Date: Tue, 9 Jul 2019 18:55:56 +0000 From: "Chisholm, Rick" <rick.chisholm@hubinternational.com> To: Miroslav Lachman <000.fbsd@quip.cz>, "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: RE: [EXTERNAL] Status of FreeBSD vulnerabilities in VUXML database Message-ID: <0054FFE9E041FC4EB2D50A99E26B120A06314D8F@EDCV-XHG-TNP01.hub.local> In-Reply-To: <af0f5734-180e-33e3-6b39-ea97fb2422fa@quip.cz> References: <af0f5734-180e-33e3-6b39-ea97fb2422fa@quip.cz>
next in thread | previous in thread | raw e-mail | index | archive | help
My understanding has always been vuXML is for ports / packages and the advi= sories page is for base. -----Original Message----- From: owner-freebsd-security@freebsd.org <owner-freebsd-security@freebsd.or= g> On Behalf Of Miroslav Lachman Sent: July 9, 2019 2:14 PM To: freebsd-security@freebsd.org Subject: [EXTERNAL] Status of FreeBSD vulnerabilities in VUXML database This Message originated outside of the organization. What is the official status of FreeBSD Security Advisories and entries in V= UXML database? I am asking especially because new FreeBSD base system vulnerabilities are = not being added to the vuxml database. The last was added 2019-04-23 accord= ing to https://vuxml.freebsd.org/freebsd/ Why? VUXML is FreeBSD's own pet so why new SAs are not added there the same day = they are published as SA on https://www.freebsd.org/security/advisories.htm= l? It makes base-audit periodic useless.=20 https://www.freshports.org/security/base-audit/ Kind regards Miroslav Lachman _______________________________________________ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman= /listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?0054FFE9E041FC4EB2D50A99E26B120A06314D8F>