$ -weight: 600;">sudo -weight: 500;">apt -weight: 500;">update
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">install -weight: 500;">apt-listbugs
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">update
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">install -weight: 500;">apt-listbugs
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">update
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">install -weight: 500;">apt-listbugs
-weight: 500;">apt-cache policy -weight: 500;">apt-listbugs
-weight: 500;">apt-cache show -weight: 500;">apt-listbugs
-weight: 500;">apt-cache policy -weight: 500;">apt-listbugs
-weight: 500;">apt-cache show -weight: 500;">apt-listbugs
-weight: 500;">apt-cache policy -weight: 500;">apt-listbugs
-weight: 500;">apt-cache show -weight: 500;">apt-listbugs
-weight: 500;">apt-listbugs list openssh-server
-weight: 500;">apt-listbugs list openssh-server
-weight: 500;">apt-listbugs list openssh-server
-weight: 500;">apt-listbugs list openssh-server/1:9.7p1-1
-weight: 500;">apt-listbugs list openssh-server/1:9.7p1-1
-weight: 500;">apt-listbugs list openssh-server/1:9.7p1-1
-weight: 500;">apt-listbugs list openssh-server:amd64/1:9.7p1-1
-weight: 500;">apt-listbugs list openssh-server:amd64/1:9.7p1-1
-weight: 500;">apt-listbugs list openssh-server:amd64/1:9.7p1-1
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">update
-weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">update
-weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
-weight: 600;">sudo -weight: 500;">apt -weight: 500;">update
-weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
-weight: 600;">sudo -weight: 500;">install -d -m 0755 /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d
-weight: 600;">sudo tee /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d/90apt-listbugs-local >/dev/null <<'EOF'
AptListbugs::Severities "critical,grave,serious,important";
EOF
-weight: 600;">sudo -weight: 500;">install -d -m 0755 /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d
-weight: 600;">sudo tee /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d/90apt-listbugs-local >/dev/null <<'EOF'
AptListbugs::Severities "critical,grave,serious,important";
EOF
-weight: 600;">sudo -weight: 500;">install -d -m 0755 /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d
-weight: 600;">sudo tee /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d/90apt-listbugs-local >/dev/null <<'EOF'
AptListbugs::Severities "critical,grave,serious,important";
EOF
-weight: 600;">sudo tee /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d/90apt-listbugs-release >/dev/null <<'EOF'
AptListbugs::DistroRelease "testing";
EOF
-weight: 600;">sudo tee /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d/90apt-listbugs-release >/dev/null <<'EOF'
AptListbugs::DistroRelease "testing";
EOF
-weight: 600;">sudo tee /etc/-weight: 500;">apt/-weight: 500;">apt.conf.d/90apt-listbugs-release >/dev/null <<'EOF'
AptListbugs::DistroRelease "testing";
EOF
-weight: 500;">apt-listbugs -T confirmed,l10n list some-package
-weight: 500;">apt-listbugs -T confirmed,l10n list some-package
-weight: 500;">apt-listbugs -T confirmed,l10n list some-package
-weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
# -weight: 500;">apt-listbugs warns about package foo
# choose to pin / defer
# abort the current -weight: 500;">upgrade -weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
-weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
# -weight: 500;">apt-listbugs warns about package foo
# choose to pin / defer
# abort the current -weight: 500;">upgrade -weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
-weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
# -weight: 500;">apt-listbugs warns about package foo
# choose to pin / defer
# abort the current -weight: 500;">upgrade -weight: 600;">sudo -weight: 500;">apt full--weight: 500;">upgrade
/etc/-weight: 500;">apt/preferences.d/-weight: 500;">apt-listbugs
/etc/-weight: 500;">apt/preferences.d/-weight: 500;">apt-listbugs
/etc/-weight: 500;">apt/preferences.d/-weight: 500;">apt-listbugs
-weight: 600;">sudo -weight: 500;">install -d -m 0755 /etc/-weight: 500;">apt/listbugs
-weight: 600;">sudo tee -a /etc/-weight: 500;">apt/listbugs/ignore_bugs >/dev/null <<'EOF'
# Ignore bug 123456 for this host until upstream fix lands
123456
EOF
-weight: 600;">sudo -weight: 500;">install -d -m 0755 /etc/-weight: 500;">apt/listbugs
-weight: 600;">sudo tee -a /etc/-weight: 500;">apt/listbugs/ignore_bugs >/dev/null <<'EOF'
# Ignore bug 123456 for this host until upstream fix lands
123456
EOF
-weight: 600;">sudo -weight: 500;">install -d -m 0755 /etc/-weight: 500;">apt/listbugs
-weight: 600;">sudo tee -a /etc/-weight: 500;">apt/listbugs/ignore_bugs >/dev/null <<'EOF'
# Ignore bug 123456 for this host until upstream fix lands
123456
EOF
-weight: 500;">apt-listbugs -n list openssh-server
-weight: 500;">apt-listbugs -n list openssh-server
-weight: 500;">apt-listbugs -n list openssh-server
-weight: 500;">systemctl list-unit-files | grep -weight: 500;">apt-listbugs
-weight: 500;">systemctl list-timers --all | grep -weight: 500;">apt-listbugs
-weight: 500;">systemctl list-unit-files | grep -weight: 500;">apt-listbugs
-weight: 500;">systemctl list-timers --all | grep -weight: 500;">apt-listbugs
-weight: 500;">systemctl list-unit-files | grep -weight: 500;">apt-listbugs
-weight: 500;">systemctl list-timers --all | grep -weight: 500;">apt-listbugs - The default severity filter is critical,grave,serious
- Pinning is not immediate inside the current APT transaction. If you choose to pin, you should abort and then rerun the same APT command.
- Automatically added pins are cleaned up later by the package's daily cron job or systemd timer, once the BTS data shows the issue is fixed or no longer affects the installable version. - you run Debian testing or unstable
- you track fast-moving packages on a workstation or homelab node
- you want APT to -weight: 500;">stop and show known release-critical issues before changing the system
- you prefer a quick BTS sanity check over reading bug trackers by hand - abort the -weight: 500;">upgrade
- pin the affected package and then rerun the command
- continue only if you understand the impact and accept the risk - automatic ignore list: /var/lib/-weight: 500;">apt-listbugs/ignore_bugs
- manual ignore list: /etc/-weight: 500;">apt/listbugs/ignore_bugs - -F can force pinning without prompt
- -N disables automatic pinning
- -y assumes yes to all questions, including continuing when bugs or errors appear
- -n assumes no and aborts when bugs or errors appear - It is not a vulnerability scanner.
- It is not a package integrity checker.
- It is not a substitute for snapshots or backups.
- It is not a guarantee that an -weight: 500;">upgrade is safe. - Install -weight: 500;">apt-listbugs
- Keep the default critical,grave,serious filter, or add important
- Run upgrades manually on important systems
- Abort and investigate when it flags a package you care about
- Let temporary pins defer known-bad upgrades instead of brute-forcing through them - Debian manpage, -weight: 500;">apt-listbugs(1): https://manpages.debian.org/testing/-weight: 500;">apt-listbugs/-weight: 500;">apt-listbugs.1.en.html
- Debian BTS severity definitions: https://www.debian.org/Bugs/Developer
- Debian package metadata for -weight: 500;">apt-listbugs: https://packages.debian.org/-weight: 500;">apt-listbugs
- Project homepage on Salsa: https://salsa.debian.org/frx-guest/-weight: 500;">apt-listbugs