Qubes OS 4.2.0 has been released!

Qubes OS 4.2.0 brings a host of new features, major improvements, and numerous bug fixes. The ISO and associated verification files are available on the downloads page.

What’s new in Qubes OS 4.2.0?

  • Dom0 upgraded to Fedora 37 (#6982)
  • Xen upgraded to version 4.17
  • Default Debian template upgraded to Debian 12
  • Default Fedora and Debian templates use Xfce instead of GNOME (#7784)
  • SELinux support in Fedora templates (#4239)
  • Several GUI applications rewritten (screenshots below), including:
    • Applications Menu (also available as preview in R4.1) (#6665), (#5677)
    • Qubes Global Settings (#6898)
    • Create New Qube
    • Qubes Update (#7443)
  • Unified grub.cfg location for both UEFI and legacy boot (#7985)
  • PipeWire support (#6358)
  • fwupd integration for firmware updates (#4855)
  • Optional automatic clipboard clearing (#3415)
  • Official packages built using Qubes Builder v2 (#6486)
  • Split GPG management in Qubes Global Settings
  • Qrexec services use new qrexec policy format by default (but old format is still supported) (#8000)
  • Improved keyboard layout switching

For further details, see the Qubes 4.2 release notes and the full list of issues completed for Qubes 4.2. Below are some screenshots of the new and improved Qubes GUI tools.

The new Qubes OS Update tool:

Screenshot of the Qubes OS Update tool

The new Qubes OS Global Config tool:

Screenshot of the Qubes OS Global Config tool Screenshot of the Qubes OS Global Config tool

The new Qubes OS Policy Editor tool:

Screenshot of the Qubes OS Policy Editor tool

Known issues in Qubes OS 4.2.0

  • DomU firewalls have completely switched to nftables. Users should add their custom rules to the custom-input and custom-forward chains. (For more information, see issues #5031 and #6062.)

  • Templates restored in 4.2 from a pre-4.2 backup continue to target their original Qubes OS release repos. If you are using fresh templates on a clean 4.2 installation, or if you performed an in-place upgrade from 4.1 to 4.2, then this does not affect you. (For more information, see issue #8701.)

Also see the full list of open bug reports affecting Qubes 4.2.

We strongly recommend updating Qubes OS immediately after installation in order to apply all available bug fixes.

How to get Qubes OS 4.2.0

In all cases, we strongly recommend making a full backup beforehand.

Reminder: new release signing key for Qubes 4.2

As a reminder, we published the following special announcement in Qubes Canary 032 on 2022-09-14:

We plan to create a new Release Signing Key (RSK) for Qubes OS 4.2. Normally, we have only one RSK for each major release. However, for the 4.2 release, we will be using Qubes Builder version 2, which is a complete rewrite of the Qubes Builder. Out of an abundance of caution, we would like to isolate the build processes of the current stable 4.1 release and the upcoming 4.2 release from each other at the cryptographic level in order to minimize the risk of a vulnerability in one affecting the other. We are including this notice as a canary special announcement since introducing a new RSK for a minor release is an exception to our usual RSK management policy.

As always, we encourage you to authenticate this canary by verifying its PGP signatures. Specific instructions are also included in the canary announcement.

As with all Qubes signing keys, we also encourage you to authenticate the new Qubes OS Release 4.2 Signing Key, which is available in the Qubes Security Pack (qubes-secpack) as well as on the downloads page under the Qubes OS 4.2.0-rc5 ISO.

Support for older releases

In accordance with our release support policy, Qubes 4.1 will remain supported for six months after the release of Qubes 4.2, until 2024-06-18. After that, Qubes 4.1 will no longer receive security updates or bug fixes.

Whonix templates are created and supported by our partner, the Whonix Project. The Whonix Project has set its own support policy for Whonix templates in Qubes. For more information, see Qubes-Whonix version support policy.

Thank you to our partners, donors, contributors, and testers!

This release would not be possible without generous support from our partners and donors, as well as contributions from our active community members, especially bug reports from our testers. We are eternally grateful to our excellent community for making the Qubes OS Project a great example of open-source collaboration.


This is a companion discussion topic for the original entry at https://www.qubes-os.org/news/2023/12/18/qubes-os-4-2-0-has-been-released/
28 Likes

Nice work!

What are the vendors and models of hardware that would best support the fwupd integration?

Thank you.

P.S. Fixes of keyboard layout switching are not even mentioned on the list, while it was one of the most desired/demanded by users change according to the forum.

After seeing the news, I did a full system update/upgrade. Bunch of stuff got updated on dom0. I did a restart. However, after the restart, on Qubes Manager > About > QubesOS the version number reported is still 4.2.0-rc5 (R4.2) on me. Am I still on the RC, or am I on the proper 4.2?

A big Thank You to all involved! Nice work and keep up all the work! I love how it grow more and more for all…

1 Like

If you update dom0 with current-testing enabled, you will get the full 4.2.0 release. The change related to the Qubes version is still in the testing repository.

3 Likes

Alright. I think I will wait for the 4.2 release to hit the regular update repo.

Fantastic work!

I’m currently on 4.2 RC5 with dom0 update set to testing in global settings, what should I do to enable the new application menu?

Is it missing for you?
It should look like this:

Turns out, I’m dumb!
I now remember I wanted to install 4.2 RC5, had some issues, and did 4.1 instead. So let me first upgrade to 4.2 from there. Sorry!

Great! Time for a clean reinstall! :slight_smile:

And let’s seed the torrent file :ocean:

5 Likes

Also put the torrent file on i2p :slight_smile:

3 Likes

Ongoing discussion on Hacker News: Qubes OS 4.2.0 has been released | Hacker News

1 Like

Qubes OS 4.2.0 release notes

Please note: This page is still an unfinished draft in progress. It is being updated as Qubes 4.2 development and testing continues.

I guess this note can be removed now.

1 Like

A post was split to a new topic: File locking is disabled

Added, thanks.

Good catch. Fixed, thanks.

3 Likes

Sounds like a good project for next week: blow away my laptop install and do a fresh install. I’ve been waiting to see if all my configuration customizations (most people wouldn’t even recognize my system) would be as easy to port to a clean install as I thought.

2 Likes

There’s a huge problem with KDE, it’s like it’s not supported anymore. I’ve created some new threads, but it seems way off the 4.1 way. Please address this issue. The system with KDE is unusable whatsoever.

1 Like

Please consider submitting a bug report, if possible:

1 Like

I don’t use github.

If anyone willing to report the issue you’re more than welcome.

It really makes an impression that KDE is not tested whatsoever with 4.2 version.

2 Likes