Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 18 May 2015 13:06:53 -0500
From:      Mark Felder <feld@FreeBSD.org>
To:        freebsd-security@freebsd.org
Subject:   Re: pkg audit / vuln.xml failures
Message-ID:  <1431972413.2880876.271908321.6959F2D3@webmail.messagingengine.com>
In-Reply-To: <20150517210300.45FF67B8@hub.freebsd.org>
References:  <20150517210300.45FF67B8@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Sun, May 17, 2015, at 16:02, Roger Marquis wrote:
> Does anyone know what's going on with vuln.xml updates?  Over the last
> few weeks and months CVEs and application mailing lists have announced
> vulnerabilities for several ports that in some cases only showed up in
> vuln.xml after several days and in other cases are still not listed
> (despite email to the security team).
> 
> Is there a URL outlining the policies and procedures of vuln.xml
> maintenance?
> 

I am also interested. I know there is a desire to leverage CPE in the
future, but I've seen CPE entries take weeks to show up. Our vuln.xml
maintenance has always been pretty solid. Is there a lack of manpower
right now? Are there notices/reports not being processed?

How can we help?



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1431972413.2880876.271908321.6959F2D3>