Skip to content
  • Home
  • Aktuell
  • Tags
  • 0 Ungelesen 0
  • Kategorien
  • Unreplied
  • Beliebt
  • GitHub
  • Docu
  • Hilfe
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Standard: (Kein Skin)
  • Kein Skin
Einklappen
ioBroker Logo

Community Forum

donate donate
  1. ioBroker Community Home
  2. Deutsch
  3. Off Topic
  4. Pflege des Betriebssystems
  5. Betriebssystem-Paket-Updates, Linux ist auf neustem Stand

NEWS

  • UPDATE 31.10.: Amazon Alexa - ioBroker Skill läuft aus ?
    apollon77A
    apollon77
    48
    3
    8.9k

  • Monatsrückblick – September 2025
    BluefoxB
    Bluefox
    13
    1
    2.3k

  • Neues Video "KI im Smart Home" - ioBroker plus n8n
    BluefoxB
    Bluefox
    16
    1
    3.6k

Betriebssystem-Paket-Updates, Linux ist auf neustem Stand

Geplant Angeheftet Gesperrt Verschoben Pflege des Betriebssystems
61 Beiträge 16 Kommentatoren 15.1k Aufrufe 12 Watching
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • L Offline
    L Offline
    luder
    schrieb am zuletzt editiert von
    #1

    Hallo,

    ich bekomme beim Start die Meldung:
    Betriebssystem-Paket-Updates verfügbar
    Einige Betriebssystempakete können aktualisiert werden.

    Darunter ist dann eine ziemlich lange Liste, siehe unten.

    Ich habe dann ein Update meines Linux System gemacht
    sudo apt update
    sudo apt dist-upgrade
    sudo reboot

    aber die Meldung kommt immer noch. Muss ich noch etwas anderes aktualisieren?
    Bin leider kein Linux Experte.

    base-files/stable 12.4+deb12u6 amd64 [upgradable from: 12.4]
    bash/stable 5.2.15-2+b7 amd64 [upgradable from: 5.2.15-2+b2]
    bind9-dnsutils/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
    bind9-host/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
    bind9-libs/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
    bsdextrautils/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    bsdutils/stable,stable-security 1:2.38.1-5+deb12u1 amd64 [upgradable from: 1:2.38.1-5+b1]
    dbus-bin/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
    dbus-daemon/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
    dbus-session-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
    dbus-system-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
    dbus/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
    debian-archive-keyring/stable 2023.3+deb12u1 all [upgradable from: 2023.3]
    debianutils/stable 5.7-0.5~deb12u1 amd64 [upgradable from: 5.7-0.4]
    distro-info-data/stable 0.58+deb12u2 all [upgradable from: 0.58]
    fdisk/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    gir1.2-gdkpixbuf-2.0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
    gir1.2-rsvg-2.0/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
    inetutils-telnet/stable 2:2.4-2+deb12u1 amd64 [upgradable from: 2:2.4-2]
    krb5-locales/stable 1.20.1-2+deb12u1 all [upgradable from: 1.20.1-2]
    less/stable,stable-security 590-2.1~deb12u2 amd64 [upgradable from: 590-2]
    libarchive13/stable,stable-security 3.6.2-1+deb12u1 amd64 [upgradable from: 3.6.2-1]
    libblkid-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    libblkid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    libc-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
    libc-dev-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
    libc-l10n/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
    libc6-dev/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
    libc6/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
    libcryptsetup12/stable 2:2.6.1-4~deb12u2 amd64 [upgradable from: 2:2.6.1-4~deb12u1]
    libdbus-1-3/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
    libdbus-1-dev/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
    libfdisk1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    libfreetype-dev/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
    libfreetype6/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
    libgdk-pixbuf-2.0-0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
    libgdk-pixbuf-2.0-dev/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
    libgdk-pixbuf2.0-bin/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
    libgdk-pixbuf2.0-common/stable 2.42.10+dfsg-1+deb12u1 all [upgradable from: 2.42.10+dfsg-1]
    libglib2.0-0/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
    libglib2.0-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
    libglib2.0-data/stable 2.74.6-2+deb12u3 all [upgradable from: 2.74.6-2]
    libglib2.0-dev-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
    libglib2.0-dev/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
    libgnutls30/stable 3.7.9-2+deb12u3 amd64 [upgradable from: 3.7.9-2]
    libgssapi-krb5-2/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
    libisl23/stable 0.25-1.1 amd64 [upgradable from: 0.25-1]
    libk5crypto3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
    libkrb5-3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
    libkrb5support0/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
    libmount-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    libmount1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    libnftables1/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
    libnghttp2-14/stable,stable-security 1.52.0-1+deb12u1 amd64 [upgradable from: 1.52.0-1]
    libnss-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
    libpam-modules-bin/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
    libpam-modules/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
    libpam-runtime/stable 1.5.2-6+deb12u1 all [upgradable from: 1.5.2-6]
    libpam-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
    libpam0g-dev/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
    libpam0g/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
    libperl5.36/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
    libpython3.11-minimal/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
    libpython3.11-stdlib/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
    librsvg2-2/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
    librsvg2-common/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
    librsvg2-dev/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
    libseccomp2/stable 2.5.4-1+deb12u1 amd64 [upgradable from: 2.5.4-1+b3]
    libsmartcols1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    libssl3/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
    libsystemd-shared/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
    libsystemd0/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
    libtiff-dev/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
    libtiff6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
    libtiffxx6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
    libudev-dev/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
    libudev1/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
    libuuid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    libuv1/stable,stable-security 1.44.2-1+deb12u1 amd64 [upgradable from: 1.44.2-1]
    libwbclient0/stable,stable-security 2:4.17.12+dfsg-0+deb12u1 amd64 [upgradable from: 2:4.17.8+dfsg-2]
    libwebp-dev/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
    libwebp7/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
    libwebpdemux2/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
    libwebpmux3/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
    libx11-6/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
    libx11-data/stable,stable-security 2:1.8.4-2+deb12u2 all [upgradable from: 2:1.8.4-2+deb12u1]
    libx11-dev/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
    libxml2/stable 2.9.14+dfsg-1.3~deb12u1 amd64 [upgradable from: 2.9.14+dfsg-1.2]
    linux-libc-dev/stable 6.1.94-1 amd64 [upgradable from: 6.1.37-1]
    locales/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
    mount/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
    nano/stable 7.2-1+deb12u1 amd64 [upgradable from: 7.2-1]
    nftables/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
    openssh-client/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
    openssh-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
    openssh-sftp-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
    openssl/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
    perl-base/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
    perl-modules-5.36/stable 5.36.0-7+deb12u1 all [upgradable from: 5.36.0-7]
    perl/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
    
