From owner-freebsd-vuxml@FreeBSD.ORG Mon Jan 24 15:47:39 2005 Return-Path: Delivered-To: freebsd-vuxml@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5483116A4CE for ; Mon, 24 Jan 2005 15:47:39 +0000 (GMT) Received: from bast.unixathome.org (bast.unixathome.org [66.11.174.150]) by mx1.FreeBSD.org (Postfix) with ESMTP id 21BA643D2D for ; Mon, 24 Jan 2005 15:47:39 +0000 (GMT) (envelope-from dan@langille.org) Received: from wocker (wocker.unixathome.org [192.168.0.99]) by bast.unixathome.org (Postfix) with ESMTP id 786353D40 for ; Mon, 24 Jan 2005 10:47:28 -0500 (EST) From: "Dan Langille" To: freebsd-vuxml@freebsd.org Date: Mon, 24 Jan 2005 10:47:28 -0500 MIME-Version: 1.0 Message-ID: <41F4D240.12228.221FB59D@localhost> Priority: normal In-reply-to: <41F3755F.17732.1CCB0831@localhost> X-mailer: Pegasus Mail for Windows (4.21c) Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: 7BIT Content-description: Mail message body Subject: Re: what happens if a vuln is loaded in error? X-BeenThere: freebsd-vuxml@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Documenting security issues in VuXML List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 24 Jan 2005 15:47:39 -0000 On 23 Jan 2005 at 9:58, Dan Langille wrote: > I'm looking over the design of how FreshPorts handles VuXML changes. > A thought comes to mind. If a vuln turns out to be false (i.e not a > vulnerability at all, for whatever reason), what changes would be > made to the VuXML data? How would this situation be fixed? This commit answers my question: http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/vuxml/vuln.xml.di ff?r1=1.515&r2=1.516&f=h Thanks -- Dan Langille : http://www.langille.org/ BSDCan - The Technical BSD Conference - http://www.bsdcan.org/