Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Sep 2021 15:55:43 +0200
From:      =?UTF-8?Q?Bernhard_Fr=C3=B6hlich?= <decke@freebsd.org>
To:        Jan Beich <jbeich@freebsd.org>
Cc:        "ports-committers@freebsd.org" <ports-committers@freebsd.org>,  "dev-commits-ports-all@freebsd.org" <dev-commits-ports-all@freebsd.org>,  "dev-commits-ports-main@freebsd.org" <dev-commits-ports-main@freebsd.org>
Subject:   Re: git: f07b3de4630f - main - security/vuxml: update seatd 0.6.{0, 1} entry
Message-ID:  <CAE-m3X2hcVjZT1GrMxdFZRJMiGCiHiq8zn4vE-QVOGoxxNYQmQ@mail.gmail.com>
In-Reply-To: <CAE-m3X37tK0H4xvD=B9DE0b%2B_LKgh_Z=wvQcsJ4nhwA4LBWTXg@mail.gmail.com>
References:  <202109172138.18HLc4NF056932__21043.0593624309$1631914770$gmane$org@gitrepo.freebsd.org> <czp6-g9bo-wny@FreeBSD.org> <CAE-m3X37tK0H4xvD=B9DE0b%2B_LKgh_Z=wvQcsJ4nhwA4LBWTXg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Saturday, September 18, 2021, Bernhard Fr=C3=B6hlich <decke@freebsd.org>
wrote:

> On Friday, September 17, 2021, Jan Beich <jbeich@freebsd.org> wrote:
>
>> Jan Beich <jbeich@FreeBSD.org> writes:
>>
>> > The branch main has been updated by jbeich:
>> >
>> > URL: https://cgit.FreeBSD.org/ports/commit/?id=3Df07b3de4630f5062f4
>> de92232b6a5f5902ad21c8
>> >
>> > commit f07b3de4630f5062f4de92232b6a5f5902ad21c8
>> > Author:     Jan Beich <jbeich@FreeBSD.org>
>> > AuthorDate: 2021-09-17 21:34:14 +0000
>> > Commit:     Jan Beich <jbeich@FreeBSD.org>
>> > CommitDate: 2021-09-17 21:37:59 +0000
>> >
>> >     security/vuxml: update seatd 0.6.{0,1} entry
>> >
>> >     - Discovered 1 day before announcement
>> >     - Assigned CVE-2021-41387
>>
>> Bernhard, can you check if sysutils/seatd now needs USES=3Dcpe?
>> I've tried looking at NVD link[1] but it doesn't seem to list
>> "Known Affected Software Configurations".
>>
>> [1] https://nvd.nist.gov/vuln/detail/CVE-2021-41387
>>
>
> The source oft truth is the CPE Dictionary but I could not find a matchin=
g
> entry yet.
>
>  https://nvd.nist.gov/products/cpe/search/results?
> namingFormat=3D2.3&keyword=3Dseatd
>
> This is a nice example to check the timing when it is added to the CPE
> Dictionary. The CVE entry is currently in received state.
>

It took quite long but the CVE has switched to analyzed.

 https://nvd.nist.gov/vuln/detail/CVE-2021-41387

The used CPE is cpe:2.3:a:seatd_project:seatd so adding USES=3Dcpe and
CPE_VENDOR=3Dseatd_project will be correct.

Now I wonder when the CPE entry will be added to the CPE dictionary.


--=20
Bernhard Froehlich
http://www.bluelife.at/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAE-m3X2hcVjZT1GrMxdFZRJMiGCiHiq8zn4vE-QVOGoxxNYQmQ>