Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 1 Jan 2026 18:23:55 -0800
From:      Mel P <list_freebsd@bluerosetech.com>
To:        freebsd-security@freebsd.org, FreeBSD Security Advisories <security-advisories@freebsd.org>
Subject:   Did this need a kernel version bump? [Was: Re: FreeBSD Security Advisory FreeBSD-SA-25:11.ipfw]
Message-ID:  <9b881b84-e9b8-96b8-eb6a-8cf6a7fff3db@bluerosetech.com>
In-Reply-To: <20251217010207.1E91EE32B@freefall.freebsd.org>

index | next in thread | previous in thread | raw e-mail

After updating via freebsd-update on my 13.5 systems, I have:

# freebsd-version -kru
13.5-RELEASE-p6
13.5-RELEASE-p6
13.5-RELEASE-p8

However, pkg-base-audit doesn't "see" that the update was applied:

Checking for security vulnerabilities in base (userland & kernel):
vulnxml file up-to-date
FreeBSD-kernel-13.5_6 is vulnerable:
   FreeBSD -- ipfw denial of service
   CVE: CVE-2025-14769
   WWW: 
https://vuxml.FreeBSD.org/freebsd/0b22e22a-dae9-11f0-80b8-bc241121aa0a.html

1 problem(s) in 1 package(s) found.
vulnxml file up-to-date
0 problem(s) in 0 package(s) found.

That makes sense--on non-pkgbase systems it synthesizes a hypothetical 
kernel pkg from `freebsd-version -k`, so it can't see the update unless 
the kernel version increases.

I can see that /boot/kernel/ipfw_pmod.ko changed between the running BE 
and the -p7 snapshot, so I'm confident I did get the update.

Does pkg-audit-base have a bug such that it also must consider the 
userland version when checking for kernel vulns; or did the kernel 
version bump get missed?


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9b881b84-e9b8-96b8-eb6a-8cf6a7fff3db>