Date: Sun, 27 Nov 2016 13:33:17 +0300 From: Odhiambo Washington <odhiambo@gmail.com> To: User Questions <freebsd-questions@freebsd.org> Subject: Re: Dealing with (multiple) pkgs with security vulnerabilities. Message-ID: <CAAdA2WNuzMhoJUV4AdJqziRhH8BUdjwLjcpAmrvnmoVV4iuOCg@mail.gmail.com> In-Reply-To: <8660n9utar.wl-herbert@mailbox.org> References: <CAAdA2WMFMYT8ss2DqqdeFWmv5atU3cj7DxYHiPCNBBB_TYxEgw@mail.gmail.com> <868ts5uw17.wl-herbert@mailbox.org> <CAAdA2WO15vE18iCLdL5ukhRmHf1FE5yoFijv_rN=FS5YwZhLPw@mail.gmail.com> <8660n9utar.wl-herbert@mailbox.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 27 November 2016 at 13:10, Herbert J. Skuhra <herbert@mailbox.org> wrote: > Odhiambo Washington wrote: > > > > On 27 November 2016 at 12:11, Herbert J. Skuhra wrote: > >> > >> - you are running a version that is EOL (e.g.: FreeBSD 8.x) > >> > > > > That is so true!! But I also have some servers running 9.3 and 10.3. > Would > > it be different dealing with this situation in 9.3|10.3 ?? > > Sure, 9.3 and 10.3 are still supported but the former will reach EOL > soon: https://www.freebsd.org/security/index.html#sup > > Have a look at <http://pkg.freebsd.org/>: > > This server's package sets: > > FreeBSD:8:i386 (no longer updated) > FreeBSD:8:amd64 (no longer updated) > [...] > Thank you so much. -- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254 7 3200 0004/+254 7 2274 3223 "Oh, the cruft."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAAdA2WNuzMhoJUV4AdJqziRhH8BUdjwLjcpAmrvnmoVV4iuOCg>
