Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Oct 2023 22:44:14 -0400
From:      "Dan Langille" <dan@langille.org>
To:        "Sunpoet Po-Chuan Hsieh" <sunpoet@FreeBSD.org>, ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   Re: git: c06e206dffd4 - main - security/vuxml: Fix  bca498407bf9e529936ebb68e9ca257bdd1428de
Message-ID:  <9c707b4a-f8ee-4206-a935-5bc87409dfe9@app.fastmail.com>
In-Reply-To: <202310112223.39BMNY2Y092294@gitrepo.freebsd.org>
References:  <202310112223.39BMNY2Y092294@gitrepo.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Oct 11, 2023, at 6:23 PM, Po-Chuan Hsieh wrote:
> The branch main has been updated by sunpoet:
>
> URL: 
> https://cgit.FreeBSD.org/ports/commit/?id=c06e206dffd44ca562f86fbf55c06e361881bf47
>
> commit c06e206dffd44ca562f86fbf55c06e361881bf47
> Author:     Po-Chuan Hsieh <sunpoet@FreeBSD.org>
> AuthorDate: 2023-10-11 22:22:51 +0000
> Commit:     Po-Chuan Hsieh <sunpoet@FreeBSD.org>
> CommitDate: 2023-10-11 22:22:51 +0000
>
>     security/vuxml: Fix bca498407bf9e529936ebb68e9ca257bdd1428de
>    
>     The pkg audit result before the fix:
>     curl-8.4.0 is vulnerable:
>       curl -- SOCKS5 heap buffer overflow
>       CVE: CVE-2023-38545
>       WWW: 
> https://vuxml.FreeBSD.org/freebsd/d6c19e8c-6806-11ee-9464-b42e991fc52e.html
>    
>     1 problem(s) in 1 installed package(s) found.
> ---
>  security/vuxml/vuln/2023.xml | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
> index d2b1be12644f..db04c1b9498f 100644
> --- a/security/vuxml/vuln/2023.xml
> +++ b/security/vuxml/vuln/2023.xml
> @@ -3,8 +3,7 @@
>      <affects>
>        <package>
>  	<name>curl</name>
> -	<range><gt>7.69.0</gt></range>
> -	<range><lt>8.4.0</lt></range>
> +	<range><gt>7.69.0</gt><lt>8.4.0</lt></range>

FreshPorts agrees with this change in that it no longer lists 8.4.0 as vuln

However, my hosts are still getting:

[2:42 dns1 dan ~] % sudo pkg audit -F
vulnxml file up-to-date
curl-8.4.0 is vulnerable:
  curl -- SOCKS5 heap buffer overflow
  CVE: CVE-2023-38545
  WWW: https://vuxml.FreeBSD.org/freebsd/d6c19e8c-6806-11ee-9464-b42e991fc52e.html

1 problem(s) in 1 installed package(s) found.

What do I need to do in order to propagate that fix?

Thank you.

>        </package>
>      </affects>
>      <description>
> @@ -35,6 +34,7 @@
>      <dates>
>        <discovery>2023-09-30</discovery>
>        <entry>2023-10-11</entry>
> +      <modified>2023-10-11</modified>
>      </dates>
>    </vuln>

-- 
  Dan Langille
  dan@langille.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9c707b4a-f8ee-4206-a935-5bc87409dfe9>