Package: debian-reference
Version: 2.100
The "2.7.7. Tweaking candidate version with apt-pinning" section
in "Chapter 2. Debian package management" recommends
The target release archive can be set by several methods.
- "/etc/apt/apt.conf" configuration file with "APT::Default-Release "stable";"
line
- command line option, e.g., "apt-get install -t testing some-package"
https://www.debian.org/doc/manuals/debian-reference/ch02.en.html#_tweaking_candidate_version
Unfortunately "APT::Default-Release "stable";" prevents installing of
updates from stable-security and stable-updates repositories. So this
option should be either just dropped or a warning should be added to
alert users who remembers it from previous release.
Accordingly to the Debian 11 bullseye release notes acceptable value for
default release may be
APT::Default-Release "/^bullseye(|-security|-updates)$/";
https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#security-archive
"5.1.3. Changed security archive layout"
in "Chapter 5. Issues to be aware of for bullseye"
However there are opinions that this option should be considered as
deprecated:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041708#38
apt man pages
https://lists.debian.org/debian-security/2022/01/msg00022.html
Re: Bullseye security.debian.org codename misconfigured?
Sat, 22 Jan 2022 21:07:09 +0100
There is a similar bug against debian-handbook
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041706
filed during the following discussion
https://lists.debian.org/debian-security/2023/07/msg00011.html
"Setting APT::Default-Release prevents installation of security updates
in bookworm!?"
In my case it was bookworm with the backports repository added to test a
wifi issue and trixie to get firefox-esr 115 earlier than it will appear
in stable. By setting APT::Default-Release I was going to prevent
upgrade kernel from backports to testing when I noticed missed security
updates. I decided to use apt pinning instead.
I have seen doubts concerning support of APT::Default-Release in
synaptic and regexps in "apt source PKG", but I have not noticed any
problem. So I am unsure if it can be an *additional* argument against
APT::Default-Release.
I admit that some users may need purely stable release without security
updates (e.g. to test upgrades from particular versions), but I believe
this case is too specific to be covered in the manual.
Either removing mention of the setting or adding a warning against
APT::Default-Release should prevent users from making their
configuration insecure.