I'm using FreeBSD-9.1-p5
.
My security run output
:
Checking for packages with security vulnerabilities:
Database fetched: Wed Sep 24 23:01:24 EDT 2014
bash-4.3.24
pkg info bash
:
# pkg info bash
bash-4.3.24
Name : bash
Version : 4.3.24
Installed on : Tue Sep 16 17:17:32 EDT 2014
Origin : shells/bash
Architecture : freebsd:9:x86:64
Prefix : /usr/local
Categories : shells
Licenses : GPLv3
Maintainer : ehaupt@FreeBSD.org
WWW : http://cnswww.cns.cwru.edu/~chet/bash/bashtop.html
Comment : The GNU Project's Bourne Again SHell
Options :
COLONBREAKSWORDS: on
DOCS : on
HELP : on
IMPLICITCD : on
NLS : on
STATIC : off
SYSLOG : off
Shared Libs required:
libintl.so.9
libiconv.so.3
Annotations :
repo_type : binary
repository : FreeBSD
Flat size : 6.65MiB
Description :
This is GNU Bash. Bash is the GNU Project's Bourne Again SHell,
a complete implementation of the POSIX.2 shell spec, but also
with interactive command line editing, job control on architectures
that support it, csh-like features such as history substitution and
brace expansion, and a slew of other features.
WWW: http://cnswww.cns.cwru.edu/~chet/bash/bashtop.html
#
pkg upgrade bash
:
# pkg upgrade bash
Updating FreeBSD repository catalogue...
FreeBSD repository is up-to-date.
All repositories are up-to-date.
Checking integrity... done (0 conflicting)
Your packages are up to date.
#
I'm using pkg(8)
and not /usr/ports
. Does it mean maintainer didn't update package, yet security vulnerabilities list is already up to date?