1 |
Very nice, slick script .. thanks! |
2 |
|
3 |
Lenny |
4 |
|
5 |
-----Original Message----- |
6 |
From: Konstnatin V. Gavrilenko [mailto:mlists@××××××.com] |
7 |
Sent: Tuesday, May 22, 2007 11:33 AM |
8 |
To: gentoo-security@l.g.o |
9 |
Subject: Re: [gentoo-security] Days of yore |
10 |
|
11 |
the script I use to get email notifications of the affected ebuilds, |
12 |
that also prepares a shell script that fixes the glsas. |
13 |
|
14 |
might be useful for someone. |
15 |
|
16 |
|
17 |
yours, |
18 |
kos |
19 |
|
20 |
#!/bin/bash |
21 |
tmp="/tmp/.glsa-check" |
22 |
update="/root/run-to-update.sh" |
23 |
glsa="/usr/portage/metadata/glsa" |
24 |
|
25 |
if [ -f $tmp ] ; then |
26 |
rm -f $tmp |
27 |
fi |
28 |
|
29 |
if [ -f $update ] ; then |
30 |
rm -f $update |
31 |
fi |
32 |
|
33 |
emerge --sync >/dev/null 2>&1 |
34 |
glsa-check -n --list affected 2> /dev/null > $tmp |
35 |
|
36 |
arr=(`cat $tmp | awk '{print $1}'`) |
37 |
BUGCOUNT=${#arr[@]} |
38 |
|
39 |
if [ $BUGCOUNT -gt "0" ] ; then |
40 |
|
41 |
echo -e '#!/bin/bash' > $update |
42 |
echo -ne '#relevant as for ' >> $update |
43 |
echo `date +%D` >> $update |
44 |
|
45 |
n=0 |
46 |
while (($n < $BUGCOUNT)); do |
47 |
|
48 |
echo "/usr/bin/glsa-check -f" ${arr[$n]} >> $update |
49 |
cat $glsa/glsa-${arr[$n]}.xml | grep "# emerge" | grep -v "emerge |
50 |
--sync" | \ |
51 |
sed 's/\"\;/\"/g' | sed 's/\>\;/\>/g' | sed 's/<\/code>//g' >> |
52 |
$update |
53 |
echo >> $update |
54 |
let n+=1 |
55 |
done |
56 |
|
57 |
echo -e "\nRun $update to update the system" >> $tmp |
58 |
cat $tmp | /bin/mail -s GLSA_UNAPPLIED email_address@××××××.com |
59 |
rm -rf $tmp |
60 |
fi |
61 |
|
62 |
|
63 |
|
64 |
|
65 |
|
66 |
Sune Kloppenborg Jeppesen wrote: |
67 |
> On Monday 16 April 2007 20:31, Sune Kloppenborg Jeppesen wrote: |
68 |
>> I agree that policy should be updated to reflect this but that got bogged |
69 |
>> down by other issues last I tried. I'll try again. |
70 |
> Ohh well, I must have dropped my memory somewhere I forgot:( |
71 |
> |
72 |
> I actually updated the Gentoo Linux Vulnerability Treatment Policy last |
73 |
> August to reflect that: |
74 |
> |
75 |
> "Kernels |
76 |
> Currently kernels are not covered by the GLSA release process. |
77 |
> Vulnerabilities must still be reported and will be fixed, but no GLSA will be |
78 |
> issued when everything is solved. |
79 |
> Note: This policy should be changed when new tools are added to cover |
80 |
> security vulnerabilities affecting the different kernel sources." |
81 |
> |
82 |
> http://www.gentoo.org/security/en/vulnerability-policy.xml |
83 |
> |
84 |
|
85 |
-- |
86 |
gentoo-security@g.o mailing list |
87 |
|
88 |
|
89 |
-- |
90 |
gentoo-security@g.o mailing list |