When I installed 14.04 server it gave me the option to automatically install updates. I picked yes. I logged in a year later to find that my servers had installed three updates, then ran into this bug and stopped. In fact, kernel updates come out so often that half the time I try to install software apt is in a broken state because of this.
I could almost understand this kind of behaviour if having a cronjob do apt-get upgrade was a non-standard setup, but if it's an option in the installer? Unacceptable, and stupid. A bug that completely breaks all security updates *should* be considered a security bug. If Microsoft made the same mistake we'd lose no time in mocking them for their insecure OS. Why should we hold ourselves to a different standard? My suggestion for a fix would be to fix apt-get autoremove to skip the current running kernel. That way, autoremove can be triggered automatically right after update without worrying about screwing up the currently running kernel. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1037285 Title: /boot fills up after many kernel upgrades To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1037285/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
