[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#43275: marked as done (apt: apt does not offer to add security updates to sources.list)



Your message dated Sun, 17 Oct 1999 20:34:14 -0600 (MDT)
with message-id <Pine.LNX.3.96.991017203401.17306H-100000@localhost>
and subject line Fixed
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Darren Benham
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 20 Aug 1999 22:23:38 +0000
Received: (qmail 23534 invoked from network); 20 Aug 1999 22:23:24 -0000
Received: from zulu.idiomtech.com (HELO nolfolan.idiomtech.com) (140.239.101.195)
  by master.debian.org with SMTP; 20 Aug 1999 22:23:24 -0000
Received: by idiomtech.com
	via sendmail from stdin
	id <m11HxSh-000SNwC@nolfolan.idiomtech.com> (Debian Smail3.2.0.102)
	for submit@bugs.debian.org; Fri, 20 Aug 1999 18:48:39 -0400 (EDT) 
Message-Id: <m11HxSh-000SNwC@nolfolan.idiomtech.com>
Date: Fri, 20 Aug 1999 18:48:39 -0400 (EDT)
From: pimlott@idiomtech.com
Subject: apt: apt does not offer to add security updates to sources.list
To: submit@bugs.debian.org
Bcc:
X-Mailer: bug 3.2.2

Package: apt
Version: 0.3.11
Severity: wishlist

apt should offer a configuration that makes it easy to install security
updates regularly.  According to http://www.debian.org/security/ , the
official sources.list line is 

deb http://security.debian.org/ stable updates

However, I'm sure that many users never add this, and don't otherwise keep
up on Debian security bulletins.  This represents a great number of
potentially insecure machines that could be eliminated with this
sources.list line and, optionally, a cron task.  This configuration
shouldn't be forced on everyone, but should be an option (at install time)
for those who would otherwise ignore security updates completely.

Although administrators of important systems may prefer not to be upgraded
automatically, Debian can with this simple measure protect casual users from
common exploits.

Andrew

-- System Information
Debian Release: potato
Kernel Version: Linux nolfolan 2.2.10 #2 Mon Jun 21 18:24:15 EDT 1999 i686 unknown

Versions of the packages apt depends on:
ii  libc6           2.1.2-0pre7    GNU C Library: Shared libraries and timezone
ii  libstdc++2.9-gl 2.91.66-2      The GNU stdc++ library (EGCS version)
---------------------------------------
Received: (at 43275-done) by bugs.debian.org; 18 Oct 1999 02:34:21 +0000
Received: (qmail 20193 invoked from network); 18 Oct 1999 02:34:21 -0000
Received: from pilsener.srv.ualberta.ca (129.128.5.19)
  by master.debian.org with SMTP; 18 Oct 1999 02:34:21 -0000
Received: from localhost (async1-11.remote.ualberta.ca [129.128.238.20])
	by pilsener.srv.ualberta.ca (8.9.3/8.9.3) with ESMTP id UAA05464
	for <43275-done@bugs.debian.org>; Sun, 17 Oct 1999 20:34:15 -0600 (MDT)
Received: from localhost [127.0.0.1] (jgg)
	by localhost with smtp (Exim 2.11 #1)
	id 11d2co-0007pX-00 (Debian); Sun, 17 Oct 1999 20:34:14 -0600
Date: Sun, 17 Oct 1999 20:34:14 -0600 (MDT)
From: Jason Gunthorpe <jgg@ualberta.ca>
X-Sender: jgg@localhost
To: 43275-done@bugs.debian.org
Subject: Fixed
Message-ID: <Pine.LNX.3.96.991017203401.17306H-100000@localhost>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII


This was fixed a version or two ago


Reply to: