Package: unattended-upgrades
Version: 1.15
Severity: normal
Dear Maintainer,
* What led up to the situation?
* What exactly did you do (or not do) that was effective (or
ineffective)?
* What was the outcome of this action?
* What outcome did you expect instead?
-- System Information:
Debian Release: bullseye/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages unattended-upgrades depends on:
ii debconf [debconf-2.0] 1.5.73
ii lsb-base 11.1.0
ii lsb-release 11.1.0
ii python3 3.7.3-1
ii python3-apt 1.8.4+b1
ii python3-dbus 1.2.14-1
ii python3-distro-info 0.22
ii ucf 3.0038+nmu1
ii xz-utils 5.2.4-1+b1
Versions of packages unattended-upgrades recommends:
ii anacron 2.3-29
ii cron [cron-daemon] 3.0pl1-135
ii systemd-sysv 243-8
Versions of packages unattended-upgrades suggests:
ii bsd-mailx 8.1.2-0.20180807cvs-1+b1
ii exim4-daemon-light [mail-transport-agent] 4.92-5
pn needrestart <none>
ii powermgmt-base 1.36
ii python3-gi 3.34.0-3
-- debconf information:
unattended-upgrades/enable_auto_updates: true
unattended-upgrades/origins_pattern:
"origin=Debian,codename=${distro_codename},label=Debian-Security";