[qubes-users] Qubes OS 4.2.0 has been released!

Dear Qubes Community,

Qubes OS 4.2.0 brings a host of new features, major improvements, and numerous bug fixes. The ISO and associated [verification files](Verifying signatures | Qubes OS) are available on the [downloads](Download Qubes OS | Qubes OS) page.

## What's new in Qubes OS 4.2.0?

- Dom0 upgraded to Fedora 37 ([#6982](Fedora 37+ in dom0 · Issue #6982 · QubesOS/qubes-issues · GitHub))
- Xen upgraded to version 4.17
- Default Debian template upgraded to Debian 12
- Default Fedora and Debian templates use Xfce instead of GNOME ([#7784](Choose "spins"/"flavors" of Fedora and Debian with better sets of default apps for standard templates · Issue #7784 · QubesOS/qubes-issues · GitHub))
- SELinux support in Fedora templates ([#4239](SELinux support in Fedora qubes · Issue #4239 · QubesOS/qubes-issues · GitHub))
- Several GUI applications rewritten, including:
  - Applications Menu (also available as preview in R4.1) ([#6665]("Valentina" App Menu · Issue #6665 · QubesOS/qubes-issues · GitHub)), ([#5677](App menu redesign · Issue #5677 · QubesOS/qubes-issues · GitHub))
  - Qubes Global Settings ([#6898](Next-Gen Qubes OS Settings UI · Issue #6898 · QubesOS/qubes-issues · GitHub))
  - Create New Qube
  - Qubes Update ([#7443](Implement own non-interactive template update tool · Issue #7443 · QubesOS/qubes-issues · GitHub))
- Unified `grub.cfg` location for both UEFI and legacy boot ([#7985](Use unified grub.cfg location · Issue #7985 · QubesOS/qubes-issues · GitHub))
- PipeWire support ([#6358](Pipewire audio support · Issue #6358 · QubesOS/qubes-issues · GitHub))
- fwupd integration for firmware updates ([#4855](Support for firmware updates via UEFI capsule · Issue #4855 · QubesOS/qubes-issues · GitHub))
- Optional automatic clipboard clearing ([#3415](Clear automatically the clipboard of an AppVM after a delay when using Ctrl-Shift-V · Issue #3415 · QubesOS/qubes-issues · GitHub))
- Official packages built using Qubes Builder v2 ([#6486](Design next major version of qubes-builder · Issue #6486 · QubesOS/qubes-issues · GitHub))
- Split GPG management in Qubes Global Settings
- Qrexec services use new qrexec policy format by default (but old format is still supported) ([#8000](Phase out legacy qrexec policy files · Issue #8000 · QubesOS/qubes-issues · GitHub))

For further details, see the [Qubes 4.2 release notes](Qubes OS 4.2.0 release notes | Qubes OS) and the [full list of issues completed for Qubes 4.2](Issues · QubesOS/qubes-issues · GitHub).

## Known issues in Qubes OS 4.2.0

DomU firewalls have completely switched to nftables. Users should add their custom rules to the `custom-input` and `custom-forward` chains. (For more information, see issues [#5031](iptables →nftables · Issue #5031 · QubesOS/qubes-issues · GitHub) and [#6062](Use flowtables to accelerate IP forwarding · Issue #6062 · QubesOS/qubes-issues · GitHub).)

Also see the [full list of open bug reports affecting Qubes 4.2](Issues · QubesOS/qubes-issues · GitHub).

We strongly recommend [updating Qubes OS](How to update | Qubes OS) immediately after installation in order to apply all available bug fixes.

## How to get Qubes OS 4.2.0

- If you don't have Qubes OS installed, or if you're currently on Qubes 4.0 or earlier, follow the [installation guide](Installation guide | Qubes OS).
- If you're currently on Qubes 4.1, learn [how to upgrade to Qubes 4.2](How to upgrade to Qubes 4.2 | Qubes OS).
- If you're currently on a Qubes 4.2 release candidate (RC), [update normally](How to update | Qubes OS).

In all cases, we strongly recommend [making a full backup](How to back up, restore, and migrate | Qubes OS) beforehand.

## Reminder: new release signing key for Qubes 4.2

As a reminder, we published the following special announcement in [Qubes Canary 032](Qubes Canary 032 | Qubes OS) on 2022-09-14:

We plan to create a new Release Signing Key (RSK) for Qubes OS 4.2. Normally, we have only one RSK for each major release. However, for the 4.2 release, we will be using Qubes Builder version 2, which is a complete rewrite of the Qubes Builder. Out of an abundance of caution, we would like to isolate the build processes of the current stable 4.1 release and the upcoming 4.2 release from each other at the cryptographic level in order to minimize the risk of a vulnerability in one affecting the other. We are including this notice as a canary special announcement since introducing a new RSK for a minor release is an exception to our usual RSK management policy.

As always, we encourage you to [authenticate](Qubes security pack (qubes-secpack) | Qubes OS) this canary by [verifying its PGP signatures](Verifying signatures | Qubes OS). Specific instructions are also included in the [canary announcement](Qubes Canary 032 | Qubes OS).

As with all Qubes signing keys, we also encourage you to [authenticate](Verifying signatures | Qubes OS) the new Qubes OS Release 4.2 Signing Key, which is available in the [Qubes Security Pack (qubes-secpack)](Qubes security pack (qubes-secpack) | Qubes OS) as well as on the [downloads](Download Qubes OS | Qubes OS) page under the Qubes OS 4.2.0-rc5 ISO.

## Support for older releases

In accordance with our [release support policy](Supported releases | Qubes OS), Qubes 4.1 will remain supported for six months after the release of Qubes 4.2, until 2024-06-18. After that, Qubes 4.1 will no longer receive security updates or bug fixes.

[Whonix templates](Qubes-Whonix Overview) are created and supported by our partner, the [Whonix Project](https://www.whonix.org/). The Whonix Project has set its own support policy for Whonix templates in Qubes. For more information, see [Qubes-Whonix version support policy](Whonix - Overview).

## Thank you to our partners, donors, contributors, and testers!

This release would not be possible without generous support from our [partners](Qubes Partners | Qubes OS) and [donors](Donate to Qubes | Qubes OS), as well as [contributions](How to contribute | Qubes OS) from our active community members, especially [bug reports](Issue tracking | Qubes OS) from our [testers](Testing new releases and updates | Qubes OS). We are eternally grateful to our excellent community for making the Qubes OS Project a great example of open-source collaboration.

This announcement is also available on the Qubes website:


I’m gonna make it a fun day project to upgrade my Qubes system. Long live Qubes!!