Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Jan 2008 17:01:15 +0000
From:      "P Bielecki" <pawciobiel@gmail.com>
To:        freebsd-ports@freebsd.org
Subject:   Re: packages with security vulnerabilities
Message-ID:  <2e420cc20801210901k1e15fdep55b4829551114d50@mail.gmail.com>
In-Reply-To: <479375C0.30507@FreeBSD.org>
References:  <2e420cc20801200650q19ed0d03h38a3152b26f22643@mail.gmail.com> <479375C0.30507@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Jan 20, 2008 4:24 PM, Kris Kennaway <kris@freebsd.org> wrote:
> Packages are built continuously and as fast as possible.  Which package
> sets do you feel are being updated too slowly?
>
> Kris
>

Kris,
I am just curious how it works.
Was concern about packages with security updates mostly;
maybe perl, mod_perl, php5, Apache22 and possibly few from mail/ as
well, what do you think?

I think I was trying to find analogy to Debian's security APT updates
which actually haven't been using for quite a while now.

Thanks,
Paul



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2e420cc20801210901k1e15fdep55b4829551114d50>