Date: Mon, 5 Sep 2011 09:45:55 +0200 From: Remko Lodder <remko@elvandar.org> To: Chris Rees <crees@freebsd.org> Cc: cvs-ports@freebsd.org, secteam@freebsd.org, cvs-all@freebsd.org, ports-committers@freebsd.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml Message-ID: <227CDF2C-301B-4443-9DBB-928866528F78@elvandar.org> In-Reply-To: <CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA@mail.gmail.com> References: <201109042015.p84KFqOR005039@repoman.freebsd.org> <CADLo83_poDk0J2Sfk3dE8WvU8e3J47fewVhTtzLp2DznqEYxeA@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Dear Chris, Please have a look, but consult us before you actually commit the changes.. Thanks Remko On Sep 4, 2011, at 10:44 PM, Chris Rees wrote: > On 4 September 2011 21:15, Chris Rees <crees@freebsd.org> wrote: >> crees 2011-09-04 20:15:52 UTC >> >> FreeBSD ports repository >> >> Modified files: >> security/vuxml vuln.xml >> Log: >> - Document cfs buffer overflow vulnerability. >> - While here, unbreak packaudit -- it doesn't like newlines in the >> middle of tags. Perhaps a comment should say something? > > Actually, that's a bad long-term solution. The real solution would be > to fix portaudit's XML parser. > > secteam, would you like me to have a go at it, or shall I let you > investigate since you know the code? > > Chris > _______________________________________________________ > Please think twice when forwarding, cc:ing, or bcc:ing > security-team messages. Ask if you are unsure. >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?227CDF2C-301B-4443-9DBB-928866528F78>