From owner-freebsd-vuxml@FreeBSD.ORG Wed Sep 29 21:05:22 2004 Return-Path: Delivered-To: freebsd-vuxml@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5A43016A4D0; Wed, 29 Sep 2004 21:05:22 +0000 (GMT) Received: from pittgoth.com (14.zlnp1.xdsl.nauticom.net [209.195.149.111]) by mx1.FreeBSD.org (Postfix) with ESMTP id 02F1A43D46; Wed, 29 Sep 2004 21:05:22 +0000 (GMT) (envelope-from trhodes@FreeBSD.org) Received: from localhost (acs-24-154-239-170.zoominternet.net [24.154.239.170]) (authenticated bits=0) by pittgoth.com (8.12.10/8.12.10) with ESMTP id i8TL5Kex005588 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Wed, 29 Sep 2004 17:05:21 -0400 (EDT) (envelope-from trhodes@FreeBSD.org) Date: Wed, 29 Sep 2004 17:06:02 -0400 From: Tom Rhodes To: "Dan Langille" Message-Id: <20040929170602.43a2738a@localhost> In-Reply-To: <415A5622.28007.13E297A6@localhost> References: <4159AC2E.27531.114AB696@localhost> <415A5622.28007.13E297A6@localhost> X-Mailer: Sylpheed-Claws 0.9.12 (GTK+ 1.2.10; i386-portbld-freebsd5.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit cc: freebsd-vuxml@FreeBSD.org cc: Tom Rhodes Subject: Re: (Fwd) cvs commit: ports/security/vuxml vuln.xml X-BeenThere: freebsd-vuxml@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Documenting security issues in VuXML List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Sep 2004 21:05:22 -0000 On Wed, 29 Sep 2004 06:28:50 -0400 "Dan Langille" wrote: > On 28 Sep 2004 at 18:27, Tom Rhodes wrote: > > > On Tue, 28 Sep 2004 18:23:42 -0400 > > "Dan Langille" wrote: > > > > > FWIW, between the other fixes and this one, the number of affected > > > packages went from up by 40 to 395, and the number of vulns went up > > > by 3 to 174. > > > > > > http://beta.freshports.org/vuxml.php?list and the rest of FreshPorts > > > has been updated with the recent changes. > > > > > > The next step is to automate what I've been doing manually so that > > > FreshPorts VuXML data is updated automagically with each vuxml.xml > > > commit. > > > > Is it just a script that updates when run or? > > Yes. It is a two stage process: > > # import the vulnerabilities > perl process_vuxml.pl < ~/ports/security/vuxml/vuln.xml > > # mark the commits > perl vuxml_mark_commits.pl Oh, then just drop it into cron(8). :) -- Tom Rhodes