Date: Wed, 29 Sep 2004 17:06:02 -0400 From: Tom Rhodes <trhodes@FreeBSD.org> To: "Dan Langille" <dan@langille.org> Cc: Tom Rhodes <trhodes@FreeBSD.org> Subject: Re: (Fwd) cvs commit: ports/security/vuxml vuln.xml Message-ID: <20040929170602.43a2738a@localhost> In-Reply-To: <415A5622.28007.13E297A6@localhost> References: <4159AC2E.27531.114AB696@localhost> <415A5622.28007.13E297A6@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 29 Sep 2004 06:28:50 -0400 "Dan Langille" <dan@langille.org> wrote: > On 28 Sep 2004 at 18:27, Tom Rhodes wrote: > > > On Tue, 28 Sep 2004 18:23:42 -0400 > > "Dan Langille" <dan@langille.org> wrote: > > > > > FWIW, between the other fixes and this one, the number of affected > > > packages went from up by 40 to 395, and the number of vulns went up > > > by 3 to 174. > > > > > > http://beta.freshports.org/vuxml.php?list and the rest of FreshPorts > > > has been updated with the recent changes. > > > > > > The next step is to automate what I've been doing manually so that > > > FreshPorts VuXML data is updated automagically with each vuxml.xml > > > commit. > > > > Is it just a script that updates when run or? > > Yes. It is a two stage process: > > # import the vulnerabilities > perl process_vuxml.pl < ~/ports/security/vuxml/vuln.xml > > # mark the commits > perl vuxml_mark_commits.pl Oh, then just drop it into cron(8). :) -- Tom Rhodes
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040929170602.43a2738a>