How to Audit Packages for Vulnerabilities with `pkg audit` on FreeBSD

How to use pkg audit to scan FreeBSD packages for vulnerabilities, interpret the results, and implement best practices to maintain a secure system.

Introduction

Security is a critical concern for any system administrator. Ensuring that installed software packages are free from known vulnerabilities helps protect systems from exploits and potential breaches. FreeBSD, a robust and security-focused operating system, provides built-in tools for auditing installed packages. One such tool is pkg audit, which allows users to check installed packages against a vulnerability database and take appropriate actions.

In this article, we will explore how to use pkg audit to scan FreeBSD packages for vulnerabilities, interpret the results, and implement best practices to maintain a secure system.


Understanding pkg audit

pkg audit is part of FreeBSD’s package management system, pkg. It scans installed packages and compares them with known security vulnerabilities listed in the FreeBSD VuXML database. VuXML (Vulnerability and eXposure Markup Language) is a repository that FreeBSD maintains to document security issues affecting software.

Why Use pkg audit?

  • Detects security vulnerabilities in installed packages.
  • Helps system administrators take proactive measures.
  • Provides information on the nature of vulnerabilities.
  • Enhances overall system security by guiding updates and mitigations.

Installing and Updating the FreeBSD Package Manager

Before using pkg audit, ensure that the FreeBSD package manager (pkg) is installed and up-to-date.

Check if pkg is Installed

Run the following command:

pkg -v

If pkg is not installed, you can install it using:

sudo /usr/sbin/pkg bootstrap

Update the Package Repository

Keeping the package repository up to date ensures you have the latest package information and vulnerability data:

sudo pkg update

Running pkg audit

Once pkg is set up, running pkg audit is straightforward.

Basic Usage

To audit all installed packages for known vulnerabilities, use:

pkg audit

This command will return a list of any installed packages that have known vulnerabilities, along with descriptions of the issues and links to relevant security advisories.

Example Output

python39-3.9.6 is vulnerable:
OpenSSL - Multiple vulnerabilities (CVE-2022-0778, CVE-2021-3712)
https://vuxml.freebsd.org/freebsd/a5b6c3d1-ffde-11eb-8a9f-0800275a44de.html

1 problem(s) in 1 installed package(s) found.

Understanding the Audit Results

When pkg audit reports vulnerabilities, each entry contains:

  • Package name and version – Identifies the affected software.
  • Vulnerability description – Provides a brief summary of the issue.
  • CVE (Common Vulnerabilities and Exposures) IDs – Links to official vulnerability databases.
  • Reference link – Directs to the FreeBSD VuXML entry for further details.

If no vulnerabilities are found, the output will be:

0 problem(s) in 0 installed package(s) found.

This means all installed packages are currently free from known vulnerabilities.


Updating Vulnerability Data

Since vulnerabilities are discovered regularly, it is essential to keep the VuXML database up to date. You can manually update the database by running:

sudo pkg audit -F

This command fetches the latest vulnerability data from FreeBSD VuXML, ensuring that subsequent audits use current information.


Mitigating Vulnerabilities

1. Upgrading Affected Packages

The most effective way to address vulnerabilities is to upgrade the affected packages. Run:

sudo pkg upgrade

This updates all installed packages to their latest versions, which may include security patches.

To upgrade a specific package:

sudo pkg upgrade <package-name>

For example:

sudo pkg upgrade python39

2. Checking Package Versions Before Upgrading

If you want to check available versions before upgrading, use:

pkg info -R <package-name>

3. Removing Vulnerable Packages

If an upgrade is not available and the package is non-essential, consider removing it:

sudo pkg delete <package-name>

Example:

sudo pkg delete python39

4. Using Alternative Packages

If a package is crucial and no fix is available, explore alternative software or configurations to mitigate risks. For example, switching to a different version or implementation may help.


Automating Security Audits

Automating pkg audit with Cron

To ensure regular security checks, automate pkg audit with a cron job. Edit the cron schedule using:

crontab -e

Add the following line to run pkg audit daily and log the results:

0 2 * * * /usr/sbin/pkg audit > /var/log/pkg_audit.log

This runs the audit at 2 AM daily and saves the output to /var/log/pkg_audit.log.

Email Notifications for Vulnerabilities

To receive email notifications for vulnerabilities, use:

pkg audit | mail -s "FreeBSD Package Audit Report" your-email@example.com

Add this to the cron job to get daily reports via email.


Best Practices for Secure Package Management

  1. Regularly update package repositories and the VuXML database.
  2. Upgrade vulnerable packages as soon as fixes are available.
  3. Remove or replace insecure software when upgrades are unavailable.
  4. Automate security checks and monitor logs.
  5. Use FreeBSD’s security advisories for additional guidance.

Conclusion

pkg audit is an essential tool for maintaining security on FreeBSD systems. By regularly auditing packages, updating vulnerability data, and promptly addressing security risks, administrators can significantly reduce the attack surface of their systems. Automating security checks and keeping software up-to-date further enhances FreeBSD’s already strong security posture.

By integrating pkg audit into your routine system maintenance, you can ensure a safer and more resilient computing environment.