From odip@bionet.nsc.ru  Fri Jul 29 16:46:23 2005
Return-Path: <odip@bionet.nsc.ru>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 75B0716A41F;
	Fri, 29 Jul 2005 16:46:23 +0000 (GMT)
	(envelope-from odip@bionet.nsc.ru)
Received: from manticore.bionet.nsc.ru (manticore.bionet.nsc.ru [84.237.118.164])
	by mx1.FreeBSD.org (Postfix) with ESMTP id D83AE43D48;
	Fri, 29 Jul 2005 16:46:22 +0000 (GMT)
	(envelope-from odip@bionet.nsc.ru)
Received: by manticore.bionet.nsc.ru (Postfix, from userid 1001)
	id AA49A21720; Fri, 29 Jul 2005 23:46:19 +0700 (NOVST)
Message-Id: <20050729164619.AA49A21720@manticore.bionet.nsc.ru>
Date: Fri, 29 Jul 2005 23:46:19 +0700 (NOVST)
From: Dmitry A Grigorovich <odip@bionet.nsc.ru>
To: FreeBSD-gnats-submit@freebsd.org
Cc: security@FreeBSD.org
Subject: portaudit doesn't report about all security bugs
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         84312
>Category:       ports
>Synopsis:       security/portaudit doesn't report about all security bugs
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    remko
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Jul 29 16:50:19 GMT 2005
>Closed-Date:    Thu Aug 04 18:37:38 GMT 2005
>Last-Modified:  Thu Aug 04 18:37:38 GMT 2005
>Originator:     Dmitry A Grigorovich
>Release:        FreeBSD 5.4-RELEASE-p2 i386
>Organization:
ICiG SB RAS, Russia
>Environment:
System: FreeBSD manticore.bionet.nsc.ru 5.4-RELEASE-p2 FreeBSD 5.4-RELEASE-p2 #1: Wed Jul 27 19:15:09 NOVST 2005 root@manticore.bionet.nsc.ru:/usr/obj/usr/src/sys/ODIP i386

>Description:

On the page
http://www.vuxml.org/freebsd/651996e0-fe07-11d9-8329-000e0c2e438a.html
reported that package apache+mod_ssl < 1.3.33+2.8.22_1 have security bug

Also in /var/db/portaudit/ presented line:
apache+mod_ssl<1.3.33+2.8.22_1|http://www.FreeBSD.org/ports/portaudit/651996e0-fe07-11d9-8329-000e0c2e438a.html|apache -- http request smuggling

But port /usr/ports/www/apache13-modssl may install different packages:

apache+mod_ssl-1.3.33+2.8.22 or apache+mod_ssl+mod_deflate-1.3.33+2.8.22
or some other.

When I have installed apache+mod_ssl+mod_deflate-1.3.33+2.8.22 package
then portaudit does not report about security bug !!!

>How-To-Repeat:

Update ports to current state

cd /usr/ports/www/apache13-modssl

Edit Makefile - remove PORTREVISION line
This turn this port
from current version apache+mod_ssl-1.3.33+2.8.22_1
to old version apache+mod_ssl-1.3.33+2.8.22

Try fetch apache+mod_ssl:

root@manticore# make fetch
===>  apache+mod_ssl-1.3.33+2.8.22 has known vulnerabilities:
=> apache -- http request smuggling.
   Reference: <http://www.FreeBSD.org/ports/portaudit/651996e0-fe07-11d9-8329-000e0c2e438a.html>
=> Please update your ports tree and try again.
*** Error code 1

Stop in /usr/ports/www/apache13-modssl.

portaudit worked for apache+mod_ssl

But try fetch apache+mod_ssl+mod_deflate:

root@manticore# make WITH_APACHE_MODDEFLATE=yes fetch

You may use the following build options:

....

Ups - portaudit permit you install version with security bug !!!

>Fix:

I see two ways:

1)
Add to portaudit all FLAVOURS ports of BASE port:

E.g. when bug in mod_apache+mod_ssl
also add mod_apache+mod_ssl+mod_deflate.

This need some work for dependencies.

2)
When checking security bugs in portaudit
we need get name of BASE port:
e.g. if we need checking mod_apache+mod_ssl+mod_deflate
then we get BASE port as mod_apache+mod_ssl
and check in portaudit this BASE port.
>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: freebsd-ports-bugs->freebsd-security 
Responsible-Changed-By: linimon 
Responsible-Changed-When: Fri Jul 29 21:37:38 GMT 2005 
Responsible-Changed-Why:  
Over to maintainer(s). 

http://www.freebsd.org/cgi/query-pr.cgi?pr=84312 
Responsible-Changed-From-To: freebsd-security->remko 
Responsible-Changed-By: remko 
Responsible-Changed-When: Sat Jul 30 17:05:19 GMT 2005 
Responsible-Changed-Why:  
I entered the apache vulnerability into VuXML so i should fix this. 
Thanks for mentioning this! 

http://www.freebsd.org/cgi/query-pr.cgi?pr=84312 
State-Changed-From-To: open->closed 
State-Changed-By: remko 
State-Changed-When: Thu Aug 4 18:37:17 GMT 2005 
State-Changed-Why:  
I think i listed them all now. Thanks for the notification! 

http://www.freebsd.org/cgi/query-pr.cgi?pr=84312 
>Unformatted:
