Date: Thu, 18 Dec 2025 11:29:00 +0100 From: Erichans <erichanskrs@gmail.com> To: freebsd-pkgbase@freebsd.org Subject: December 2025 SA-s and EN-s wrt FreeBSD 15 Message-ID: <CAM9dGPvCqO622U3FhAc_njB8nhDSJRBEWFUXCO6LiOhac6LLhw@mail.gmail.com>
index | next in thread | raw e-mail
With respect to the recent EN-s and SA-s such as: https://lists.freebsd.org/archives/freebsd-announce/2025-December/000217.html I'm a bit surprised wrt to package based FreeBSD 15.0 users. A packaged base FreeBSD 15.0-RELEASE or 15.0-STABLE are officially supported versions. As to stable/15, AFAIK, a main advantage of running a packaged base is that it can be upgraded by binary patches whereas previous versions of stable/xx could only be updated from source. As to 15.0-RELEASE, a packaged base is ideally suited to be binary "pkg-upgrade"-d. I was expecting specific solution options mentioned by means of pkg-upgrading of base packages. Am I missing something here? Eric ___ [1] https://lists.freebsd.org/archives/freebsd-announce/2025-December/000214.html https://lists.freebsd.org/archives/freebsd-announce/2025-December/000215.html and https://lists.freebsd.org/archives/freebsd-announce/2025-December/000217.html >From the last one: ==BEGIN_QUOTE [...] V. Solution Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. Perform one of the following: 1) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms, or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 2) To update your vulnerable system via a source code patch: [...] ==END_QUOTEhelp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAM9dGPvCqO622U3FhAc_njB8nhDSJRBEWFUXCO6LiOhac6LLhw>
