From owner-freebsd-security@freebsd.org Tue Jul 9 22:04:29 2019 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 180D515E7179 for ; Tue, 9 Jul 2019 22:04:29 +0000 (UTC) (envelope-from SRS0=a4H4=VG=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 698D789018 for ; Tue, 9 Jul 2019 22:04:27 +0000 (UTC) (envelope-from SRS0=a4H4=VG=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id 4477228422; Wed, 10 Jul 2019 00:04:24 +0200 (CEST) Received: from illbsd.quip.test (ip-62-24-92-232.net.upcbroadband.cz [62.24.92.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 7E33328417; Wed, 10 Jul 2019 00:04:22 +0200 (CEST) Subject: Re: [EXTERNAL] Status of FreeBSD vulnerabilities in VUXML database To: "Chisholm, Rick" , "freebsd-security@freebsd.org" References: <0054FFE9E041FC4EB2D50A99E26B120A06314D8F@EDCV-XHG-TNP01.hub.local> From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: <1dec1b4c-e54f-ba65-c1dc-cc91b9a5dec2@quip.cz> Date: Wed, 10 Jul 2019 00:04:21 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Firefox/52.0 SeaMonkey/2.49.3 MIME-Version: 1.0 In-Reply-To: <0054FFE9E041FC4EB2D50A99E26B120A06314D8F@EDCV-XHG-TNP01.hub.local> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 698D789018 X-Spamd-Bar: +++++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [5.10 / 15.00]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_SOME(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_SPAM_SHORT(0.97)[0.975,0]; IP_SCORE(0.94)[ip: (0.53), ipnet: 94.124.104.0/21(0.27), asn: 42000(3.82), country: CZ(0.08)]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[quip.cz]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(1.00)[1.000,0]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MX_GOOD(-0.01)[cached: elsa.codelab.cz]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[4.105.124.94.list.dnswl.org : 127.0.10.0]; NEURAL_SPAM_LONG(1.00)[1.000,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[000.fbsd@quip.cz,SRS0=a4H4=VG=quip.cz=000.fbsd@elsa.codelab.cz]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:42000, ipnet:94.124.104.0/21, country:CZ]; FROM_NEQ_ENVFROM(0.00)[000.fbsd@quip.cz,SRS0=a4H4=VG=quip.cz=000.fbsd@elsa.codelab.cz]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Jul 2019 22:04:29 -0000 Chisholm, Rick wrote on 2019/07/09 20:55: > My understanding has always been vuXML is for ports / packages and the advisories page is for base. Support for FreeBSD base vulnerabilities was created by Mark Felder 3 years ago https://blog.feld.me/posts/2016/08/monitoring-freebsd-base-system-vulnerabilities-with-pkg-audit/ and the past Security Advisories was published in VUXML. At this time there is no other automated system to report base system vulnerabilities - are we really in 2019? > -----Original Message----- > From: owner-freebsd-security@freebsd.org On Behalf Of Miroslav Lachman > Sent: July 9, 2019 2:14 PM > To: freebsd-security@freebsd.org > Subject: [EXTERNAL] Status of FreeBSD vulnerabilities in VUXML database > > This Message originated outside of the organization. > > What is the official status of FreeBSD Security Advisories and entries in VUXML database? > I am asking especially because new FreeBSD base system vulnerabilities are not being added to the vuxml database. The last was added 2019-04-23 according to https://vuxml.freebsd.org/freebsd/ > > Why? > > VUXML is FreeBSD's own pet so why new SAs are not added there the same day they are published as SA on https://www.freebsd.org/security/advisories.html? > > It makes base-audit periodic useless. > https://www.freshports.org/security/base-audit/ > > Kind regards > Miroslav Lachman > _______________________________________________ > freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" > >