Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 Jul 2015 10:31:47 +0200
From:      Pietro Cerutti <gahr@FreeBSD.org>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-15:13.tcp
Message-ID:  <daf06b64685db467b724dfcbe75e9545@gahr.ch>
In-Reply-To: <20150722025746.7697C1C34@freefall.freebsd.org>
References:  <20150722025746.7697C1C34@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 2015-07-22 04:57, FreeBSD Security Advisories wrote:

> 2) To update your vulnerable system via a binary patch:
> 
> Systems running a RELEASE version of FreeBSD on the i386 or amd64
> platforms can be updated via the freebsd-update(8) utility:
> 
> # freebsd-update fetch
> # freebsd-update install

Hi, I just updated my system as usual using freebsd-update. I was 
expecting it to require a reboot, since it's touching kernel code, but 
it hasn't. freebsd-version shows 10.1-RELEASE-p15 for both kernel and 
userland. Am I missing something?

Thanks!

-- 
Pietro Cerutti
gahr@FreeBSD.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?daf06b64685db467b724dfcbe75e9545>