pkgsrc-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: PR/59446 CVS commit: pkgsrc/mk
The following reply was made to PR pkg/59446; it has been noted by GNATS.
From: George Georgalis <george%galis.org@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: pkg-manager%netbsd.org@localhost, gnats-admin%netbsd.org@localhost, pkgsrc-bugs%netbsd.org@localhost,
kim%netbsd.org@localhost, Jonathan Perkin <jperkin%pkgsrc.org@localhost>
Subject: Re: PR/59446 CVS commit: pkgsrc/mk
Date: Sat, 31 May 2025 23:30:54 -0700
--000000000000bf075506367ccaaa
Content-Type: text/plain; charset="UTF-8"
Works for me, thanks!
===> Checking for vulnerabilities in tcpdump-4.99.5
Package tcpdump-4.99.5 has a information-disclosure vulnerability, see
https://nvd.nist.gov/vuln/detail/CVE-2018-19519
Package tcpdump-4.99.5 has a out-of-bounds-read vulnerability, see
https://nvd.nist.gov/vuln/detail/CVE-2019-1010220
Package tcpdump-4.99.5 has a out-of-bounds-read vulnerability, see
https://nvd.nist.gov/vuln/detail/CVE-2018-19325
Package tcpdump-4.99.5 has a out-of-bounds-write vulnerability, see
https://nvd.nist.gov/vuln/detail/CVE-2023-1801
ERROR: Define ALLOW_VULNERABLE_PACKAGES in mk.conf or IGNORE_URL in
pkg_install.conf(5) if this package is absolutely essential.
*** Error code 1
Stop.
bmake[1]: stopped making "all" in /opt/pkgsrc-stable/net/tcpdump
*** Error code 1
Stop.
bmake: stopped making "all" in /opt/pkgsrc-stable/net/tcpdump
I raised the discussion on tech-pkg but failed to mention a few salient
points.
I used LLM to make my comments more concise and clear, I failed to mention
that and missed a few language/technical details in my edit, but they are
not very important. (LLM is really not clear about "jurisdiction" when it
comes to site security and the ecosystem of software.)
Focused observations:
- Per-CVE risk assessment rather than per-package has advantages
- The separation between pkg_add, pkgin, package repos and
pkg-vulnerabilities creates potential security blind spots
- audit trails for security-relevant configuration changes, and/or ATF for
security feature / unit testing could be helpful
My feeling is pkgsrc should set the right disposition with regard to
security---as a higher priority than adding/fixing packages---even if the
final implementation details are left to site administrators, the supported
security features should work.
In another case, package+CVE exceptions may be needed, since a CVE could
apply to a lib with zero consequence in one package, and serious liability
in for another... simply adding a per package exception, would create a gap
if a new CVE introduced liability---more to consider.
Thanks,
-George
--
George Georgalis, (415) 894-2710, http://www.galis.org/
--000000000000bf075506367ccaaa
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr"><div dir=3D"ltr">Works for me, thanks!<br><br>=3D=3D=3D>=
; Checking for vulnerabilities in tcpdump-4.99.5<br>Package tcpdump-4.99.5 =
has a information-disclosure vulnerability, see <a href=3D"https://nvd.nist=
.gov/vuln/detail/CVE-2018-19519" target=3D"_blank">https://nvd.nist.gov/vul=
n/detail/CVE-2018-19519</a><br>Package tcpdump-4.99.5 has a out-of-bounds-r=
ead vulnerability, see <a href=3D"https://nvd.nist.gov/vuln/detail/CVE-2019=
-1010220" target=3D"_blank">https://nvd.nist.gov/vuln/detail/CVE-2019-10102=
20</a><br>Package tcpdump-4.99.5 has a out-of-bounds-read vulnerability, se=
e <a href=3D"https://nvd.nist.gov/vuln/detail/CVE-2018-19325" target=3D"_bl=
ank">https://nvd.nist.gov/vuln/detail/CVE-2018-19325</a><br>Package tcpdump=
-4.99.5 has a out-of-bounds-write vulnerability, see <a href=3D"https://nvd=
.nist.gov/vuln/detail/CVE-2023-1801" target=3D"_blank">https://nvd.nist.gov=
/vuln/detail/CVE-2023-1801</a><br>ERROR: Define ALLOW_VULNERABLE_PACKAGES i=
n mk.conf or IGNORE_URL in pkg_install.conf(5) if this package is absolutel=
y essential.<br>*** Error code 1<br><br>Stop.<br>bmake[1]: stopped making &=
quot;all" in /opt/pkgsrc-stable/net/tcpdump<br>*** Error code 1<br><br=
>Stop.<br>bmake: stopped making "all" in /opt/pkgsrc-stable/net/t=
cpdump<br><div><br></div><div><br></div>I raised the discussion on tech-pkg=
but failed to mention a few salient points.<br><br><div>I used LLM to make=
my comments more concise and clear, I failed to mention that and missed a =
few language/technical details in my edit, but they are not very important.=
(LLM is really not clear about "jurisdiction" when it comes to s=
ite security and the ecosystem of software.) <br></div><div><br></div><div>=
Focused observations:</div><div>- Per-CVE risk assessment rather than per-p=
ackage has advantages</div><div>- The separation between pkg_add, pkgin, pa=
ckage repos and pkg-vulnerabilities creates potential security blind spots<=
/div><div>- audit trails for security-relevant configuration changes, and/o=
r ATF for security feature / unit testing could be helpful</div><div><br></=
div><div>My feeling is pkgsrc should set the right disposition with=20
regard to security---as a higher priority than adding/fixing packages---eve=
n=20
if the final implementation details are left to site administrators,=20
the supported security features should work.<br><br></div><div>In another c=
ase, package+CVE exceptions may be needed, since a CVE could apply to a lib=
with zero consequence in one package, and serious liability in for another=
... simply adding a per package exception, would create a gap if a new CVE =
introduced liability---more to consider.</div><div><br></div><div>Thanks,</=
div><div>-George</div><div><br></div>-- <br>George Georgalis, (415) 894-271=
0, <a href=3D"http://www.galis.org/" target=3D"_blank">http://www.galis.org=
/</a><br></div>
</div>
--000000000000bf075506367ccaaa--
Home |
Main Index |
Thread Index |
Old Index