From owner-freebsd-audit@FreeBSD.ORG Wed Sep 8 00:40:45 2004 Return-Path: <owner-freebsd-audit@FreeBSD.ORG> Delivered-To: freebsd-audit@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9FCD516A4CE for <freebsd-audit@freebsd.org>; Wed, 8 Sep 2004 00:40:45 +0000 (GMT) Received: from mproxy.gmail.com (rproxy.gmail.com [64.233.170.205]) by mx1.FreeBSD.org (Postfix) with ESMTP id 43CA043D45 for <freebsd-audit@freebsd.org>; Wed, 8 Sep 2004 00:40:45 +0000 (GMT) (envelope-from kerochan2@gmail.com) Received: by mproxy.gmail.com with SMTP id 77so228408rnl for <freebsd-audit@freebsd.org>; Tue, 07 Sep 2004 17:40:44 -0700 (PDT) Received: by 10.38.82.8 with SMTP id f8mr2378612rnb; Tue, 07 Sep 2004 17:40:44 -0700 (PDT) Received: by 10.38.75.25 with HTTP; Tue, 7 Sep 2004 17:40:44 -0700 (PDT) Message-ID: <3b793f1a040907174043f4cad4@mail.gmail.com> Date: Tue, 7 Sep 2004 20:40:44 -0400 From: kerochan ii <kerochan2@gmail.com> To: freebsd-audit@freebsd.org Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: portaudit false positive X-BeenThere: freebsd-audit@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: kerochan ii <kerochan2@gmail.com> List-Id: FreeBSD Security Audit <freebsd-audit.freebsd.org> List-Unsubscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-audit>, <mailto:freebsd-audit-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-audit> List-Post: <mailto:freebsd-audit@freebsd.org> List-Help: <mailto:freebsd-audit-request@freebsd.org?subject=help> List-Subscribe: <http://lists.freebsd.org/mailman/listinfo/freebsd-audit>, <mailto:freebsd-audit-request@freebsd.org?subject=subscribe> X-List-Received-Date: Wed, 08 Sep 2004 00:40:45 -0000 portaudit started warning me about a vulnerability in the cvs server in the base system. It reports that the affected package is FreeBSD-502010. I realised that this is actually a vulnerability fixed months ago, and because i'm tracking RELENG_5_2 and thus running 5.2.1-p9, it was fixed on my system before portaudit even reported vulnerabilities in base. So please make it check if the base system is patched (uname -m) and only let it report problems if they really exist. Thank you in advance...