From owner-freebsd-ports@FreeBSD.ORG Fri May 29 14:21:04 2015 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id EA7D21C5; Fri, 29 May 2015 14:21:04 +0000 (UTC) (envelope-from venture37@gmail.com) Received: from mail-wi0-x22e.google.com (mail-wi0-x22e.google.com [IPv6:2a00:1450:400c:c05::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 7D6991BD7; Fri, 29 May 2015 14:21:04 +0000 (UTC) (envelope-from venture37@gmail.com) Received: by wicmx19 with SMTP id mx19so17469912wic.0; Fri, 29 May 2015 07:21:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=LrEacr7LSIlXVX6muTW42kqaoOYuZyc/PlVdw6osAdU=; b=0yz87jL1w3XVqRb+mW7+5sHqenXZTVprrsASkh/14s306RZ3FwoKOvT3R4xVlWFMLM 4vVsVPd2GyFo6thlt5XTS+131/DYWQow5sCHi5Pmo+0NMclrdZxKUZQ+jJMh5QqAL58J c5ou7g3aj+X2CTut8Cw0btoHhuox57KmZu000aWhpycaw1rTkOb3DD+UV1WYUvUwVR6T Dpz4qsLG8jOBUhQDeBAjL4oYUKIMoeKQsFnJszvsy12ntWo3wsXXbcrmyaUOfnbdBDuK gfCoP8bUOChQqs9EsWL1pXbkOAVVXGjlqQn3BzDN3+otfZFtPMDYP1Z62XFnd/EQYR75 DkDg== MIME-Version: 1.0 X-Received: by 10.194.82.38 with SMTP id f6mr15112555wjy.16.1432909262987; Fri, 29 May 2015 07:21:02 -0700 (PDT) Received: by 10.194.88.165 with HTTP; Fri, 29 May 2015 07:21:02 -0700 (PDT) In-Reply-To: <556746A4.4090208@FreeBSD.org> References: <20150523153029.B7BD3280@hub.freebsd.org> <1432659389.3130746.278522905.6D1E6549@webmail.messagingengine.com> <20150527174037.EF719B11@hub.freebsd.org> <556746A4.4090208@FreeBSD.org> Date: Fri, 29 May 2015 15:21:02 +0100 Message-ID: Subject: Re: New pkg audit / vuln.xml failures (php55, unzoo) From: "Sevan / Venture37" To: Bryan Drewery Cc: Roger Marquis , Mark Felder , freebsd-ports@freebsd.org Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 29 May 2015 14:21:05 -0000 On 28 May 2015 at 17:47, Bryan Drewery wrote: > I think the VUXML database needs to be simpler to contribute to. Only a > handful of committers feel comfortable touching the file. We have also > had the wrong pervasive mentality by committers and users that the vuxml > database should only have an entry if there is a committed fix. This is > totally wrong. These CVE are _already public_ in all of these cases. > Users deserve to know that there is a known issue with a package they > have installed. I can understand how the mentality grew to what it is > with some people, but the fact that there is not an update doesn't > change that the user's system is insecure and needs to be dealt with. If > the tool can't reliably report issues then it is not worth trusting. > TL;DR; the file needs to be simpler. I know there is an effort to use > CPE but I'm not too familiar with where it is going. May a I suggest a more pragmatic format of package+version, type of issue, url for further info. > The RedHat security team and reporting is very impressive. Don't forget > that they are a funded company though. Perhaps the FreeBSD Foundation > needs to fund a fulltime security officer that is devoted to both Ports > and Src. Just the Ports piece is easily a fulltime job. There seems to be a lot of eyes on the ports-bugs@ list from the community, a heads up about vulnerabilities via the bug tracker may help in the meantime? Sevan / Venture37