|
[[!meta title="Tails 4.2.2 is out"]]
|
|
|
This release is an emergency release to fix a critical security vulnerability in *Tor Browser*.
|
|
|
Updates
|
|
|
Update *Tor Browser* to [9.0.4](https://blog.torproject.org/new-release-tor-browser-904).
|
|
|
This fixes a [[!mfsa 2020-03 desc="critical vulnerability"]] in the JavaScript JIT compiler of *Firefox* and *Tor Browser*.
|
|
|
Mozilla is aware of targeted attacks in the wild abusing this vulnerability.
|
|
|
This vulnerability only affects the *standard* [[security level|doc/anonymous_internet/Tor_Browser#security-level]] of *Tor Browser*. The *safer* and *safest* security levels are not affected.
|
|
|
Fixed problems
|
|
|
Avoid a 2-minutes delay when restarting after doing an automatic upgrade. ([[!tails_ticket 17026]])
|
|
|
For more details, read our [[!tails_gitweb debian/changelog desc="changelog"]].
|
|
|
Known issues
|
|
|
None specific to this release.
|
|
|
See the list of [[long-standing issues|support/known_issues]].
|
|
|
Get Tails 4.2.2
|
|
|
To upgrade your Tails USB stick and keep your persistent storage
|
|
|
- Automatic upgrades are available from 4.2 to 4.2.2.
|
|
|
Users of Tails 4.0, 4.1, and 4.1.1 have to upgrade to 4.2 first and then to 4.2.2.
|
|
|
If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a [[manual upgrade|doc/upgrade/#manual]].
|
|
|
To install Tails on a new USB stick
|
|
|
Follow our installation instructions:
|
|