topengineer
Newbie | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору Report выглядит вот так: Checking for a current audit database: Downloading fresh database. auditfile.tbz 37 kB 21 kBps New database installed. Database created: Sat Aug 19 23:40:02 UTC 2006 Checking for packages with security vulnerabilities: Affected package: ruby-1.8.4_8,1 Type of problem: ruby - multiple vulnerabilities. Reference: <http://www.FreeBSD.org/ports/portaudit/76562594-1f19-11db-b7d4-0008743bf21a.html> Affected package: apache-2.2.2 Type of problem: apache -- mod_rewrite buffer overflow vulnerability. Reference: <http://www.FreeBSD.org/ports/portaudit/dc8c08c7-1e7c-11db-88cf-000c6ec775d9.html> Affected package: mutt-1.4.2.1_2 Type of problem: mutt -- Remote Buffer Overflow Vulnerability. Reference: <http://www.FreeBSD.org/ports/portaudit/d2a43243-087b-11db-bc36-0008743bf21a.html> Affected package: mysql-server-4.1.19 Type of problem: MySQL -- SQL-injection security vulnerability. Reference: <http://www.FreeBSD.org/ports/portaudit/7f8cecea-f199-11da-8422-00123ffe8333.html> 4 problem(s) in your installed packages found. You are advised to update or deinstall the affected package(s) immediately. -- End of security output -- Цитата: Так точно - прочитано. Шаг за шагом выполняю что написано. Вот результат: delta# pkgdb -F ---> Checking the package registry database delta# portupgrade -n mutt ---> Session started at: Tue, 22 Aug 2006 06:53:52 +0000 ---> Upgrade of mail/mutt started at: Tue, 22 Aug 2006 06:53:57 +0000 ---> Upgrading 'mutt-1.4.2.1_2' to 'mutt-1.4.2.2' (mail/mutt) OK? [no] ---> Upgrade of mail/mutt ended at: Tue, 22 Aug 2006 06:53:57 +0000 (consumed 00:00:00) ---> Listing the results (+:done / -:ignored / *:skipped / !:failed) + mail/mutt (mutt-1.4.2.1_2) ---> Packages processed: 1 done, 0 ignored, 0 skipped and 0 failed ---> Session ended at: Tue, 22 Aug 2006 06:53:57 +0000 (consumed 00:00:05) delta# portupgrade -n -F mutt ---> Session started at: Tue, 22 Aug 2006 06:54:23 +0000 ---> Fetch for mail/mutt started at: Tue, 22 Aug 2006 06:54:26 +0000 ---> Fetching the distfile(s) for 'mutt-1.4.2.2' (mail/mutt) OK? [no] ---> Fetch for mail/mutt ended at: Tue, 22 Aug 2006 06:54:26 +0000 (consumed 00:00:00) ---> Listing the results (+:done / -:ignored / *:skipped / !:failed) + mail/mutt (mutt-1.4.2.1_2) ---> Packages processed: 1 done, 0 ignored, 0 skipped and 0 failed ---> Session ended at: Tue, 22 Aug 2006 06:54:26 +0000 (consumed 00:00:02) delta# portupgrade -fn mutt ---> Session started at: Tue, 22 Aug 2006 06:59:49 +0000 ---> Upgrade of mail/mutt started at: Tue, 22 Aug 2006 06:59:52 +0000 ---> Upgrading 'mutt-1.4.2.1_2' to 'mutt-1.4.2.2' (mail/mutt) OK? [no] ---> Upgrade of mail/mutt ended at: Tue, 22 Aug 2006 06:59:52 +0000 (consumed 00:00:00) ---> Listing the results (+:done / -:ignored / *:skipped / !:failed) + mail/mutt (mutt-1.4.2.1_2) ---> Packages processed: 1 done, 0 ignored, 0 skipped and 0 failed ---> Session ended at: Tue, 22 Aug 2006 06:59:52 +0000 (consumed 00:00:02) delta# portaudit -Fa auditfile.tbz 100% of 37 kB 22 kBps New database installed. Affected package: ruby-1.8.4_8,1 Type of problem: ruby - multiple vulnerabilities. Reference: <http://www.FreeBSD.org/ports/portaudit/76562594-1f19-11db-b7d4-0008743bf21a.html> Affected package: apache-2.2.2 Type of problem: apache -- mod_rewrite buffer overflow vulnerability. Reference: <http://www.FreeBSD.org/ports/portaudit/dc8c08c7-1e7c-11db-88cf-000c6ec775d9.html> Affected package: mutt-1.4.2.1_2 Type of problem: mutt -- Remote Buffer Overflow Vulnerability. Reference: <http://www.FreeBSD.org/ports/portaudit/d2a43243-087b-11db-bc36-0008743bf21a.html> Affected package: mysql-server-4.1.19 Type of problem: MySQL -- SQL-injection security vulnerability. Reference: <http://www.FreeBSD.org/ports/portaudit/7f8cecea-f199-11da-8422-00123ffe8333.html> 4 problem(s) in your installed packages found. You are advised to update or deinstall the affected package(s) immediately. Объясните, пожалуйста, что я не так делаю. Спасибо! |