LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Debian
User Name
Password
Debian This forum is for the discussion of Debian Linux.

Notices


Reply
  Search this Thread
Old 09-21-2014, 10:58 PM   #16
evo2
LQ Guru
 
Registered: Jan 2009
Location: Japan
Distribution: Mostly Debian and CentOS
Posts: 6,724

Rep: Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705Reputation: 1705

Hi,

IIRC, the main thing to watch out for when using aptitude is that it uses own database for for putting packages on hold instead of the standard dpkg backend used by all(?) the other Debian package managers. So for basic stuff you can use both, but you need to be bit careful if you are doing more complicated things.

Evo2.
 
Old 09-22-2014, 03:45 AM   #17
EmaRsk
Member
 
Registered: Mar 2006
Distribution: Mint, WSL Ubuntu
Posts: 134

Rep: Reputation: 32
Quote:
Originally Posted by evo2 View Post
Hi,

IIRC, the main thing to watch out for when using aptitude is that it uses own database for for putting packages on hold instead of the standard dpkg backend used by all(?) the other Debian package managers. So for basic stuff you can use both, but you need to be bit careful if you are doing more complicated things.

Evo2.
And, I may be wrong here, but you can set apt-get and aptitude to treat Recommends in different ways (install by default or not), and they have opposite defaults, if I remember correctly. This too can give some unexpected results. For aptitude, this can be configured easily from within the ncurses interface, btw.
All of this is less critical when aptitude is used interactively, anyway.
 
Old 09-28-2014, 01:32 PM   #18
EDDY1
LQ Addict
 
Registered: Mar 2010
Location: Oakland,Ca
Distribution: wins7, Debian wheezy
Posts: 6,841

Rep: Reputation: 649Reputation: 649Reputation: 649Reputation: 649Reputation: 649Reputation: 649
I rarely use aptitude because it takes so long to try to
reslolve dependencies, if it gets them resolved at all.
 
Old 02-21-2015, 01:27 PM   #19
s.verma
Member
 
Registered: Oct 2013
Distribution: Debian Sid, Gentoo, Arch, Debian
Posts: 186
Blog Entries: 4

Rep: Reputation: 25
Dear OP,

I am just sharing my experience. I do not know whether that command work or not.
But I regularly update only those packages for which there is some security issues from debian security advisory (I have subscribed it in my email, so when there is one it is sent in my email, then I check for new ones.).
I have been using Debian Sid for around 6 months, but never my system broke due to only upgrading security fixes.

For upgrade I use
Code:
apt-cache showsrc packagename
for give source 'packagename' from Debian Security Advisory to see all binary 'packages' belonging to 'packagename'.
Then using
Code:
apt-get install --only-upgrade packages
for 'packages' to upgrade all packages.
 
Old 02-21-2015, 02:43 PM   #20
Head_on_a_Stick
Senior Member
 
Registered: Dec 2014
Location: London, England
Distribution: Debian stable (and OpenBSD-current)
Posts: 1,187

Rep: Reputation: 285Reputation: 285Reputation: 285
I'm confused -- Debian sid does not have any "security updates", everything is pulled directly from upstream.

https://wiki.debian.org/DebianUnstab...ity_updates.3F
 
Old 02-21-2015, 09:59 PM   #21
s.verma
Member
 
Registered: Oct 2013
Distribution: Debian Sid, Gentoo, Arch, Debian
Posts: 186
Blog Entries: 4

Rep: Reputation: 25
Quote:
Originally Posted by Head_on_a_Stick View Post
I'm confused -- Debian sid does not have any "security updates", everything is pulled directly from upstream.

https://wiki.debian.org/DebianUnstab...ity_updates.3F
Dear Head_on_a_Stick,
Yes you are right that everything is pulled directly from upstream,
But it doesn't mean that if a security hole is found then it is not fixed in Sid.
Only security team doesn't handle that.

Quote:
Not in the same sense that stable does. If the maintainer of a package fixes a security bug and uploads the package, it'll go into sid by the normal means. If the maintainer doesn't do that, then it won't. The security team only covers stable (and possibly testing... there's a pending issue for that case).

Sid users are strongly urged to subscribe to the Debian security announce mailing list. And while you're at it, you should also be on the Debian devel announce list and Debian devel list.
From your ref link,
That's why I have subscribed to "Debian security announce mailing list".

