Displaying 20 results from an estimated 1100 matches similar to: "FreeBSD supported branches update"
2010 Feb 04
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect the EoL (end-of-life) of FreeBSD 6.3. The new list is below
and at <URL: http://security.freebsd.org/ >.
Users of FreeBSD 6.3 are advised to upgrade promptly to a newer release,
either by downloading an updated source tree and building updates
2010 Feb 04
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect the EoL (end-of-life) of FreeBSD 6.3. The new list is below
and at <URL: http://security.freebsd.org/ >.
Users of FreeBSD 6.3 are advised to upgrade promptly to a newer release,
either by downloading an updated source tree and building updates
2010 Apr 01
0
HEADS UP: FreeBSD 7.2 EoL coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On June 30th, FreeBSD 7.2 will reach its End of Life and will no longer be
supported by the FreeBSD Security Team. Users of this release are strongly
encouraged to upgrade to FreeBSD 7.3 before that date; FreeBSD 7.3 will be
supported until the end of March 2012. Please note that since FreeBSD 7.1
has been designated for
2010 Apr 01
0
HEADS UP: FreeBSD 7.2 EoL coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On June 30th, FreeBSD 7.2 will reach its End of Life and will no longer be
supported by the FreeBSD Security Team. Users of this release are strongly
encouraged to upgrade to FreeBSD 7.3 before that date; FreeBSD 7.3 will be
supported until the end of March 2012. Please note that since FreeBSD 7.1
has been designated for
2011 Mar 01
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated to
reflect the EoL (end-of-life) of FreeBSD 7.1. The new list of supported
branches is below and at < http://security.freebsd.org/ >.
Users of FreeBSD 7.1 are advised to upgrade promptly to a newer release (most
likely the recently announced FreeBSD 7.4)
2011 Mar 01
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated to
reflect the EoL (end-of-life) of FreeBSD 7.1. The new list of supported
branches is below and at < http://security.freebsd.org/ >.
Users of FreeBSD 7.1 are advised to upgrade promptly to a newer release (most
likely the recently announced FreeBSD 7.4)
2009 Apr 01
0
HEADS UP: FreeBSD 7.0 EoL coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On April 30th, FreeBSD 7.0 will reach its End of Life and will no longer be
supported by the FreeBSD Security Team. Users of FreeBSD 7.0 are strongly
encouraged to upgrade to FreeBSD 7.1 before that date.
Note that the End of Life date for FreeBSD 7.0 was originally announced as
being February 28, but was delayed by two months in
2009 Apr 01
0
HEADS UP: FreeBSD 7.0 EoL coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On April 30th, FreeBSD 7.0 will reach its End of Life and will no longer be
supported by the FreeBSD Security Team. Users of FreeBSD 7.0 are strongly
encouraged to upgrade to FreeBSD 7.1 before that date.
Note that the End of Life date for FreeBSD 7.0 was originally announced as
being February 28, but was delayed by two months in
2010 Jan 06
0
FreeBSD Security Advisory FreeBSD-SA-10:03.zfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-10:03.zfs Security Advisory
The FreeBSD Project
Topic: ZFS ZIL playback with insecure permissions
Category: contrib
Module: zfs
Announced:
2010 Dec 01
0
FreeBSD supported branches update
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated to
reflect the EoL (end-of-life) of FreeBSD 6.4 and FreeBSD 8.0. Since FreeBSD
6.4 was the last remaining supported release from the FreeBSD 6.x stable
branch, support for the FreeBSD 6.x stable branch has also ended. The new
list of supported branches is below and at < http://security.freebsd.org/ >.
2010 Dec 01
0
FreeBSD supported branches update
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated to
reflect the EoL (end-of-life) of FreeBSD 6.4 and FreeBSD 8.0. Since FreeBSD
6.4 was the last remaining supported release from the FreeBSD 6.x stable
branch, support for the FreeBSD 6.x stable branch has also ended. The new
list of supported branches is below and at < http://security.freebsd.org/ >.
2008 Jun 03
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect recent EoL (end-of-life) events. The new list is below and
at <URL: http://security.freebsd.org/ >. FreeBSD 5.5, FreeBSD 6.1, and
FreeBSD 6.2 have `expired' and are no longer supported effective June 1,
2008. Users of these releases are
2008 Jun 03
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect recent EoL (end-of-life) events. The new list is below and
at <URL: http://security.freebsd.org/ >. FreeBSD 5.5, FreeBSD 6.1, and
FreeBSD 6.2 have `expired' and are no longer supported effective June 1,
2008. Users of these releases are
2008 Jun 03
0
FreeBSD supported branches update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
The branches supported by the FreeBSD Security Officer have been updated
to reflect recent EoL (end-of-life) events. The new list is below and
at <URL: http://security.freebsd.org/ >. FreeBSD 5.5, FreeBSD 6.1, and
FreeBSD 6.2 have `expired' and are no longer supported effective June 1,
2008. Users of these releases are
2011 Dec 23
1
FreeBSD Security Advisory FreeBSD-SA-11:09.pam_ssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-11:09.pam_ssh Security Advisory
The FreeBSD Project
Topic: pam_ssh improperly grants access when user account has
unencrypted SSH private keys
2008 Apr 01
0
HEADS UP: FreeBSD 5.5, 6.1, and 6.2 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On May 31st, FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 will have reached
their End of Life and will no longer be supported by the FreeBSD Security
Team. Since FreeBSD 5.5 is the last remaining supported release from the
FreeBSD 5.x stable branch, support for the FreeBSD 5.x stable branch will
also cease at the same point. Users of
2008 Apr 01
0
HEADS UP: FreeBSD 5.5, 6.1, and 6.2 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On May 31st, FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 will have reached
their End of Life and will no longer be supported by the FreeBSD Security
Team. Since FreeBSD 5.5 is the last remaining supported release from the
FreeBSD 5.x stable branch, support for the FreeBSD 5.x stable branch will
also cease at the same point. Users of
2008 Apr 02
1
freebsd-security Digest, Vol 246, Issue 1
Here's another project for us. We'll want to upgrade to 6.3-RELEASE in May.
On Wed, Apr 2, 2008 at 7:00 AM, <freebsd-security-request@freebsd.org> wrote:
> Send freebsd-security mailing list submissions to
> freebsd-security@freebsd.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>
2009 Dec 01
0
Upcoming FreeBSD Security Advisory
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi all,
A short time ago a "local root" exploit was posted to the full-disclosure
mailing list; as the name suggests, this allows a local user to execute
arbitrary code as root.
Normally it is the policy of the FreeBSD Security Team to not publicly
discuss security issues until an advisory is ready, but in this case
since exploit code is
2009 Jul 08
1
rumours of openssh vulnerability
Hi all,
There are rumours flying around about a supposed vulnerability in OpenSSH. Two
details which I've seen mentioned many times are
(a) that this exploit was used to break into a RedHat system running OpenSSH 4.3
plus backported security patches, and
(b) that "recent" versions of OpenSSH are not affected;
but it's not clear if there is any basis for these rumours.
Given