Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 9 Jul 2019 18:55:56 +0000
From:      "Chisholm, Rick" <rick.chisholm@hubinternational.com>
To:        Miroslav Lachman <000.fbsd@quip.cz>, "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   RE: [EXTERNAL] Status of FreeBSD vulnerabilities in VUXML database
Message-ID:  <0054FFE9E041FC4EB2D50A99E26B120A06314D8F@EDCV-XHG-TNP01.hub.local>
In-Reply-To: <af0f5734-180e-33e3-6b39-ea97fb2422fa@quip.cz>
References:  <af0f5734-180e-33e3-6b39-ea97fb2422fa@quip.cz>

next in thread | previous in thread | raw e-mail | index | archive | help
My understanding has always been vuXML is for ports / packages and the advi=
sories page is for base.

-----Original Message-----
From: owner-freebsd-security@freebsd.org <owner-freebsd-security@freebsd.or=
g> On Behalf Of Miroslav Lachman
Sent: July 9, 2019 2:14 PM
To: freebsd-security@freebsd.org
Subject: [EXTERNAL] Status of FreeBSD vulnerabilities in VUXML database

This Message originated outside of the organization.

What is the official status of FreeBSD Security Advisories and entries in V=
UXML database?
I am asking especially because new FreeBSD base system vulnerabilities are =
not being added to the vuxml database. The last was added 2019-04-23 accord=
ing to https://vuxml.freebsd.org/freebsd/

Why?

VUXML is FreeBSD's own pet so why new SAs are not added there the same day =
they are published as SA on https://www.freebsd.org/security/advisories.htm=
l?

It makes base-audit periodic useless.=20
https://www.freshports.org/security/base-audit/

Kind regards
Miroslav Lachman
_______________________________________________
freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman=
/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?0054FFE9E041FC4EB2D50A99E26B120A06314D8F>