Skip site navigation (1)Skip section navigation (2)
Date:      19 Nov 2003 09:31:40 -0500
From:      Lowell Gilbert <freebsd-questions-local@be-well.ilk.org>
To:        "Kevin McKay" <kevin@dhap.com>
Cc:        questions@FreeBSD.org
Subject:   Re: Security question
Message-ID:  <44fzgk4egj.fsf@be-well.ilk.org>
In-Reply-To: <000801c3ae5b$44595cf0$0599a440@linuxops.com>
References:  <000801c3ae5b$44595cf0$0599a440@linuxops.com>

next in thread | previous in thread | raw e-mail | index | archive | help
"Kevin McKay" <kevin@dhap.com> writes:

> I have read through the documentation but have not been able to find
> a definite answer. I am running a pretty core install of 5.1 minimal
> + bind9, postfix, apache, ssh, no ports collection. Here is my
> question. When I run the binary update from sysinstall will that
> take care of the earlier ssh vulnerability and update apache postfix
> and bind to the most current version?

You normally need to run the sysinstall from the version you're
updating to.  You could configure your system's sysinstall to load in
the later version, and it should be compatible, but I don't know the
syntax for that offhand...



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44fzgk4egj.fsf>