diff --git a/website/content/en/portmgr/policies_eol.adoc b/website/content/en/portmgr/policies_eol.adoc index 1ab393bdfb..a488347214 100644 --- a/website/content/en/portmgr/policies_eol.adoc +++ b/website/content/en/portmgr/policies_eol.adoc @@ -1,77 +1,77 @@ --- title: "Ports and Packages for Supported Releases" sidenav: about --- include::shared/en/urls.adoc[] = Ports and Packages for Supported Releases Support of FreeBSD releases by ports and the ports infrastructure currently matches the link:../../security/#sup[policies set out by the FreeBSD Security Officer]. Once a major branch X reaches its EOL date, the "last known good" ports tree will be tagged with the `RELEASE_X_EOL` tag as a convenience to those remaining users who intend to self-support their installations. This tag is not supported in any way and security fixes will not be applied. Usage is therefore highly discouraged and should only be used if there is no other option; consumers are expected to provide their own support. For all supported major src branches, all ports will be included in an automated quality assurance procedure which will build, install, package, and deinstall each port on all link:{committers-guide}#AEN1259[Tier 1 platforms]. Maintainers and committers are notified of failures detected during testing. Ports that are known not to build or run on a given supported branch and/or platform will be marked as such. Prebuilt binary packages will also be provided for all major branches and Tier 1 platforms and will be made available via https://www.freebsd.org/cgi/man.cgi?query=pkg&sektion=8[pkg(8)]. Package builds will use the oldest supported minor release within each major branch to ensure ABI and KBI backwards compatibility within each major branch, and support all minor versions of each major branch, including `-RELEASE` and `-STABLE`. The current package sets and estimated lifetimes of the currently supported branches are given below. The _Estimated EoL (end-of-life)_ column gives the earliest date on which that branch is likely to be dropped. [.tblbasic] [width="100%",cols="20%,20%,20%,20%,20%",options="header",] |=== |Branch |Release |Package Branch |Package Set |Estimated EoL -|stable/13 |n/a |releng/13.2 | |January 31, 2026 +|stable/13 |n/a |releng/13.2 | |April 30, 2026 |releng/13.2 |13.2-RELEASE |releng/13.2 a| * FreeBSD:13:aarch64 * FreeBSD:13:amd64 * FreeBSD:13:armv6 * FreeBSD:13:armv7 * FreeBSD:13:i386 * FreeBSD:13:powerpc (only quarterly is updated) * FreeBSD:13:powerpc64 (only quarterly is updated) * FreeBSD:13:powerpc64le (only quarterly is updated) |June 5, 2024 |releng/13.3 |13.3-RELEASE |releng/13.3 a| * FreeBSD:13:aarch64 * FreeBSD:13:amd64 * FreeBSD:13:armv6 * FreeBSD:13:armv7 * FreeBSD:13:i386 * FreeBSD:13:powerpc (only quarterly is updated) * FreeBSD:13:powerpc64 (only quarterly is updated) * FreeBSD:13:powerpc64le (only quarterly is updated) |13.4-RELEASE + 3 months |stable/14 |n/a |releng/14.0 | |November 30, 2028 |releng/14.0 |14.0-RELEASE |releng/14.0 a| * FreeBSD:14:aarch64 * FreeBSD:14:amd64 * FreeBSD:14:armv6 * FreeBSD:14:armv7 * FreeBSD:14:i386 * FreeBSD:14:powerpc (only quarterly is updated) * FreeBSD:14:powerpc64 (only quarterly is updated) * FreeBSD:14:powerpc64le (only quarterly is updated) |14.1-RELEASE + 3 months |main |n/a |main a| * FreeBSD:15:aarch64 * FreeBSD:15:amd64 * FreeBSD:15:armv7 * FreeBSD:15:powerpc * FreeBSD:15:powerpc64 * FreeBSD:15:powerpc64le |Best Effort |=== Older releases are not maintained; ports and packages may not be able to install or run. Users are strongly encouraged to upgrade to one of the supported releases mentioned above. diff --git a/website/content/en/security/_index.adoc b/website/content/en/security/_index.adoc index 2cc4595c58..ee5c2debb1 100644 --- a/website/content/en/security/_index.adoc +++ b/website/content/en/security/_index.adoc @@ -1,120 +1,120 @@ --- title: "FreeBSD Security Information" sidenav: support --- include::shared/en/urls.adoc[] include::shared/releases.adoc[] = FreeBSD Security Information == Introduction FreeBSD takes security very seriously and its developers are constantly working on making the operating system as secure as possible. This page will provide information about what to do in the event of a security vulnerability affecting your system == Table of Contents * <> * <> * <> * <> * <> * <> [[reporting]] == Reporting FreeBSD security incidents FreeBSD security issues specific to the base system should be reported via email to the mailto:secteam@FreeBSD.org[FreeBSD Security Team] or, if a higher level of confidentiality is required, via PGP encrypted email to the mailto:security-officer@FreeBSD.org[Security Officer Team] using the link:so_public_key.asc[Security Officer PGP key]. Additional information can be found at the link:reporting/[reporting FreeBSD security incidents] page. [[when-reporting]] == When is a Security Advisory considered? For every issue that gets reported, an internal tracking number is created, unless something is very obviously not a security issue. To determine whether or not a Security Advisory is warranted we use the following scheme: * Is it a privilege escalation vulnerability? * Is it a code injection vulnerability? * Is it a memory disclosure or dataleak vulnerability? ** From either the kernel ** From a privileged process ** From a process owned by another user? * Is it a Denial of Service vulnerability? ** Only when remotely exploitable, where remotely means that it comes from a different broadcast domain, so ARP and/or NDP based attacks do not qualify. * Is it an unassisted jailbreak vulnerability? * Is it a malfunction that could lead to generating insecure crypto keys, such as a PRNG bug? For items that fall under these categories, a Security Advisory is very likely. Items that are not on this list are looked into individually and it will be determined then whether or not it will receive a Security Advisory or an Errata Notice. Once it had been determined that a Security Advisory is warranted, either the submitter delivers a CVE number if he/she already requested one, or we use one from the FreeBSD pool available. [[recent]] == Recent FreeBSD security vulnerabilities A full list of all security vulnerabilities affecting the base system can be found link:advisories[on this page]. A full list of all other errata affecting the base system can be found link:notices[on this page]. [[advisories]] == Understanding FreeBSD security advisories Advisories affecting the base system are sent to the following mailing lists: * FreeBSD-security-notifications@FreeBSD.org * FreeBSD-security@FreeBSD.org * FreeBSD-announce@FreeBSD.org The list of released advisories can be found on the link:advisories[FreeBSD Security Advisories] page. Advisories are always signed using the FreeBSD Security Officer link:so_public_key.asc[PGP key] and are archived, along with their associated patches, at the https://security.FreeBSD.org web server in the https://security.FreeBSD.org/advisories/[advisories] and https://security.FreeBSD.org/patches/[patches] subdirectories. The FreeBSD Security Officer provides security advisories for _-STABLE Branches_ and the _Security Branches_. (Advisories are not issued for the _-CURRENT Branch_, which is primarily oriented towards FreeBSD developers.) * The -STABLE branch tags have names like `stable/13`. The corresponding builds have names like `FreeBSD 13.2-STABLE`. * Each FreeBSD Release has an associated Security Branch. The Security Branch tags have names like `releng/13.2`. The corresponding builds have names like `FreeBSD 13.2-RELEASE-p1`. Issues affecting the FreeBSD Ports Collection are covered separately in https://vuxml.FreeBSD.org/[the FreeBSD VuXML document]. Errata affecting the base system but not classified as security vulnerabilities are covered separately on the link:notices[FreeBSD Errata Notices] page. [[how]] == How to update your system For users that have previously installed a binary version of FreeBSD (e.g., {rel131-current} or {rel123-current}), commands: `# freebsd-update fetch` `# freebsd-update install` If that fails, follow the other instructions in the security advisory you care about. Note that the above procedure is only for users who have previously installed a binary distribution. Those who have built from source will need to update their source tree to upgrade. For more details, read link:{handbook}cutting-edge/#freebsdupdate-security-patches[how to apply security patches]. [[sup]] == Supported FreeBSD releases Each release is supported by the Security Officer for a limited time only. The designation and expected lifetime of all currently supported branches and their respective releases are given below. The _Expected EoL (end-of-life)_ column indicates the earliest date on which support for that branch or release will end. Please note that these dates may be pushed back if circumstances warrant it. link:unsupported[Older releases] are not supported and users are strongly encouraged to upgrade to one of these supported releases: [.tblbasic] [cols=",,,",options="header",] |=== |Branch |Release |Release Date |Expected EoL |stable/14 |n/a |n/a |November 30, 2028 |releng/14.0 |14.0-RELEASE |November 20, 2023 |14.1-RELEASE + 3 months -|stable/13 |n/a |n/a |January 31, 2026 +|stable/13 |n/a |n/a |April 30, 2026 |releng/13.3 |13.3-RELEASE |March 5, 2024 |13.4-RELEASE + 3 months |releng/13.2 |13.2-RELEASE |April 11, 2023 |June 30, 2024 |=== In the run-up to a release, a number of -BETA and -RC releases may be published for testing purposes. These releases are only supported for a few weeks, as resources permit, and will not be listed as supported on this page. Users are strongly discouraged from running these releases on production systems. [[model]] == The FreeBSD support model Under the current support model, each major version's stable branch is explicitly supported for 5 years, while each individual point release is only supported for three months after the next point release. The details and rationale behind this model can be found in the https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html[official announcement] sent in February 2015.