Package: unattended-upgrades
Version: 1.15
Severity: normal

Dear Maintainer,


   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?



-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages unattended-upgrades depends on:
ii  debconf [debconf-2.0]  1.5.73
ii  lsb-base               11.1.0
ii  lsb-release            11.1.0
ii  python3                3.7.3-1
ii  python3-apt            1.8.4+b1
ii  python3-dbus           1.2.14-1
ii  python3-distro-info    0.22
ii  ucf                    3.0038+nmu1
ii  xz-utils               5.2.4-1+b1

Versions of packages unattended-upgrades recommends:
ii  anacron             2.3-29
ii  cron [cron-daemon]  3.0pl1-135
ii  systemd-sysv        243-8

Versions of packages unattended-upgrades suggests:
ii  bsd-mailx                                  8.1.2-0.20180807cvs-1+b1
ii  exim4-daemon-light [mail-transport-agent]  4.92-5
pn  needrestart                                <none>
ii  powermgmt-base                             1.36
ii  python3-gi                                 3.34.0-3

-- debconf information:
  unattended-upgrades/enable_auto_updates: true
  unattended-upgrades/origins_pattern: 
"origin=Debian,codename=${distro_codename},label=Debian-Security";

Reply via email to