How To Get LTS updates for Debian 6 (Squeeze)

Want to support HowtoForge? Become a subscriber!
 
Submitted by till (Contact Author) (Forums) on Tue, 2014-07-01 18:32. :: Debian | Linux | Security

How To Get LTS updates for Debian 6 (Squeeze)

Version 1.0 
Author: Till Brehm<t [dot] brehm [at] howtoforge [dot] com> 
 Follow howtoforge on Twitter
Last edited 2014-07-01

Debian Squeeze (6.0) is the so named "Old Stable" branch of Debian, the official support for this version ended in april 2014. Squeze is still used on many servers, so a group of Debian developers decided to provide security patches for a longer timespan for this release. These so called LTS updates (LTS = Long Term Support) are not available on the normal Debian update repository and not every user might be aware that he wont get these updates automatically. The following short guide explains how to enable the LTS repository and install the updates.

 

Add the new repository

Open the sources.list file with an editor:

vi /etc/apt/sources.list

and add the following 2 lines at the end of the /etc/apt/sources.list file:

 

deb http://ftp.de.debian.org/debian squeeze-lts main contrib non-free
deb-src http://http.debian.net/debian/ squeeze-lts main contrib non-free

 

Please note: The updates are only provided for the i386 and amd64 architectures.

 

Installation of updates

The updates are then installed as usual with apt. Run these commands to update the packagelist and install the updates:

apt-get update
apt-get upgrade

 

Limitations

Not all packages will get security updates. To run a check if unsupported packages are installed on your Server, install the new package "debian-security-support".

apt-get install debian-security-support

A check if unsupprted packages are installed is run every time a package gets installed. You can run the test manually with:

check-support-status

 

Links


Please do not use the comment function to ask for help! If you need help, please use our forum.
Comments will be published after administrator approval.