Bugs in daily security output

Michael Neumann mneumann at ntecs.de
Wed Oct 12 02:07:23 PDT 2022


On Wed, Oct 05, 2022 at 08:19:01AM -0700, Autumn Jolitz wrote:
> I’ve recently set up an operational mail server and now have been able to receive the previously ignored messages output by cron.
> 
> Of note, I saw inside the daily security email the following bugs:
> 
> > Checking for security vulnerabilities in base (userland & kernel):
> > /usr/local/etc/periodic/security/405.pkg-base-audit: freebsd-version: not found
> > Database fetched: Mon Oct  3 05:02:29 PDT 2022
> > sysctl: unknown oid 'security.jail.jailed'
> > [: =: unexpected operator
> > /snip
> 
> This is on a DragonFly v6.2.1.6.gb08a68-RELEASE system.
> 
> To recap:
> - ``freebsd-version`` is still referenced by ``/usr/local/etc/periodic/security/405.pkg-base-audit``
> - security audit script references a non-existent systctl key
> - the `[` operation that references said sysctl lacks a value to make the string real, which is normally handled by an adjacent placeholder value like ``[ "x$(command)" = "x1" ]`` which ensures the left operand is real for handing to the infix operator.
> 
> I don’t have a bugs.dragonfly account so I am unable to file a ticket for this. If there was a github like DPorts has, I’d file it there.

Hi Autumn,

See 

https://github.com/DragonFlyBSD/DPorts/commit/af4a673f4a6a52680b88ede5eba7d1e1eef28b55#commitcomment-84215161

This is the same issue I ran into. You can avoid this by setting:

security_status_baseaudit_enable=NO in /etc/periodic.conf.

The problem is that this is FreeBSD-specific code that does not work on
DragonFly and actually should not be run on DragonFly.

Regards,

  Michael

-- 
Michael Neumann
NTECS Consulting
www.ntecs.de


More information about the Users mailing list