Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 18 Dec 2025 11:29:00 +0100
From:      Erichans <erichanskrs@gmail.com>
To:        freebsd-pkgbase@freebsd.org
Subject:   December 2025 SA-s and EN-s wrt FreeBSD 15
Message-ID:  <CAM9dGPvCqO622U3FhAc_njB8nhDSJRBEWFUXCO6LiOhac6LLhw@mail.gmail.com>

index | next in thread | raw e-mail

With respect to the recent EN-s and SA-s such as:
https://lists.freebsd.org/archives/freebsd-announce/2025-December/000217.html

I'm a bit surprised wrt to package based FreeBSD 15.0 users.

A packaged base FreeBSD 15.0-RELEASE or 15.0-STABLE are
officially supported versions.

As to stable/15, AFAIK, a main advantage of running a
packaged base is that it can be upgraded by binary
patches whereas previous versions of stable/xx could
only be updated from source.

As to 15.0-RELEASE, a packaged base is ideally suited to
be binary "pkg-upgrade"-d.

I was expecting specific solution options mentioned by
means of pkg-upgrading of base packages.

Am I missing something here?


Eric

___
[1]
https://lists.freebsd.org/archives/freebsd-announce/2025-December/000214.html
https://lists.freebsd.org/archives/freebsd-announce/2025-December/000215.html
and
https://lists.freebsd.org/archives/freebsd-announce/2025-December/000217.html

>From the last one:
==BEGIN_QUOTE
  [...]
V.   Solution

Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Perform one of the following:

1) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
or the i386 platform on FreeBSD 13, can be updated via the freebsd-update(8)
utility:

# freebsd-update fetch
# freebsd-update install

2) To update your vulnerable system via a source code patch:
 [...]
==END_QUOTE


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAM9dGPvCqO622U3FhAc_njB8nhDSJRBEWFUXCO6LiOhac6LLhw>