Date: Mon, 25 Jul 2016 19:08:57 +0300 From: "George L. Yermulnik" <yz@yz.kiev.ua> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-16:25.bspatch Message-ID: <20160725160857.GF63000@yz.kiev.ua> In-Reply-To: <20160725152222.C6BF71447@freefall.freebsd.org> References: <20160725152222.C6BF71447@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello! On Mon, 25 Jul 2016 at 15:22:22 (+0000), FreeBSD Security Advisories wrote: [...] > 3) To update your vulnerable system via a source code patch: > The following patches have been verified to apply to the applicable > FreeBSD release branches. > a) Download the relevant patch from the location below, and verify the > detached PGP signature using your PGP utility. > # fetch https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch > # fetch https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch.asc > # gpg --verify bspatch.patch.asc fetch: https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch: Not Found > b) Apply the patch. Execute the following commands as root: > # cd /usr/src > # patch < /path/to/patch > c) Recompile the operating system using buildworld and installworld as > described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. [...] -- George L. Yermulnik [YZ-RIPE]
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20160725160857.GF63000>