Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 5 Sep 2011 09:45:55 +0200
From:      Remko Lodder <remko@elvandar.org>
To:        Chris Rees <crees@freebsd.org>
Cc:        cvs-ports@freebsd.org, secteam@freebsd.org, cvs-all@freebsd.org, ports-committers@freebsd.org
Subject:   Re: cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <227CDF2C-301B-4443-9DBB-928866528F78@elvandar.org>
In-Reply-To: <CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA@mail.gmail.com>
References:  <201109042015.p84KFqOR005039@repoman.freebsd.org> <CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help

Dear Chris,

Please have a look, but consult us before you actually commit the changes..

Thanks
Remko

On Sep 4, 2011, at 10:44 PM, Chris Rees wrote:

> On 4 September 2011 21:15, Chris Rees <crees@freebsd.org> wrote:
>> crees       2011-09-04 20:15:52 UTC
>> 
>>  FreeBSD ports repository
>> 
>>  Modified files:
>>    security/vuxml       vuln.xml
>>  Log:
>>  - Document cfs buffer overflow vulnerability.
>>  - While here, unbreak packaudit -- it doesn't like newlines in the
>>    middle of tags.  Perhaps a comment should say something?
> 
> Actually, that's a bad long-term solution. The real solution would be
> to fix portaudit's XML parser.
> 
> secteam, would you like me to have a go at it, or shall I let you
> investigate since you know the code?
> 
> Chris
> _______________________________________________________
> Please think twice when forwarding, cc:ing, or bcc:ing
> security-team messages.  Ask if you are unsure.
> 




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?227CDF2C-301B-4443-9DBB-928866528F78>