Hi all,
portaudit keeps reminding me since a few days that my curl installation has a vulnerability:
Being an obedient admin to my system I'm trying that for a few days already:
So, do I need to wait for a patch? From what I understand from the portaudit vulnerability notes this vulnerability is not considered critical. But how should I handle this? Ignore it until a patch comes out? Uninstalling is certainly not an option. Curl is used in so many ports as a dependency that I dare not try this. I can't be the only one with this issue but I have a hard time finding more information on how to handle the situation.
portaudit keeps reminding me since a few days that my curl installation has a vulnerability:
Code:
# portaudit
Affected package: curl-7.24.0_3
Type of problem: cURL library -- heap corruption in curl_easy_unescape.
Reference: http://portaudit.FreeBSD.org/01cf67b3-dc3b-11e2-a6cd-c48508086173.html
1 problem(s) in your installed packages found.
You are advised to update or deinstall the affected package(s) immediately.
Being an obedient admin to my system I'm trying that for a few days already:
Code:
# portsnap fetch update
Looking up portsnap.FreeBSD.org mirrors... 6 mirrors found.
Fetching snapshot tag from ec2-eu-west-1.portsnap.freebsd.org... done.
Fetching snapshot metadata... done.
// yadda yadda
// ...
// and then
# portmaster -b curl
===>>> Currently installed version: curl-7.24.0_3
===>>> Port directory: /usr/ports/ftp/curl
===>>> Gathering distinfo list for installed ports
===>>> Launching 'make checksum' for ftp/curl in background
===>>> Gathering dependency list for ftp/curl from ports
===>>> Initial dependency check complete for ftp/curl
===>>> Starting build for ftp/curl <<<===
===>>> All dependencies are up to date
===> Cleaning for curl-7.24.0_3
===>>> Waiting on fetch & checksum for ftp/curl <<<===
===> curl-7.24.0_3 has known vulnerabilities:
Affected package: curl-7.24.0_3
Type of problem: cURL library -- heap corruption in curl_easy_unescape.
Reference: http://portaudit.FreeBSD.org/01cf67b3-dc3b-11e2-a6cd-c48508086173.html
=> Please update your ports tree and try again.
*** [check-vulnerable] Error code 1
Stop in /usr/ports/ftp/curl.
===> Deleting distfiles for curl-7.24.0_3
===>>> RE-STARTING FETCH <<<===
===> curl-7.24.0_3 has known vulnerabilities:
Affected package: curl-7.24.0_3
Type of problem: cURL library -- heap corruption in curl_easy_unescape.
Reference: http://portaudit.FreeBSD.org/01cf67b3-dc3b-11e2-a6cd-c48508086173.html
=> Please update your ports tree and try again.
*** [check-vulnerable] Error code 1
Stop in /usr/ports/ftp/curl.
*** [build] Error code 1
Stop in /usr/ports/ftp/curl.
===>>> make failed for ftp/curl
===>>> Aborting update
===>>> Killing background jobs
Terminated
===>>> You can restart from the point of failure with this command line:
portmaster <flags> ftp/curl
===>>> Exiting
So, do I need to wait for a patch? From what I understand from the portaudit vulnerability notes this vulnerability is not considered critical. But how should I handle this? Ignore it until a patch comes out? Uninstalling is certainly not an option. Curl is used in so many ports as a dependency that I dare not try this. I can't be the only one with this issue but I have a hard time finding more information on how to handle the situation.
Code:
# uname -a
FreeBSD frodo.metrico 9.1-RELEASE-p4 FreeBSD 9.1-RELEASE-p4 #0: Mon Jun 17 11:42:37 UTC 2013 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64