Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Oct 2017 08:57:35 -0700 (PDT)
From:      Roger Marquis <marquis@roble.com>
To:        freebsd-ports@freebsd.org
Cc:        freebsd-security@freebsd.org
Subject:   New pkg audit FNs
Message-ID:  <nycvar.OFS.7.76.1710090833020.60492@eboyr.pbz>

next in thread | raw e-mail | index | archive | help
Can anyone say what mechanisms the ports-security team might have in
place to monitor CVEs and port software versions?

The reason I ask is CVE-2017-12617 was announced almost a week ago yet
there's no mention of it in the vulnerability database  The tomcat8
port's Makefile also still points to the older, vulnerable version.
Tomcat is one of those popular, internet-facing applications that sites
need to check and/or update quickly when CVEs are released and most
admins probably don't expect "pkg audit" to throw false negatives.

Tomcat is just one of many apps, however, so concern regarding the
validity of FreeBSD's vulnerability database is larger than this CVE.
We are concerned about update processes and procedures, especially
considering how this topic has come up in the past (for different apps).

Roger Marquis



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?nycvar.OFS.7.76.1710090833020.60492>