[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Current bullseye security and stability



Hi.

I love having fresh packages.  To work around the oldness of Debian
stable, I have installed dozens of packages from buster-backports; 81
packages from Guix; 12 Flatpak applications (excluding runtimes); 20
pip3 packages (excluding their dependencies); and ≃10 npm packages
(excluding their many dozens of dependencies).

The complementary package managers do not quench my thirst for
freshness, so I would like to upgrade Debian to bullseye.  Now that the
freeze has started, is it a good time to upgrade my personal notebook?
Should bullseye, by now, be relatively stable and, more importantly,
secure enough?

I do not run any server; it is a personal laptop behind NAT---at least
for IPv4 (I don't know the details of IPv6).  I am subscribed to
`debian-security' and am willing to manually pull specific packages from
/unstable/ for security reasons.  That is, when a /testing/ package in
my installation has a serious security vulnerability, I am willing to
upgrade it to the security-fixed version from /unstable/ instead of
waiting for it to propagate to testing.

In this context, is bullseye secure enough?

Regards

-- 
- <https://jorgemorais.gitlab.io/justice-for-rms/>
- If an email of mine arrives at your spam box, please notify me.
- Please adopt free/libre formats like PDF, ODF, Org, LaTeX, Opus, WebM and 7z.
- Free/libre software for Replicant, LineageOS and Android: https://f-droid.org
- [[https://www.gnu.org/philosophy/free-sw.html][What is free software?]]


Reply to: