I'm gonna make it a fun day project to upgrade my Qubes system. Long live
Qubes!!

On Mon, Dec 18, 2023 at 7:13 PM Andrew David Wong <a...@qubes-os.org> wrote:

> Dear Qubes Community,
>
> Qubes OS 4.2.0 brings a host of new features, major improvements, and
> numerous bug fixes. The ISO and associated [verification files](
> https://www.qubes-os.org/security/verifying-signatures/) are available on
> the [downloads](https://www.qubes-os.org/downloads/) page.
>
> ## What's new in Qubes OS 4.2.0?
>
> - Dom0 upgraded to Fedora 37 ([#6982](
> https://github.com/QubesOS/qubes-issues/issues/6982))
> - Xen upgraded to version 4.17
> - Default Debian template upgraded to Debian 12
> - Default Fedora and Debian templates use Xfce instead of GNOME ([#7784](
> https://github.com/QubesOS/qubes-issues/issues/7784))
> - SELinux support in Fedora templates ([#4239](
> https://github.com/QubesOS/qubes-issues/issues/4239))
> - Several GUI applications rewritten, including:
>   - Applications Menu (also available as preview in R4.1) ([#6665](
> https://github.com/QubesOS/qubes-issues/issues/6665)), ([#5677](
> https://github.com/QubesOS/qubes-issues/issues/5677))
>   - Qubes Global Settings ([#6898](
> https://github.com/QubesOS/qubes-issues/issues/6898))
>   - Create New Qube
>   - Qubes Update ([#7443](
> https://github.com/QubesOS/qubes-issues/issues/7443))
> - Unified `grub.cfg` location for both UEFI and legacy boot ([#7985](
> https://github.com/QubesOS/qubes-issues/issues/7985))
> - PipeWire support ([#6358](
> https://github.com/QubesOS/qubes-issues/issues/6358))
> - fwupd integration for firmware updates ([#4855](
> https://github.com/QubesOS/qubes-issues/issues/4855))
> - Optional automatic clipboard clearing ([#3415](
> https://github.com/QubesOS/qubes-issues/issues/3415))
> - Official packages built using Qubes Builder v2 ([#6486](
> https://github.com/QubesOS/qubes-issues/issues/6486))
> - Split GPG management in Qubes Global Settings
> - Qrexec services use new qrexec policy format by default (but old format
> is still supported) ([#8000](
> https://github.com/QubesOS/qubes-issues/issues/8000))
>
> For further details, see the [Qubes 4.2 release notes](
> https://www.qubes-os.org/doc/releases/4.2/release-notes/) and the [full
> list of issues completed for Qubes 4.2](
> https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+is%3Aclosed+reason%3Acompleted+milestone%3A%22Release+4.2%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3A%22R%3A+declined%22+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+not+applicable%22+-label%3A%22R%3A+self-closed%22+-label%3A%22R%3A+upstream+issue%22+
> ).
>
> ## Known issues in Qubes OS 4.2.0
>
> DomU firewalls have completely switched to nftables. Users should add
> their custom rules to the `custom-input` and `custom-forward` chains. (For
> more information, see issues [#5031](
> https://github.com/QubesOS/qubes-issues/issues/5031) and [#6062](
> https://github.com/QubesOS/qubes-issues/issues/6062).)
>
> Also see the [full list of open bug reports affecting Qubes 4.2](
> https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+label%3Aaffects-4.2+label%3A%22T%3A+bug%22+is%3Aopen
> ).
>
> We strongly recommend [updating Qubes OS](
> https://www.qubes-os.org/doc/how-to-update/) immediately after
> installation in order to apply all available bug fixes.
>
> ## How to get Qubes OS 4.2.0
>
> - If you don't have Qubes OS installed, or if you're currently on Qubes
> 4.0 or earlier, follow the [installation guide](
> https://www.qubes-os.org/doc/installation-guide/).
> - If you're currently on Qubes 4.1, learn [how to upgrade to Qubes 4.2](
> https://www.qubes-os.org/doc/upgrade/4.2/).
> - If you're currently on a Qubes 4.2 release candidate (RC), [update
> normally](https://www.qubes-os.org/doc/how-to-update/).
>
> In all cases, we strongly recommend [making a full backup](
> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/)
> beforehand.
>
> ## Reminder: new release signing key for Qubes 4.2
>
> As a reminder, we published the following special announcement in [Qubes
> Canary 032](https://www.qubes-os.org/news/2022/09/14/canary-032/) on
> 2022-09-14:
>
> > We plan to create a new Release Signing Key (RSK) for Qubes OS 4.2.
> Normally, we have only one RSK for each major release. However, for the 4.2
> release, we will be using Qubes Builder version 2, which is a complete
> rewrite of the Qubes Builder. Out of an abundance of caution, we would like
> to isolate the build processes of the current stable 4.1 release and the
> upcoming 4.2 release from each other at the cryptographic level in order to
> minimize the risk of a vulnerability in one affecting the other. We are
> including this notice as a canary special announcement since introducing a
> new RSK for a minor release is an exception to our usual RSK management
> policy.
>
> As always, we encourage you to [authenticate](
> https://www.qubes-os.org/security/pack/#how-to-obtain-and-authenticate)
> this canary by [verifying its PGP signatures](
> https://www.qubes-os.org/security/verifying-signatures/). Specific
> instructions are also included in the [canary announcement](
> https://www.qubes-os.org/news/2022/09/14/canary-032/).
>
> As with all Qubes signing keys, we also encourage you to [authenticate](
> https://www.qubes-os.org/security/verifying-signatures/#how-to-import-and-authenticate-release-signing-keys)
> the new Qubes OS Release 4.2 Signing Key, which is available in the [Qubes
> Security Pack (qubes-secpack)](https://www.qubes-os.org/security/pack/)
> as well as on the [downloads](https://www.qubes-os.org/downloads/) page
> under the Qubes OS 4.2.0-rc5 ISO.
>
> ## Support for older releases
>
> In accordance with our [release support policy](
> https://www.qubes-os.org/doc/supported-releases/#qubes-os), Qubes 4.1
> will remain supported for six months after the release of Qubes 4.2, until
> 2024-06-18. After that, Qubes 4.1 will no longer receive security updates
> or bug fixes.
>
> [Whonix templates](https://www.whonix.org/wiki/Qubes) are created and
> supported by our partner, the [Whonix Project](https://www.whonix.org/).
> The Whonix Project has set its own support policy for Whonix templates in
> Qubes. For more information, see [Qubes-Whonix version support policy](
> https://www.whonix.org/wiki/About#Qubes_Hosts).
>
> ## Thank you to our partners, donors, contributors, and testers!
>
> This release would not be possible without generous support from our
> [partners](https://www.qubes-os.org/partners/) and [donors](
> https://www.qubes-os.org/donate/), as well as [contributions](
> https://www.qubes-os.org/doc/contributing/) from our active community
> members, especially [bug reports](
> https://www.qubes-os.org/doc/issue-tracking/) from our [testers](
> https://www.qubes-os.org/doc/testing/). We are eternally grateful to our
> excellent community for making the Qubes OS Project a great example of
> open-source collaboration.
>
>
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2023/12/18/qubes-os-4-2-0-has-been-released/
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/2188aeef-3a2a-4cb2-bd10-04ee792fa952%40qubes-os.org
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAALhvVZkQR0-XPR09Fz1jw%2Bzr7h9FzuK-n99zC7hpL%2ByM_Knag%40mail.gmail.com.

Reply via email to