Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 16 Nov 2024 10:45:22 -0800
From:      Kevin Oberman <rkoberman@gmail.com>
To:        "freebsd-questions@freebsd.org" <questions@freebsd.org>
Subject:   Unable to update to 14.1-p6
Message-ID:  <CAN6yY1stBxS5OVeLpZyzBKn%2B=b_jqFqtRsYM1Zx16OC3DWBu8A@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
--000000000000fa736706270c16ac
Content-Type: text/plain; charset="UTF-8"

I am running 14.1-p5 and get a daily message that I have a kernel security
vulnerability:
Checking for security vulnerabilities in base (userland & kernel):
Fetching vuln.xml.xz: .......... done
FreeBSD-kernel-14.1_5 is vulnerable:
  FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer
  CVE: CVE-2024-39281
  WWW:
https://vuxml.FreeBSD.org/freebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html
But attempts to use freebsd-update don't update to p6.
# freebsd-update fetch
src component not installed, skipped
Looking up update.FreeBSD.org mirrors... 3 mirrors found.
Fetching metadata signature for 14.1-RELEASE from update1.freebsd.org...
done.
Fetching metadata index... done.
Inspecting system... done.
Preparing to download files... done.

No updates needed to update system to 14.1-RELEASE-p6.
# freebsd-update install
src component not installed, skipped
No updates are available to install.
Run 'freebsd-update [options] fetch' first.

I am baffled. A reboot leaves me at p5, but I can't seem to get p6 as
freebsd-update seems to think it's already installed, but freebsd-version
shows:
# freebsd-version -kur
14.1-RELEASE-p5
14.1-RELEASE-p5
14.1-RELEASE-p6

I could pull down the kernel sources and build it, but that should not be
needed.
-- 
Kevin Oberman, Part time kid herder and retired Network Engineer
E-mail: rkoberman@gmail.com
PGP Fingerprint: D03FB98AFA78E3B78C1694B318AB39EF1B055683

--000000000000fa736706270c16ac
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div style=3D"font-family:tahoma,sans-serif;font-size=
:small" class=3D"gmail_default">I am running 14.1-p5 and get a daily messag=
e that I have a kernel security vulnerability:<br></div>Checking for securi=
ty vulnerabilities in base (userland &amp; kernel):<br>
Fetching vuln.xml.xz: .......... done<br>
FreeBSD-kernel-14.1_5 is vulnerable:<br>
=C2=A0 FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer<br>
=C2=A0 CVE: CVE-2024-39281<br>
=C2=A0 WWW: <a href=3D"https://vuxml.FreeBSD.org/freebsd/8caa5d60-a174-11ef=
-9a62-002590c1f29c.html" rel=3D"noreferrer" target=3D"_blank">https://vuxml=
.FreeBSD.org/freebsd/8caa5d60-a174-11ef-9a62-002590c1f29c.html</a><br>
</div><div style=3D"font-family:tahoma,sans-serif;font-size:small" class=3D=
"gmail_default">But attempts to use freebsd-update don&#39;t update to p6.<=
/div><div style=3D"font-family:tahoma,sans-serif;font-size:small" class=3D"=
gmail_default"># freebsd-update fetch<br>src component not installed, skipp=
ed<br>Looking up <a href=3D"http://update.FreeBSD.org">update.FreeBSD.org</=
a> mirrors... 3 mirrors found.<br>Fetching metadata signature for 14.1-RELE=
ASE from update1.freebsd.org... done.<br>Fetching metadata index... done.<b=
r>Inspecting system... done.<br>Preparing to download files... done.<br><br=
>No updates needed to update system to 14.1-RELEASE-p6.</div><div style=3D"=
font-family:tahoma,sans-serif;font-size:small" class=3D"gmail_default"># fr=
eebsd-update install<br>src component not installed, skipped<br>No updates =
are available to install.<br>Run &#39;freebsd-update [options] fetch&#39; f=
irst.</div><div style=3D"font-family:tahoma,sans-serif;font-size:small" cla=
ss=3D"gmail_default"><br></div><div style=3D"font-family:tahoma,sans-serif;=
font-size:small" class=3D"gmail_default">I am baffled. A reboot leaves me a=
t p5, but I can&#39;t seem to get p6 as freebsd-update seems to think it&#3=
9;s already installed, but freebsd-version shows:</div><div style=3D"font-f=
amily:tahoma,sans-serif;font-size:small" class=3D"gmail_default"># freebsd-=
version -kur<br>14.1-RELEASE-p5<br>14.1-RELEASE-p5<br>14.1-RELEASE-p6</div>=
<div style=3D"font-family:tahoma,sans-serif;font-size:small" class=3D"gmail=
_default"><br></div><div style=3D"font-family:tahoma,sans-serif;font-size:s=
mall" class=3D"gmail_default">I could pull down the kernel sources and buil=
d it, but that should not be needed.<br></div><span class=3D"gmail_signatur=
e_prefix">-- </span><br><div dir=3D"ltr" class=3D"gmail_signature" data-sma=
rtmail=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div=
 dir=3D"ltr"><div><div dir=3D"ltr">Kevin Oberman, Part time kid herder and =
retired Network Engineer<br>E-mail: <a href=3D"mailto:rkoberman@gmail.com" =
target=3D"_blank">rkoberman@gmail.com</a><br></div><div>PGP Fingerprint: D0=
3FB98AFA78E3B78C1694B318AB39EF1B055683</div></div></div></div></div></div><=
/div></div></div>

--000000000000fa736706270c16ac--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAN6yY1stBxS5OVeLpZyzBKn%2B=b_jqFqtRsYM1Zx16OC3DWBu8A>