Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 4 Sep 2011 21:44:07 +0100
From:      Chris Rees <crees@freebsd.org>
To:        ports-committers@freebsd.org, cvs-ports@freebsd.org, cvs-all@freebsd.org,  secteam@freebsd.org
Subject:   Re: cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA@mail.gmail.com>
In-Reply-To: <201109042015.p84KFqOR005039@repoman.freebsd.org>
References:  <201109042015.p84KFqOR005039@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On 4 September 2011 21:15, Chris Rees <crees@freebsd.org> wrote:
> crees       2011-09-04 20:15:52 UTC
>
>  FreeBSD ports repository
>
>  Modified files:
>    security/vuxml       vuln.xml
>  Log:
>  - Document cfs buffer overflow vulnerability.
>  - While here, unbreak packaudit -- it doesn't like newlines in the
>    middle of tags.  Perhaps a comment should say something?

Actually, that's a bad long-term solution. The real solution would be
to fix portaudit's XML parser.

secteam, would you like me to have a go at it, or shall I let you
investigate since you know the code?

Chris



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA>