English Portuguese
[[!meta title="Tails 5.3.1 is out"]]
[[!meta date="Tue, 02 Aug 2022 12:34:56 +0000"]]
This release is an emergency release to fix a security vulnerability in the *Linux* kernel.
<h1 id="changes">Changes and updates</h1>
Update the *Linux* kernel to 5.10.127-2, which fixes [CVE-2022-34918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918), a vulnerability that allows applications in Tails to gain administration privileges.
For example, if an attacker was able to exploit other unknown security
vulnerabilities in *Tor Browser*, they might then use CVE-2022-34918 to take
full control of your Tails and deanonymize you.
This attack is very unlikely, but could be performed by a strong attacker,
such as a government or a hacking firm. We are not aware of this attack being
used in the wild.
- Update *Thunderbird* to [91.12.0](https://www.thunderbird.net/en-US/thunderbird/91.12.0/releasenotes/).
<h1 id="fixes">Fixed problems</h1>
For more details, read our [[!tails_gitweb debian/changelog desc="changelog"]].
<h1 id="issues">Known issues</h1>
None specific to this release.
See the list of [[long-standing issues|support/known_issues]].
<h1 id="get">Get Tails 5.3.1</h1>
To upgrade your Tails USB stick and keep your persistent storage
- Automatic upgrades are available from Tails 5.0 or later to 5.3.1.
You can [[reduce the size of the download|doc/upgrade#reduce]] of future
automatic upgrades by doing a manual upgrade to the latest version.
If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a [[manual upgrade|doc/upgrade/#manual]].
To install Tails on a new USB stick
Follow our installation instructions: