From owner-freebsd-security Mon Mar 18 13: 6:18 2002 Delivered-To: freebsd-security@freebsd.org Received: from lariat.org (lariat.org [12.23.109.2]) by hub.freebsd.org (Postfix) with ESMTP id D506837B427 for ; Mon, 18 Mar 2002 13:05:53 -0800 (PST) Received: from lariat.lariat.org (IDENT:ppp0.lariat.org@lariat.org [12.23.109.2]) by lariat.org (8.9.3/8.9.3) with ESMTP id OAA26863 for ; Mon, 18 Mar 2002 14:05:49 -0700 (MST) X-message-flag: Warning! Use of Microsoft Outlook may make your system susceptible to Internet worms and other "malware." Message-Id: <4.3.2.7.2.20020318140524.00e5bd60@nospam.lariat.org> X-Sender: brett@nospam.lariat.org X-Mailer: QUALCOMM Windows Eudora Version 4.3.2 Date: Mon, 18 Mar 2002 14:05:41 -0700 To: security@FreeBSD.ORG From: Brett Glass Subject: Re: FreeBSD Ports Security Advisory FreeBSD-SA-02:18.zlib Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org At 09:52 AM 3/18/2002, Chris Faulhaber wrote: >You mean like the 4.5 security branch (RELENG_4_5)? I don't use CVS on production machines (nor should one do so; it's not a good idea to rebuild a production machine's code nightly). What I really need is a stream of patches -- or, failing that, builds that I can install seamlessly as updates. It'd be nice to track ports and packages, too, as the majority of security holes actually occur there. --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message