[Bug 1037285] Re: /boot fills up after many kernel upgrades

2017-06-03 Thread spike speigel
bug # 1515513 is a contributing factor. DKMS has been patched upstream for that particular bug. Not sure when Ubuntu will update or incorporate the patch into their packaged version of dkms. Are there any other files left behind after kernel updates that might cause these kinds of update problem

[Bug 1037285] Re: /boot fills up after many kernel upgrades

2015-12-29 Thread Gordon
When I installed 14.04 server it gave me the option to automatically install updates. I picked yes. I logged in a year later to find that my servers had installed three updates, then ran into this bug and stopped. In fact, kernel updates come out so often that half the time I try to install soft

[Bug 1037285] Re: /boot fills up after many kernel upgrades

2013-09-05 Thread David White
This is definitely a security risk, and also a usability problem. If we are updating kernels because of security fixes then surely a bug which prevents an update is perpetuating the security risk. Also, this makes managing ubuntu servers and desktops a headache. Remember, Ubuntu is for humans and

[Bug 1037285] Re: /boot fills up after many kernel upgrades

2013-08-04 Thread Shaun Crampton
Some thoughts on this bug: When /boot does run out of space, it causes the next install of a kernel package to fail, leaving the package in a broken state as far as apt is concerned. That makes it impossible to remove the old kernel packages using apt: apt won't remove packages until you successf

[Bug 1037285] Re: /boot fills up after many kernel upgrades

2012-11-19 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: ubuntu-meta (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1037285 Title:

[Bug 1037285] Re: /boot fills up after many kernel upgrades

2012-08-17 Thread Jamie Strandboge
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privile