Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Sep 2004 17:06:02 -0400
From:      Tom Rhodes <trhodes@FreeBSD.org>
To:        "Dan Langille" <dan@langille.org>
Cc:        Tom Rhodes <trhodes@FreeBSD.org>
Subject:   Re: (Fwd) cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <20040929170602.43a2738a@localhost>
In-Reply-To: <415A5622.28007.13E297A6@localhost>
References:  <4159AC2E.27531.114AB696@localhost> <415A5622.28007.13E297A6@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 29 Sep 2004 06:28:50 -0400
"Dan Langille" <dan@langille.org> wrote:

> On 28 Sep 2004 at 18:27, Tom Rhodes wrote:
> 
> > On Tue, 28 Sep 2004 18:23:42 -0400
> > "Dan Langille" <dan@langille.org> wrote:
> > 
> > > FWIW, between the other fixes and this one, the number of affected 
> > > packages went from up by 40 to 395, and the number of vulns went up 
> > > by 3 to 174.
> > > 
> > > http://beta.freshports.org/vuxml.php?list and the rest of FreshPorts 
> > > has been updated with the recent changes.
> > > 
> > > The next step is to automate what I've been doing manually so that 
> > > FreshPorts VuXML data is updated automagically with each vuxml.xml 
> > > commit.
> > 
> > Is it just a script that updates when run or?
> 
> Yes.  It is a two stage process:
> 
>   # import the vulnerabilities
>   perl process_vuxml.pl < ~/ports/security/vuxml/vuln.xml
> 
>   # mark the commits
>   perl vuxml_mark_commits.pl

Oh, then just drop it into cron(8).  :)

-- 
Tom Rhodes



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040929170602.43a2738a>