Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 05 Sep 2011 01:59:12 +0200
From:      Matthias Andree <mandree@FreeBSD.org>
To:        Chris Rees <crees@FreeBSD.org>
Cc:        cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org
Subject:   Re: cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <4E6410D0.1070100@FreeBSD.org>
In-Reply-To: <201109042015.p84KFqOR005039@repoman.freebsd.org>
References:  <201109042015.p84KFqOR005039@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Am 04.09.2011 22:15, schrieb Chris Rees:
> crees       2011-09-04 20:15:52 UTC
>
>   FreeBSD ports repository
>
>   Modified files:
>     security/vuxml       vuln.xml
>   Log:
>   - Document cfs buffer overflow vulnerability.
>   - While here, unbreak packaudit -- it doesn't like newlines in the
>     middle of tags.  Perhaps a comment should say something?

Chris,

Are you use that your XML and/or SGML toolchains and document type
definitions and catalogs are properly installed?   I have seen cases
where the catalogs were broken, and nothing short of deinstalling
xmlcatmgr (and all ports that need it), removing leftover catalogs, and
reinstalling all ports that got deinstalled helped.

Are you sure that you aren't by accident tripped up by CR characters
somewhere?

I've reverted vuln.xml to 1.2434 and don't see how it breaks the parser
(xsltproc), and packaudit generates a file that seems to be in proper
working order for me.

HTH,
Matthias



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E6410D0.1070100>