lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20111206200953.GA9595@pisco.westfalen.local>
Date: Tue, 6 Dec 2011 21:09:53 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2360-1] Two month advance notification for upcoming end-of-life
 for Debian oldstable

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2360-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
December 6, 2011                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

This is an advance notice that security support for Debian GNU/Linux 5.0 
(code name "lenny") will be terminated in two months.

The Debian project released Debian GNU/Linux 6.0 alias "squeeze" on the 
6th of February 2011. Users and distributors have been given a one-year 
timeframe to upgrade their old installations to the current stable 
release. Hence, the security support for the old release of 5.0 is going 
to end on the 6th of February 2012 as previously announced.

Previously announced security updates for the old release will continue 
to be available on security.debian.org.

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk7edjgACgkQXm3vHE4uylqzdgCg5LIpBXVlN13c9QbZ/oX0Trrw
lOkAoIAhSp72pvAD0dQ1IoTqIq3dW2X/
=jC8t
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