User Vivek Gite of nixCraft shows us how to patch up your FreeBSD systems from the recent Meltdown & Spectre vulnerabilities. Head on over to the link below to see the full set of instructions.

All supported versions of FreeBSD affected by Meltdown (CVE-2017-5754), Spectre variant 1 (CVE-2017-5753), and Spectre variant 2 (CVE-2017-5715). How do I patch Meltdown and Spectre vulnerabilities on FreeBSD (speculative execution vulnerabilities) server powered by 64 bit Intel CPU?

Many modern processors have issues that allow unprivileged attackers to bypass user-kernel or memory access restrictions, by exploiting speculative execution and shared resources. Currently, FreeBSD issued patches for Meltdown and Spectre V2.

Steps to patch Meltdown and Spectre vulnerabilities on FreeBSD

Make a backup – it cannot be stressed enough how important it is to make a backup of your system before you do this. Most of the actions listed in this post are written with the assumption that they will be executed by the root user running the bash or any other modern shell. I tested it on FreeBSD 11.x amd64 only.

Step 1 – Find your current FreeBSD version

Full tutorial: https://www.cyberciti.biz/faq/how-to-patch-meltdown-and-spectre-vulnerabilities-on-freebsd/