From owner-freebsd-vuxml@FreeBSD.ORG Sun Jan 23 14:56:55 2005 Return-Path: Delivered-To: freebsd-vuxml@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id CBFE416A4CE for ; Sun, 23 Jan 2005 14:56:55 +0000 (GMT) Received: from bast.unixathome.org (bast.unixathome.org [66.11.174.150]) by mx1.FreeBSD.org (Postfix) with ESMTP id 959F543D41 for ; Sun, 23 Jan 2005 14:56:53 +0000 (GMT) (envelope-from dan@langille.org) Received: from wocker (wocker.unixathome.org [192.168.0.99]) by bast.unixathome.org (Postfix) with ESMTP id 000BC3D37 for ; Sun, 23 Jan 2005 09:56:52 -0500 (EST) From: "Dan Langille" To: freebsd-vuxml@freebsd.org Date: Sun, 23 Jan 2005 09:58:55 -0500 MIME-Version: 1.0 Message-ID: <41F3755F.17732.1CCB0831@localhost> Priority: normal X-mailer: Pegasus Mail for Windows (4.21c) Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: 7BIT Content-description: Mail message body Subject: what happens if a vuln is loaded in error? X-BeenThere: freebsd-vuxml@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Documenting security issues in VuXML List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 23 Jan 2005 14:56:55 -0000 Hi folks, I'm looking over the design of how FreshPorts handles VuXML changes. A thought comes to mind. If a vuln turns out to be false (i.e not a vulnerability at all, for whatever reason), what changes would be made to the VuXML data? How would this situation be fixed? Thanks. -- Dan Langille : http://www.langille.org/ BSDCan - The Technical BSD Conference - http://www.bsdcan.org/