[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#964589: buster-pu: package fwupd/1.2.5-2



Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian.org@packages.debian.org
Usertags: pu

Hi folks,

Similarly again for Buster...

We'd like to push an update for fwupd in Buster. It's not as far out
of date as that in Stretch, but it's starting to show its age and
security worries (again CVE-2020-10759).

To fix things and to allow us to keep on top of security and other
important issues, we'd like to update to the head of the current
stable release branch (1.12.x). Mario, the primary maintainer in
Debian, is also part of the upstream development team and has been
working to maintain that. Apparently Ubuntu and other distros have
switched to this already.

This *does* mean that the debdiff is *way* too large to fit in mail,
sorry. :-( I've put a copy up at

 https://www.einval.com/~steve/debian/fwupd_1.2.13-1_amd64.debdiff.gz

for reference.

Sorry this is so big and so late... :-(

-- System Information:
Debian Release: 10.4
  APT prefers stable-debug
  APT policy: (500, 'stable-debug'), (500, 'stable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.118+ (SMP w/4 CPU cores)
Kernel taint flags: TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled


Reply to: