From ba2e52a9fde8c13813c0e8e01f6540a28d1fb925 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Sun, 24 Apr 2016 13:00:39 +0000 Subject: Add check for Red Hat source using Red Hat bugzilla git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@41113 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- check-external/update.sh | 6 ++++++ 1 file changed, 6 insertions(+) (limited to 'check-external') diff --git a/check-external/update.sh b/check-external/update.sh index 4148f031a3..1e6ea81a40 100755 --- a/check-external/update.sh +++ b/check-external/update.sh @@ -41,6 +41,12 @@ check_list() { # sort > cve.list #check_list cve.list +# Fetch some CVE information directly from Red Hat Bugzilla +# This should be better done via a rewrite and using python-bugzilla +# but it is sufficient for now to get some additional CVE information +# from Red Hat source +wget -O redhat-bugzilla.html 'https://bugzilla.redhat.com/buglist.cgi?classification=Other&component=vulnerability&f1=alias&o1=regexp&product=Security%20Response&query_format=advanced&v1=^CVE-.*&order=priority%2Cbug_severity&limit=0' +sed -rn '/CVE-[12][0-9]{2,}-/{s/^.+(CVE-[12][0-9]{3}-[0-9]{4,}).+$/\1/;T;p}' redhat-bugzilla.html | sort > cve.list check_list cve.list # List of issues fixed by each vendor, according to MITRE. Very -- cgit v1.2.3