FreeBSD Security Advisory FreeBSD-SA-16:16.ntp
Xin Li
delphij at delphij.net
Mon May 2 06:35:49 UTC 2016
On 4/29/16 04:13, gabor at zahemszky.hu wrote:
>> 2) To update your vulnerable system via a binary patch:
>>
>> Systems running a RELEASE version of FreeBSD on the i386 or amd64
>> platforms can be updated via the freebsd-update(8) utility:
>>
>> # freebsd-update fetch
>> # freebsd-update install
>
> Both on an i386 and on an amd64 machine, I got:
>
> ====
> ....
> Fetching metadasa signature for 10.3-RELEASE from update5.freebsd.org...
> done
> Fetching metadata index.... done
>
> The update metadata is correctly signed, but
> failed an integrity check.
> Cowardly refusing to proceed any further.
> ====
>
> Both machines are VM-s, upgraded from 10.2.
>
> (Got the same with -s update[23456].freebsd.org, and without -s option.
There was a nit in the metadata, and this should have been addressed now.
Cheers,
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.freebsd.org/pipermail/freebsd-security/attachments/20160501/d8cfefe3/attachment.sig>
More information about the freebsd-security
mailing list