Release Notes for Debian 10 (buster), 64-bit PC

The Debian Documentation Project

This document is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, version 2, as published by the Free Software Foundation.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.

The license text can also be found at https://www.gnu.org/licenses/gpl-2.0.html and /usr/share/common-licenses/GPL-2 on Debian systems.


Table of Contents

1. Introduction
1.1. Reporting bugs on this document
1.2. Contributing upgrade reports
1.3. Sources for this document
2. What's new in Debian 10
2.1. Supported architectures
2.2. What's new in the distribution?
2.2.1. UEFI Secure Boot
2.2.2. AppArmor enabled per default
2.2.3. Optional hardening of APT
2.2.4. Unattended-upgrades for stable point releases
2.2.5. Substantially improved man pages for German speaking users
2.2.6. Network filtering based on nftables framework by default
2.2.7. Cryptsetup defaults to on-disk LUKS2 format
2.2.8. Driverless printing with CUPS 2.2.10
2.2.9. Basic support for Allwinner A64 based devices
2.2.10. News from Debian Med Blend
2.2.11. GNOME defaults to Wayland
2.2.12. Merged /usr on fresh installs
2.2.13. News from Debian Live team
3. Installation System
3.1. What's new in the installation system?
3.1.1. Automated installation
4. Upgrades from Debian 9 (stretch)
4.1. Preparing for the upgrade
4.1.1. Back up any data or configuration information
4.1.2. Inform users in advance
4.1.3. Prepare for downtime on services
4.1.4. Prepare for recovery
4.1.5. Prepare a safe environment for the upgrade
4.1.6. Verify network interface name support
4.2. Checking APT configuration status
4.2.1. The proposed-updates section
4.2.2. Unofficial sources
4.2.3. Disabling APT pinning
4.2.4. Checking packages status
4.3. Preparing APT source-list files
4.3.1. Adding APT Internet sources
4.3.2. Adding APT sources for a local mirror
4.3.3. Adding APT sources from optical media
4.4. Upgrading packages
4.4.1. Recording the session
4.4.2. Updating the package list
4.4.3. Make sure you have sufficient space for the upgrade
4.4.4. Minimal system upgrade
4.4.5. Upgrading the system
4.5. Possible issues during upgrade
4.5.1. Dist-upgrade fails with Could not perform immediate configuration
4.5.2. Expected removals
4.5.3. Conflicts or Pre-Depends loops
4.5.4. File conflicts
4.5.5. Configuration changes
4.5.6. Change of session to console
4.6. Upgrading your kernel and related packages
4.6.1. Installing a kernel metapackage
4.7. Preparing for the next release
4.7.1. Purging removed packages
4.8. Obsolete packages
4.8.1. Transitional dummy packages
5. Issues to be aware of for buster
5.1. Upgrade specific items for buster
5.1.1. Hidepid mount option for procfs unsupported
5.1.2. ypbind fails to start with -no-dbus
5.1.3. NIS server does not answer NIS client requests by default
5.1.4. sshd fails to authenticate
5.1.5. Daemons fail to start or system appears to hang during boot
5.1.6. Migrating from legacy network interface names
5.1.7. Module configuration for bonding and dummy interfaces
5.1.8. OpenSSL default version and security level raised
5.1.9. Some applications don't work in GNOME on Wayland
5.1.10. Noteworthy obsolete packages
5.1.11. Deprecated components for buster
5.1.12. Things to do post upgrade before rebooting
5.1.13. SysV init related packages no longer required
5.2. Limitations in security support
5.2.1. Security status of web browsers and their rendering engines
5.2.2. Go based packages
5.3. Package specific issues
5.3.1. Glibc requires Linux kernel 3.2 or higher
5.3.2. Semantics for using environment variables for su changed
5.3.3. Existing PostgreSQL databases need to be reindexed
5.3.4. mutt and neomutt
5.3.5. Accessing GNOME Settings app without mouse
5.3.6. gnome-disk-utility fails to change LUKS password causing permanent data loss (buster 10.0 only)
5.3.7. evolution-ews has been dropped, and email inboxes using Exchange, Office365 or Outlook server will be removed
5.3.8. Calamares installer leaves disk encryption keys readable
5.3.9. S3QL URL changes for Amazon S3 buckets
5.3.10. Split in configuration for logrotate
5.3.11. The rescue boot option is unusable without a root password
6. More information on Debian
6.1. Further reading
6.2. Getting help
6.2.1. Mailing lists
6.2.2. Internet Relay Chat
6.3. Reporting bugs
6.4. Contributing to Debian
A. Managing your stretch system before the upgrade
A.1. Upgrading your stretch system
A.2. Checking your APT source-list files
A.3. Removing obsolete configuration files
A.4. Upgrade legacy locales to UTF-8
B. Contributors to the Release Notes
Index
Glossary