From owner-freebsd-questions@FreeBSD.ORG Mon Feb 16 23:22:33 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 284116CC for ; Mon, 16 Feb 2015 23:22:33 +0000 (UTC) Received: from plane.gmane.org (plane.gmane.org [80.91.229.3]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D3F39173 for ; Mon, 16 Feb 2015 23:22:32 +0000 (UTC) Received: from list by plane.gmane.org with local (Exim 4.69) (envelope-from ) id 1YNUzk-0000S8-Fz for freebsd-questions@freebsd.org; Tue, 17 Feb 2015 00:22:29 +0100 Received: from 63-245-179-205.ip.mtelco.net ([63-245-179-205.ip.mtelco.net]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Tue, 17 Feb 2015 00:22:28 +0100 Received: from jgoerzen by 63-245-179-205.ip.mtelco.net with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Tue, 17 Feb 2015 00:22:28 +0100 X-Injected-Via-Gmane: http://gmane.org/ To: freebsd-questions@freebsd.org From: John Goerzen Subject: Re: pkg audit finds updates, but pkg upgrade doesn't Date: Mon, 16 Feb 2015 23:22:21 +0000 (UTC) Lines: 29 Message-ID: References: <20150216224753.73143297@curlew.lan> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Complaints-To: usenet@ger.gmane.org X-Gmane-NNTP-Posting-Host: sea.gmane.org User-Agent: Loom/3.14 (http://gmane.org/) X-Loom-IP: 63.245.179.205 (Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.4.0) X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Feb 2015 23:22:33 -0000 Mike Clarke milibyte.co.uk> writes: > > xorg-server was modified on Thursday Feb 12th at 19:58:41 to fix this > vulnerability > > . > The latest package builds started on Wednesday 11th > and > . It looks like they all > used snapshots from before the new version was available except for > 84i386-default and 84amd64-default. The next package build should start > in a couple of days time on Wednesday 18th. > Ah, ok, so packages are built once a week then? What do people do when they want their security updates faster, if they were using packages instead of ports primarily? I suppose one could install the port, but then wouldn't that typically pull in a lot of development dependencies that might not otherwise have been needed on a system? In my particular case, I do have /usr/ports installed but didn't use it for this. I'm not super-worried about this particular issue, but in general, what's the right way to proceed? Thanks, John