From owner-freebsd-stable Sun Sep 9 18:29:54 2001 Delivered-To: freebsd-stable@freebsd.org Received: from obsecurity.dyndns.org (adsl-63-207-60-54.dsl.lsan03.pacbell.net [63.207.60.54]) by hub.freebsd.org (Postfix) with ESMTP id 42D1F37B407 for ; Sun, 9 Sep 2001 18:29:51 -0700 (PDT) Received: by obsecurity.dyndns.org (Postfix, from userid 1000) id C0DA666E6C; Sun, 9 Sep 2001 18:29:50 -0700 (PDT) Date: Sun, 9 Sep 2001 18:29:50 -0700 From: Kris Kennaway To: "David W. Chapman Jr." Cc: Eugene Grosbein , John Polstra , stable@FreeBSD.ORG Subject: Re: Update to fix CVSup timestamp bug Message-ID: <20010909182950.A23485@xor.obsecurity.org> References: <3B9C1597.3AECEB52@svzserv.kemerovo.su> <20010909202349.A47851@leviathan.inethouston.net> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-md5; protocol="application/pgp-signature"; boundary="SUOF0GtieIMvvwua" Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <20010909202349.A47851@leviathan.inethouston.net>; from dwcjr@inethouston.net on Sun, Sep 09, 2001 at 08:23:49PM -0500 Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG --SUOF0GtieIMvvwua Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun, Sep 09, 2001 at 08:23:49PM -0500, David W. Chapman Jr. wrote: > On Mon, Sep 10, 2001 at 09:21:27AM +0800, Eugene Grosbein wrote: > > > I have fixed the bug and have released a new snapshot of CVSup, > > > SNAP_16_1d. I have also created binary packages for FreeBSD-4.x which > > > can be installed using "pkg_add". For information about updating your > > > CVSup installation, look here: > >=20 > > Please issue an announcement about your plans of creating binary packag= es > > for FreeBSD 3.5, will such package be released or not? > >=20 > Just curious, are there still changes and updates being done to 3.5? =20 > I know its not supported anymore atleast by ports. Only remotely exploitable security holes (not locally exploitable ones), and we'll stop doing even that at some unspecified point in the future. It's in end-of-life mode. Kris --SUOF0GtieIMvvwua Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7nBeOWry0BWjoQKURAgGeAJ9RHMmHtNMmScDfE1CaK481xwrWmgCfQg0d RiSoq+NJE2bxtr/ZD4hV8C4= =GACb -----END PGP SIGNATURE----- --SUOF0GtieIMvvwua-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message