[Dev] [News] Hyperbola users are now mitigated against Microarchitectural Data Sampling (MDS) vulnerabilities

Nelson H. F. Beebe beebe at math.utah.edu
Sat May 18 03:51:46 EEST 2019

Thanks to André Silva for a recipe that finally fixed my
invalid-signing-key problem that was blocking pacman updates.

I ran these steps (as root):

	rm -rf /etc/pacman.d/gnupg
	pacman-key --init
	pacman-key --populate hyperbola arch
	pacman-key --refresh-keys

	cp /etc/pacman.conf /etc/pacman.conf.good

	vi /etc/pacman.conf
	[Change to SigLevel = Never]

	pacman -S --asdeps hyperbola-keyring

	cp /etc/pacman.conf.good /etc/pacman.conf

	pacman -S --asdeps hyperbola-keyring

	pacman -Syu


My system is now at current update levels, and I've recorded those
rescue steps in local notes for use if the problem ever reappears.

They might rate a FAQ or Hyperbola User Manual entry.

- Nelson H. F. Beebe                    Tel: +1 801 581 5254                  -
- University of Utah                    FAX: +1 801 581 4148                  -
- Department of Mathematics, 110 LCB    Internet e-mail: beebe at math.utah.edu  -
- 155 S 1400 E RM 233                       beebe at acm.org  beebe at computer.org -
- Salt Lake City, UT 84112-0090, USA    URL: http://www.math.utah.edu/~beebe/ -

More information about the Dev mailing list