On Mon, Jun 08, 2015 at 11:51:30AM +0200, Hans Yntema wrote:
> Package: unattended-upgrades
> Version: 0.83.3.1
> Severity: important

Thanks for your bugreport.

This is a brown-paperbug bug of me, sorry for this. I uploaded a new
version with a updated conffile to stable-proposed-updates that should
fix the issue [1]. Sorry for that and please let me know if that fixes
the issue.

Cheers,
 Michael

[1] https://wiki.debian.org/StableProposedUpdates

> Dear Maintainer,
> 
> Initially (6 weeks ago), unattended-upgrades did not install 
> security-updates. I was able to fix by applying fix suggested in 783690.
> I added "origin=Debian,codename=${distro_codename},label=Debian-Security" to 
> 50unattended-upgrades.
> 
> Last week, unattended-upgrades got updated via Debian apt-get. Because I 
> manually changed 50unattended-upgrades (due to 783690),
> I decided to replace it with stock 50unattended-upgrades during the update 
> (assuming that 783690 would be fixed in the proper way)
> 
> Since this last upgrade, security updates don't get installed automatically.
> 
> Somehow, applying the fix suggested in 783690 does't work anymore. I get 
> errors when I run
> unattended-upgrade --dry-run --debug
> 
> The unchanged 50unattended-upgrades yields following results
> 
> sudo unattended-upgrade --dry-run --debug
> Initial blacklisted packages:
> Initial whitelisted packages:
> Starting unattended upgrades script
> Allowed origins are: ['o=Debian,a=jessie-security']
> Checking: libapache2-mod-php5 ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php-pear ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5 ([<Origin component:'main' archive:'stable' origin:'Debian' 
> label:'Debian-Security' site:'security.debian.org' isTrusted:True>])
> Checking: php5-cli ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5-common ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5-gd ([<Origin component:'main' archive:'stable' origin:'Debian' 
> label:'Debian-Security' site:'security.debian.org' isTrusted:True>])
> Checking: php5-intl ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5-ldap ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5-mcrypt ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5-mysql ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5-readline ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: php5-xsl ([<Origin component:'main' archive:'stable' 
> origin:'Debian' label:'Debian-Security' site:'security.debian.org' 
> isTrusted:True>])
> Checking: x2goserver ([<Origin component:'main' archive:'' origin:'X2Go' 
> label:'X2Go' site:'packages.x2go.org' isTrusted:True>])
> Checking: x2goserver-extensions ([<Origin component:'main' archive:'' 
> origin:'X2Go' label:'X2Go' site:'packages.x2go.org' isTrusted:True>])
> Checking: x2goserver-xsession ([<Origin component:'main' archive:'' 
> origin:'X2Go' label:'X2Go' site:'packages.x2go.org' isTrusted:True>])
> pkgs that look like they should be upgraded:
> Fetched 0 B in 0s (0 B/s)
> fetch.run() result: 0
> blacklist: []
> whitelist: []
> InstCount=0 DelCount=0 BrokenCount=0
> No packages found that can be upgraded unattended
> 
> 
> 
> -- System Information:
> Debian Release: 8.1
>   APT prefers stable-updates
>   APT policy: (500, 'stable-updates'), (500, 'stable')
> Architecture: amd64 (x86_64)
> Foreign Architectures: i386
> 
> Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
> Init: systemd (via /run/systemd/system)
> 
> Versions of packages unattended-upgrades depends on:
> ii  apt                    1.0.9.8
> ii  apt-utils              1.0.9.8
> ii  debconf [debconf-2.0]  1.5.56
> ii  init-system-helpers    1.22
> ii  lsb-base               4.1+Debian13+nmu1
> ii  lsb-release            4.1+Debian13+nmu1
> ii  python3                3.4.2-2
> ii  python3-apt            0.9.3.11
> ii  ucf                    3.0030
> ii  xz-utils               5.1.1alpha+20120614-2+b3
> 
> unattended-upgrades recommends no packages.
> 
> Versions of packages unattended-upgrades suggests:
> ii  bsd-mailx                       8.1.2-0.20141216cvs-2
> ii  postfix [mail-transport-agent]  2.11.3-1
> 
> -- Configuration Files:
> /etc/apt/apt.conf.d/50unattended-upgrades changed [not included]
> 
> -- debconf information:
> * unattended-upgrades/enable_auto_updates: true


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to