
Quoting Brian May (brian@microcomaustralia.com.au):
For me the benefit Ubuntu has it that I get daily security updates that rarely break anything (yes I know it does happen) without having to do a daily upgrade to the latest Debian/testing (which ends up taking significant time, especially if you have multiple computers to maintain and/or if things break badly) while at the same time not falling behind as much as Debian/stable.
What you describe resulting from 'doing a daily upgrade to te latest Debian/testing' implies doing something like 'apt-get dist-upgrade', which indeed hogs a lot of time and bandwidth -- especially if you've made the error of doing a kitchen-sink installation -- but is completely unnecessary: The interesting thing about Debian's security updates (as detailed on the debian-security-announce mailing list, http://lists.debian.org/debian-security-announce/) is that, upon examination, you find that 95% are either irrelevant to your installed system for one reason or another (package not installed, threat model applies only to a particular configuration you don't have), or is intended to fix theoretical vulnerabilities so far-fetched that there's no hurry dealing with them. In 2011 so far, there have been 211 postings to that mailing list (whose postings I skim-read). Of those, 42 were package updates that were _potentially_ applicable to my Debian servers, and 42 were _potentially_ applicable to my Debian workstation. However, the actual number of relevant updates has been much smaller than that. Let's consider the 42 workstation packages, and spot/weed out the ones that can be ignored: DSA-2141-2, nss: This addressed the far-fetched TLS man-in-the-middle scenario in January, which I already render irrelevant in other ways. DSA-2142-1, dpkg directory traversal: Far-fetched attack on .deb source-code packages that are in 3.0 quilt format. DSA 2149-1: local DoS against dbus; not much of an attack. Carefully crafted system messages could cause an instance of dbus to segfault, but it'd launch another, so not a big deal. DSA 2151-1 (still January): Set of OO.o bugs whereby malicious RTF documents, XML filters, TGA (Targa) graphics files, MS-Word files could 'potentially execute arbitrary code' as the local user, which means there's no exploit and may never be but you should get around to upgrading on general principle. I didn't bother, but instead just gave OO.o the heave-ho when LibreOffice came out. DSA 2152-1, hplip: irrelevant because I don't use the SNMP discovery code. DSA 2153-1, linux-2.6: Almost entirely bugs in drivers and subsystems I don't use, except some minor information leakage and several local-user DoS bugs, meriting eventually kernel upgrade when convenient but not urgently. DSA 2164-1, shadow: Farfetched, and I don't use NIS. DSA 2176-1, cups: Basically, DoSing the print daemon with malformed files, in which case it segfaults and cupsd forks/execs another copy. DSA 2200-1: iceweasel: Blacklisting several fraudulent SSL certs issued by Comodo, which is nice but I'd already manually removed the Comodo root cert. DSA 2203-1: nss: Same Comodo certs, already dealt with locally. DSA 2213-1: x11-xserver-utils (xrdb utility): So-called remote attack if remote X11 is enabled (who does that?) or there's a 'rogue DHCP server' on the local LAN issuing 'crafted hostnames' that might in some farfetched scenario possibly stack-smash the xrdb utility that might in theory escalate privilege. Farfetched, no hurry. DSA 2217-1, dhcp3: 'Rogue DHCP server' could send DHCP client shell meta-characters that could speculatively maybe some day lead to an explotiable way to execute arbitrary code as the dhclient user. Farfetched, and moreover irrelevant because I have DHCLIENT_SET_HOSTNAME="no". DSA 2240-1, linux-2.6: Various kernel bugs, all of them in drivers and subsystems I don't use, except for one about video support for AGP devices, which is irrelevant because my users aren't in group 'video'. DSA 2264-1, linux-2.6: As above. DSA 2265-1: perl: 'tainted' flag isn't always handled correctly, which is serious but irrelevant because I don't rely on it for anything. DSA 2267-1, perl: Perl's 'safe' module can sometimes be bypassed, which is serious but irrelevant because I don't rely on it for anything. DSA 2275-1, OO.o: Import filter for Lotus Word Pro is subject to theoretical, speculative attack as the local user, but this is irrelevant because I don't use Lotus Word Pro files. DSA-2287-1, libpng. Several bugs, the most serious of which can be used to make libpng grab lots of RAM, maybe fall over, and very speculatively maybe some day accomplish more mischief. Not urgent. DSA 2292-1, dhcp3. DoS: Remote attacker can make your DHCP client program fall over. Bummer. Annoying, but hardly a security emergency. DSA 2299-1, ca-certificates: Blacklisting Diginotar for incompetence as a CA. Irrelevant for the same reasons as the Comodo issues. DSA 2200-1, nss: Same. DSA 2300-2, nss: Diginotar round 2. See above. DSA 2303-1, linux-2.6: Mostly drivers and subsystems I don't use, except two that are minor information leakage (to fix when convenient, not an emergency) and a fascinating bug in TCP sequence number randomisation that merits a kernel upgrade (again) when convenient but not an emergency. (If your secret network transactions are accessible merely by guessing packet sequence numbers, you aren't doing security right.) DSA 2303-2, linux-2.6: Fixes a nasty bug introduced by the prior fix. (See? This is one reason to not be in a hurry except when haste is actually needed.) DSA 2310-1, linux-2.6: Again, almost entirely drivers and subsystems I don't use, excepting a couple of minor information leakage bugs. Merits kernel upgrade when convenient, not an emergency. DSA 2310-1, OO.o: Bugs in the MS-Word importer, which can cause OO.o Writer to fall over but so far probably not much else. Taking out the above 26 irrelevant or not-very-important updates, what does that leave? One fairly serious glibc update, one fairly serious PAM update, five updates each of iceweasel (Firefox) and icedove (Thunderbird), and four updates to freetype: 16 package updates, plus in some cases dependencies. So, _not_ 211 for the current year, but rather _16_. Plus a kernel upgrade or two whenever convenient. Also, because of my usage scenarios for Iceweasel and Icedove (well-tuned NoScript and RequestPolicy for Firefox, simple HTML display in Thunderbird), I actually ignore most upgrades with perfect safety because I've addressed threat vectors at other levels. Anyway, I hope you'll notice, _very_ few package upgrade result, if you bother to read the DSAs and fix only what's worth fixing -- and if you haven't installed the kitchen sink. By the way, if you have numerous Debian machines needing package updates, you do _not_ have them all fetch those in parallel. What you do is have each host's apt subsystem use a shared local Squid cache you establish for that purpose. That way, duplicate downloads are eliminated automatically.
Yes, things can and do do break badly in Ubuntu upgrades, but at least you only need to worry about these once every 6 months, not once every day.
As you see, you were misinformed. One just subscribes to the DSAs (very low traffic announce-only mailing list), skim-reads the occasional postings, ignores 95% as irrelevant, and acts on the remaining dozen-plus packages per year.