Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 01 Dec 2009 14:12:02 +0100
From:      =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>
To:        Alex Huth <a.huth@tmr.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Upcoming FreeBSD Security Advisory
Message-ID:  <86skbuet3x.fsf@ds4.des.no>
In-Reply-To: <20091201111627.GC4920@borusse.borussiapark> (Alex Huth's message of "Tue, 1 Dec 2009 12:16:27 %2B0100")
References:  <200912010120.nB11Kjm9087476@freefall.freebsd.org> <ov3Jq1IJ/c8KAXGQ501G8Os9xr8@Ll2tHa60cb%2BhiG8R4R8/VS21128> <20091201111627.GC4920@borusse.borussiapark>

next in thread | previous in thread | raw e-mail | index | archive | help
Alex Huth <a.huth@tmr.net> writes:
> I am new to patching systems, so forgive "stupid" questions. We have
> some 6.1 systems. Are or will there be a patch for them or are they
> not involved in this problem?

Support for 6.1 ended one and a half years ago (almost to the day), so
no to the first part of your question.  As to the second: yes, 6.1 is
most likely affected.

There is a good chance (but no guarantee) that the patch for 6.3 will
apply cleanly on 6.1.  The security advisory will contain instructions
on how to apply and deploy the patch.

> How do i apply such a patch? With freebsd-update? As far as i know is
> this tool only for systems >=3D 6.3 or?

freebsd-update will work on 6.3 since 6.3 is still supported (until the
end of January).

DES
--=20
Dag-Erling Sm=C3=B8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86skbuet3x.fsf>