Niels Erik
Dabbler
- Joined
- Aug 9, 2015
- Messages
- 18
Hi
I have two FreeNAS systems on the ’FreeNAS 11-Stable’ train, updated to ’FreeNAS-11.0-U3’ a few days ago.
I only use the pkg manager to update my jails. (I know that I'm not supposed to use pkg on the host)
But when I audited the host system itself, it listed a number of vulnerable packets.
Both of my NAS boxes are updated to the newest stable version, but lists the same vulnerable packets.
Why? I expected the automatic system update to keep the system updated?
or it the pkg audit wrong about the status of my host systems? (jails are ok)
I have two FreeNAS systems on the ’FreeNAS 11-Stable’ train, updated to ’FreeNAS-11.0-U3’ a few days ago.
I only use the pkg manager to update my jails. (I know that I'm not supposed to use pkg on the host)
But when I audited the host system itself, it listed a number of vulnerable packets.
Both of my NAS boxes are updated to the newest stable version, but lists the same vulnerable packets.
Why? I expected the automatic system update to keep the system updated?
or it the pkg audit wrong about the status of my host systems? (jails are ok)
Code:
# pkg audit | grep vulnerable apache24-2.4.25_1 is vulnerable: oniguruma5-5.9.6_1 is vulnerable: curl-7.52.1 is vulnerable: libgcrypt-1.7.5 is vulnerable: openvpn-2.3.12_1 is vulnerable: py36-django110-1.10.3 is vulnerable: icu-57.1,1 is vulnerable: collectd5-5.7.1_6 is vulnerable: graphite2-1.3.8 is vulnerable: freetype2-2.6.3 is vulnerable: nss-3.28 is vulnerable: samba46-4.6.5_5 is vulnerable: proftpd-1.3.5b is vulnerable: openssl-1.0.2j_1,1 is vulnerable: nginx-1.10.1_2,2 is vulnerable: libevent2-2.0.22_1 is vulnerable: sqlite3-3.14.1_1 is vulnerable: gnutls-3.4.15 is vulnerable:
Last edited by a moderator: