$temp =~ s{(\d+)}
{bug_links(bug=>$1)}ge;
$temp;]gxie;
-
+ if (defined $config{cve_tracker} and
+ length $config{cve_tracker}
+ ) {
+ # Add links to CVE vulnerabilities (closes #568464)
+ $body =~ s{(CVE-\d{4}-\d{4,})}
+ {<a href="http://$config{cve_tracker}$1">$1</a>}gx;
+ }
if (not exists $param{att}) {
print {$param{output}} qq(<pre class="message">$body</pre>\n);
}
qw($gVersionPackagesDir $gVersionIndex $gBinarySourceMap $gSourceBinaryMap),
qw($gVersionTimeIndex),
qw($gSimpleVersioning),
+ qw($gCVETracker),
qw($gSendmail $gLibPath $gSpamScan @gExcludeFromControl),
qw(%gSeverityDisplay @gTags @gSeverityList @gStrongSeverities),
qw(%gTagsSingleLetter),
=cut
-
set_default(\%config,'subscription_domain',undef);
+
+=item cve_tracker $gCVETracker
+
+URI to CVE security tracker; in bugreport.cgi, CVE-2001-0002 becomes
+linked to http://$config{cve_tracker}CVE-2001-002
+
+Default: security-tracker.debian.org/tracker/
+
+=cut
+
+set_default(\%config,'cve_tracker','security-tracker.debian.org/tracker/');
+
+
=back
=cut
$hash_name =~ s/^([\$\%\@])g//;
my $glob_type = $1;
my $glob_name = 'g'.$hash_name;
- $hash_name =~ s/(HTML|CGI)/ucfirst(lc($1))/ge;
+ $hash_name =~ s/(HTML|CGI|CVE)/ucfirst(lc($1))/ge;
$hash_name =~ s/^([A-Z]+)/lc($1)/e;
$hash_name =~ s/([A-Z]+)/'_'.lc($1)/ge;
return $hash_name unless wantarray;
* Fix source package src: urls
* Use package_maintainer to search for packages maintained by a
maintainer (closes: #556863). Thanks to Yves-Alexis Perez.
+ * Linkify CVE reports (closes: #568464). Thanks to Martin Zobel-Helas.
-- Don Armstrong <don@debian.org> Wed, 26 Aug 2009 21:32:53 -0700