Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 25 Jul 2016 19:08:57 +0300
From:      "George L. Yermulnik" <yz@yz.kiev.ua>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-16:25.bspatch
Message-ID:  <20160725160857.GF63000@yz.kiev.ua>
In-Reply-To: <20160725152222.C6BF71447@freefall.freebsd.org>
References:  <20160725152222.C6BF71447@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hello!

On Mon, 25 Jul 2016 at 15:22:22 (+0000), FreeBSD Security Advisories wrote:

[...]
> 3) To update your vulnerable system via a source code patch:

> The following patches have been verified to apply to the applicable
> FreeBSD release branches.

> a) Download the relevant patch from the location below, and verify the
> detached PGP signature using your PGP utility.

> # fetch https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch
> # fetch https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch.asc
> # gpg --verify bspatch.patch.asc

fetch: https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch: Not Found

> b) Apply the patch.  Execute the following commands as root:

> # cd /usr/src
> # patch < /path/to/patch

> c) Recompile the operating system using buildworld and installworld as
> described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
[...]

-- 
George L. Yermulnik
[YZ-RIPE]



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20160725160857.GF63000>