Date: Tue, 16 Sep 2014 13:25:29 -0400 From: "R. Scott Evans" <freebsd-security@rsle.net> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:19.tcp Message-ID: <54187289.8030604@rsle.net> In-Reply-To: <20140916164257.GA1277@faust.sbb.rs> References: <20140916164257.GA1277@faust.sbb.rs>
next in thread | previous in thread | raw e-mail | index | archive | help
On 09/16/14 12:42, Zoran Kolic wrote: >> The advisory solution offers 3 options... freebsd-update is the binary >> approach (option #3) that provides you a new updated generic kernel >> already compiled. If you aren't using a generic kernel or want to patch >> and recompile your own, then you would use the option #2. > > Hm! I use custom kernel. Here is what I did using > freebsd-update: > I fetched and installed. Then I recompiled the kernel. > Did I miss the security patch doing this? > > Zoran Unfortunately, I don't think your custom kernel got the patch. In your case you will want to follow option 2 with: " a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. # fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch # fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch.asc # gpg --verify tcp.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in http://www.FreeBSD.org/handbook/kernelconfig.html and reboot the system. " -scott
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54187289.8030604>