    HomoranH CodierknechtC F 3 Antworten Letzte Antwort
    0
    • L luder

      Hallo,

      ich bekomme beim Start die Meldung:
      Betriebssystem-Paket-Updates verfügbar
      Einige Betriebssystempakete können aktualisiert werden.

      Darunter ist dann eine ziemlich lange Liste, siehe unten.

      Ich habe dann ein Update meines Linux System gemacht
      sudo apt update
      sudo apt dist-upgrade
      sudo reboot

      aber die Meldung kommt immer noch. Muss ich noch etwas anderes aktualisieren?
      Bin leider kein Linux Experte.

      base-files/stable 12.4+deb12u6 amd64 [upgradable from: 12.4]
      bash/stable 5.2.15-2+b7 amd64 [upgradable from: 5.2.15-2+b2]
      bind9-dnsutils/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
      bind9-host/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
      bind9-libs/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
      bsdextrautils/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      bsdutils/stable,stable-security 1:2.38.1-5+deb12u1 amd64 [upgradable from: 1:2.38.1-5+b1]
      dbus-bin/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
      dbus-daemon/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
      dbus-session-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
      dbus-system-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
      dbus/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
      debian-archive-keyring/stable 2023.3+deb12u1 all [upgradable from: 2023.3]
      debianutils/stable 5.7-0.5~deb12u1 amd64 [upgradable from: 5.7-0.4]
      distro-info-data/stable 0.58+deb12u2 all [upgradable from: 0.58]
      fdisk/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      gir1.2-gdkpixbuf-2.0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
      gir1.2-rsvg-2.0/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
      inetutils-telnet/stable 2:2.4-2+deb12u1 amd64 [upgradable from: 2:2.4-2]
      krb5-locales/stable 1.20.1-2+deb12u1 all [upgradable from: 1.20.1-2]
      less/stable,stable-security 590-2.1~deb12u2 amd64 [upgradable from: 590-2]
      libarchive13/stable,stable-security 3.6.2-1+deb12u1 amd64 [upgradable from: 3.6.2-1]
      libblkid-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      libblkid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      libc-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
      libc-dev-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
      libc-l10n/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
      libc6-dev/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
      libc6/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
      libcryptsetup12/stable 2:2.6.1-4~deb12u2 amd64 [upgradable from: 2:2.6.1-4~deb12u1]
      libdbus-1-3/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
      libdbus-1-dev/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
      libfdisk1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      libfreetype-dev/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
      libfreetype6/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
      libgdk-pixbuf-2.0-0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
      libgdk-pixbuf-2.0-dev/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
      libgdk-pixbuf2.0-bin/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
      libgdk-pixbuf2.0-common/stable 2.42.10+dfsg-1+deb12u1 all [upgradable from: 2.42.10+dfsg-1]
      libglib2.0-0/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
      libglib2.0-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
      libglib2.0-data/stable 2.74.6-2+deb12u3 all [upgradable from: 2.74.6-2]
      libglib2.0-dev-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
      libglib2.0-dev/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
      libgnutls30/stable 3.7.9-2+deb12u3 amd64 [upgradable from: 3.7.9-2]
      libgssapi-krb5-2/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
      libisl23/stable 0.25-1.1 amd64 [upgradable from: 0.25-1]
      libk5crypto3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
      libkrb5-3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
      libkrb5support0/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
      libmount-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      libmount1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      libnftables1/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
      libnghttp2-14/stable,stable-security 1.52.0-1+deb12u1 amd64 [upgradable from: 1.52.0-1]
      libnss-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
      libpam-modules-bin/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
      libpam-modules/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
      libpam-runtime/stable 1.5.2-6+deb12u1 all [upgradable from: 1.5.2-6]
      libpam-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
      libpam0g-dev/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
      libpam0g/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
      libperl5.36/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
      libpython3.11-minimal/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
      libpython3.11-stdlib/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
      librsvg2-2/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
      librsvg2-common/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
      librsvg2-dev/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
      libseccomp2/stable 2.5.4-1+deb12u1 amd64 [upgradable from: 2.5.4-1+b3]
      libsmartcols1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      libssl3/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
      libsystemd-shared/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
      libsystemd0/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
      libtiff-dev/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
      libtiff6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
      libtiffxx6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
      libudev-dev/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
      libudev1/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
      libuuid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      libuv1/stable,stable-security 1.44.2-1+deb12u1 amd64 [upgradable from: 1.44.2-1]
      libwbclient0/stable,stable-security 2:4.17.12+dfsg-0+deb12u1 amd64 [upgradable from: 2:4.17.8+dfsg-2]
      libwebp-dev/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
      libwebp7/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
      libwebpdemux2/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
      libwebpmux3/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
      libx11-6/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
      libx11-data/stable,stable-security 2:1.8.4-2+deb12u2 all [upgradable from: 2:1.8.4-2+deb12u1]
      libx11-dev/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
      libxml2/stable 2.9.14+dfsg-1.3~deb12u1 amd64 [upgradable from: 2.9.14+dfsg-1.2]
      linux-libc-dev/stable 6.1.94-1 amd64 [upgradable from: 6.1.37-1]
      locales/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
      mount/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
      nano/stable 7.2-1+deb12u1 amd64 [upgradable from: 7.2-1]
      nftables/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
      openssh-client/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
      openssh-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
      openssh-sftp-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
      openssl/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
      perl-base/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
      perl-modules-5.36/stable 5.36.0-7+deb12u1 all [upgradable from: 5.36.0-7]
      perl/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
      
