Commit a44ddd54 authored by Neil McGovern's avatar Neil McGovern

Now doesn't ignore last item in DTSA/list


git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1815 e39458fd-73e7-0310-bf30-c45bca0a0e42
parent f69b6d28
......@@ -49,6 +49,11 @@ while(<LIST>) {
$pack = 0;
}
}
if ($pack == 1) {
# print the previous acvisory, as it wasn't unreleased
print OUT "<dt>$date <a href='DTSA/$dtsa.html'>$dtsa $package</a></dt>\n";
print OUT "<dd>$desc</dd>\n";
}
print OUT "</dl>\n";
open (FOOT,"footer.html") || die("Could not open footer.html: $!"); ;
......
......@@ -109,7 +109,7 @@ def export_html(src, date, vuln_type, cve, testing_fix, sid_fix, descr, vendor_a
# Open, read, write and close the header
header = open(os.getcwd() + "/templates/header.html","r")
for line in header.readlines():
header.write(line);
html.write(line);
header.close
# Write the actual html
......
......@@ -68,8 +68,6 @@ group.&nbsp;<br>
<dd>apt-get update && apt-get install maildrop</dd>
<br>
<dt>The Debian testing security team does not track security issues for then stable (sarge) and oldstable (woody) distributions. If stable is vulnerable, the Debian security team will make an announcement once a fix is ready.</dt>
<br>
<dt>To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:<dt>
<br>
......@@ -80,8 +78,6 @@ group.&nbsp;<br>
<dd><a href='http://secure-testing.debian.net/ziyi-2005-7.asc'>http://secure-testing.debian.net/ziyi-2005-7.asc</a><dd>
<br>
<dt>For further information about the Debian testing security team, please refer to <a href='http://secure-testing.debian.net/'>http://secure-testing.debian.net/</a></dt>
<!-- footer -->
<hr>
......
......@@ -55,6 +55,8 @@
<dd>bad device name escaping</dd>
<dt>[August 29th, 2005] <a href='DTSA/DTSA-10-1.html'>DTSA-10-1 pcre3</a></dt>
<dd>buffer overflow</dd>
<dt>[August 29th, 2005] <a href='DTSA/DTSA-11-1.html'>DTSA-11-1 maildrop</a></dt>
<dd>local privilege escalation</dd>
</dl>
<!-- footer -->
<hr>
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment