Date: Mon, 05 Sep 2011 01:59:12 +0200 From: Matthias Andree <mandree@FreeBSD.org> To: Chris Rees <crees@FreeBSD.org> Cc: cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml Message-ID: <4E6410D0.1070100@FreeBSD.org> In-Reply-To: <201109042015.p84KFqOR005039@repoman.freebsd.org> References: <201109042015.p84KFqOR005039@repoman.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Am 04.09.2011 22:15, schrieb Chris Rees: > crees 2011-09-04 20:15:52 UTC > > FreeBSD ports repository > > Modified files: > security/vuxml vuln.xml > Log: > - Document cfs buffer overflow vulnerability. > - While here, unbreak packaudit -- it doesn't like newlines in the > middle of tags. Perhaps a comment should say something? Chris, Are you use that your XML and/or SGML toolchains and document type definitions and catalogs are properly installed? I have seen cases where the catalogs were broken, and nothing short of deinstalling xmlcatmgr (and all ports that need it), removing leftover catalogs, and reinstalling all ports that got deinstalled helped. Are you sure that you aren't by accident tripped up by CR characters somewhere? I've reverted vuln.xml to 1.2434 and don't see how it breaks the parser (xsltproc), and packaudit generates a file that seems to be in proper working order for me. HTH, Matthias
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E6410D0.1070100>