Determine which software have outstanding security advisories

Author: name contact BSD flavour

Reviewer: name contact BSD flavour

Reviewer: Chris Silva racerx@makeworld.com FreeBSD/OpenBSD


Concept

Recognize the importance of being aware of software security (((security))) vulnerabilities (((vulnerabilities))). Also recognize the third-party utilities which integrate with the BSD package(((package))) managers to determine which software has outstanding vulnerabilities.

Introduction

FreeBSD uses the portaudit system.

portaudit: system to check installed packages for known vulnerabilities (((portaudit)))

portaudit -a prints a vulnerability report for all installed packages

portaudit -F fetches current database from FreeBSD servers

portaudit -Fa (does both at one time, very useful)

TODO: mention enabling periodic portaudit script

DragonFlyBSD and FreeBSD can both use the following command to check for known vulnerabilities in installed applications: pkg audit -F

NetBSD uses pkg_admin in a two-command sequence to getting the latest package vulnerabilities database and check your installed packages against it: pkg_admin fetch-pkg-vulnerabilities pkg_admin audit

OpenBSD users should monitor relevant mailing lists [see http://www.openbsd.org/mail.html] and follow-Unix-related security announcement websites and mailing lists, to allow updates to the BASE operating system. One strategy to accomplish this is to maintain a local CVS repository using the CVSync or rsync programs, and build STABLE releases incorporating any desired security fixes [see http://www.openbsd.org/faq/faq5.html]. For fixing security vulnerabilities in OpenBSD packages or ports, you should subscribe to mailing lists or other security related resources relevant for EACH application you are using beyond the BASE system. Also it could be helpful to monitor results from security-related testing of applications that appear on various sites like CERT [https://www.us-cert.gov/ncas/alerts etc.]

More information and ideas for fixing security vulnerabilities on OpenBSD (and some for FreeBSD too) can be found here: http://serverfault.com/questions/209027/openbsd-freebsd-your-update-philosophy

Examples

The following is an example of using portaudit on FreeBSD. (The "-d" option prints the date of the vulnerability database.)

""$ /usr/local/sbin/portaudit -Fda ""New database installed. ""Database created: Fri Jan 26 09:40:17 PST 2007 ""Affected package: php5-5.1.2_1 ""Type of problem: php -- open_basedir Race Condition Vulnerability. ""Reference: <http://www.FreeBSD.org/ports/portaudit/edabe438-542f-11db-a5ae-00508d6a62df.html> "" ""1 problem(s) in your installed packages found. "" ""You are advised to update or deinstall the affected package(s) immediately.

Practice Exercises

More information

audit-packages(((audit-packages))) for Dragonfly and NetBSD; portaudit(((portaudit))) and vuxml(((vuxml))) for FreeBSD and OpenBSD

TODO: verify for OpenBSD?