Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Jul 2001 12:18:43 -0400
From:      "Drew Derbyshire" <ahd@kew.com>
To:        <security-advisories@FreeBSD.org>
Cc:        <freebsd-stable@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-01:
Message-ID:  <00c601c1095b$fd4bed10$94cba8c0@xena>
References:  <200107101402.f6AE2MU63568@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Has this been added to the 4.3 security release branch, if not could it be
please?

> V.   Solution
>
> One of the following:
>
> 1) Upgrade your vulnerable FreeBSD system to 4.3-STABLE after the
> correction date.
>
> 2) To patch your present system: download the relevant patch from the
> below location, and execute the following commands as root:
>
> [FreeBSD 4.1, 4.2, and 4.3 base systems]
>
> This patch has been verified to apply to FreeBSD 4.1, 4.2, and 4.3 only.
> It may or may not apply to older releases.
>
> # fetch
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch
> # fetch
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch.asc
>
> Verify the detached PGP signature using your PGP utility.
>
> # cd /usr/src/sys/kern
> # patch -p < /path/to/patch
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00c601c1095b$fd4bed10$94cba8c0>