      HomoranH Nicht stören
      HomoranH Nicht stören
      Homoran
      Global Moderator Administrators
      schrieb am zuletzt editiert von
      #2

      @luder sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

      Ich habe dann ein Update meines Linux System gemacht
      sudo apt update

      was kommt jetzt bei

      sudo apt update?

      kein Support per PN! - Fragen im Forum stellen - es gibt fast nichts, was nicht auch für andere interessant ist.

      Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

      der Installationsfixer: curl -fsL https://iobroker.net/fix.sh | bash -

      L 1 Antwort Letzte Antwort
      0
      • L luder

        Hallo,

        ich bekomme beim Start die Meldung:
        Betriebssystem-Paket-Updates verfügbar
        Einige Betriebssystempakete können aktualisiert werden.

        Darunter ist dann eine ziemlich lange Liste, siehe unten.

        Ich habe dann ein Update meines Linux System gemacht
        sudo apt update
        sudo apt dist-upgrade
        sudo reboot

        aber die Meldung kommt immer noch. Muss ich noch etwas anderes aktualisieren?
        Bin leider kein Linux Experte.

        base-files/stable 12.4+deb12u6 amd64 [upgradable from: 12.4]
        bash/stable 5.2.15-2+b7 amd64 [upgradable from: 5.2.15-2+b2]
        bind9-dnsutils/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
        bind9-host/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
        bind9-libs/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
        bsdextrautils/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        bsdutils/stable,stable-security 1:2.38.1-5+deb12u1 amd64 [upgradable from: 1:2.38.1-5+b1]
        dbus-bin/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
        dbus-daemon/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
        dbus-session-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
        dbus-system-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
        dbus/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
        debian-archive-keyring/stable 2023.3+deb12u1 all [upgradable from: 2023.3]
        debianutils/stable 5.7-0.5~deb12u1 amd64 [upgradable from: 5.7-0.4]
        distro-info-data/stable 0.58+deb12u2 all [upgradable from: 0.58]
        fdisk/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        gir1.2-gdkpixbuf-2.0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
        gir1.2-rsvg-2.0/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
        inetutils-telnet/stable 2:2.4-2+deb12u1 amd64 [upgradable from: 2:2.4-2]
        krb5-locales/stable 1.20.1-2+deb12u1 all [upgradable from: 1.20.1-2]
        less/stable,stable-security 590-2.1~deb12u2 amd64 [upgradable from: 590-2]
        libarchive13/stable,stable-security 3.6.2-1+deb12u1 amd64 [upgradable from: 3.6.2-1]
        libblkid-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        libblkid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        libc-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
        libc-dev-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
        libc-l10n/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
        libc6-dev/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
        libc6/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
        libcryptsetup12/stable 2:2.6.1-4~deb12u2 amd64 [upgradable from: 2:2.6.1-4~deb12u1]
        libdbus-1-3/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
        libdbus-1-dev/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
        libfdisk1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        libfreetype-dev/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
        libfreetype6/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
        libgdk-pixbuf-2.0-0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
        libgdk-pixbuf-2.0-dev/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
        libgdk-pixbuf2.0-bin/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
        libgdk-pixbuf2.0-common/stable 2.42.10+dfsg-1+deb12u1 all [upgradable from: 2.42.10+dfsg-1]
        libglib2.0-0/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
        libglib2.0-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
        libglib2.0-data/stable 2.74.6-2+deb12u3 all [upgradable from: 2.74.6-2]
        libglib2.0-dev-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
        libglib2.0-dev/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
        libgnutls30/stable 3.7.9-2+deb12u3 amd64 [upgradable from: 3.7.9-2]
        libgssapi-krb5-2/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
        libisl23/stable 0.25-1.1 amd64 [upgradable from: 0.25-1]
        libk5crypto3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
        libkrb5-3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
        libkrb5support0/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
        libmount-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        libmount1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        libnftables1/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
        libnghttp2-14/stable,stable-security 1.52.0-1+deb12u1 amd64 [upgradable from: 1.52.0-1]
        libnss-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
        libpam-modules-bin/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
        libpam-modules/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
        libpam-runtime/stable 1.5.2-6+deb12u1 all [upgradable from: 1.5.2-6]
        libpam-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
        libpam0g-dev/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
        libpam0g/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
        libperl5.36/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
        libpython3.11-minimal/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
        libpython3.11-stdlib/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
        librsvg2-2/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
        librsvg2-common/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
        librsvg2-dev/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
        libseccomp2/stable 2.5.4-1+deb12u1 amd64 [upgradable from: 2.5.4-1+b3]
        libsmartcols1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        libssl3/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
        libsystemd-shared/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
        libsystemd0/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
        libtiff-dev/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
        libtiff6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
        libtiffxx6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
        libudev-dev/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
        libudev1/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
        libuuid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        libuv1/stable,stable-security 1.44.2-1+deb12u1 amd64 [upgradable from: 1.44.2-1]
        libwbclient0/stable,stable-security 2:4.17.12+dfsg-0+deb12u1 amd64 [upgradable from: 2:4.17.8+dfsg-2]
        libwebp-dev/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
        libwebp7/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
        libwebpdemux2/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
        libwebpmux3/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
        libx11-6/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
        libx11-data/stable,stable-security 2:1.8.4-2+deb12u2 all [upgradable from: 2:1.8.4-2+deb12u1]
        libx11-dev/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
        libxml2/stable 2.9.14+dfsg-1.3~deb12u1 amd64 [upgradable from: 2.9.14+dfsg-1.2]
        linux-libc-dev/stable 6.1.94-1 amd64 [upgradable from: 6.1.37-1]
        locales/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
        mount/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
        nano/stable 7.2-1+deb12u1 amd64 [upgradable from: 7.2-1]
        nftables/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
        openssh-client/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
        openssh-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
        openssh-sftp-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
        openssl/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
        perl-base/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
        perl-modules-5.36/stable 5.36.0-7+deb12u1 all [upgradable from: 5.36.0-7]
        perl/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
        
