Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 4 Sep 2011 21:44:07 +0100
From:      Chris Rees <crees@freebsd.org>
To:        ports-committers@freebsd.org, cvs-ports@freebsd.org, cvs-all@freebsd.org,  secteam@freebsd.org
Subject:   Re: cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA@mail.gmail.com>
In-Reply-To: <201109042015.p84KFqOR005039@repoman.freebsd.org>
References:  <201109042015.p84KFqOR005039@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 4 September 2011 21:15, Chris Rees <crees@freebsd.org> wrote:
> crees =A0 =A0 =A0 2011-09-04 20:15:52 UTC
>
> =A0FreeBSD ports repository
>
> =A0Modified files:
> =A0 =A0security/vuxml =A0 =A0 =A0 vuln.xml
> =A0Log:
> =A0- Document cfs buffer overflow vulnerability.
> =A0- While here, unbreak packaudit -- it doesn't like newlines in the
> =A0 =A0middle of tags. =A0Perhaps a comment should say something?

Actually, that's a bad long-term solution. The real solution would be
to fix portaudit's XML parser.

secteam, would you like me to have a go at it, or shall I let you
investigate since you know the code?

Chris



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA>