Why did my Debian Stretch update to Buster?Trouble migrating from Yum to apt-getUpgrade debian from oldstable...
How to trick a fairly simplistic kill-counter?
How do I respond appropriately to an overseas company that obtained a visa for me without hiring me?
Return last number in sub-sequences in a list of integers
Can I shorten this filter, that finds disk sizes over 100G?
Does the use of a new concept require a prior definition?
How long should I wait to plug in my refrigerator after unplugging it?
Protect a 6 inch air hose from physical damage
Being told my "network" isn't PCI compliant. I don't even have a server! Do I have to comply?
"Fewer errors means better products" or "Fewer errors mean better products"?
The grades of the students in a class
How does Rust's 128-bit integer `i128` work on a 64-bit system?
Is the EU really banning "toxic propellants" in 2020? How is that going to work?
How can a class have multiple methods without breaking the single responsibility principle
Declaring a visitor to the UK as my "girlfriend" - effect on getting a Visitor visa?
What is the difference between 2/4 and 4/4 when it comes the accented beats?
Can an alphabet for a Turing machine contain subsets of other alphabets?
A conjectural trigonometric identity
How to power down external drive safely
Define tcolorbox in math mode
"Will flex for food". What does this phrase mean?
What is Albrecht Dürer's Perspective Machine drawing style?
Can Otiluke's Freezing Spheres be stockpiled?
Windows del command not working?
Why did the United States not resort to nuclear weapons in Vietnam?
Why did my Debian Stretch update to Buster?
Trouble migrating from Yum to apt-getUpgrade debian from oldstable (squeeze) to unstable (sid)uninitialized constant XML::SaxParser / Error retrieving bug reports from the serverDebian security updatesapt pinning priority restricted`apt update` failed on Debian Linuxhow to update cURL openssl version for paypal IPNHow to get rid of a PPA?can't install ecodmsserver on crunchbang++ / Debian 9 stretch distroAm I at risk? How to interpret debscan vulnerability output?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}
I run manual updates weekly on my machine / home server.
When I ran the apt update && apt upgrade
command, a lot of packages would be updated. I thought it has something to do with the release of buster
(my current system should be using stretch
), e.g. a lot of security updates or last final release/push to stretch
.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10
.
That certainly was very weird. My sources indicate this:
# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free
There is nothing in my sources indicating that my install should be buster
. Almost everything points to stretch
.
Checking the version indeed point to 10.0
:
# cat /etc/debian_version
10.0
Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?
Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch
or buster
but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!
debian apt upgrade
add a comment |
I run manual updates weekly on my machine / home server.
When I ran the apt update && apt upgrade
command, a lot of packages would be updated. I thought it has something to do with the release of buster
(my current system should be using stretch
), e.g. a lot of security updates or last final release/push to stretch
.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10
.
That certainly was very weird. My sources indicate this:
# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free
There is nothing in my sources indicating that my install should be buster
. Almost everything points to stretch
.
Checking the version indeed point to 10.0
:
# cat /etc/debian_version
10.0
Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?
Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch
or buster
but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!
debian apt upgrade
You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time youupgrade
, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.
– jordanm
9 mins ago
side note: apt is just really awful, not user friendly, and known to bite people in this way...
– jordanm
8 mins ago
add a comment |
I run manual updates weekly on my machine / home server.
When I ran the apt update && apt upgrade
command, a lot of packages would be updated. I thought it has something to do with the release of buster
(my current system should be using stretch
), e.g. a lot of security updates or last final release/push to stretch
.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10
.
That certainly was very weird. My sources indicate this:
# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free
There is nothing in my sources indicating that my install should be buster
. Almost everything points to stretch
.
Checking the version indeed point to 10.0
:
# cat /etc/debian_version
10.0
Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?
Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch
or buster
but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!
debian apt upgrade
I run manual updates weekly on my machine / home server.
When I ran the apt update && apt upgrade
command, a lot of packages would be updated. I thought it has something to do with the release of buster
(my current system should be using stretch
), e.g. a lot of security updates or last final release/push to stretch
.. Oh boy was I wrong. After several reboots and fixing a few non-working programs because of library version mismatches, my machine presented me with the MOTD containing Debian 10
.
That certainly was very weird. My sources indicate this:
# grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/*
/etc/apt/sources.list:#
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:# deb cdrom:[Debian GNU/Linux 9.3.0 _Stretch_ - Official amd64 NETINST 20171209-12:10]/ stretch main
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:deb-src http://security.debian.org/debian-security stretch/updates main non-free
/etc/apt/sources.list:
/etc/apt/sources.list:# stretch-updates, previously known as 'volatile'
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:deb-src http://ftp.nl.debian.org/debian/ stretch-updates main non-free
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:# deb-src [arch=amd64] https://download.docker.com/linux/debian stretch stable
/etc/apt/sources.list:
/etc/apt/sources.list:deb http://ftp.nl.debian.org/debian stretch-backports main
/etc/apt/sources.list.d/mono-official-stable.list:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/mono-official-stable.list.save:deb https://download.mono-project.com/repo/debian stable-stretch main
/etc/apt/sources.list.d/stable.list:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list:
/etc/apt/sources.list.d/stable.list:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:deb-src http://ftp.nl.debian.org/debian/ stable main contrib non-free
/etc/apt/sources.list.d/stable.list.save:
/etc/apt/sources.list.d/stable.list.save:deb http://security.debian.org/ stable/updates main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:# deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list:
/etc/apt/sources.list.d/testing.list:# deb http://security.debian.org/ testing/updates main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:#deb-src http://ftp.nl.debian.org/debian/ testing main contrib non-free
/etc/apt/sources.list.d/testing.list.save:
/etc/apt/sources.list.d/testing.list.save:#deb http://security.debian.org/ testing/updates main contrib non-free
There is nothing in my sources indicating that my install should be buster
. Almost everything points to stretch
.
Checking the version indeed point to 10.0
:
# cat /etc/debian_version
10.0
Where did it go wrong and why did this happen to me (again, last time was jessie to stretch on a PROD server at work... ugh, bad times!)? I though Debian wouldn't update to a new version on its' own willy-nilly?
Also, how would I fix this weird spaghetti mess and unfrankenstein my Debian install without starting from scratch? I don't care if my install is stretch
or buster
but I don't want them to mix and most importantly I don't want it to update to a new version when doing regular security updates!
debian apt upgrade
debian apt upgrade
edited 26 mins ago
Gizmo
asked 31 mins ago
GizmoGizmo
1207 bronze badges
1207 bronze badges
You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time youupgrade
, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.
– jordanm
9 mins ago
side note: apt is just really awful, not user friendly, and known to bite people in this way...
– jordanm
8 mins ago
add a comment |
You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time youupgrade
, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.
– jordanm
9 mins ago
side note: apt is just really awful, not user friendly, and known to bite people in this way...
– jordanm
8 mins ago
You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you
upgrade
, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.– jordanm
9 mins ago
You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you
upgrade
, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.– jordanm
9 mins ago
side note: apt is just really awful, not user friendly, and known to bite people in this way...
– jordanm
8 mins ago
side note: apt is just really awful, not user friendly, and known to bite people in this way...
– jordanm
8 mins ago
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "106"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f533776%2fwhy-did-my-debian-stretch-update-to-buster%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f533776%2fwhy-did-my-debian-stretch-update-to-buster%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
You are using "stable" in your sources.list instead of explicitly "stretch" or "buster" so every time you
upgrade
, you will get the latest stable, even if its a major release. You shouldn't be frankendebian at this point, just pure buster.– jordanm
9 mins ago
side note: apt is just really awful, not user friendly, and known to bite people in this way...
– jordanm
8 mins ago