Date: 19 Nov 2003 09:31:40 -0500 From: Lowell Gilbert <freebsd-questions-local@be-well.ilk.org> To: "Kevin McKay" <kevin@dhap.com> Cc: questions@FreeBSD.org Subject: Re: Security question Message-ID: <44fzgk4egj.fsf@be-well.ilk.org> In-Reply-To: <000801c3ae5b$44595cf0$0599a440@linuxops.com> References: <000801c3ae5b$44595cf0$0599a440@linuxops.com>
next in thread | previous in thread | raw e-mail | index | archive | help
"Kevin McKay" <kevin@dhap.com> writes: > I have read through the documentation but have not been able to find > a definite answer. I am running a pretty core install of 5.1 minimal > + bind9, postfix, apache, ssh, no ports collection. Here is my > question. When I run the binary update from sysinstall will that > take care of the earlier ssh vulnerability and update apache postfix > and bind to the most current version? You normally need to run the sysinstall from the version you're updating to. You could configure your system's sysinstall to load in the later version, and it should be compatible, but I don't know the syntax for that offhand...
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44fzgk4egj.fsf>