Date: Sun, 4 Sep 2011 21:44:07 +0100 From: Chris Rees <crees@freebsd.org> To: ports-committers@freebsd.org, cvs-ports@freebsd.org, cvs-all@freebsd.org, secteam@freebsd.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml Message-ID: <CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA@mail.gmail.com> In-Reply-To: <201109042015.p84KFqOR005039@repoman.freebsd.org> References: <201109042015.p84KFqOR005039@repoman.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 4 September 2011 21:15, Chris Rees <crees@freebsd.org> wrote: > crees =A0 =A0 =A0 2011-09-04 20:15:52 UTC > > =A0FreeBSD ports repository > > =A0Modified files: > =A0 =A0security/vuxml =A0 =A0 =A0 vuln.xml > =A0Log: > =A0- Document cfs buffer overflow vulnerability. > =A0- While here, unbreak packaudit -- it doesn't like newlines in the > =A0 =A0middle of tags. =A0Perhaps a comment should say something? Actually, that's a bad long-term solution. The real solution would be to fix portaudit's XML parser. secteam, would you like me to have a go at it, or shall I let you investigate since you know the code? Chris
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA>