When I installed 14.04 server it gave me the option to automatically
install updates.  I picked yes.  I logged in a year later to find that
my servers had installed three updates, then ran into this bug and
stopped.  In fact, kernel updates come out so often that half the time I
try to install software apt is in a broken state because of this.

I could almost understand this kind of behaviour if having a cronjob do
apt-get upgrade was a non-standard setup, but if it's an option in the
installer?  Unacceptable, and stupid.

A bug that completely breaks all security updates *should* be considered
a security bug.  If Microsoft made the same mistake we'd lose no time in
mocking them for their insecure OS.  Why should we hold ourselves to a
different standard?


My suggestion for a fix would be to fix apt-get autoremove to skip the current 
running kernel.  That way, autoremove can be triggered automatically right 
after update without worrying about screwing up the currently running kernel.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1037285

Title:
  /boot fills up after many kernel upgrades

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/1037285/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to