Auditing ports (FreeBSD)

One of the most important aspects of *BSD systems is security. Knowing which installed packages have exploitable vulnerabilities is one of the admin’s tasks.

Here, the portaudit utility comes in handy. It is not part of the base system, so it must be installed first:

% cd /usr/ports/ports-mgmt/portaudit; make install clean

To run a simple check:

% portaudit
Affected package: XXX
Type of problem: XXX -- embedded GD library Use-After-Free vulnerability.
Reference: <>

Affected package: YYY-
Type of problem: YYY -- integer overflow vulnerability.
Reference: <>

Affected package: ZZZ-1.10.2_2
Type of problem: ZZZ -- integer overflow.
Reference: <>

I have omitted the details of the vulnerable packages of my own machine. I’m sure you understand :)


speak up

Add your comment below, or trackback from your own site.

Subscribe to these comments.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*Required Fields