From owner-freebsd-ports@freebsd.org Thu Oct 10 11:15:30 2019 Return-Path: Delivered-To: freebsd-ports@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D8A6F12F202 for ; Thu, 10 Oct 2019 11:15:30 +0000 (UTC) (envelope-from jbeich@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46ppR65BmHz3GYB; Thu, 10 Oct 2019 11:15:30 +0000 (UTC) (envelope-from jbeich@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1354) id AB43B9205; Thu, 10 Oct 2019 11:15:30 +0000 (UTC) From: Jan Beich To: Kurt Jaeger Cc: freebsd-ports@freebsd.org Subject: Re: [HEADS UP] Binary packages for FreeBSD 11 to require 11.3 soon References: <20191010052243.GA37504@home.opsec.eu> Date: Thu, 10 Oct 2019 13:15:27 +0200 In-Reply-To: <20191010052243.GA37504@home.opsec.eu> (Kurt Jaeger's message of "Thu, 10 Oct 2019 07:22:43 +0200") Message-ID: <8sps-etrk-wny@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Oct 2019 11:15:30 -0000 Kurt Jaeger writes: > Hi! > >> FreeBSD 11.3 was released on 2019-07-09. After adding 3 months support >> overlap it'd be 2019-10-09 (yesterday). > > https://www.freebsd.org/security/security.html#sup > > says that 11.2 is supported until 31.10.2019. Indeed. A few weeks ago it didn't have the exact date. https://web.archive.org/web/20190926111817/https://www.freebsd.org/security/