[prev in list] [next in list] [prev in thread] [next in thread] 

List:       qubes-users
Subject:    Re: [qubes-users] Qubes OS 4.2.0 has been released!
From:       Leo28C <leo28c () gmail ! com>
Date:       2023-12-19 12:29:19
Message-ID: CAALhvVZkQR0-XPR09Fz1jw+zr7h9FzuK-n99zC7hpL+yM_Knag () mail ! gmail ! com
[Download RAW message or body]

I'm gonna make it a fun day project to upgrade my Qubes system. Long live
Qubes!!

On Mon, Dec 18, 2023 at 7:13 PM Andrew David Wong <adw@qubes-os.org> wrote:

> Dear Qubes Community,
> 
> Qubes OS 4.2.0 brings a host of new features, major improvements, and
> numerous bug fixes. The ISO and associated [verification files](
> https://www.qubes-os.org/security/verifying-signatures/) are available on
> the [downloads](https://www.qubes-os.org/downloads/) page.
> 
> ## What's new in Qubes OS 4.2.0?
> 
> - Dom0 upgraded to Fedora 37 ([#6982](
> https://github.com/QubesOS/qubes-issues/issues/6982))
> - Xen upgraded to version 4.17
> - Default Debian template upgraded to Debian 12
> - Default Fedora and Debian templates use Xfce instead of GNOME ([#7784](
> https://github.com/QubesOS/qubes-issues/issues/7784))
> - SELinux support in Fedora templates ([#4239](
> https://github.com/QubesOS/qubes-issues/issues/4239))
> - Several GUI applications rewritten, including:
> - Applications Menu (also available as preview in R4.1) ([#6665](
> https://github.com/QubesOS/qubes-issues/issues/6665)), ([#5677](
> https://github.com/QubesOS/qubes-issues/issues/5677))
> - Qubes Global Settings ([#6898](
> https://github.com/QubesOS/qubes-issues/issues/6898))
> - Create New Qube
> - Qubes Update ([#7443](
> https://github.com/QubesOS/qubes-issues/issues/7443))
> - Unified `grub.cfg` location for both UEFI and legacy boot ([#7985](
> https://github.com/QubesOS/qubes-issues/issues/7985))
> - PipeWire support ([#6358](
> https://github.com/QubesOS/qubes-issues/issues/6358))
> - fwupd integration for firmware updates ([#4855](
> https://github.com/QubesOS/qubes-issues/issues/4855))
> - Optional automatic clipboard clearing ([#3415](
> https://github.com/QubesOS/qubes-issues/issues/3415))
> - Official packages built using Qubes Builder v2 ([#6486](
> https://github.com/QubesOS/qubes-issues/issues/6486))
> - Split GPG management in Qubes Global Settings
> - Qrexec services use new qrexec policy format by default (but old format
> is still supported) ([#8000](
> https://github.com/QubesOS/qubes-issues/issues/8000))
> 
> For further details, see the [Qubes 4.2 release notes](
> https://www.qubes-os.org/doc/releases/4.2/release-notes/) and the [full
> list of issues completed for Qubes 4.2](
> https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+is%3Aclosed+reason%3Acom \
> pleted+milestone%3A%22Release+4.2%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3A% \
> 22R%3A+declined%22+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+not+applicable%22+-label%3A%22R%3A+self-closed%22+-label%3A%22R%3A+upstream+issue%22+
>  ).
> 
> ## Known issues in Qubes OS 4.2.0
> 
> DomU firewalls have completely switched to nftables. Users should add
> their custom rules to the `custom-input` and `custom-forward` chains. (For
> more information, see issues [#5031](
> https://github.com/QubesOS/qubes-issues/issues/5031) and [#6062](
> https://github.com/QubesOS/qubes-issues/issues/6062).)
> 
> Also see the [full list of open bug reports affecting Qubes 4.2](
> https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+label%3Aaffects-4.2+label%3A%22T%3A+bug%22+is%3Aopen
>  ).
> 
> We strongly recommend [updating Qubes OS](
> https://www.qubes-os.org/doc/how-to-update/) immediately after
> installation in order to apply all available bug fixes.
> 
> ## How to get Qubes OS 4.2.0
> 
> - If you don't have Qubes OS installed, or if you're currently on Qubes
