Package: unattended-upgrades
Version: 2.3
Severity: important

Dear Maintainer,

after latest system upgrade , i noticed this behavior.
In the bugtracker i noticed there was a similar behavior described in

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899366

but it had been fixed. Maybe a regression.

Thanks


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages unattended-upgrades depends on:
ii  debconf [debconf-2.0]  1.5.74
ii  lsb-base               11.1.0
ii  lsb-release            11.1.0
ii  python3                3.8.2-3
ii  python3-apt            2.1.1
ii  python3-dbus           1.2.16-2
ii  python3-distro-info    0.23
ii  ucf                    3.0038+nmu1
ii  xz-utils               5.2.4-1+b1

Versions of packages unattended-upgrades recommends:
ii  anacron             2.3-29
ii  cron [cron-daemon]  3.0pl1-136
ii  systemd-sysv        245.5-1

Versions of packages unattended-upgrades suggests:
ii  bsd-mailx                                  8.1.2-0.20180807cvs-1+b1
ii  exim4-daemon-light [mail-transport-agent]  4.93-14
ii  needrestart                                3.5-1
ii  powermgmt-base                             1.36
ii  python3-gi                                 3.36.0-3

-- debconf information:
  unattended-upgrades/enable_auto_updates: true
  unattended-upgrades/origins_pattern: 
"origin=Debian,codename=${distro_codename},label=Debian-Security";

Reply via email to