You'd think that someone at Ubuntu is responsible for checking whether the security updates they put out actually work. But with the recent X Window System breakage and now a kernel update issue, you have to wonder... The problem lies in a broken dependency. We are advised not to upgrade at this point as this will more then likely cause problems. Just sit tight and let them sort out this silly dependency issue. This applies to Dapper Drake & Edgy Eft. Probably other releases too. Code: The following packages are BROKEN: linux-headers-686 linux-image-386 linux-image-686 linux-restricted-modules-2.6.15-28-386 linux-restricted-modules-2.6.15-28-686 The following packages are unused and will be REMOVED: linux-headers-2.6.15-27 linux-headers-2.6.15-27-686 The following packages will be upgraded: linux-386 linux-686 linux-restricted-modules-386 linux-restricted-modules-686 7 packages upgraded, 2 newly installed, 2 to remove and 0 not upgraded. Need to get 16.2MB of archives. After unpacking 35.8MB will be freed. The following packages have unmet dependencies: linux-image-386: Depends: linux-image-2.6.15-28-386 which is a virtual package. linux-headers-686: Depends: linux-headers-2.6.15-28-686 which is a virtual package. linux-image-686: Depends: linux-image-2.6.15-28-686 which is a virtual package. linux-restricted-modules-2.6.15-28-386: Depends: linux-image-2.6.15-28-386 which is a virtual package. linux-restricted-modules-2.6.15-28-686: Depends: linux-image-2.6.15-28-686 which is a virtual package. Resolving dependencies... The following actions will resolve these dependencies: Keep the following packages at their current version: linux-headers-2.6.15-27 [2.6.15-27.50 (dapper-security, now)] linux-headers-2.6.15-27-686 [2.6.15-27.50 (dapper-security, now)] linux-headers-686 [2.6.15.25 (now)] linux-image-386 [2.6.15.25 (now)] linux-image-686 [2.6.15.25 (now)] linux-restricted-modules-2.6.15-28-386 [Not Installed] linux-restricted-modules-2.6.15-28-686 [Not Installed] linux-restricted-modules-386 [2.6.15.25 (now)] linux-restricted-modules-686 [2.6.15.25 (now)]
here's another reason for freespire / linspire sitting on top of Ubuntu rather than Debain... its another point of possible failure! does this just affect users who have installed a different kernel? or everyone?
What do you mean by that? The Ubuntu devs are just repackaging Debian at this point, and they don't even seem to be doing that right. I'm using Debian Sid (Sid is the unstable development branch of Debian), and used Etch before that. I have not had any bugs to speak of in either build, period. I've seen a few showstoppers with Ubuntu so far though, so you could say that makes me something less than a fan. I'd recommend just trying Debian if you're tired of Ubuntu problems. It's an unmolested version of the same thing, and it's faster too.
I dont think failure was the right word to use... http://www.hardwareforums.com/linspire-freespire-based-ubuntu-16932/#post109515 if you base something on something else, you have to wait for that something to be updated before you can update your something! what i was trying to say: is basing your distro (*spire) on a distro which is allready based on another (Ubuntu) really a great idea? Moving to Debian does sound like a nice idea, but, i've only just got ubuntu setup... (encrypted filesytem, and about to install openBSD in VM's to run services (apache etc).
Not that it still applies now, but despite the security of OpenBSD, I've read it doesn't perform all too well under heavy load. This may have changed, but I read a performance review of Linux, Free, Net and OpenBSD and it didn't fair too well. You really should try debian, I don't like how the kernels have been made generic in Edgy. Instead of having separate kernels for different architectures, they have a generic kernel for each version . I will probably switch my laptop to Debian Etch like I have with my desktop.
My VM's arnt going to be under any sort of load really... i only have a 2MBit connection so i cant really do anything on even a moderate scale! I'm only using VM's to add an extra layer of protection to ubuntu, whats the point in having everything encypted (transparently) if the files can be read through an exploit in apache(etc)! (my machine runs 24/7) If apache running on openBSD gets owned, you would still have to brake out of the VM to get anything... and even if the disk is pulled, then the files cant be read anyway! next im going to be looking at encypting a partition on a usb drive, and having a second unencrypted partition containing the tools to read the encrypted partition for as many OS's as i can find!
yeah i had 2.6.15-27 i just downgraded the kernel & headers to 2.6.15.26 and rebooted onto the new kernel, uninstalled 27, rebooted again (to clear tmp files) then reinstalled 27 and it worked, no broken packages, and no available updates
Seem to be a bit paranoid to me. Linux is very unlikely to be exploited if you keep updated packages, OpenBSD more so, but running in a VM seems a tad extreme, considering the slight overhead you get with the VM. Try chrooting it instead.
I have the resources (AMD64 AM2 X2 4200+, 1 GB DDR2 Ram), and the idea is that it remains as secure as possible even if it hasn't been updated in a long time. Yes i am paranoid, no i don't really have any good reason to be (other than those dam aliens, lol)
cheers mega, but since when have i done anything the easy way[ot]can't believe Kubuntu has being running for about 6 months, XP hardly survived WPA expiry[/ot] Edit: i didn't realize there was a bus until i checked HWF