> 4.0 or earlier, follow the [installation guide](
> https://www.qubes-os.org/doc/installation-guide/).
> - If you're currently on Qubes 4.1, learn [how to upgrade to Qubes 4.2](
> https://www.qubes-os.org/doc/upgrade/4.2/).
> - If you're currently on a Qubes 4.2 release candidate (RC), [update
> normally](https://www.qubes-os.org/doc/how-to-update/).
> 
> In all cases, we strongly recommend [making a full backup](
> https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/)
> beforehand.
> 
> ## Reminder: new release signing key for Qubes 4.2
> 
> As a reminder, we published the following special announcement in [Qubes
> Canary 032](https://www.qubes-os.org/news/2022/09/14/canary-032/) on
> 2022-09-14:
> 
> > We plan to create a new Release Signing Key (RSK) for Qubes OS 4.2.
> Normally, we have only one RSK for each major release. However, for the 4.2
> release, we will be using Qubes Builder version 2, which is a complete
> rewrite of the Qubes Builder. Out of an abundance of caution, we would like
> to isolate the build processes of the current stable 4.1 release and the
> upcoming 4.2 release from each other at the cryptographic level in order to
> minimize the risk of a vulnerability in one affecting the other. We are
> including this notice as a canary special announcement since introducing a
> new RSK for a minor release is an exception to our usual RSK management
> policy.
> 
> As always, we encourage you to [authenticate](
> https://www.qubes-os.org/security/pack/#how-to-obtain-and-authenticate)
> this canary by [verifying its PGP signatures](
> https://www.qubes-os.org/security/verifying-signatures/). Specific
> instructions are also included in the [canary announcement](
> https://www.qubes-os.org/news/2022/09/14/canary-032/).
> 
> As with all Qubes signing keys, we also encourage you to [authenticate](
> https://www.qubes-os.org/security/verifying-signatures/#how-to-import-and-authenticate-release-signing-keys)
>  the new Qubes OS Release 4.2 Signing Key, which is available in the [Qubes
> Security Pack (qubes-secpack)](https://www.qubes-os.org/security/pack/)
> as well as on the [downloads](https://www.qubes-os.org/downloads/) page
> under the Qubes OS 4.2.0-rc5 ISO.
> 
> ## Support for older releases
> 
> In accordance with our [release support policy](
> https://www.qubes-os.org/doc/supported-releases/#qubes-os), Qubes 4.1
> will remain supported for six months after the release of Qubes 4.2, until
> 2024-06-18. After that, Qubes 4.1 will no longer receive security updates
> or bug fixes.
> 
> [Whonix templates](https://www.whonix.org/wiki/Qubes) are created and
> supported by our partner, the [Whonix Project](https://www.whonix.org/).
> The Whonix Project has set its own support policy for Whonix templates in
> Qubes. For more information, see [Qubes-Whonix version support policy](
> https://www.whonix.org/wiki/About#Qubes_Hosts).
> 
> ## Thank you to our partners, donors, contributors, and testers!
> 
> This release would not be possible without generous support from our
> [partners](https://www.qubes-os.org/partners/) and [donors](
> https://www.qubes-os.org/donate/), as well as [contributions](
> https://www.qubes-os.org/doc/contributing/) from our active community
> members, especially [bug reports](
> https://www.qubes-os.org/doc/issue-tracking/) from our [testers](
> https://www.qubes-os.org/doc/testing/). We are eternally grateful to our
> excellent community for making the Qubes OS Project a great example of
> open-source collaboration.
> 
> 
> This announcement is also available on the Qubes website:
> https://www.qubes-os.org/news/2023/12/18/qubes-os-4-2-0-has-been-released/
> 
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscribe@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/2188aeef-3a2a-4cb2-bd10-04ee792fa952%40qubes-os.org
>                 
> .
> 

-- 
You received this message because you are subscribed to the Google Groups \
"qubes-users" group. To unsubscribe from this group and stop receiving emails from \
it, send an email to qubes-users+unsubscribe@googlegroups.com. To view this \
discussion on the web visit \
https://groups.google.com/d/msgid/qubes-users/CAALhvVZkQR0-XPR09Fz1jw%2Bzr7h9FzuK-n99zC7hpL%2ByM_Knag%40mail.gmail.com.



[Attachment #3 (text/html)]

<div dir="ltr">I&#39;m gonna make it a fun day project to upgrade my Qubes system. \
Long live Qubes!!<br></div><br><div class="gmail_quote"><div dir="ltr" \
class="gmail_attr">On Mon, Dec 18, 2023 at 7:13 PM Andrew David Wong &lt;<a \
href="mailto:adw@qubes-os.org">adw@qubes-os.org</a>&gt; wrote:<br></div><blockquote \
class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex">Dear Qubes Community,<br> <br>
Qubes OS 4.2.0 brings a host of new features, major improvements, and numerous bug \
fixes. The ISO and associated [verification files](<a \
href="https://www.qubes-os.org/security/verifying-signatures/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/security/verifying-signatures/</a>) are \
available on the [downloads](<a href="https://www.qubes-os.org/downloads/" \
rel="noreferrer" target="_blank">https://www.qubes-os.org/downloads/</a>) page.<br> \
<br> ## What&#39;s new in Qubes OS 4.2.0?<br>
<br>
- Dom0 upgraded to Fedora 37 ([#6982](<a \
href="https://github.com/QubesOS/qubes-issues/issues/6982" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/6982</a>))<br>
                
- Xen upgraded to version 4.17<br>
- Default Debian template upgraded to Debian 12<br>
- Default Fedora and Debian templates use Xfce instead of GNOME ([#7784](<a \
href="https://github.com/QubesOS/qubes-issues/issues/7784" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/7784</a>))<br>
                
- SELinux support in Fedora templates ([#4239](<a \
href="https://github.com/QubesOS/qubes-issues/issues/4239" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/4239</a>))<br>
                
- Several GUI applications rewritten, including:<br>
   - Applications Menu (also available as preview in R4.1) ([#6665](<a \
href="https://github.com/QubesOS/qubes-issues/issues/6665)" rel="noreferrer" \
target="_blank">https://github.com/QubesOS/qubes-issues/issues/6665)</a>), \
([#5677](<a href="https://github.com/QubesOS/qubes-issues/issues/5677" \
rel="noreferrer" target="_blank">https://github.com/QubesOS/qubes-issues/issues/5677</a>))<br>
                
   - Qubes Global Settings ([#6898](<a \
href="https://github.com/QubesOS/qubes-issues/issues/6898" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/6898</a>))<br>
                
   - Create New Qube<br>
   - Qubes Update ([#7443](<a \
href="https://github.com/QubesOS/qubes-issues/issues/7443" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/7443</a>))<br>
                
- Unified `grub.cfg` location for both UEFI and legacy boot ([#7985](<a \
href="https://github.com/QubesOS/qubes-issues/issues/7985" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/7985</a>))<br>
                
- PipeWire support ([#6358](<a \
href="https://github.com/QubesOS/qubes-issues/issues/6358" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/6358</a>))<br>
                
- fwupd integration for firmware updates ([#4855](<a \
href="https://github.com/QubesOS/qubes-issues/issues/4855" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/4855</a>))<br>
                
- Optional automatic clipboard clearing ([#3415](<a \
href="https://github.com/QubesOS/qubes-issues/issues/3415" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/3415</a>))<br>
                
- Official packages built using Qubes Builder v2 ([#6486](<a \
href="https://github.com/QubesOS/qubes-issues/issues/6486" rel="noreferrer" \
                target="_blank">https://github.com/QubesOS/qubes-issues/issues/6486</a>))<br>
                
