Why did my Debian Stretch update to Buster?Trouble migrating from Yum to apt-getUpgrade debian from oldstable...

How to trick a fairly simplistic kill-counter?

How do I respond appropriately to an overseas company that obtained a visa for me without hiring me?

Return last number in sub-sequences in a list of integers

Can I shorten this filter, that finds disk sizes over 100G?

Does the use of a new concept require a prior definition?

How long should I wait to plug in my refrigerator after unplugging it?

Protect a 6 inch air hose from physical damage

Being told my "network" isn't PCI compliant. I don't even have a server! Do I have to comply?

"Fewer errors means better products" or "Fewer errors mean better products"?

The grades of the students in a class

How does Rust's 128-bit integer `i128` work on a 64-bit system?

Is the EU really banning "toxic propellants" in 2020? How is that going to work?

How can a class have multiple methods without breaking the single responsibility principle

Declaring a visitor to the UK as my "girlfriend" - effect on getting a Visitor visa?

What is the difference between 2/4 and 4/4 when it comes the accented beats?

Can an alphabet for a Turing machine contain subsets of other alphabets?

A conjectural trigonometric identity

How to power down external drive safely

Define tcolorbox in math mode

"Will flex for food". What does this phrase mean?

What is Albrecht Dürer's Perspective Machine drawing style?

Can Otiluke's Freezing Spheres be stockpiled?

Windows del command not working?

Why did the United States not resort to nuclear weapons in Vietnam?



Why did my Debian Stretch update to Buster?


Trouble migrating from Yum to apt-getUpgrade debian from oldstable (squeeze) to unstable (sid)uninitialized constant XML::SaxParser / Error retrieving bug reports from the serverDebian security updatesapt pinning priority restricted`apt update` failed on Debian Linuxhow to update cURL openssl version for paypal IPNHow to get rid of a PPA?can't install ecodmsserver on crunchbang++ / Debian 9 stretch distroAm I at risk? How to interpret debscan vulnerability output?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}







0















I run manual updates weekly on my machine / home server.



When I ran the apt update && apt upgrade command, a lot of packages would be updated. I thought it has something to do with the release of buster (my current system should be using stretch), e.g. a lot of security updates or last final release/push to stretch.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10.



That certainly was very weird. My sources indicate this:



# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free


There is nothing in my sources indicating that my install should be buster. Almost everything points to stretch.



Checking the version indeed point to 10.0:



# cat /etc/debian_version
10.0


Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?



Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch or buster but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!










share|improve this question



























  • You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you upgrade, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.

    – jordanm
    9 mins ago











  • side note: apt is just really awful, not user friendly, and known to bite people in this way...

    – jordanm
    8 mins ago


















0















I run manual updates weekly on my machine / home server.



When I ran the apt update && apt upgrade command, a lot of packages would be updated. I thought it has something to do with the release of buster (my current system should be using stretch), e.g. a lot of security updates or last final release/push to stretch.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10.



That certainly was very weird. My sources indicate this:



# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free


There is nothing in my sources indicating that my install should be buster. Almost everything points to stretch.



Checking the version indeed point to 10.0:



# cat /etc/debian_version
10.0


Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?



Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch or buster but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!










share|improve this question



























  • You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you upgrade, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.

    – jordanm
    9 mins ago











  • side note: apt is just really awful, not user friendly, and known to bite people in this way...

    – jordanm
    8 mins ago














0












0








0








I run manual updates weekly on my machine / home server.



When I ran the apt update && apt upgrade command, a lot of packages would be updated. I thought it has something to do with the release of buster (my current system should be using stretch), e.g. a lot of security updates or last final release/push to stretch.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10.



That certainly was very weird. My sources indicate this:



# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free


There is nothing in my sources indicating that my install should be buster. Almost everything points to stretch.



Checking the version indeed point to 10.0:



# cat /etc/debian_version
10.0


Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?



Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch or buster but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!










share|improve this question
















I run manual updates weekly on my machine / home server.



When I ran the apt update && apt upgrade command, a lot of packages would be updated. I thought it has something to do with the release of buster (my current system should be using stretch), e.g. a lot of security updates or last final release/push to stretch.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10.



That certainly was very weird. My sources indicate this:



# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free


There is nothing in my sources indicating that my install should be buster. Almost everything points to stretch.



Checking the version indeed point to 10.0:



# cat /etc/debian_version
10.0


Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?



Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch or buster but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!







debian apt upgrade






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited 26 mins ago







Gizmo

















asked 31 mins ago









GizmoGizmo

1207 bronze badges




1207 bronze badges
















  • You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you upgrade, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.

    – jordanm
    9 mins ago











  • side note: apt is just really awful, not user friendly, and known to bite people in this way...

    – jordanm
    8 mins ago



















  • You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you upgrade, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.

    – jordanm
    9 mins ago











  • side note: apt is just really awful, not user friendly, and known to bite people in this way...

    – jordanm
    8 mins ago

















You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you upgrade, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.

– jordanm
9 mins ago





You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you upgrade, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.

– jordanm
9 mins ago













side note: apt is just really awful, not user friendly, and known to bite people in this way...

– jordanm
8 mins ago





side note: apt is just really awful, not user friendly, and known to bite people in this way...

– jordanm
8 mins ago










0






active

oldest

votes














Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "106"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f533776%2fwhy-did-my-debian-stretch-update-to-buster%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Unix & Linux Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f533776%2fwhy-did-my-debian-stretch-update-to-buster%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Taj Mahal Inhaltsverzeichnis Aufbau | Geschichte | 350-Jahr-Feier | Heutige Bedeutung | Siehe auch |...

Baia Sprie Cuprins Etimologie | Istorie | Demografie | Politică și administrație | Arii naturale...

Nicolae Petrescu-Găină Cuprins Biografie | Opera | In memoriam | Varia | Controverse, incertitudini...