From nobody Sat Nov 16 18:45:22 2024 X-Original-To: questions@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XrNBL4WnTz5dgmr for ; Sat, 16 Nov 2024 18:45:46 +0000 (UTC) (envelope-from kob6558@gmail.com) Received: from mail-yw1-x1136.google.com (mail-yw1-x1136.google.com [IPv6:2607:f8b0:4864:20::1136]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "WR4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XrNBK2tBFz4WxT for ; Sat, 16 Nov 2024 18:45:45 +0000 (UTC) (envelope-from kob6558@gmail.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20230601 header.b="T//ynL5W"; spf=pass (mx1.freebsd.org: domain of kob6558@gmail.com designates 2607:f8b0:4864:20::1136 as permitted sender) smtp.mailfrom=kob6558@gmail.com; dmarc=pass (policy=none) header.from=gmail.com Received: by mail-yw1-x1136.google.com with SMTP id 00721157ae682-6ee676b4e20so13362647b3.3 for ; Sat, 16 Nov 2024 10:45:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1731782739; x=1732387539; darn=freebsd.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=346hW6L347fDRcBn4Aac2EkXCn41282EjjXftSUrEXs=; b=T//ynL5WSvwcI9NAQJ6iageM3ZVXf9XhNtqMHH6QmY/XjT6IYz/AvL4hN305jh37el /GmmaIFQYjd8TcwhYO6yxDwqxJhkuUps3Zoxc1b6y8xe5IMQ6TlKiVYG/be0dctbnRlH F59R162iuB/3ag/vNa8OwpqkJSGHh7J3nc0wOwi4/kzwsjp5tzD8yKY0UR3uPeiwTRV5 ghU3k4JL4aPRGEMD1i6Q5hZkmRXrcOP3EdE7ZhlPIgCI9h4eHsRczXfbmEIPTqVaJ8jO HBzpqmdU3ndODshvAjj5fCTPz/10JQj7nHYJmPo+U9ZLLn3irMh+YW64S3W79eW1M9py XIzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1731782739; x=1732387539; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=346hW6L347fDRcBn4Aac2EkXCn41282EjjXftSUrEXs=; b=vUaOlxoAaCjcGtlGy9ovrElEgvqS1CvDCYPo4LD5oH23DmYKhRodbO6g1G8iMrVY64 ns8xBxLM5+DpuwRqhOOw4WGTW0FHDuL+hX2o3VIRv/qJ02w9kk/JpKwiSZFHmVaeno0X oDWe5LuR4y+9XcnddWMxeE6cPrm3l+wmFvhKEyMEdkGcTNxPugL6hquyUfzuMNAx3B+/ 7KWRc/qzBxpShg2FpCfhCsMYJv4Q50ZNB+42DW6GGMXHIZWqs+nKGN5kOGtxcR/4X5Ps sMYCHTDokwKqko057TeI93NN4K5MUp6Ji+MvQljd3tWyn+Oi2u6Fnw9H2103VklQyHl3 ogfQ== X-Gm-Message-State: AOJu0YxjvvCmgUw9cQdj75R+It11E1DyQSGYpGZPJbBQqFPTS21umcmm C4We4HkMLExU5V++PcLA+YGVcE7XA3kDCIHniN9Dy7qiWLTVjaRwoARNZtsqZQaLIv8fAHhTx/i GB9qQznDvwhf33h7k8X6crYpU7y64AVYEhI0= X-Google-Smtp-Source: AGHT+IGDowgTu2KCs2YRitvQ6NX68w0/fPGezbnkgM33ELirCacHQLzlu4YQXV7Yl8OSRw3VB8Px/lUVH4KfASeS4Go= X-Received: by 2002:a05:690c:6b11:b0:6ea:e967:81da with SMTP id 00721157ae682-6ee55bee93cmr65677757b3.11.1731782738864; Sat, 16 Nov 2024 10:45:38 -0800 (PST) List-Id: User questions List-Archive: https://lists.freebsd.org/archives/freebsd-questions List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-questions@freebsd.org Sender: owner-freebsd-questions@FreeBSD.org MIME-Version: 1.0 From: Kevin Oberman Date: Sat, 16 Nov 2024 10:45:22 -0800 Message-ID: Subject: Unable to update to 14.1-p6 To: "freebsd-questions@freebsd.org" Content-Type: multipart/alternative; boundary="000000000000fa736706270c16ac" X-Spamd-Result: default: False [-3.48 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.78)[-0.779]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; FORGED_SENDER(0.30)[rkoberman@gmail.com,kob6558@gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20230601]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; RCVD_TLS_LAST(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::1136:from]; MID_RHS_MATCH_FROMTLD(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[questions@freebsd.org]; FROM_NEQ_ENVFROM(0.00)[rkoberman@gmail.com,kob6558@gmail.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MLMMJ_DEST(0.00)[questions@freebsd.org]; RCVD_COUNT_ONE(0.00)[1]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; MISSING_XM_UA(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim] X-Rspamd-Queue-Id: 4XrNBK2tBFz4WxT X-Spamd-Bar: --- --000000000000fa736706270c16ac Content-Type: text/plain; charset="UTF-8" I am running 14.1-p5 and get a daily message that I have a kernel security vulnerability: Checking for security vulnerabilities in base (userland & kernel): Fetching vuln.xml.xz: .......... done FreeBSD-kernel-14.1_5 is vulnerable: FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer CVE: CVE-2024-39281 WWW: https://vuxml.FreeBSD.org/freebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html But attempts to use freebsd-update don't update to p6. # freebsd-update fetch src component not installed, skipped Looking up update.FreeBSD.org mirrors... 3 mirrors found. Fetching metadata signature for 14.1-RELEASE from update1.freebsd.org... done. Fetching metadata index... done. Inspecting system... done. Preparing to download files... done. No updates needed to update system to 14.1-RELEASE-p6. # freebsd-update install src component not installed, skipped No updates are available to install. Run 'freebsd-update [options] fetch' first. I am baffled. A reboot leaves me at p5, but I can't seem to get p6 as freebsd-update seems to think it's already installed, but freebsd-version shows: # freebsd-version -kur 14.1-RELEASE-p5 14.1-RELEASE-p5 14.1-RELEASE-p6 I could pull down the kernel sources and build it, but that should not be needed. -- Kevin Oberman, Part time kid herder and retired Network Engineer E-mail: rkoberman@gmail.com PGP Fingerprint: D03FB98AFA78E3B78C1694B318AB39EF1B055683 --000000000000fa736706270c16ac Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
I am running 14.1-p5 and get a daily messag= e that I have a kernel security vulnerability:
Checking for securi= ty vulnerabilities in base (userland & kernel):
Fetching vuln.xml.xz: .......... done
FreeBSD-kernel-14.1_5 is vulnerable:
=C2=A0 FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer
=C2=A0 CVE: CVE-2024-39281
=C2=A0 WWW: https://vuxml= .FreeBSD.org/freebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html
--000000000000fa736706270c16ac--