Package: unattended-upgrades Version: 1.15 Severity: normal Dear Maintainer,
* What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages unattended-upgrades depends on: ii debconf [debconf-2.0] 1.5.73 ii lsb-base 11.1.0 ii lsb-release 11.1.0 ii python3 3.7.3-1 ii python3-apt 1.8.4+b1 ii python3-dbus 1.2.14-1 ii python3-distro-info 0.22 ii ucf 3.0038+nmu1 ii xz-utils 5.2.4-1+b1 Versions of packages unattended-upgrades recommends: ii anacron 2.3-29 ii cron [cron-daemon] 3.0pl1-135 ii systemd-sysv 243-8 Versions of packages unattended-upgrades suggests: ii bsd-mailx 8.1.2-0.20180807cvs-1+b1 ii exim4-daemon-light [mail-transport-agent] 4.92-5 pn needrestart <none> ii powermgmt-base 1.36 ii python3-gi 3.34.0-3 -- debconf information: unattended-upgrades/enable_auto_updates: true unattended-upgrades/origins_pattern: "origin=Debian,codename=${distro_codename},label=Debian-Security";