From owner-freebsd-gnome@FreeBSD.ORG Tue May 13 02:21:31 2014 Return-Path: Delivered-To: gnome@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 2853FC3D for ; Tue, 13 May 2014 02:21:31 +0000 (UTC) Received: from mail.musha.org (v055125.ppp.asahi-net.or.jp [124.155.55.125]) by mx1.freebsd.org (Postfix) with ESMTP id 8D6D82EF7 for ; Tue, 13 May 2014 02:21:29 +0000 (UTC) Received: by mail.musha.org (Postfix, from userid 58) id 3gSMvk2nxmzYnJX; Tue, 13 May 2014 11:11:46 +0900 (JST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on daemon.musha.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=13.0 tests=BAYES_00, CONTENT_TYPE_PRESENT,FAKEDWORD_ONE,FAKEDWORD_VERTICALLINE,ONLY1HOPDIRECT, RP_MATCHES_RCVD,SPF_HELO_FAIL,SPF_SOFTFAIL autolearn=no autolearn_force=no version=3.4.0 Received: from daemon.musha.org (daemon.local.idaemons.org [192.168.11.11]) by mail.musha.org (Postfix) with ESMTP id 3gSMvj6cWvzYnJV for ; Tue, 13 May 2014 11:11:45 +0900 (JST) Date: Tue, 13 May 2014 11:11:45 +0900 Message-ID: <86fvkeh1ge.knu@iDaemons.org> From: "Akinori MUSHA" To: gnome@FreeBSD.org Subject: textproc/libxml2: multiple DoS vulnerabilities Organization: Associated I. Daemons X-PGP-Public-Key: finger knu@FreeBSD.org X-PGP-Fingerprint: 081D 099C 1705 861D 4B70 B04A 920B EFC7 9FD9 E1EE MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: multipart/signed; boundary="pgp-sign-Multipart_Tue_May_13_11:11:41_2014-1"; micalg=pgp-sha1; protocol="application/pgp-signature" Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 May 2014 02:21:31 -0000 --pgp-sign-Multipart_Tue_May_13_11:11:41_2014-1 Content-Type: text/plain; charset=US-ASCII Hi, I have just added entries for CVE-2014-0191 and CVE-2013-2877 which affect textproc/libxml2 to vuln.xml. Please add the patches found via the links in the entries to the port, as soon as possible. Best Regards, -- Akinori MUSHA / https://akinori.org/ --pgp-sign-Multipart_Tue_May_13_11:11:41_2014-1 Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit Content-Description: OpenPGP Digital Signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEABECAAYFAlNxf10ACgkQkgvvx5/Z4e78cQCdHBKU33uyMzhCGVo5tIwT5RuN WK0AoNg407xLNrTo5IltL2XL4As8WjwB =BbbG -----END PGP SIGNATURE----- --pgp-sign-Multipart_Tue_May_13_11:11:41_2014-1--