Date: Tue, 01 Dec 2009 14:12:02 +0100 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Alex Huth <a.huth@tmr.net> Cc: freebsd-security@freebsd.org Subject: Re: Upcoming FreeBSD Security Advisory Message-ID: <86skbuet3x.fsf@ds4.des.no> In-Reply-To: <20091201111627.GC4920@borusse.borussiapark> (Alex Huth's message of "Tue, 1 Dec 2009 12:16:27 %2B0100") References: <200912010120.nB11Kjm9087476@freefall.freebsd.org> <ov3Jq1IJ/c8KAXGQ501G8Os9xr8@Ll2tHa60cb%2BhiG8R4R8/VS21128> <20091201111627.GC4920@borusse.borussiapark>
next in thread | previous in thread | raw e-mail | index | archive | help
Alex Huth <a.huth@tmr.net> writes: > I am new to patching systems, so forgive "stupid" questions. We have > some 6.1 systems. Are or will there be a patch for them or are they > not involved in this problem? Support for 6.1 ended one and a half years ago (almost to the day), so no to the first part of your question. As to the second: yes, 6.1 is most likely affected. There is a good chance (but no guarantee) that the patch for 6.3 will apply cleanly on 6.1. The security advisory will contain instructions on how to apply and deploy the patch. > How do i apply such a patch? With freebsd-update? As far as i know is > this tool only for systems >=3D 6.3 or? freebsd-update will work on 6.3 since 6.3 is still supported (until the end of January). DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86skbuet3x.fsf>