Package "fwupd"
WARNING: the "fwupd" package was deleted from this repository
Name: |
fwupd
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Test suite for firmware update daemon
|
Latest version: |
*DELETED* |
Release: |
bionic (18.04) |
Level: |
proposed |
Repository: |
universe |
Links
Other versions of "fwupd" in Bionic
Packages in group
Deleted packages are displayed in grey.
Changelog
No changelog for deleted or moved packages.
|
fwupd (1.2.14-0~18.04.3) bionic; urgency=medium
* Do not submit fwupd tarballs for signing (LP: #1955386).
We still build and install the unsigned binaries so that if you do not
have fwupd-signed installed (which is not possible on i386 and armhf
anymore) your fwupd continues to function (on insecure boot, as before).
* Remove -signed-template helpers, they are owned by fwupd-efi now
-- Julian Andres Klode <email address hidden> Tue, 23 May 2023 17:46:42 +0200
|
1955386 |
fwupd / fwupd-efi split on version 1.7.x |
|
No changelog for deleted or moved packages.
|
fwupd (1.2.14-0~18.04.1) bionic; urgency=medium
* New upstream version (1.2.14) (LP: #1884788)
* Bug fixes:
- Fixes crashes on fwupdaa64.efi on startup (LP: #1858590)
- Check version was updated by checking version
- Correctly import PKCS-7 remote metadata
- Decrease minimum battery requirement to 10%
- Disable the battery percentage checks if UPower is unavailable
- Do not do semver conversion in fu_common_vercmp()
- Fix the DeviceID set by GetDetails
- Force the synaptics-prometheus minor version from 0x02 to 0x01
- Prevent Dell updates to occur via synaptics-mst
- Read all releases and convert versions when comparing
- Use the correct timeout for unifying IO channel writes
- Validate that gpgme_op_verify_result() returned at least one signature
- Avoid checking for bolt support when not required
- Correct HWID support in wacom-raw
- Fix offset of vendor id of hidraw devices
- Make loading vendor/product/serial strings non-fatal
- Only check the vendor ID if the device has one set
- Use more systemd directives for directories
- Actually write the new device path if different than before
- Add a SynapticsMSTBoardID for a few Lenovo docks
- Add the counterpart GUID for the DW5821e
- Be more accepting when trying to recover a failed database migration
- Do not ask the user to upload a report if ReportURI is not set
- Do not segfault when trying to quit the downgrade selection
- Fix a crash when stopping the fwupd service
- Never show AppStream markup on the console
- Relax the certificate time checks in the self tests for the legacy certificate
- Reload metadata store when configuration changes
- Remove replug flag after the device comes back from reboot
- Update device_modified in sql database during updates
- Work properly with ICL thunderbolt controller
* New features:
- Add support for tpm2-tools 4.X
- Allow specifying a firmware GUID to check any version exists
- Add SBAT region support (LP: #1921539)
* Don't cleanup /var/cache/fwupdate anymore
* Drop upstreamed patches:
- 0001-Relax-the-certificate-time-checks-in-the-self-tests-.patch
- 0001-trivial-libfwupd-skip-tests-if-machine-id-is-empty-t.patch
- 0001-Allows-confined-snaps-to-activate-fwupd-via-D-Bus.patch
- 0001-Only-check-the-vendor-ID-if-the-device-has-one-set.patch
- 0001-efi-use-a-wildcard-section-copy-for-final-EFI-genera.patch
- CVE-2020-10759.patch
* Remaining changes:
- meson-0.45-bc.patch: Fix build with meson 0.45
- Drop added Recommends: on bolt which is not in flavor seeds and adds a
new service.
* Backport a patch from upstream 1_2_X branch to fix SBAT character.
* Backport a patch from upstream 1_2_X branch to fix vendor-id requirement
error on Dell WD19 (LP: #1921544)
-- Mario Limonciello <email address hidden> Fri, 26 Mar 2021 13:38:20 -0500
|
1884788 |
Update bionic to the fwupd 1.2.14 release |
1858590 |
fwupdaa64.efi crashes on startup |
1921544 |
[bionic] fwupd 1.2.x, 1.3.x, 1.4.x: vendor-id requirement on LVFS causes failures |
CVE-2020-10759 |
Possible bypass in signature verification |
|
About
-
Send Feedback to @ubuntu_updates