Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 15 Jan 2008 07:18:06 +0100
From:      Norman Maurer <norman@apache.org>
To:        zbigniew szalbot <zbigniew@szalbot.homedns.org>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: newest security patch and custom kernel
Message-ID:  <1200377886.6647.3.camel@norman-laptop>
In-Reply-To: <478C4C94.8080504@szalbot.homedns.org>
References:  <478C4C94.8080504@szalbot.homedns.org>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help
Hi,

the /usr/src/sys* stuff should be patched anyway. But you need to build
your kernel again and install it to reflect the changes. Even if i think
it only update the -p10 label in the case of -p10 patch set.

cheers
Norman


Am Dienstag, den 15.01.2008, 07:03 +0100 schrieb zbigniew szalbot:
> Hello,
> 
> Using freebsd-update I applied the latest security patches which were 
> announced yesterday. However, I then notice this message:
> 
> The following files will be updated as part of updating to 6.2-RELEASE-p10:
> /boot/GENERIC/kernel
> 
> My question is whether my update missed the point because I have a 
> custom kernel? If so, do I need to apply it manually as described in the 
> security advisory? If I still want to go down the binary road, how can I 
> make sure my custom kernel gets patched, too?
> 
> Thank you very much!
> 
> Zbigniew Szalbot
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?1200377886.6647.3.camel>