[Bug 1619188] Re: Unattended upgrades can break persistent live media
sudodus
1619188 at bugs.launchpad.net
Tue Oct 18 10:00:40 UTC 2016
Oct 14:
[ubuntu/xenial-security] tzdata 2016g-0ubuntu0.16.04 (Accepted) Adam Conrad
[ubuntu/xenial-security] openjpeg2 2.1.0-2.1ubuntu0.1 (Accepted) Marc Deslauriers
Oct 17:
[ubuntu/xenial-security] ffmpeg 7:2.8.8-0ubuntu0.16.04.1 (Accepted) Marc Deslauriers
tzdata - up to date (was it updated automatically?)
openjpeg2 - not found (the 'best match' is openjpeg-tools)
ffmpeg - not installed (can I install the old package and check if it will be updated automatically?)
---
ubuntu at ubuntu:~$ apt-cache policy tzdata
tzdata:
Installed: 2016g-0ubuntu0.16.04
Candidate: 2016g-0ubuntu0.16.04
Version table:
*** 2016g-0ubuntu0.16.04 500
500 http://security.ubuntu.com/ubuntu xenial-security/main amd64 Packages
500 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 Packages
100 /var/lib/dpkg/status
2016d-0ubuntu0.16.04 500
500 http://archive.ubuntu.com/ubuntu xenial/main amd64 Packages
ubuntu at ubuntu:~$ apt-cache policy openjpeg2
N: Unable to locate package openjpeg2
ubuntu at ubuntu:~$ apt-cache policy ffmpeg
ffmpeg:
Installed: (none)
Candidate: 7:2.8.6-1ubuntu2
Version table:
7:2.8.6-1ubuntu2 500
500 http://archive.ubuntu.com/ubuntu xenial/universe amd64 Packages
ubuntu at ubuntu:~$ apt-cache policy openjpeg
N: Unable to locate package openjpeg
ubuntu at ubuntu:~$ apt-cache policy open
Display all 306 possibilities? (y or n)
ubuntu at ubuntu:~$ apt-cache policy openj
openjade openjdk-8-jre-jamvm openjdk-9-source
openjade1.3 openjdk-8-jre-zero openjfx
openjdk-8-dbg openjdk-8-source openjfx-source
openjdk-8-demo openjdk-9-dbg openjpeg-tools
openjdk-8-doc openjdk-9-demo openjpip-dec-server
openjdk-8-jdk openjdk-9-doc openjpip-server
openjdk-8-jdk-headless openjdk-9-jdk openjpip-viewer
openjdk-8-jre openjdk-9-jdk-headless openjpip-viewer-xerces
openjdk-8-jre-dcevm openjdk-9-jre
openjdk-8-jre-headless openjdk-9-jre-headless
ubuntu at ubuntu:~$ apt-cache policy openjpeg-tools
openjpeg-tools:
Installed: (none)
Candidate: 1:1.5.2-3.1
Version table:
1:1.5.2-3.1 500
500 http://archive.ubuntu.com/ubuntu xenial/universe amd64 Packages
ubuntu at ubuntu:~$
---
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to casper in Ubuntu.
https://bugs.launchpad.net/bugs/1619188
Title:
Unattended upgrades can break persistent live media
Status in casper package in Ubuntu:
Fix Released
Status in casper source package in Xenial:
Fix Committed
Status in casper source package in Yakkety:
Fix Released
Bug description:
Test Case
---------
1) Boot an Ubuntu 16.04 Live CD
2) Choose Try Ubuntu
3) head -n5 /etc/apt/apt.conf.d/50unattended-upgrades
4) Observe -security is enabled in line 3. (// is a comment)
5) Run /usr/lib/apt/apt.systemd.daily
6) Observe your Live environment run out of space! (I received a pop-up re lack of free space and /var/log/unattended-upgrades/unattended-upgrades-dpkg.log contained an error installing a package due to disk full.)
With the version of the package in -proposed step 4 will reveal the
-security pocket being disabled and step 6 won't fill your live
environment.
Regression Potential
--------------------
Persistent live users will not receive updates from -security, but that seems less bad than destroying people's live environment by filling up their disk.
Original Bug Description
------------------------
Looking at the persistent live Ubuntu 16.04 LTS system - the Software & Updates screen / Update - I notice, that Automatic updates is set to 'Download and install automatically'. This is bad in a persistent live system.
After leaving the persistent live Ubuntu 16.04 LTS system running
overnight, I found that it had performed an automatic upgrade:
df revealed that the content in casper-rw had increased to 1.6 GiB.
It was a surprise that the persistent live system started an automatic
upgrade. This is not caused by the installer (mkusb), because the
files controlling those actions are not touched. Instead it is caused
by a change of the default action, when there are security updates.
And the survey indicates that this default setting is different
between the flavours and versions of Ubuntu. Lubuntu keeps the setting
'Display immediately', while the other tested flavours change it from
14.04 LTS to 16.04 LTS.
Until this is resolved, it is a good idea to disable unattended-
upgrades manually, but above all, to take regular backups, when you
use a persistent live system.
The survey is described in this link to the Ubuntu Forums:
https://ubuntuforums.org/showthread.php?t=2335669&p=13538805#post13538805
and it contains some screenshots illustrating the settings manager for
automatic updates for different versions and flavours of Ubuntu.
-o-
There are various scripts in the casper package that change things to
be more appropriate for the live environment. I suggest to change the
default for security updates to 'Display immediately', when the system
is running live and persistent live.
See also this link to Ask Ubuntu, the first report about this problem:
https://askubuntu.com/questions/817750/unattended-upgrades-broke-
persistent-live-media/817820#
-o-
Addendum: Things should continue to work if you leave a live Ubuntu
iso running for a day or two. Unattended upgrades cause problems for
all live systems, 'live-only' and 'persistent live'.
ProblemType: BugDistroRelease: Ubuntu 16.04
Package: casper 1.376
ProcVersionSignature: Ubuntu 4.4.0-31.50-generic 4.4.13
Uname: Linux 4.4.0-31-generic x86_64
ApportVersion: 2.20.1-0ubuntu2.1
Architecture: amd64
CasperVersion: 1.376
CurrentDesktop: Unity
Date: Thu Sep 1 08:32:08 2016
LiveMediaBuild: Ubuntu 16.04.1 LTS "Xenial Xerus" - Release amd64 (20160719)
ProcEnviron:
TERM=xterm-256color
PATH=(custom, no user)
XDG_RUNTIME_DIR=<set>
LANG=en_US.UTF-8
SHELL=/bin/bashSourcePackage: casper
UpgradeStatus: No upgrade log present (probably fresh install)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1619188/+subscriptions
More information about the foundations-bugs
mailing list