        CodierknechtC Offline
        CodierknechtC Offline
        Codierknecht
        Developer Most Active
        schrieb am zuletzt editiert von Codierknecht
        #3

        @luder

        sudo apt update
        sudo apt full-upgrade
        sudo reboot
        

        "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." (Martin Fowler, "Refactoring")

        Proxmox 9.1.1 LXC|8 GB|Core i7-6700
        HmIP|ZigBee|Tasmota|Unifi
        Zabbix Certified Specialist
        Konnte ich Dir helfen? Dann benutze bitte das Voting unten rechts im Beitrag

        L 1 Antwort Letzte Antwort
        1
        • HomoranH Homoran

          @luder sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

          Ich habe dann ein Update meines Linux System gemacht
          sudo apt update

          was kommt jetzt bei

          sudo apt update?

          L Offline
          L Offline
          luder
          schrieb am zuletzt editiert von Homoran
          #4

          @homoran sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

          sudo apt update

          root@cloneV01:~# sudo apt update
          Hit:1 http://security.debian.org bookworm-security InRelease
          Hit:2 http://deb.debian.org/debian bookworm InRelease                              
          Hit:3 http://deb.debian.org/debian bookworm-updates InRelease                      
          Hit:4 https://deb.nodesource.com/node_22.x nodistro InRelease                      
          Reading package lists... Done                                
          Building dependency tree... Done
          Reading state information... Done
          All packages are up to date.
          

          MOD-EDIT: Code in code-tags gesetzt!

          HomoranH CodierknechtC 2 Antworten Letzte Antwort
          0
          • L luder

            @homoran sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

            sudo apt update

            root@cloneV01:~# sudo apt update
            Hit:1 http://security.debian.org bookworm-security InRelease
            Hit:2 http://deb.debian.org/debian bookworm InRelease                              
            Hit:3 http://deb.debian.org/debian bookworm-updates InRelease                      
            Hit:4 https://deb.nodesource.com/node_22.x nodistro InRelease                      
            Reading package lists... Done                                
            Building dependency tree... Done
            Reading state information... Done
            All packages are up to date.
            

            MOD-EDIT: Code in code-tags gesetzt!

            HomoranH Nicht stören
            HomoranH Nicht stören
            Homoran
            Global Moderator Administrators
            schrieb am zuletzt editiert von
            #5

            @luder ja, da ist nichts mehr.

            Mal den admin refresht und Browsercache geleert?

            kein Support per PN! - Fragen im Forum stellen - es gibt fast nichts, was nicht auch für andere interessant ist.

            Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

            der Installationsfixer: curl -fsL https://iobroker.net/fix.sh | bash -

            L 1 Antwort Letzte Antwort
            0
            • CodierknechtC Codierknecht

              @luder

              sudo apt update
              sudo apt full-upgrade
              sudo reboot
              
              L Offline
              L Offline
              luder
              schrieb am zuletzt editiert von Homoran
              #6

              @codierknecht sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

              @luder

              sudo apt update
              sudo apt full-upgrade
              sudo reboot
              

              dann kommt dieses, der Fehler bleibt aber bestehen nach reboot

              root@cloneV01:~# sudo apt update
              Hit:1 http://security.debian.org bookworm-security InRelease
              Hit:2 http://deb.debian.org/debian bookworm InRelease                              
              Hit:3 http://deb.debian.org/debian bookworm-updates InRelease                      
              Hit:4 https://deb.nodesource.com/node_22.x nodistro InRelease                      
              Reading package lists... Done                                
              Building dependency tree... Done
              Reading state information... Done
              All packages are up to date.
              root@cloneV01:~# sudo apt full-upgrade
              Reading package lists... Done
              Building dependency tree... Done
              Reading state information... Done
              Calculating upgrade... Done
              0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
              

              MOD-EDIT: Code in code-tags gesetzt!

