From owner-cvs-all@FreeBSD.ORG Mon Sep 5 19:07:06 2011 Return-Path: Delivered-To: cvs-all@FreeBSD.org Received: from apollo.emma.line.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by hub.freebsd.org (Postfix) with ESMTP id 06EB1106564A; Mon, 5 Sep 2011 19:07:06 +0000 (UTC) (envelope-from mandree@FreeBSD.org) Received: from [127.0.0.1] (localhost.localdomain [127.0.0.1]) by apollo.emma.line.org (Postfix) with ESMTP id 8CE5723CEB1; Mon, 5 Sep 2011 01:59:12 +0200 (CEST) Message-ID: <4E6410D0.1070100@FreeBSD.org> Date: Mon, 05 Sep 2011 01:59:12 +0200 From: Matthias Andree User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.21) Gecko/20110831 Mnenhy/0.8.3 Thunderbird/3.1.13 MIME-Version: 1.0 To: Chris Rees References: <201109042015.p84KFqOR005039@repoman.freebsd.org> In-Reply-To: <201109042015.p84KFqOR005039@repoman.freebsd.org> X-Enigmail-Version: 1.1.2 Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 7bit Cc: cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Sep 2011 19:07:06 -0000 Am 04.09.2011 22:15, schrieb Chris Rees: > crees 2011-09-04 20:15:52 UTC > > FreeBSD ports repository > > Modified files: > security/vuxml vuln.xml > Log: > - Document cfs buffer overflow vulnerability. > - While here, unbreak packaudit -- it doesn't like newlines in the > middle of tags. Perhaps a comment should say something? Chris, Are you use that your XML and/or SGML toolchains and document type definitions and catalogs are properly installed? I have seen cases where the catalogs were broken, and nothing short of deinstalling xmlcatmgr (and all ports that need it), removing leftover catalogs, and reinstalling all ports that got deinstalled helped. Are you sure that you aren't by accident tripped up by CR characters somewhere? I've reverted vuln.xml to 1.2434 and don't see how it breaks the parser (xsltproc), and packaudit generates a file that seems to be in proper working order for me. HTH, Matthias