git: d4b1dbdb83 - main - status: Correct heading levels
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 15 Nov 2021 18:01:06 UTC
The branch main has been updated by debdrup:
URL: https://cgit.FreeBSD.org/doc/commit/?id=d4b1dbdb8347a34ff8a6b0a7b93dcf7a5116346c
commit d4b1dbdb8347a34ff8a6b0a7b93dcf7a5116346c
Author: Daniel Ebdrup Jensen <debdrup@FreeBSD.org>
AuthorDate: 2021-11-15 18:00:20 +0000
Commit: Daniel Ebdrup Jensen <debdrup@FreeBSD.org>
CommitDate: 2021-11-15 18:00:20 +0000
status: Correct heading levels
This fixes the CPE report and its subheadings showing up in the ToC.
Reported by: emaste
---
website/content/en/status/report-2021-07-2021-09/cpe.adoc | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/website/content/en/status/report-2021-07-2021-09/cpe.adoc b/website/content/en/status/report-2021-07-2021-09/cpe.adoc
index 69a43c419f..e2fe9e6d3f 100644
--- a/website/content/en/status/report-2021-07-2021-09/cpe.adoc
+++ b/website/content/en/status/report-2021-07-2021-09/cpe.adoc
@@ -22,7 +22,7 @@ use it. This is why a script called `chkcpe` was created to
validate existing CPE data and find new possible matches
automatically.
-=== Why do we need it?
+==== Why do we need it?
It allows comparing CPE URIs for installed packages against
published vulnerability data and will give us a much better and
@@ -30,7 +30,7 @@ more complete `pkg audit`. As a side effect we will also have a
better overview of vulnerable ports in the FreeBSD Ports Collection
that need to be patched or updated.
-=== How can I help?
+==== How can I help?
In this phase there is no easy possibility for port maintainers to
help. Creating separate PRs only to add CPE data does not make
@@ -40,10 +40,9 @@ Right now review and commit consumes around 3 minutes per port.
If you are a Ports Committer and want to help please get in touch!
-=== Open Tasks
+==== Open Tasks
* Review remaining reports (~1800) and update ports when appropriate
* Improve matching quality to find more possible matches
* Support using CPE data in `pkg audit`
* Scan for vulnerable ports in the Ports Collection
-