A few months ago we started asking permission to upload the number of bytes real users have saved while using #fwupd with Passim, on the logic we didn't know how effective it would really be in the real world.
A few months ago we started asking permission to upload the number of bytes real users have saved while using #fwupd with Passim, on the logic we didn't know how effective it would really be in the real world.
#Fwupd 2.0.11 #Linux Firmware Updater Is Out with Support for Lenovo Thunderbolt 5 Smart Docks https://9to5linux.com/fwupd-2-0-11-linux-firmware-updater-supports-lenovo-thunderbolt-5-smart-docks
Two weeks after the last release, I give you #fwupd 2.0.11: https://github.com/fwupd/fwupd/releases/tag/2.0.11
#Fwupd 2.0.10 #Linux Firmware Updater Is Out with Support for #Lenovo Legion Touchpad and #Logitech MX Mechanical Keyboard https://9to5linux.com/fwupd-2-0-10-linux-firmware-updater-adds-support-for-lenovo-legion-touchpad
New #fwupd release just dropped: https://github.com/fwupd/fwupd/releases/tag/2.0.10
It fixes the bug (mea culpa) where the KEK failed to deploy correctly. If you had a KEK deploy failure, please update to this release and try again. I'll re-upload the KEKs to the LVFS with the fwupd requirement set to 2.0.10.
There's also some other better stuff, so enjoy!
Edit: seems to be resolved now
Anyone else getting fwupdmgr checksum errors right now?
$ fwupdmgr refresh --force
Updating lvfs
Downloading… [************************************** ]
Failed to update metadata for lvfs: checksum failure: failed to verify data, expected ffbee0c4af245985093489884ef435767f1fd919
Another month, another #fwupd release: https://github.com/fwupd/fwupd/releases/tag/2.0.9 -- enjoy!
Notability this release allows us to roll out the KEK and db updates from the LVFS which is going to be required soon to make SecureBoot continue to work on Linux. There's some more information here: https://fwupd.github.io/libfwupdplugin/uefi-db.html
I didn't think that Daniel Micay / GrapheneOS would already be targeting new victims and hé will be just continuing to attack /e/, but I was wrong.
The #fwupd developer is being targeted, and #grapheneos has shown no evidence of Richard's harassment of him and GOS.
Please support Richard @hughsie who is being accused of being hostile to #GOS without any proof.
GrapheneOS has serious problems with fwupd
GrapheneOS is a privacy-focused operating system for Android phones that aims to increase your privacy while maintaining basic Android functions. This is built for Google Pixel phones as they meet the project’s requirements.
The official GrapheneOS project has just recently released a statement on their official Mastodon account stating that they have become aware of an issue with the fwupd program, which is a firmware update service for computers that are running Linux, such as Ubuntu, Debian, Red Hat, Fedora, Gentoo, Arch Linux, and more. It has become evident that the fwupd program has been incorrectly connecting to random USB devices using the Fastboot protocol.
As a result, users will experience an error when trying to connect to the USB device because the system would be reporting that the USB device is already in use. The GrapheneOS project has considered this issue to be a group of fatal bugs, because they “can block an installation part of the way through and lead to an unusable device until the user fixes it.” They have also called this practice “wrong,” because the main use of Fastboot would be broken.
As a workaround, we recommend following the official guidelines to make sure that fwupd stops trying to connect to random USB devices that the project team have documented via the following pages:
We hope that the fwupd program gets an update that will fix this bug.
#Fwupd 2.0.8 #Linux Firmware Updater Adds Two New Plugins to Update the UEFI Signature Database and KEK https://9to5linux.com/fwupd-2-0-8-adds-new-plugins-to-update-the-uefi-signature-database-and-kek
Anyone want to do a few last minute translations for the #fwupd release tomorrow?
Please use https://explore.transifex.com/freedesktop/fwupd/ if so. There's also https://copr.fedorainfracloud.org/coprs/rhughes/fwupd/ if you want to do some pre-release testing on Fedora.
Thanks!
wellllll not the cleanest code I ever wrote, but all things considered I'm pretty happy with this. It enables capsule updates for all Qualcomm devices (supported in upstream), without needing a table of devices, and supporting multiple boot methods (since some devices can have run u-boot either as the first stage bootloader or chainloaded)
once this and some other bits are in, we can start the process of getting builds for some different smartphones onto #fwupd / #lvfs so you can not just have an EFI bootloader on your OnePlus 6, but it can get updates too regardless of which distro you're running :D
#fwupd 2.0.7 #Linux Firmware Updater Adds Support for More Lenovo and HP Devices https://9to5linux.com/fwupd-2-0-7-linux-firmware-updater-adds-support-for-more-lenovo-and-hp-devices
A new #fwupd 2.0.7 release just dropped; the new 5G modem stuff wasn't quite ready for this release but I'll hopefully make 2.0.8 -- but there are plenty of other nice things to play with while you wait: https://github.com/fwupd/fwupd/releases/tag/2.0.7
Important heads up! We removed a ton of build configuration options this release (removing ifdefs and complexity from the code) so you might need to tweak any downstream build files.
#Fwupd 2.0.6 #Linux Firmware Updater Utility Is Out Now with Support for HPE Gen10 and Gen10+ Devices Using Redfish and New Features https://9to5linux.com/fwupd-2-0-6-adds-support-for-hpe-gen10-and-gen10-devices-using-redfish
New stable #fwupd -- get it while it's still warm: https://github.com/fwupd/fwupd/releases/tag/1.9.28
Notably, this one can also apply the new dbx to fix CVE-2024-7344 -- with more details here: https://blogs.gnome.org/hughsie/2025/01/20/fwupd-2-0-4-and-dbxupdate-20241101/
I'm just building it for #fedora 41 now.
#Fwupd 2.0.4 #Linux Firmware Updater Released with New Features and Bug Fixes https://9to5linux.com/fwupd-2-0-4-linux-firmware-updater-released-with-new-features-and-bug-fixes
I've just tagged #fwupd 2.0.4 -- lots of nice new features, and most importantly with new protocol support to allow applying the latest dbx security update: https://github.com/fwupd/fwupd/releases/tag/2.0.4
As to why we need a new protocol, I'm about to start writing a blog explaining why we couldn't just use the existing uefi-dbx plugin. I'll link to this post when it's done.
If I see lots of dbx updates going out with 2.0.4 in the next few hours I'll also backport the new protocol into 1_9_X for 1.9.27
Well, it looks like everyone is back to work today! Enjoy your new hardware everybody. #fwupd