Date: Tue, 10 Jul 2001 12:18:43 -0400 From: "Drew Derbyshire" <ahd@kew.com> To: <security-advisories@FreeBSD.org> Cc: <freebsd-stable@freebsd.org> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-01: Message-ID: <00c601c1095b$fd4bed10$94cba8c0@xena> References: <200107101402.f6AE2MU63568@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Has this been added to the 4.3 security release branch, if not could it be please? > V. Solution > > One of the following: > > 1) Upgrade your vulnerable FreeBSD system to 4.3-STABLE after the > correction date. > > 2) To patch your present system: download the relevant patch from the > below location, and execute the following commands as root: > > [FreeBSD 4.1, 4.2, and 4.3 base systems] > > This patch has been verified to apply to FreeBSD 4.1, 4.2, and 4.3 only. > It may or may not apply to older releases. > > # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch > # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch.asc > > Verify the detached PGP signature using your PGP utility. > > # cd /usr/src/sys/kern > # patch -p < /path/to/patch > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00c601c1095b$fd4bed10$94cba8c0>