From owner-freebsd-audit@FreeBSD.ORG Wed Sep 8 00:40:45 2004 Return-Path: Delivered-To: freebsd-audit@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9FCD516A4CE for ; Wed, 8 Sep 2004 00:40:45 +0000 (GMT) Received: from mproxy.gmail.com (rproxy.gmail.com [64.233.170.205]) by mx1.FreeBSD.org (Postfix) with ESMTP id 43CA043D45 for ; Wed, 8 Sep 2004 00:40:45 +0000 (GMT) (envelope-from kerochan2@gmail.com) Received: by mproxy.gmail.com with SMTP id 77so228408rnl for ; Tue, 07 Sep 2004 17:40:44 -0700 (PDT) Received: by 10.38.82.8 with SMTP id f8mr2378612rnb; Tue, 07 Sep 2004 17:40:44 -0700 (PDT) Received: by 10.38.75.25 with HTTP; Tue, 7 Sep 2004 17:40:44 -0700 (PDT) Message-ID: <3b793f1a040907174043f4cad4@mail.gmail.com> Date: Tue, 7 Sep 2004 20:40:44 -0400 From: kerochan ii To: freebsd-audit@freebsd.org Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: portaudit false positive X-BeenThere: freebsd-audit@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: kerochan ii List-Id: FreeBSD Security Audit List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Sep 2004 00:40:45 -0000 portaudit started warning me about a vulnerability in the cvs server in the base system. It reports that the affected package is FreeBSD-502010. I realised that this is actually a vulnerability fixed months ago, and because i'm tracking RELENG_5_2 and thus running 5.2.1-p9, it was fixed on my system before portaudit even reported vulnerabilities in base. So please make it check if the base system is patched (uname -m) and only let it report problems if they really exist. Thank you in advance...