Debian squeeze (6.0) LTS development

Contribute

You can help in many ways

Report Bugs

Please report bugs that you found in the packages to the debian-lts mailinglist

Preparing fixed packages for squeeze-lts

Claim the issue in lts-needed.txt

In order to prevent duplication of effort, make sure the issue is listed in lts-needed.txt and add your name to it.

Building the update

Backport the fix to the version in squeeze or squeeze-lts (in case there's already been an earlier update). You need to set the target distribution in debian/changelog to "squeeze-lts". The versioning follows the conventions already used in security.debian.org. Historically codenames have been used as version numbers, but this was changed some time ago as version numbers are more deterministic.

Now build the package and run your tests. You can generate a debdiff and post it to debian-lts@lists.debian.org for review.

Now test the fixed package. If you're satisfied, upload to ftp-master. If you use dput-ng, you need to apply the patch from 745806. After that "dput CHANGES file" is sufficient. Once uploaded the package will be auto-built for amd64 or i386 (if it's an arch:any package).

Announcing the update

Now that the update has been released, send a mail to the debian-lts-announce mailing list. The mail needs to be signed by a PGP key in the debian.org or debian-maintainers keyring. Both PGP/MIME and inline signatures should be fine.

 Package        : SOURCEPACKAGENAME
 Version        : VERSIONOFFIX
 CVE ID         : CVE-2014-0001 CVE-2014-0002

 Brief description of the issue. This can usually be copied from the DSA.

Recording the fix in the Debian Security Tracker

Finally the fix needs to be tracked in the Debian Security Tracker by adding a [squeeze] version tag, e.g. for GNUTLS:

CVE-2014-3466
        RESERVED
        {DSA-2944-1}
        - gnutls26 2.12.23-16
        - gnutls28 3.2.15-1
        [squeeze] - gnutls26 2.8.6-1+squeeze4


CategoryLts