OPNsense Forum

English Forums => General Discussion => Topic started by: rickygm on April 29, 2024, 04:23:24 AM

Title: packages with vulnerability
Post by: rickygm on April 29, 2024, 04:23:24 AM
***GOT REQUEST TO AUDIT SECURITY***
Currently running OPNsense 24.1.6 at Sun Apr 28 20:20:29 CST 2024
vulnxml file up-to-date
ruby-3.1.4_1,1 is vulnerable:
  ruby -- Arbitrary memory address read vulnerability with Regex search
  CVE: CVE-2024-27282
  WWW: https://vuxml.FreeBSD.org/freebsd/2ce1a2f1-0177-11ef-a45e-08002784c58d.html

1 problem(s) in 1 installed package(s) found.
***DONE**

any idea how to fix them?
Title: Re: packages with vulnerability
Post by: franco on April 29, 2024, 10:32:46 AM
I'm not sure someone is feeding arbitrary untrusted data to ruby, but usually it takes a stable update fix this.. this is only for community plugins (iperf and tor).


Cheers,
Franco
Title: Re: packages with vulnerability
Post by: chemlud on April 29, 2024, 11:13:39 AM
Hmm, do you want to insinuate that ruby is the new xz?  :o
Title: Re: packages with vulnerability
Post by: franco on April 29, 2024, 11:42:45 AM
I'm merely paraphrasing the link:

If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
Title: Re: packages with vulnerability
Post by: rickygm on April 29, 2024, 08:30:05 PM
I think it would be good to remove a package from the repo that could affect security.

note: would I have to remove iperf to remove this package or can I directly remove ruby?
Title: Re: packages with vulnerability
Post by: Patrick M. Hausen on April 29, 2024, 08:40:27 PM
There is no externally supplied data fed to Ruby in OPNsense. So there is no vulnerability.

If you are logged in via SSH you can trigger a bug in Ruby by supplying suitably crafted data and then read information from the running Ruby process with the privilege of the user that started the command in the first place. No privilege escalation, no remote code execution, nothing to see here.

Please don't freak out over CVEs but do a proper risk assessment. There will always be some CVE for a product with as many dependencies as OPNsense and an update cycle of two weeks.
Title: Re: packages with vulnerability
Post by: rickygm on April 29, 2024, 09:16:10 PM
thank for information
Title: Re: packages with vulnerability
Post by: chemlud on April 30, 2024, 08:56:46 AM
...todays patch is tomorrows bug... :-D
Title: Re: packages with vulnerability
Post by: franco on April 30, 2024, 02:17:22 PM
Quote from: chemlud on April 30, 2024, 08:56:46 AM
...todays patch is tomorrows bug... :-D

True, and perfect software is dead software.


Cheers,
Franco