throAU said:If portaudit still reports issues, then your ports are not updated properly.
$ pkg info -x chrom
chromium-25.0.1364.172 Mostly BSD-licensed web browser based on WebKit and Gtk+
$ portaudit
Affected package: chromium-[B]24[/B].0.1312.57_1
Type of problem: chromium -- multiple vulnerabilities.
Reference: http://portaudit.FreeBSD.org/bdd48858-9656-11e2-a9a8-00262d5ed8ee.html
Affected package: chromium-25.0.1364.172
Type of problem: chromium -- multiple vulnerabilities.
Reference: http://portaudit.FreeBSD.org/bdd48858-9656-11e2-a9a8-00262d5ed8ee.html
Affected package: chromium-[B]24[/B].0.1312.57_1
Type of problem: chromium -- WebKit vulnerability.
Reference: http://portaudit.FreeBSD.org/54bed676-87ce-11e2-b528-00262d5ed8ee.html
Affected package: chromium-[B]24[/B].0.1312.57_1
Type of problem: chromium -- multiple vulnerabilities.
Reference: http://portaudit.FreeBSD.org/40d5ab37-85f2-11e2-b528-00262d5ed8ee.html
Affected package: chromium-[B]24[/B].0.1312.57_1
Type of problem: chromium -- multiple vulnerabilities.
Reference: http://portaudit.FreeBSD.org/dfd92cb2-7d48-11e2-ad48-00262d5ed8ee.html
# pkg info -x nvidia-driver
nvidia-driver-310.44 NVidia graphics card binary drivers for hardware OpenGL rendering
# portaudit
Affected package: nvidia-driver-304.64
Type of problem: NVIDIA UNIX driver -- ARGB cursor buffer overflow in NoScanout mode.
Reference: http://portaudit.FreeBSD.org/1431f2d6-a06e-11e2-b9e0-001636d274f3.html
Erratus said:Is it a problem with the mail?
# mailq -v
/var/spool/mqueue is empty
Total requests: 0
Checking for packages with security vulnerabilities:
ca_root_nss-3.13.6 is vulnerable:
mozilla -- multiple vulnerabilities
WWW: http://portaudit.FreeBSD.org/a4ed6632-5aa9-11e2-8fcb-c8600054b392.html
freetype2-2.4.9_1 is vulnerable:
freetype -- Multiple vulnerabilities
WWW: http://portaudit.FreeBSD.org/1ae613c3-5728-11e2-9483-14dae938ec40.html
libxml2-2.7.8_5 is vulnerable:
libxml2 -- cpu consumption Dos
WWW: http://portaudit.FreeBSD.org/843a4641-9816-11e2-9c51-080027019be0.html
openssl-1.0.1_4 is vulnerable:
OpenSSL -- TLS 1.1, 1.2 denial of service
WWW: http://portaudit.FreeBSD.org/00b0d8cd-7097-11e2-98d9-003067c2616f.html
perl-5.14.2_2 is vulnerable:
perl -- denial of service via algorithmic complexity attack on hashing routines
WWW: http://portaudit.FreeBSD.org/68c1f75b-8824-11e2-9996-c48508086173.html
php5-5.4.7 is vulnerable:
php5 -- Multiple vulnerabilities
WWW: http://portaudit.FreeBSD.org/1d23109a-9005-11e2-9602-d43d7e0c7c02.html
squid-3.1.21 is vulnerable:
squid -- denial of service
WWW: http://portaudit.FreeBSD.org/c37de843-488e-11e2-a5c9-0019996bc1f7.html
sudo-1.8.6.p3_1 is vulnerable:
sudo -- Potential bypass of tty_tickets constraints
WWW: http://portaudit.FreeBSD.org/82cfd919-8213-11e2-9273-902b343deec9.html
sudo-1.8.6.p3_1 is vulnerable:
sudo -- Authentication bypass when clock is reset
WWW: http://portaudit.FreeBSD.org/764344fb-8214-11e2-9273-902b343deec9.html
8 problem(s) in your installed packages found.
-- End of security output --
#pkg_version -v
ca_root_nss-3.14.3 = up-to-date with port
freetype2-2.4.11 = up-to-date with port
libxml2-2.8.0_1 = up-to-date with port
perl-5.14.2_3 = up-to-date with port
php5-5.4.13 = up-to-date with port
squid-3.1.23 = up-to-date with port
# portaudit
0 problem(s) in your installed packages found.
kpa said:Have you used PKGNG at some point but reverted back to the old packages?
# mv /var/db/pkg/local.sqlite /var/db/pkg/local.sqlite.old