From owner-svn-ports-head@FreeBSD.ORG Wed Aug 7 13:42:34 2013 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 1033) id 6FA4AC86; Wed, 7 Aug 2013 13:42:34 +0000 (UTC) Date: Wed, 7 Aug 2013 13:42:34 +0000 From: Alexey Dokuchaev To: "Timur I. Bakeyev" Subject: Re: svn commit: r324296 - head/net/samba36 Message-ID: <20130807134234.GB14969@FreeBSD.org> References: <201308060032.r760W83G023317@svn.freebsd.org> <20130807132239.GB10293@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Cc: "svn-ports-head@freebsd.org" , "svn-ports-all@freebsd.org" , Jason Helfman , "ports-committers@freebsd.org" X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Aug 2013 13:42:34 -0000 On Wed, Aug 07, 2013 at 03:38:04PM +0200, Timur I. Bakeyev wrote: > Well, it's said that CVE code should be inserted there and by such a code > it's possible to fetch description and vulnerable versions in theory... But > true, never thought of it thoroughly.. VuXML entries have too much stuff that has to be input manually, from exact versions vulnerable (NVidia drivers give me real PITA in this regard) up to writing summary excerpts, which in general case cannot be easily factored out from upstream CVE entry. ./danfe