- Split GPG management in Qubes Global Settings<br>
- Qrexec services use new qrexec policy format by default (but old format is still \
supported) ([#8000](<a href="https://github.com/QubesOS/qubes-issues/issues/8000" \
rel="noreferrer" target="_blank">https://github.com/QubesOS/qubes-issues/issues/8000</a>))<br>
 <br>
For further details, see the [Qubes 4.2 release notes](<a \
href="https://www.qubes-os.org/doc/releases/4.2/release-notes/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/doc/releases/4.2/release-notes/</a>) and the \
[full list of issues completed for Qubes 4.2](<a \
href="https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+is%3Aclosed+reason%3 \
Acompleted+milestone%3A%22Release+4.2%22+-label%3A%22R%3A+cannot+reproduce%22+-label%3 \
A%22R%3A+declined%22+-label%3A%22R%3A+duplicate%22+-label%3A%22R%3A+not+applicable%22+-label%3A%22R%3A+self-closed%22+-label%3A%22R%3A+upstream+issue%22+" \
rel="noreferrer" target="_blank">https://github.com/QubesOS/qubes-issues/issues?q=is%3 \
Aissue+is%3Aclosed+reason%3Acompleted+milestone%3A%22Release+4.2%22+-label%3A%22R%3A+c \
annot+reproduce%22+-label%3A%22R%3A+declined%22+-label%3A%22R%3A+duplicate%22+-label%3 \
A%22R%3A+not+applicable%22+-label%3A%22R%3A+self-closed%22+-label%3A%22R%3A+upstream+issue%22+</a>).<br>
 <br>
## Known issues in Qubes OS 4.2.0<br>
<br>
DomU firewalls have completely switched to nftables. Users should add their custom \
rules to the `custom-input` and `custom-forward` chains. (For more information, see \
issues [#5031](<a href="https://github.com/QubesOS/qubes-issues/issues/5031" \
rel="noreferrer" target="_blank">https://github.com/QubesOS/qubes-issues/issues/5031</a>) \
and [#6062](<a href="https://github.com/QubesOS/qubes-issues/issues/6062)" \
rel="noreferrer" target="_blank">https://github.com/QubesOS/qubes-issues/issues/6062)</a>.)<br>
 <br>
Also see the [full list of open bug reports affecting Qubes 4.2](<a \
href="https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+label%3Aaffects-4.2+label%3A%22T%3A+bug%22+is%3Aopen" \
rel="noreferrer" target="_blank">https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+label%3Aaffects-4.2+label%3A%22T%3A+bug%22+is%3Aopen</a>).<br>
 <br>
We strongly recommend [updating Qubes OS](<a \
href="https://www.qubes-os.org/doc/how-to-update/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/doc/how-to-update/</a>) immediately after \
installation in order to apply all available bug fixes.<br> <br>
## How to get Qubes OS 4.2.0<br>
<br>
- If you don&#39;t have Qubes OS installed, or if you&#39;re currently on Qubes 4.0 \
or earlier, follow the [installation guide](<a \
href="https://www.qubes-os.org/doc/installation-guide/" rel="noreferrer" \
                target="_blank">https://www.qubes-os.org/doc/installation-guide/</a>).<br>
                
