Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Sep 2014 13:25:29 -0400
From:      "R. Scott Evans" <freebsd-security@rsle.net>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-14:19.tcp
Message-ID:  <54187289.8030604@rsle.net>
In-Reply-To: <20140916164257.GA1277@faust.sbb.rs>
References:  <20140916164257.GA1277@faust.sbb.rs>

next in thread | previous in thread | raw e-mail | index | archive | help
On 09/16/14 12:42, Zoran Kolic wrote:
>> The advisory solution offers 3 options... freebsd-update is the binary
>> approach (option #3) that provides you a new updated generic kernel
>> already compiled.  If you aren't using a generic kernel or want to patch
>> and recompile your own, then you would use the option #2.
>
> Hm! I use custom kernel. Here is what I did using
> freebsd-update:
> I fetched and installed. Then I recompiled the kernel.
> Did I miss the security patch doing this?
>
>                         Zoran

Unfortunately, I don't think your custom kernel got the patch.

In your case you will want to follow option 2 with:
"
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch
# fetch http://security.FreeBSD.org/patches/SA-14:19/tcp.patch.asc
# gpg --verify tcp.patch.asc

b) Apply the patch.  Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
http://www.FreeBSD.org/handbook/kernelconfig.html and reboot the
system.
"

-scott



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54187289.8030604>