Hello! On Mon, 25 Jul 2016 at 15:22:22 (+0000), FreeBSD Security Advisories wrote:
[...] > 3) To update your vulnerable system via a source code patch: > The following patches have been verified to apply to the applicable > FreeBSD release branches. > a) Download the relevant patch from the location below, and verify the > detached PGP signature using your PGP utility. > # fetch https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch > # fetch https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch.asc > # gpg --verify bspatch.patch.asc fetch: https://security.FreeBSD.org/patches/SA-16:25/bspatch.patch: Not Found > b) Apply the patch. Execute the following commands as root: > # cd /usr/src > # patch < /path/to/patch > c) Recompile the operating system using buildworld and installworld as > described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. [...] -- George L. Yermulnik [YZ-RIPE] _______________________________________________ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"