From owner-freebsd-audit@FreeBSD.ORG  Wed Sep  8 00:40:45 2004
Return-Path: <owner-freebsd-audit@FreeBSD.ORG>
Delivered-To: freebsd-audit@freebsd.org
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 9FCD516A4CE
	for <freebsd-audit@freebsd.org>; Wed,  8 Sep 2004 00:40:45 +0000 (GMT)
Received: from mproxy.gmail.com (rproxy.gmail.com [64.233.170.205])
	by mx1.FreeBSD.org (Postfix) with ESMTP id 43CA043D45
	for <freebsd-audit@freebsd.org>; Wed,  8 Sep 2004 00:40:45 +0000 (GMT)
	(envelope-from kerochan2@gmail.com)
Received: by mproxy.gmail.com with SMTP id 77so228408rnl
        for <freebsd-audit@freebsd.org>; Tue, 07 Sep 2004 17:40:44 -0700 (PDT)
Received: by 10.38.82.8 with SMTP id f8mr2378612rnb;
        Tue, 07 Sep 2004 17:40:44 -0700 (PDT)
Received: by 10.38.75.25 with HTTP; Tue, 7 Sep 2004 17:40:44 -0700 (PDT)
Message-ID: <3b793f1a040907174043f4cad4@mail.gmail.com>
Date: Tue, 7 Sep 2004 20:40:44 -0400
From: kerochan ii <kerochan2@gmail.com>
To: freebsd-audit@freebsd.org
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Subject: portaudit false positive
X-BeenThere: freebsd-audit@freebsd.org
X-Mailman-Version: 2.1.1
Precedence: list
Reply-To: kerochan ii <kerochan2@gmail.com>
List-Id: FreeBSD Security Audit <freebsd-audit.freebsd.org>
List-Unsubscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-audit>,
	<mailto:freebsd-audit-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-audit>
List-Post: <mailto:freebsd-audit@freebsd.org>
List-Help: <mailto:freebsd-audit-request@freebsd.org?subject=help>
List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-audit>,
	<mailto:freebsd-audit-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Sep 2004 00:40:45 -0000

portaudit started warning me about a vulnerability in the cvs server
in the base system.
It reports that the affected package is FreeBSD-502010.
I realised that this is actually a vulnerability fixed months ago, and
because i'm tracking RELENG_5_2 and thus running 5.2.1-p9, it was
fixed on my system before portaudit even reported vulnerabilities in
base.
So please make it check if the base system is patched (uname -m) and
only let it report problems if they really exist.

Thank you in advance...