Debian Testing Looking for Security Staff
The free Debian Linux distribution is looking for Security staff for its "testing" branch.
As Nico Golde from the Testing Security Team writes in a message posted on a mailing list, currently just one or two developers are keeping an eye on security in the testing branch. The situation has become more aggravated because one of the team members has been hit by a computer defect.
The Testing Security team aims to achieve a reasonable measure of security for all users who declined the "testing" branch of the Debian distribution on their computers. Typical users include developers who prefer more recent software, but also end users.
Golde emphasizes bent you do not need to be a registered Debian developer to help the security team. The only basic requirements are some working knowledge of security mechanisms and vulnerabilities, familiarity with the Subversion version control system and of course enough time. A security issue occurs every two to three days. In order to find the vulnerability of team traces new input in the CVE Security directory and in Debian’s Bugtracker. The Debian Security Tracker is used to trace vulnerabilities. An introduction to this tool is provided by the "Narrative Introduction" in the Subversion repository.
If you also have programming experience and know-how to build Debian packages, your contribution will definitely be welcome: after all, the Security team creates updated packages with fixes for vulnerabilities.
If you fulfill at least some of these requirements and are interested in an interesting task, you can contact the Testing Security Team via its mailing list. As an alternative contact you can also use the IRC channel "#debian-security" on irc.oftc.net.
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

News
-
Go-Based Botnet Attacking IoT Devices
Using an SSH credential brute-force attack, the Go-based PumaBot is exploiting IoT devices everywhere.
-
Plasma 6.5 Promises Better Memory Optimization
With the stable Plasma 6.4 on the horizon, KDE has a few new tricks up its sleeve for Plasma 6.5.
-
KaOS 2025.05 Officially Qt5 Free
If you're a fan of independent Linux distributions, the team behind KaOS is proud to announce the latest iteration that includes kernel 6.14 and KDE's Plasma 6.3.5.
-
Linux Kernel 6.15 Now Available
The latest Linux kernel is now available with several new features/improvements and the usual bug fixes.
-
Microsoft Makes Surprising WSL Announcement
In a move that might surprise some users, Microsoft has made Windows Subsystem for Linux open source.
-
Red Hat Releases RHEL 10 Early
Red Hat quietly rolled out the official release of RHEL 10.0 a bit early.
-
openSUSE Joins End of 10
openSUSE has decided to not only join the End of 10 movement but it also will no longer support the Deepin Desktop Environment.
-
New Version of Flatpak Released
Flatpak 1.16.1 is now available as the latest, stable version with various improvements.
-
IBM Announces Powerhouse Linux Server
IBM has unleashed a seriously powerful Linux server with the LinuxONE Emperor 5.
-
Plasma Ends LTS Releases
The KDE Plasma development team is doing away with the LTS releases for a good reason.