We are using openVZ on Debian Etch, and are going to start some virtalized production servers.

We are using precompiled 2.6.18 openVZ kernel packages, either from download.openvz.org/debian or debian.systs.org repositories, currently:

linux-image-2.6.18-fza-028stab051.1-686 (from debian.systs.org)
linux-image-2.6.18-openvz-18-51.3d2-686 (from openvz.org)

Question is: how are these packages security-maintained ? Are all security-related Debian updates backported to them ?

If not, what is the recommended way to maintain a production kernel ? getting the latest Debian Etch source, applying an openVZ patch (which ?) and manually compile ?

By the way, what is the naming scheme for these packages ? The version suffix appears quite unclear, so identifying the latest version is quite difficult. The most effective solution appears to manually read the modification time of the files on the repository, which is not very convenient.

--
Ce message a ete verifie par MailScanner
pour des virus ou des polluriels et rien de
suspect n'a ete trouve.

_______________________________________________
Users mailing list
[email protected]
https://openvz.org/mailman/listinfo/users

Reply via email to