              HomoranH 1 Antwort Letzte Antwort
              0
              • L luder

                @codierknecht sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                @luder

                sudo apt update
                sudo apt full-upgrade
                sudo reboot
                

                dann kommt dieses, der Fehler bleibt aber bestehen nach reboot

                root@cloneV01:~# sudo apt update
                Hit:1 http://security.debian.org bookworm-security InRelease
                Hit:2 http://deb.debian.org/debian bookworm InRelease                              
                Hit:3 http://deb.debian.org/debian bookworm-updates InRelease                      
                Hit:4 https://deb.nodesource.com/node_22.x nodistro InRelease                      
                Reading package lists... Done                                
                Building dependency tree... Done
                Reading state information... Done
                All packages are up to date.
                root@cloneV01:~# sudo apt full-upgrade
                Reading package lists... Done
                Building dependency tree... Done
                Reading state information... Done
                Calculating upgrade... Done
                0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
                

                MOD-EDIT: Code in code-tags gesetzt!

                HomoranH Nicht stören
                HomoranH Nicht stören
                Homoran
                Global Moderator Administrators
                schrieb am zuletzt editiert von
                #7

                @luder warum als root?

                kein Support per PN! - Fragen im Forum stellen - es gibt fast nichts, was nicht auch für andere interessant ist.

                Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

                der Installationsfixer: curl -fsL https://iobroker.net/fix.sh | bash -

                MartinPM 1 Antwort Letzte Antwort
                1
                • HomoranH Homoran

                  @luder warum als root?

                  MartinPM Online
                  MartinPM Online
                  MartinP
                  schrieb am zuletzt editiert von
                  #8

                  @homoran und warum dann zusätzlich mit sudo...

                  Intel(R) Celeron(R) CPU N3000 @ 1.04GHz 8G RAM 480G SSD
                  Virtualization : unprivileged lxc container (debian 12 on Proxmox 8.4.14)
                  Linux pve 6.8.12-16-pve
                  6 GByte RAM für den Container
                  Fritzbox 6591 FW 8.03 (Vodafone Leih-Box)
                  Remote-Access über Wireguard der Fritzbox

                  HomoranH 1 Antwort Letzte Antwort
                  0
                  • HomoranH Homoran

                    @luder ja, da ist nichts mehr.

                    Mal den admin refresht und Browsercache geleert?

                    L Offline
                    L Offline
                    luder
                    schrieb am zuletzt editiert von
                    #9

                    @homoran sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                    @luder ja, da ist nichts mehr.

                    Mal den admin refresht und Browsercache geleert?

                    Browser cache habe ich gelöscht und einen anderen Browser probiert, leider ohne Erfolg.
                    Was meinst du mit admin refresht?

                    1 Antwort Letzte Antwort
                    0
                    • MartinPM MartinP

                      @homoran und warum dann zusätzlich mit sudo...

                      HomoranH Nicht stören
                      HomoranH Nicht stören
                      Homoran
                      Global Moderator Administrators
                      schrieb am zuletzt editiert von
                      #10

                      @martinp sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                      @homoran und warum dann zusätzlich mit sudo...

                      weil ich immer davon ausgehe dass niemand als root durchs System pflügt

                      kein Support per PN! - Fragen im Forum stellen - es gibt fast nichts, was nicht auch für andere interessant ist.

                      Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

                      der Installationsfixer: curl -fsL https://iobroker.net/fix.sh | bash -

                      1 Antwort Letzte Antwort
                      1
                      • L luder

                        @homoran sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                        sudo apt update

                        root@cloneV01:~# sudo apt update
                        Hit:1 http://security.debian.org bookworm-security InRelease
                        Hit:2 http://deb.debian.org/debian bookworm InRelease                              
                        Hit:3 http://deb.debian.org/debian bookworm-updates InRelease                      
                        Hit:4 https://deb.nodesource.com/node_22.x nodistro InRelease                      
                        Reading package lists... Done                                
                        Building dependency tree... Done
                        Reading state information... Done
                        All packages are up to date.
                        

                        MOD-EDIT: Code in code-tags gesetzt!

                        CodierknechtC Offline
                        CodierknechtC Offline
                        Codierknecht
                        Developer Most Active
                        schrieb am zuletzt editiert von
                        #11

                        @luder
                        Man fummelt grundsätzlich nicht als "root" im System rum!

                        "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." (Martin Fowler, "Refactoring")

                        Proxmox 9.1.1 LXC|8 GB|Core i7-6700
                        HmIP|ZigBee|Tasmota|Unifi
                        Zabbix Certified Specialist
                        Konnte ich Dir helfen? Dann benutze bitte das Voting unten rechts im Beitrag

                        S 1 Antwort Letzte Antwort
                        1
                        • MartinPM Online
                          MartinPM Online
                          MartinP
                          schrieb am zuletzt editiert von
                          #12

                          @codierknecht Hast Du Dir auch für die PVE Shell einen normalen User eingerichtet?

                          In den Proxmox Foren wird das kontrovers diskutiert....

