From owner-freebsd-questions@freebsd.org Sun Nov 27 09:17:54 2016 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 40458C58CC2 for ; Sun, 27 Nov 2016 09:17:54 +0000 (UTC) (envelope-from herbert@mailbox.org) Received: from mx2.mailbox.org (mx2.mailbox.org [80.241.60.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.mailbox.org", Issuer "SwissSign Server Silver CA 2014 - G22" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0341117C for ; Sun, 27 Nov 2016 09:17:53 +0000 (UTC) (envelope-from herbert@mailbox.org) Received: from smtp1.mailbox.org (smtp1.mailbox.org [80.241.60.240]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx2.mailbox.org (Postfix) with ESMTPS id A7EAB43148 for ; Sun, 27 Nov 2016 10:11:53 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mailbox.org; h= content-type:content-type:mime-version:references:in-reply-to :subject:subject:from:from:message-id:date:date:received; s= mail20150812; t=1480237911; bh=cCeXGRebUlTuMt2UTC34W8NldGWixJ+na POZPqqHnRg=; b=op78TT3m57MJvBPI34kwLqlIiNmC3P9NVx/xr6h8xIU7ZWWxa 1R0YXfSHfdwTEAb3nNTfG7YXPchdOB7y0raA7n1u5LRnaB53jA+mru+CsqZihQuD 7jzXQBOBN1FkHSRpgU+v7vonkKc804tJPWLjelJa0zcGHWgrxB7HIc0hUtKuR/xU uko6SZCGnBiBs1aHoMnWzMBXqpOQMLKwZD7L6ZVGWn62J7dNA7h9XMvbIVAWR78B C44CtHUidbnBzzkm1RuX8uyTPumSFCgGiBEU8+OUoftQ3bsqaR4GnaIRd0RRt7SP iDREtGtQiEtZHJjs+taElureSew9ORiMPrt8A== X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp1.mailbox.org ([80.241.60.240]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by spamfilter01.heinlein-hosting.de (spamfilter01.heinlein-hosting.de [80.241.56.115]) (amavisd-new, port 10030) with ESMTPS id DR9qnD1BBp27 for ; Sun, 27 Nov 2016 10:11:51 +0100 (CET) Date: Sun, 27 Nov 2016 10:11:48 +0100 Message-ID: <868ts5uw17.wl-herbert@mailbox.org> From: "Herbert J. Skuhra" To: Subject: Re: Dealing with (multiple) pkgs with security vulnerabilities. In-Reply-To: References: MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Nov 2016 09:17:54 -0000 Odhiambo Washington wrote: > > Hi, > Part of my security run output contains a long list of packages with > vulnerabilities. > 'pkg audit -F' returns a listing of these pkgs with enough details, but > pkg update && pkg upgrade returns nothing so I suppose there is a better > way to deal with these. Output of 'uname -a' is missing. - you are running a version that is EOL (e.g.: FreeBSD 8.x) => update base first and then try pkg update/upgrade again - you are running a platform (e.g. arm) for which packages are not built/updated - the url in your repository file (e.g. /etc/pkg/FreeBSD.conf) is wrong > I know I can manually do 'make -C /path/to/port/directory clean reinstall > clean', but that is so manual and tirng even just for 10 pkgs to be updated. > > What is the easiest way of doing a batch update for all the listed pkgs? - checkout/update /usr/ports with svn(lite) or portsnap - install ports-mgmt/portmaster - run 'portmaster -a' You haven't updated for a long time (more than a year). So maybe it's better to remove all installed ports (pkg delete -a) and reinstall them one by one. -- Herbert