Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Jan 2008 22:27:40 +0100
From:      Kris Kennaway <kris@FreeBSD.org>
To:        P Bielecki <pawciobiel@gmail.com>
Cc:        freebsd-ports@freebsd.org
Subject:   Re: packages with security vulnerabilities
Message-ID:  <47950E4C.1030104@FreeBSD.org>
In-Reply-To: <2e420cc20801210901k1e15fdep55b4829551114d50@mail.gmail.com>
References:  <2e420cc20801200650q19ed0d03h38a3152b26f22643@mail.gmail.com>	 <479375C0.30507@FreeBSD.org> <2e420cc20801210901k1e15fdep55b4829551114d50@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
P Bielecki wrote:
> On Jan 20, 2008 4:24 PM, Kris Kennaway <kris@freebsd.org> wrote:
>> Packages are built continuously and as fast as possible.  Which package
>> sets do you feel are being updated too slowly?
>>
>> Kris
>>
> 
> Kris,
> I am just curious how it works.
> Was concern about packages with security updates mostly;
> maybe perl, mod_perl, php5, Apache22 and possibly few from mail/ as
> well, what do you think?
> 
> I think I was trying to find analogy to Debian's security APT updates
> which actually haven't been using for quite a while now.

I still don't understand what you claim is the problem :)  We do not 
specially update packages like perl; rather, *every* package is 
frequently rebuilt and updated.

Kris



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?47950E4C.1030104>