Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Sep 2004 06:28:50 -0400
From:      "Dan Langille" <dan@langille.org>
To:        Tom Rhodes <trhodes@FreeBSD.org>
Cc:        freebsd-vuxml@FreeBSD.org
Subject:   Re: (Fwd) cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <415A5622.28007.13E297A6@localhost>
In-Reply-To: <20040928182756.5be693ef@localhost>
References:  <4159AC2E.27531.114AB696@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help

On 28 Sep 2004 at 18:27, Tom Rhodes wrote:

> On Tue, 28 Sep 2004 18:23:42 -0400
> "Dan Langille" <dan@langille.org> wrote:
> 
> > FWIW, between the other fixes and this one, the number of affected 
> > packages went from up by 40 to 395, and the number of vulns went up 
> > by 3 to 174.
> > 
> > http://beta.freshports.org/vuxml.php?list and the rest of FreshPorts 
> > has been updated with the recent changes.
> > 
> > The next step is to automate what I've been doing manually so that 
> > FreshPorts VuXML data is updated automagically with each vuxml.xml 
> > commit.
> 
> Is it just a script that updates when run or?

Yes.  It is a two stage process:

  # import the vulnerabilities
  perl process_vuxml.pl < ~/ports/security/vuxml/vuln.xml

  # mark the commits
  perl vuxml_mark_commits.pl




-- 
Dan Langille : http://www.langille.org/
BSDCan - The Technical BSD Conference - http://www.bsdcan.org/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?415A5622.28007.13E297A6>