> One thing we talked about was adding tags that could either be indicators for
> the priority assessing role, or could be expanded into the explanation itself.
> A really simple sample of the data store for this could look something like:
>
> diff --git a/meta_lists/priority_explanations.yaml
> b/meta_lists/priority_explanations.yaml
> new file mode 100644
> index 00000000000..868d5011dca
> --- /dev/null
> +++ b/meta_lists/priority_explanations.yaml
> @@ -0,0 +1,7 @@
> +# standardized priority reason text
> +# tag/keyword based, so that we can add the tags as part of triage and
> +# re-triage to make it easier to generate.
> +---
> +kernel-debugfs: |
> + Exploitation requires write access to debugfs entries, which are
> + restricted to root by default on Ubuntu kernels.
> One thing we talked about was adding tags that could either be indicators for lists/priority_ explanations. yaml lists/priority_ explanations. yaml .868d5011dca lists/priority_ explanations. yaml
> the priority assessing role, or could be expanded into the explanation itself.
> A really simple sample of the data store for this could look something like:
>
> diff --git a/meta_
> b/meta_
> new file mode 100644
> index 00000000000.
> --- /dev/null
> +++ b/meta_
> @@ -0,0 +1,7 @@
> +# standardized priority reason text
> +# tag/keyword based, so that we can add the tags as part of triage and
> +# re-triage to make it easier to generate.
> +---
> +kernel-debugfs: |
> + Exploitation requires write access to debugfs entries, which are
> + restricted to root by default on Ubuntu kernels.
Added in https:/ /git.launchpad. net/~emitorino/ ubuntu- cve-tracker/ commit/ ?id=8c994d73504 84b43b72b876a84 764548185a00db
I also added:
1) the capability to filter CVEs published until a provided date https:/ /git.launchpad. net/~emitorino/ ubuntu- cve-tracker/ commit/ ?id=0ada37ceebc 83e7ad345e8a45f 15bbd22e1082af. So this combined with --published-since can allow to filter by a range
2) The support for non-interactive (i.e. tmpfile) mode https:/ /git.launchpad. net/~emitorino/ ubuntu- cve-tracker/ commit/ ?id=44f9c8be7a6 aef70ce65bcec4c af46b35259469f