the 
> Qubes Builder. Out of an abundance of caution, we would like to isolate the 
> build processes of the current stable 4.1 release and the upcoming 4.2 
> release from each other at the cryptographic level in order to minimize the 
> risk of a vulnerability in one affecting the other. We are including this 
> notice as a canary special announcement since introducing a new RSK for a 
> minor release is an exception to our usual RSK management policy.

As always, we encourage you to 
[authenticate](https://www.qubes-os.org/security/pack/#how-to-obtain-and-authenticate)
 this canary by [verifying its PGP 
signatures](https://www.qubes-os.org/security/verifying-signatures/). Specific 
instructions are also included in the [canary 
announcement](https://www.qubes-os.org/news/2022/09/14/canary-032/).

As with all Qubes signing keys, we also encourage you to 
[authenticate](https://www.qubes-os.org/security/verifying-signatures/#how-to-import-and-authenticate-release-signing-keys)
 the new Qubes OS Release 4.2 Signing Key, which is available in the [Qubes 
Security Pack (qubes-secpack)](https://www.qubes-os.org/security/pack/) as well 
as on the [downloads](https://www.qubes-os.org/downloads/) page under the Qubes 
OS 4.2.0-rc5 ISO.

## Support for older releases

In accordance with our [release support 
policy](https://www.qubes-os.org/doc/supported-releases/#qubes-os), Qubes 4.1 
will remain supported for six months after the release of Qubes 4.2, until 
2024-06-18. After that, Qubes 4.1 will no longer receive security updates or 
bug fixes.

[Whonix templates](https://www.whonix.org/wiki/Qubes) are created and supported 
by our partner, the [Whonix Project](https://www.whonix.org/). The Whonix 
Project has set its own support policy for Whonix templates in Qubes. For more 
information, see [Qubes-Whonix version support 
policy](https://www.whonix.org/wiki/About#Qubes_Hosts).

## Thank you to our partners, donors, contributors, and testers!

This release would not be possible without generous support from our 
[partners](https://www.qubes-os.org/partners/) and 
[donors](https://www.qubes-os.org/donate/), as well as 
[contributions](https://www.qubes-os.org/doc/contributing/) from our active 
community members, especially [bug 
reports](https://www.qubes-os.org/doc/issue-tracking/) from our 
[testers](https://www.qubes-os.org/doc/testing/). We are eternally grateful to 
our excellent community for making the Qubes OS Project a great example of 
open-source collaboration.


This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2023/12/18/qubes-os-4-2-0-has-been-released/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2188aeef-3a2a-4cb2-bd10-04ee792fa952%40qubes-os.org.

Reply via email to