[Bug 1591427] Re: Installer gives user option to deactivate automatic updates, yet automatic upgrade of security packages are on by default
Brian Murray
brian at ubuntu.com
Thu Nov 29 17:21:51 UTC 2018
It's been suggested that it'd be better if the option was better
described because we don't actually want the user to have an option that
disables automatic security updates. The default should be for users to
have a secure system.
** Summary changed:
- Installer gives user option to deactivate automatic updates, yet automatic upgrade of security packages are on by default
+ option to deactivate automatic updates leads people to believe that security updates will be disabled too
** Changed in: pkgsel (Ubuntu)
Assignee: Mathieu Trudel-Lapierre (cyphermox) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to pkgsel in Ubuntu.
https://bugs.launchpad.net/bugs/1591427
Title:
option to deactivate automatic updates leads people to believe that
security updates will be disabled too
Status in pkgsel package in Ubuntu:
Confirmed
Bug description:
Confirmed in 16.04 LTS and Yakkety Daily.
How to reproduce:
User Ubuntu Server ISO and at the very last question of the installer, answer "no automatic updates."
Then, after the reboot, check /etc/apt/apt.conf.d/50unattended-
upgrades and you will find:
// Automatically upgrade packages from these (origin:archive) pairs
Unattended-Upgrade::Allowed-Origins {
"${distro_id}:${distro_codename}-security";
// "${distro_id}:${distro_codename}-updates";
// "${distro_id}:${distro_codename}-proposed";
// "${distro_id}:${distro_codename}-backports";
};
Since by default the first one is enabled, it will install automatic
updates despite having selected "no" during installer.
ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: debian-installer (not installed)
ProcVersionSignature: Ubuntu 4.4.0-23.41-generic 4.4.10
Uname: Linux 4.4.0-23-generic x86_64
ApportVersion: 2.20.1-0ubuntu4
Architecture: amd64
Date: Fri Jun 10 19:14:21 2016
InstallationDate: Installed on 2016-06-11 (0 days ago)
InstallationMedia: Ubuntu-Server 16.10 "Yakkety Yak" - Alpha amd64 (20160610)
Lsusb:
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub
Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: VMware, Inc. VMware Virtual Platform
MemoryUsage:
total used free shared buff/cache available
Mem: 4028940 156064 3690500 5928 182376 3693048
Swap: 4192252 0 4192252
ProcEnviron:
TERM=linux
PATH=(custom, no user)
LANG=en_US.UTF-8
SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-23-generic root=UUID=eb6a3dc1-0e2a-4ad0-bb88-a5be4bdb7013 ro
SourcePackage: debian-installer
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 07/02/2015
dmi.bios.vendor: Phoenix Technologies LTD
dmi.bios.version: 6.00
dmi.board.name: 440BX Desktop Reference Platform
dmi.board.vendor: Intel Corporation
dmi.board.version: None
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 1
dmi.chassis.vendor: No Enclosure
dmi.chassis.version: N/A
dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvr6.00:bd07/02/2015:svnVMware,Inc.:pnVMwareVirtualPlatform:pvrNone:rvnIntelCorporation:rn440BXDesktopReferencePlatform:rvrNone:cvnNoEnclosure:ct1:cvrN/A:
dmi.product.name: VMware Virtual Platform
dmi.product.version: None
dmi.sys.vendor: VMware, Inc.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pkgsel/+bug/1591427/+subscriptions
More information about the foundations-bugs
mailing list