On Monday 18 June 2007 21:31:20 Javier wrote:
> On Mon, Jun 18, 2007 at 07:36:19PM +0100, Tim Brown wrote:
> > Okay, talking to Debian Security folk:
> >
> > svn://svn.debian.org/svn/secure-testing/data/DSA/list
>
> Actually, that is not the complete info, the full info is available at
> http://cvs.debian.org/webwml/english/security/?root=webwml

This is more accurate, but less nice to parse and doesn't seem to give such 
good information about the vulnerability.

> That one includes both the package information data and the description of
> the DSAs themselves. That is what is used for website generation.
>
> > Is a machine readable version of the DSA, so I'm going to hack up some
> > perl to generate the scripts next :).
>
> There's already some scripts @ the CVS site to parse the DSA data (

It's horrible python unless you mean DSA2nasl which appears to be 
proprietary :)

> > Javier, is this useful to the current nessus
> > package in Debian, I'm looking at my install and the latest DSA check is
> > DSA-869.
>
> That could be useful for the Nessus package, but the local security checks
> from Nessus (which are GPL) already include that information (and I provide
> them in the nessus-plugins package). Why regenerate them?

The Nessus local security checks in unstable don't seem up to date, as I say, 
the latest appears to be 869.

Tim
-- 
Tim Brown
<mailto:[EMAIL PROTECTED]>
<http://www.nth-dimension.org.uk/>
_______________________________________________
Openvas-plugins mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins

Reply via email to