                          Intel(R) Celeron(R) CPU N3000 @ 1.04GHz 8G RAM 480G SSD
                          Virtualization : unprivileged lxc container (debian 12 on Proxmox 8.4.14)
                          Linux pve 6.8.12-16-pve
                          6 GByte RAM für den Container
                          Fritzbox 6591 FW 8.03 (Vodafone Leih-Box)
                          Remote-Access über Wireguard der Fritzbox

                          CodierknechtC 1 Antwort Letzte Antwort
                          0
                          • MartinPM MartinP

                            @codierknecht Hast Du Dir auch für die PVE Shell einen normalen User eingerichtet?

                            In den Proxmox Foren wird das kontrovers diskutiert....

                            CodierknechtC Offline
                            CodierknechtC Offline
                            Codierknecht
                            Developer Most Active
                            schrieb am zuletzt editiert von
                            #13

                            @martinp sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                            Hast Du Dir auch für die PVE Shell einen normalen User eingerichtet?

                            Jepp. Kontrovers hin oder her. Im LXC für ioB arbeite ich nur mit dem normalen User - ohne irgendwelche Probleme.

                            Anders sieht das bei Docker aus. Aber davon ist ja hier keine Rede.

                            "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." (Martin Fowler, "Refactoring")

                            Proxmox 9.1.1 LXC|8 GB|Core i7-6700
                            HmIP|ZigBee|Tasmota|Unifi
                            Zabbix Certified Specialist
                            Konnte ich Dir helfen? Dann benutze bitte das Voting unten rechts im Beitrag

                            MartinPM 1 Antwort Letzte Antwort
                            0
                            • CodierknechtC Codierknecht

                              @martinp sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                              Hast Du Dir auch für die PVE Shell einen normalen User eingerichtet?

                              Jepp. Kontrovers hin oder her. Im LXC für ioB arbeite ich nur mit dem normalen User - ohne irgendwelche Probleme.

                              Anders sieht das bei Docker aus. Aber davon ist ja hier keine Rede.

                              MartinPM Online
                              MartinPM Online
                              MartinP
                              schrieb am zuletzt editiert von
                              #14

                              @codierknecht Nein es geht mir um die Shell von Proxmox selber. In dem LXC von Iobroker und auch den meisten anderen Containern und VMs bin ich als normaler User mit sudo für die Updates unterwegs

                              Intel(R) Celeron(R) CPU N3000 @ 1.04GHz 8G RAM 480G SSD
                              Virtualization : unprivileged lxc container (debian 12 on Proxmox 8.4.14)
                              Linux pve 6.8.12-16-pve
                              6 GByte RAM für den Container
                              Fritzbox 6591 FW 8.03 (Vodafone Leih-Box)
                              Remote-Access über Wireguard der Fritzbox

                              CodierknechtC T 2 Antworten Letzte Antwort
                              0
                              • MartinPM MartinP

                                @codierknecht Nein es geht mir um die Shell von Proxmox selber. In dem LXC von Iobroker und auch den meisten anderen Containern und VMs bin ich als normaler User mit sudo für die Updates unterwegs

                                CodierknechtC Offline
                                CodierknechtC Offline
                                Codierknecht
                                Developer Most Active
                                schrieb am zuletzt editiert von
                                #15

                                @martinp
                                Na, dann machen wir das dann doch so ziemlich gleich ;-)
                                In die Shell von Proxmox muss ich ja fast nie ... außer für die Updates.

                                "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." (Martin Fowler, "Refactoring")

                                Proxmox 9.1.1 LXC|8 GB|Core i7-6700
                                HmIP|ZigBee|Tasmota|Unifi
                                Zabbix Certified Specialist
                                Konnte ich Dir helfen? Dann benutze bitte das Voting unten rechts im Beitrag

                                1 Antwort Letzte Antwort
                                0
                                • MartinPM MartinP

                                  @codierknecht Nein es geht mir um die Shell von Proxmox selber. In dem LXC von Iobroker und auch den meisten anderen Containern und VMs bin ich als normaler User mit sudo für die Updates unterwegs

                                  T Offline
                                  T Offline
                                  TT-Tom
                                  schrieb am zuletzt editiert von
                                  #16

                                  @martinp

                                  In der normalen Shell habe ich auch ein Normalo. Aber an der Oberfläche meldet man sich doch eh als Root an und schiebt die Updates auch darüber an. Habe den Normalo bzw. Die Shell habe ich so noch nicht gebraucht.

                                  Gruß Tom
                                  https://github.com/tt-tom17
                                  Wenn meine Hilfe erfolgreich war, benutze bitte das Voting unten rechts im Beitrag

                                  NSPanel Script Wiki
                                  https://github.com/joBr99/nspanel-lovelace-ui/wiki

                                  NSPanel Adapter Wiki
                                  https://github.com/ticaki/ioBroker.nspanel-lovelace-ui/wiki

                                  CodierknechtC 1 Antwort Letzte Antwort
                                  0
                                  • T TT-Tom

                                    @martinp

                                    In der normalen Shell habe ich auch ein Normalo. Aber an der Oberfläche meldet man sich doch eh als Root an und schiebt die Updates auch darüber an. Habe den Normalo bzw. Die Shell habe ich so noch nicht gebraucht.

                                    CodierknechtC Offline
                                    CodierknechtC Offline
                                    Codierknecht
                                    Developer Most Active
                                    schrieb am zuletzt editiert von
                                    #17

                                    @tt-tom sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                                    an der Oberfläche meldet man sich doch eh als Root an

                                    An welcher "Oberfläche"?

                                    "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." (Martin Fowler, "Refactoring")

                                    Proxmox 9.1.1 LXC|8 GB|Core i7-6700
                                    HmIP|ZigBee|Tasmota|Unifi
                                    Zabbix Certified Specialist
                                    Konnte ich Dir helfen? Dann benutze bitte das Voting unten rechts im Beitrag

                                    T 1 Antwort Letzte Antwort
                                    0
                                    • CodierknechtC Codierknecht

                                      @tt-tom sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                                      an der Oberfläche meldet man sich doch eh als Root an

                                      An welcher "Oberfläche"?

                                      T Offline
                                      T Offline
                                      TT-Tom
                                      schrieb am zuletzt editiert von
                                      #18

                                      @codierknecht von proxmox

                                      Gruß Tom
                                      https://github.com/tt-tom17
                                      Wenn meine Hilfe erfolgreich war, benutze bitte das Voting unten rechts im Beitrag

                                      NSPanel Script Wiki
                                      https://github.com/joBr99/nspanel-lovelace-ui/wiki

                                      NSPanel Adapter Wiki
                                      https://github.com/ticaki/ioBroker.nspanel-lovelace-ui/wiki

                                      1 Antwort Letzte Antwort
                                      1
                                      • L luder

                                        Hallo,

                                        ich bekomme beim Start die Meldung:
                                        Betriebssystem-Paket-Updates verfügbar
                                        Einige Betriebssystempakete können aktualisiert werden.

                                        Darunter ist dann eine ziemlich lange Liste, siehe unten.

                                        Ich habe dann ein Update meines Linux System gemacht
                                        sudo apt update
                                        sudo apt dist-upgrade
                                        sudo reboot

                                        aber die Meldung kommt immer noch. Muss ich noch etwas anderes aktualisieren?
                                        Bin leider kein Linux Experte.

                                        base-files/stable 12.4+deb12u6 amd64 [upgradable from: 12.4]
                                        bash/stable 5.2.15-2+b7 amd64 [upgradable from: 5.2.15-2+b2]
                                        bind9-dnsutils/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
                                        bind9-host/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
                                        bind9-libs/stable,stable-security 1:9.18.24-1 amd64 [upgradable from: 1:9.18.16-1~deb12u1]
                                        bsdextrautils/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        bsdutils/stable,stable-security 1:2.38.1-5+deb12u1 amd64 [upgradable from: 1:2.38.1-5+b1]
                                        dbus-bin/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
                                        dbus-daemon/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
                                        dbus-session-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
                                        dbus-system-bus-common/stable 1.14.10-1~deb12u1 all [upgradable from: 1.14.6-1]
                                        dbus/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
                                        debian-archive-keyring/stable 2023.3+deb12u1 all [upgradable from: 2023.3]
                                        debianutils/stable 5.7-0.5~deb12u1 amd64 [upgradable from: 5.7-0.4]
                                        distro-info-data/stable 0.58+deb12u2 all [upgradable from: 0.58]
                                        fdisk/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        gir1.2-gdkpixbuf-2.0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
                                        gir1.2-rsvg-2.0/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
                                        inetutils-telnet/stable 2:2.4-2+deb12u1 amd64 [upgradable from: 2:2.4-2]
                                        krb5-locales/stable 1.20.1-2+deb12u1 all [upgradable from: 1.20.1-2]
                                        less/stable,stable-security 590-2.1~deb12u2 amd64 [upgradable from: 590-2]
                                        libarchive13/stable,stable-security 3.6.2-1+deb12u1 amd64 [upgradable from: 3.6.2-1]
                                        libblkid-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        libblkid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        libc-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
                                        libc-dev-bin/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
                                        libc-l10n/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
                                        libc6-dev/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
                                        libc6/stable,stable-security 2.36-9+deb12u7 amd64 [upgradable from: 2.36-9]
                                        libcryptsetup12/stable 2:2.6.1-4~deb12u2 amd64 [upgradable from: 2:2.6.1-4~deb12u1]
                                        libdbus-1-3/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
                                        libdbus-1-dev/stable 1.14.10-1~deb12u1 amd64 [upgradable from: 1.14.6-1]
                                        libfdisk1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        libfreetype-dev/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
                                        libfreetype6/stable 2.12.1+dfsg-5+deb12u3 amd64 [upgradable from: 2.12.1+dfsg-5]
                                        libgdk-pixbuf-2.0-0/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
                                        libgdk-pixbuf-2.0-dev/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
                                        libgdk-pixbuf2.0-bin/stable 2.42.10+dfsg-1+deb12u1 amd64 [upgradable from: 2.42.10+dfsg-1+b1]
                                        libgdk-pixbuf2.0-common/stable 2.42.10+dfsg-1+deb12u1 all [upgradable from: 2.42.10+dfsg-1]
                                        libglib2.0-0/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
                                        libglib2.0-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
                                        libglib2.0-data/stable 2.74.6-2+deb12u3 all [upgradable from: 2.74.6-2]
                                        libglib2.0-dev-bin/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
                                        libglib2.0-dev/stable 2.74.6-2+deb12u3 amd64 [upgradable from: 2.74.6-2]
                                        libgnutls30/stable 3.7.9-2+deb12u3 amd64 [upgradable from: 3.7.9-2]
                                        libgssapi-krb5-2/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
                                        libisl23/stable 0.25-1.1 amd64 [upgradable from: 0.25-1]
                                        libk5crypto3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
                                        libkrb5-3/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
                                        libkrb5support0/stable 1.20.1-2+deb12u1 amd64 [upgradable from: 1.20.1-2]
                                        libmount-dev/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        libmount1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        libnftables1/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
                                        libnghttp2-14/stable,stable-security 1.52.0-1+deb12u1 amd64 [upgradable from: 1.52.0-1]
                                        libnss-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
                                        libpam-modules-bin/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
                                        libpam-modules/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
                                        libpam-runtime/stable 1.5.2-6+deb12u1 all [upgradable from: 1.5.2-6]
                                        libpam-systemd/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
                                        libpam0g-dev/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
                                        libpam0g/stable 1.5.2-6+deb12u1 amd64 [upgradable from: 1.5.2-6]
                                        libperl5.36/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
                                        libpython3.11-minimal/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
                                        libpython3.11-stdlib/stable 3.11.2-6+deb12u2 amd64 [upgradable from: 3.11.2-6]
                                        librsvg2-2/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
                                        librsvg2-common/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
                                        librsvg2-dev/stable,stable-security 2.54.7+dfsg-1~deb12u1 amd64 [upgradable from: 2.54.5+dfsg-1]
                                        libseccomp2/stable 2.5.4-1+deb12u1 amd64 [upgradable from: 2.5.4-1+b3]
                                        libsmartcols1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        libssl3/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
                                        libsystemd-shared/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
                                        libsystemd0/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
                                        libtiff-dev/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
                                        libtiff6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
                                        libtiffxx6/stable,stable-security 4.5.0-6+deb12u1 amd64 [upgradable from: 4.5.0-6]
                                        libudev-dev/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
                                        libudev1/stable 252.26-1~deb12u2 amd64 [upgradable from: 252.6-1]
                                        libuuid1/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        libuv1/stable,stable-security 1.44.2-1+deb12u1 amd64 [upgradable from: 1.44.2-1]
                                        libwbclient0/stable,stable-security 2:4.17.12+dfsg-0+deb12u1 amd64 [upgradable from: 2:4.17.8+dfsg-2]
                                        libwebp-dev/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
                                        libwebp7/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
                                        libwebpdemux2/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
                                        libwebpmux3/stable,stable-security 1.2.4-0.2+deb12u1 amd64 [upgradable from: 1.2.4-0.2]
                                        libx11-6/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
                                        libx11-data/stable,stable-security 2:1.8.4-2+deb12u2 all [upgradable from: 2:1.8.4-2+deb12u1]
                                        libx11-dev/stable,stable-security 2:1.8.4-2+deb12u2 amd64 [upgradable from: 2:1.8.4-2+deb12u1]
                                        libxml2/stable 2.9.14+dfsg-1.3~deb12u1 amd64 [upgradable from: 2.9.14+dfsg-1.2]
                                        linux-libc-dev/stable 6.1.94-1 amd64 [upgradable from: 6.1.37-1]
                                        locales/stable,stable-security 2.36-9+deb12u7 all [upgradable from: 2.36-9]
                                        mount/stable,stable-security 2.38.1-5+deb12u1 amd64 [upgradable from: 2.38.1-5+b1]
                                        nano/stable 7.2-1+deb12u1 amd64 [upgradable from: 7.2-1]
                                        nftables/stable 1.0.6-2+deb12u2 amd64 [upgradable from: 1.0.6-2]
                                        openssh-client/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
                                        openssh-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
                                        openssh-sftp-server/stable-security 1:9.2p1-2+deb12u3 amd64 [upgradable from: 1:9.2p1-2]
                                        openssl/stable 3.0.13-1~deb12u1 amd64 [upgradable from: 3.0.9-1]
                                        perl-base/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
                                        perl-modules-5.36/stable 5.36.0-7+deb12u1 all [upgradable from: 5.36.0-7]
                                        perl/stable 5.36.0-7+deb12u1 amd64 [upgradable from: 5.36.0-7]
                                        
                                        F Offline
                                        F Offline
                                        Frawu
                                        schrieb am zuletzt editiert von
                                        #19

                                        @luder Hi,
                                        konntest Du das Problem lösen? Bei mir sieht es genauso aus.

                                        Meister MopperM 1 Antwort Letzte Antwort
                                        0
                                        • F Frawu

                                          @luder Hi,
                                          konntest Du das Problem lösen? Bei mir sieht es genauso aus.

                                          Meister MopperM Abwesend
                                          Meister MopperM Abwesend
                                          Meister Mopper
                                          schrieb am zuletzt editiert von
                                          #20

                                          @frawu sagte in Betriebssystem-Paket-Updates, Linux ist auf neustem Stand:

                                          @luder Hi,
                                          konntest Du das Problem lösen? Bei mir sieht es genauso aus.

                                          Wie sieht dein System aus? Was sagt das logging?

                                          Proxmox und HA

                                          RaspiUserR 1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen


                                          Support us

                                          ioBroker
                                          Community Adapters
                                          Donate

                                          595

                                          Online

                                          32.5k

                                          Benutzer

                                          81.6k

                                          Themen

                                          1.3m

                                          Beiträge
                                          Community
                                          Impressum | Datenschutz-Bestimmungen | Nutzungsbedingungen | Einwilligungseinstellungen
                                          ioBroker Community 2014-2025
                                          logo
                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Ungelesen 0
                                          • Kategorien
                                          • Unreplied
                                          • Beliebt
                                          • GitHub
                                          • Docu
                                          • Hilfe