- If you&#39;re currently on Qubes 4.1, learn [how to upgrade to Qubes 4.2](<a \
href="https://www.qubes-os.org/doc/upgrade/4.2/" rel="noreferrer" \
                target="_blank">https://www.qubes-os.org/doc/upgrade/4.2/</a>).<br>
- If you&#39;re currently on a Qubes 4.2 release candidate (RC), [update normally](<a \
href="https://www.qubes-os.org/doc/how-to-update/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/doc/how-to-update/</a>).<br> <br>
In all cases, we strongly recommend [making a full backup](<a \
href="https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/" \
rel="noreferrer" target="_blank">https://www.qubes-os.org/doc/how-to-back-up-restore-and-migrate/</a>) \
beforehand.<br> <br>
## Reminder: new release signing key for Qubes 4.2<br>
<br>
As a reminder, we published the following special announcement in [Qubes Canary \
032](<a href="https://www.qubes-os.org/news/2022/09/14/canary-032/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/news/2022/09/14/canary-032/</a>) on \
2022-09-14:<br> <br>
&gt; We plan to create a new Release Signing Key (RSK) for Qubes OS 4.2. Normally, we \
have only one RSK for each major release. However, for the 4.2 release, we will be \
using Qubes Builder version 2, which is a complete rewrite of the Qubes Builder. Out \
of an abundance of caution, we would like to isolate the build processes of the \
current stable 4.1 release and the upcoming 4.2 release from each other at the \
cryptographic level in order to minimize the risk of a vulnerability in one affecting \
the other. We are including this notice as a canary special announcement since \
introducing a new RSK for a minor release is an exception to our usual RSK management \
policy.<br> <br>
As always, we encourage you to [authenticate](<a \
href="https://www.qubes-os.org/security/pack/#how-to-obtain-and-authenticate" \
rel="noreferrer" target="_blank">https://www.qubes-os.org/security/pack/#how-to-obtain-and-authenticate</a>) \
this canary by [verifying its PGP signatures](<a \
href="https://www.qubes-os.org/security/verifying-signatures/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/security/verifying-signatures/</a>). \
Specific instructions are also included in the [canary announcement](<a \
href="https://www.qubes-os.org/news/2022/09/14/canary-032/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/news/2022/09/14/canary-032/</a>).<br> <br>
As with all Qubes signing keys, we also encourage you to [authenticate](<a \
href="https://www.qubes-os.org/security/verifying-signatures/#how-to-import-and-authenticate-release-signing-keys" \
rel="noreferrer" target="_blank">https://www.qubes-os.org/security/verifying-signatures/#how-to-import-and-authenticate-release-signing-keys</a>) \
the new Qubes OS Release 4.2 Signing Key, which is available in the [Qubes Security \
Pack (qubes-secpack)](<a href="https://www.qubes-os.org/security/pack/" \
rel="noreferrer" target="_blank">https://www.qubes-os.org/security/pack/</a>) as well \
as on the [downloads](<a href="https://www.qubes-os.org/downloads/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/downloads/</a>) page under the Qubes OS \
4.2.0-rc5 ISO.<br> <br>
## Support for older releases<br>
<br>
In accordance with our [release support policy](<a \
href="https://www.qubes-os.org/doc/supported-releases/#qubes-os" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/doc/supported-releases/#qubes-os</a>), Qubes \
4.1 will remain supported for six months after the release of Qubes 4.2, until \
2024-06-18. After that, Qubes 4.1 will no longer receive security updates or bug \
fixes.<br> <br>
[Whonix templates](<a href="https://www.whonix.org/wiki/Qubes" rel="noreferrer" \
target="_blank">https://www.whonix.org/wiki/Qubes</a>) are created and supported by \
our partner, the [Whonix Project](<a href="https://www.whonix.org/" rel="noreferrer" \
target="_blank">https://www.whonix.org/</a>). The Whonix Project has set its own \
support policy for Whonix templates in Qubes. For more information, see [Qubes-Whonix \
version support policy](<a href="https://www.whonix.org/wiki/About#Qubes_Hosts" \
rel="noreferrer" target="_blank">https://www.whonix.org/wiki/About#Qubes_Hosts</a>).<br>
 <br>
## Thank you to our partners, donors, contributors, and testers!<br>
<br>
This release would not be possible without generous support from our [partners](<a \
href="https://www.qubes-os.org/partners/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/partners/</a>) and [donors](<a \
href="https://www.qubes-os.org/donate/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/donate/</a>), as well as [contributions](<a \
href="https://www.qubes-os.org/doc/contributing/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/doc/contributing/</a>) from our active \
community members, especially [bug reports](<a \
href="https://www.qubes-os.org/doc/issue-tracking/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/doc/issue-tracking/</a>) from our \
[testers](<a href="https://www.qubes-os.org/doc/testing/" rel="noreferrer" \
target="_blank">https://www.qubes-os.org/doc/testing/</a>). We are eternally grateful \
to our excellent community for making the Qubes OS Project a great example of \
open-source collaboration.<br> <br>
<br>
This announcement is also available on the Qubes website:<br>
<a href="https://www.qubes-os.org/news/2023/12/18/qubes-os-4-2-0-has-been-released/" \
rel="noreferrer" target="_blank">https://www.qubes-os.org/news/2023/12/18/qubes-os-4-2-0-has-been-released/</a><br>
 <br>
-- <br>
You received this message because you are subscribed to the Google Groups \
&quot;qubes-users&quot; group.<br> To unsubscribe from this group and stop receiving \
emails from it, send an email to <a \
href="mailto:qubes-users%2Bunsubscribe@googlegroups.com" \
target="_blank">qubes-users+unsubscribe@googlegroups.com</a>.<br> To view this \
discussion on the web visit <a \
href="https://groups.google.com/d/msgid/qubes-users/2188aeef-3a2a-4cb2-bd10-04ee792fa952%40qubes-os.org" \
rel="noreferrer" target="_blank">https://groups.google.com/d/msgid/qubes-users/2188aeef-3a2a-4cb2-bd10-04ee792fa952%40qubes-os.org</a>.<br>
 </blockquote></div>

<p></p>

-- <br />
You received this message because you are subscribed to the Google Groups \
&quot;qubes-users&quot; group.<br /> To unsubscribe from this group and stop \
receiving emails from it, send an email to <a \
href="mailto:qubes-users+unsubscribe@googlegroups.com">qubes-users+unsubscribe@googlegroups.com</a>.<br \
/> To view this discussion on the web visit <a \
href="https://groups.google.com/d/msgid/qubes-users/CAALhvVZkQR0-XPR09Fz1jw%2Bzr7h9Fzu \
K-n99zC7hpL%2ByM_Knag%40mail.gmail.com?utm_medium=email&utm_source=footer">https://gro \
ups.google.com/d/msgid/qubes-users/CAALhvVZkQR0-XPR09Fz1jw%2Bzr7h9FzuK-n99zC7hpL%2ByM_Knag%40mail.gmail.com</a>.<br \
/>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic