On Mon, Jun 08, 2015 at 11:51:30AM +0200, Hans Yntema wrote: > Package: unattended-upgrades > Version: 0.83.3.1 > Severity: important
Thanks for your bugreport. This is a brown-paperbug bug of me, sorry for this. I uploaded a new version with a updated conffile to stable-proposed-updates that should fix the issue [1]. Sorry for that and please let me know if that fixes the issue. Cheers, Michael [1] https://wiki.debian.org/StableProposedUpdates > Dear Maintainer, > > Initially (6 weeks ago), unattended-upgrades did not install > security-updates. I was able to fix by applying fix suggested in 783690. > I added "origin=Debian,codename=${distro_codename},label=Debian-Security" to > 50unattended-upgrades. > > Last week, unattended-upgrades got updated via Debian apt-get. Because I > manually changed 50unattended-upgrades (due to 783690), > I decided to replace it with stock 50unattended-upgrades during the update > (assuming that 783690 would be fixed in the proper way) > > Since this last upgrade, security updates don't get installed automatically. > > Somehow, applying the fix suggested in 783690 does't work anymore. I get > errors when I run > unattended-upgrade --dry-run --debug > > The unchanged 50unattended-upgrades yields following results > > sudo unattended-upgrade --dry-run --debug > Initial blacklisted packages: > Initial whitelisted packages: > Starting unattended upgrades script > Allowed origins are: ['o=Debian,a=jessie-security'] > Checking: libapache2-mod-php5 ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php-pear ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5 ([<Origin component:'main' archive:'stable' origin:'Debian' > label:'Debian-Security' site:'security.debian.org' isTrusted:True>]) > Checking: php5-cli ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5-common ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5-gd ([<Origin component:'main' archive:'stable' origin:'Debian' > label:'Debian-Security' site:'security.debian.org' isTrusted:True>]) > Checking: php5-intl ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5-ldap ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5-mcrypt ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5-mysql ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5-readline ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: php5-xsl ([<Origin component:'main' archive:'stable' > origin:'Debian' label:'Debian-Security' site:'security.debian.org' > isTrusted:True>]) > Checking: x2goserver ([<Origin component:'main' archive:'' origin:'X2Go' > label:'X2Go' site:'packages.x2go.org' isTrusted:True>]) > Checking: x2goserver-extensions ([<Origin component:'main' archive:'' > origin:'X2Go' label:'X2Go' site:'packages.x2go.org' isTrusted:True>]) > Checking: x2goserver-xsession ([<Origin component:'main' archive:'' > origin:'X2Go' label:'X2Go' site:'packages.x2go.org' isTrusted:True>]) > pkgs that look like they should be upgraded: > Fetched 0 B in 0s (0 B/s) > fetch.run() result: 0 > blacklist: [] > whitelist: [] > InstCount=0 DelCount=0 BrokenCount=0 > No packages found that can be upgraded unattended > > > > -- System Information: > Debian Release: 8.1 > APT prefers stable-updates > APT policy: (500, 'stable-updates'), (500, 'stable') > Architecture: amd64 (x86_64) > Foreign Architectures: i386 > > Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) > Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) > Shell: /bin/sh linked to /bin/dash > Init: systemd (via /run/systemd/system) > > Versions of packages unattended-upgrades depends on: > ii apt 1.0.9.8 > ii apt-utils 1.0.9.8 > ii debconf [debconf-2.0] 1.5.56 > ii init-system-helpers 1.22 > ii lsb-base 4.1+Debian13+nmu1 > ii lsb-release 4.1+Debian13+nmu1 > ii python3 3.4.2-2 > ii python3-apt 0.9.3.11 > ii ucf 3.0030 > ii xz-utils 5.1.1alpha+20120614-2+b3 > > unattended-upgrades recommends no packages. > > Versions of packages unattended-upgrades suggests: > ii bsd-mailx 8.1.2-0.20141216cvs-2 > ii postfix [mail-transport-agent] 2.11.3-1 > > -- Configuration Files: > /etc/apt/apt.conf.d/50unattended-upgrades changed [not included] > > -- debconf information: > * unattended-upgrades/enable_auto_updates: true -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org