Re: [SECURITY] [DLA 3623-1] linux-5.10 security update

2023-10-19 Thread Andreas Ziegler

Ben Hutchings wrote on 19.10.23 23:24:

-
Debian LTS Advisory DLA-3623-1debian-lts@lists.debian.org
https://www.debian.org/lts/security/Ben Hutchings
October 19, 2023  https://wiki.debian.org/LTS
-

Package: linux-5.10
Version: 5.10.197-1~deb10u1



Hello,

was it intentional that this new build still has a build date of
2023-08-08
the same date as the previous kernel package 
linux-image-5.10.0-0.deb10.24-amd64 ?


Best Regards
Andreas

P.S.:
i'm not on the list, please CC an answer, thanks!


OpenPGP_signature.asc
Description: OpenPGP digital signature


Re: Preparing to announce Squeeze LTS end-of-life

2016-02-09 Thread Andreas Ziegler
Hi,

> Additionally, I think it's fine to handle any updates to Squeeze on a
> consultancy basis, but then not via the official mirrors.

i agree, otherwise people wouldn't upgrade to wheezy at all because
"they will keep fixing the big things in squeeze" - i observe similar
behavior with typo3-upstream users...

Regards

Andreas



Re: End of life for MySQL 5.1

2015-01-22 Thread Andreas Ziegler
Hi,

we use mysql-server and -client on some Debian squeeze machines, but we
don't use any more advanced features like replication.

> - Try to backport fixes based on the 5.5.x interdiffs (since Oracle
>   publishes no detailed bug details). Complicated, but could be done
>   in collaboration with Red Hat, RHEL 6 is also based on MySQL 5.1.

>From my point of view, this would be the best way.
But i think that this would be the option with the most work involved.

Because oft that thought, our 2nd priority would be the backport. We
upgraded some servers to wheezy (and therefore mysql-server-5.5) and had
no problem at all regarding MySQL.

The only negative thing that comes to my mind regarding a 5.5.x-backport
would be, that there might be many squeeze-admins who did the simple
switch to squeeze-lts in sources.list but wouldn't do the work involved
with installing the backport.
kind of a "political" question, whether these people should be supported
in their lazyness..

Regards,
Andreas


Am 21.01.2015 um 08:46 schrieb Moritz Muehlenhoff:
> Hi,
> I just noticed that MySQL 5.1 is now EOLed by Oracle:
> 
> http://www.mysql.com/support/eol-notice.html:
> 
> | Per Oracle's Lifetime Support policy, as of December 31, 2013, MySQL
> | 5.1 is covered under Oracle Sustaining Support.
> 
> As per http://www.mysql.com/support/ this means:
> 
> | No new releases, no new fixes (no error correction for new issues), no new 
> updates
> 
> The mysql derivatives also stopped support for 5.1, e.g. mariadb's
> last 5.1 release is a year old.
> 
> Possible solutions:
> - End of life for mysql in Debian LTS (but massive reverse deps)
> - Provide a backport of 5.5 for squeeze-lts (mysql also ships a lib,
>   though)
> - Try to backport fixes based on the 5.5.x interdiffs (since Oracle
>   publishes no detailed bug details). Complicated, but could be done
>   in collaboration with Red Hat, RHEL 6 is also based on MySQL 5.1.
>   
> Cheers,
> Moritz
> 
> 


-- 
To UNSUBSCRIBE, email to debian-lts-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54c13605.4060...@andreas-ziegler.de



Re: Untrusted versions of packages

2014-10-22 Thread Andreas Ziegler
Hello,

we had this problem too, but only on a few of many servers.
solved by removing cached lists in /var/cache/apt/lists/ and apt-get
update (or aptitude update) again.

we use the http redirector at http.debian.net


> Recently I started to get following errors on my squeeze server while
> using squeeze-lts.
> 
> # apt-get upgrade
> Reading package lists... Done
> Building dependency tree   
> Reading state information... Done
> The following packages will be upgraded:
>   apt apt-utils rsyslog tzdata
> 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
> Need to get 3375 kB of archives.
> After this operation, 344 kB disk space will be freed.
> Do you want to continue [Y/n]? 
> WARNING: The following packages cannot be authenticated!
>   apt tzdata apt-utils rsyslog
> Install these packages without verification [y/N]? 
> E: Some packages could not be authenticated


-- 
To UNSUBSCRIBE, email to debian-lts-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/5447b270.8090...@andreas-ziegler.de



Fwd: [SECURITY] [DSA 2954-1] dovecot security update

2014-06-12 Thread Andreas Ziegler
Hi,

is someone planning to fix that issue in squeeze-backports?

although i read most of the mails on the debian-lts-related mailing
lists and searched the wiki, i couldn't find information on how security
issues with packages in squeeze-backports will be handled.

perhaps worth adding the answer to that there?
https://wiki.debian.org/LTS/FAQ

Regards

Andreas Ziegler


 Original-Nachricht 
Betreff: [SECURITY] [DSA 2954-1] dovecot security update
Weitersenden-Datum: Mon,  9 Jun 2014 18:02:51 + (UTC)
Weitersenden-Von: debian-security-annou...@lists.debian.org
Datum: Mon, 09 Jun 2014 18:02:29 +
Von: Salvatore Bonaccorso 
Antwort an: debian-secur...@lists.debian.org
An: debian-security-annou...@lists.debian.org

-
Debian Security Advisory DSA-2954-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
June 09, 2014  http://www.debian.org/security/faq
-

Package: dovecot
CVE ID : CVE-2014-3430
Debian Bug : 747549

It was discovered that the Dovecot email server is vulnerable to a
denial of service attack against imap/pop3-login processes due to
incorrect handling of the closure of inactive SSL/TLS connections.

For the stable distribution (wheezy), this problem has been fixed in
version 1:2.1.7-7+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 1:2.2.13~rc1-1.

For the unstable distribution (sid), this problem has been fixed in
version 1:2.2.13~rc1-1.

We recommend that you upgrade your dovecot packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org



-- 
To UNSUBSCRIBE, email to debian-lts-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/539a3526.5070...@andreas-ziegler.de