Date: Mon, 21 Jan 2008 22:27:40 +0100 From: Kris Kennaway <kris@FreeBSD.org> To: P Bielecki <pawciobiel@gmail.com> Cc: freebsd-ports@freebsd.org Subject: Re: packages with security vulnerabilities Message-ID: <47950E4C.1030104@FreeBSD.org> In-Reply-To: <2e420cc20801210901k1e15fdep55b4829551114d50@mail.gmail.com> References: <2e420cc20801200650q19ed0d03h38a3152b26f22643@mail.gmail.com> <479375C0.30507@FreeBSD.org> <2e420cc20801210901k1e15fdep55b4829551114d50@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
P Bielecki wrote: > On Jan 20, 2008 4:24 PM, Kris Kennaway <kris@freebsd.org> wrote: >> Packages are built continuously and as fast as possible. Which package >> sets do you feel are being updated too slowly? >> >> Kris >> > > Kris, > I am just curious how it works. > Was concern about packages with security updates mostly; > maybe perl, mod_perl, php5, Apache22 and possibly few from mail/ as > well, what do you think? > > I think I was trying to find analogy to Debian's security APT updates > which actually haven't been using for quite a while now. I still don't understand what you claim is the problem :) We do not specially update packages like perl; rather, *every* package is frequently rebuilt and updated. Kris
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?47950E4C.1030104>