Tails 5.3.1 is out
This release is an emergency release to fix a security vulnerability in the Linux kernel.
Changes and updates
Update the Linux kernel to 5.10.127-2, which fixes CVE-2022-34918, a vulnerability that allows applications in Tails to gain administration privileges.
For example, if an attacker was able to exploit other unknown security vulnerabilities in Tor Browser, they might then use CVE-2022-34918 to take full control of your Tails and deanonymize you.
This attack is very unlikely, but could be performed by a strong attacker, such as a government or a hacking firm. We are not aware of this attack being used in the wild.
Update Thunderbird to 91.12.0.
Fixed problems
For more details, read our changelog.
Known issues
None specific to this release.
See the list of long-standing issues.
Get Tails 5.3.1
To upgrade your Tails USB stick and keep your persistent storage
Automatic upgrades are available from Tails 5.0 or later to 5.3.1.
You can reduce the size of the download of future automatic upgrades by doing a manual upgrade to the latest version.
If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.
To install Tails on a new USB stick
Follow our installation instructions:
- Install from Windows
- Install from macOS
- Install from Linux
- Install from Debian or Ubuntu using the command line and GnuPG
A new version of Tails has been released to address a security vulnerability in the included Linux kernel. Tails is a portable operating system that protects against surveillance and censorship.