Last edited by s.verma; 02-21-2015 at 10:00 PM.
 
1 members found this post helpful.
Old 12-20-2015, 12:07 AM   #22
s.verma
Member
 
Registered: Oct 2013
Distribution: Debian Sid, Gentoo, Arch, Debian
Posts: 186
Blog Entries: 4

Rep: Reputation: 25
Dear Blaumieser,

I do not understand how debsecan works. (I could not get it to work on my system).

But there is a script on https://github.com/s-verma/security-update.sh

This helps a lot. It lists all packages installed on your system with version number which belongs to package specified in debian security advisory https://www.debian.org/security/#DSAS

So you can manually check with security advisory whether you have older version than specified and upgrade all those packages using
Code:
apt-get install --only-upgrade package1 package2 ...
 
Old 02-02-2021, 04:12 AM   #23
remmilou
Member
 
Registered: Mar 2010
Location: Amsterdam
Distribution: MX Linux (21)/ XFCE
Posts: 211

Rep: Reputation: 69
My sid maintenance and a question

Quote:
Originally Posted by 273 View Post
To add another "me too" here -- I run Sid and dist-upgrade every day which tends to mean that if something breaks it only does so for that day. When the developers do things like move the NVIDIA drivers between parts of the repository it does break things and that may not have been noticed had I dist-upgraded a few days later but I'm not entirely convinced it would have gone without a hitch and the large number of updates may have made it harder to track down what happened.
I also get the impression that there are very few security updates to Sid at all as I subscribe to the Debian Security mailing list and the Sid updates don't really match them in the same way that the Stable updates do -- with Sid sometimes they go unpatched for a while and sometimes they were just part of another upgrade a couple of increments ago.
The above is all experience though and not analysis and I certainly don't know enough about things to make any definite statements.
About the same as I do.
I use timeshift t make daily (system) backups, so in case of real trouble I can restore my system in about 10 minutes to an earlier state.
With the same timeshift I create every now and then a "fallback" system on a second partition, to start from if the main system is FUBAR.
I use a third system (on a third partition) for testing upgrades, if I do not trust it on beforehand.
So triple booting...
/home is on another ssd, so timeshift restores are pretty fast. Might be even faster when using BTRFS (but I still use EXT4)
Am I paranoid? Anyone better ideas, or suggestions for improvement?

My profile says MX Linux (Buster). I switched away from that 2 months ago, but I can still revert to that with timeshift.
Will update my profile

Last edited by remmilou; 02-02-2021 at 04:15 AM. Reason: Addition about profile.
 
Old 02-02-2021, 05:32 AM   #24
cynwulf
Senior Member
 
Registered: Apr 2005
Posts: 2,727

Rep: Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367Reputation: 2367
When I ran mixed testing/unstable, I never needed that level of contingency. The main thing is to check the output of apt-listbugs, which you should be using on testing/unstable regardless and triple check before answering "y". But yes, back ups are a good idea.
 
Old 02-03-2021, 03:02 AM   #25
remmilou
Member
 
Registered: Mar 2010
Location: Amsterdam
Distribution: MX Linux (21)/ XFCE
Posts: 211

Rep: Reputation: 69
Thanks

Quote:
Originally Posted by cynwulf View Post
When I ran mixed testing/unstable, I never needed that level of contingency. The main thing is to check the output of apt-listbugs, which you should be using on testing/unstable regardless and triple check before answering "y". But yes, back ups are a good idea.
Ahh... yes... apt-listbugs. I switched that off for some reason I do not remember. Will switch it on again.
THANKS!!!
 
  


Reply

Tags
debian.sid.unstable, security, updates



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Security Updates for Debian 6.0.5 Stable Ztcoracat Linux - Security 2 09-16-2012 12:55 AM
updates and additions to Debian SID utanja Debian 2 04-02-2010 04:12 PM
Debian sid serious proxy error after latest updates! jackgu1988 Linux - Software 12 12-08-2009 11:53 AM
Debian Security Updates aquaboot Debian 6 01-12-2008 07:47 PM
Security updates for debian bigeeguy Linux - Newbie 1 04-05-2004 12:11 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Debian

All times are GMT -5. The time now is 10:44 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration