Date: Mon, 6 May 2019 15:25:00 +0300 From: Lev Serebryakov <lev@FreeBSD.org> To: koobs@FreeBSD.org, ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Cc: FreeBSD Ports Security Team <ports-secteam@freebsd.org> Subject: Re: svn commit: r500915 - head/devel/subversion-lts Message-ID: <de28e996-d1c1-1955-45c1-3fd2cee09885@FreeBSD.org> In-Reply-To: <391a0a82-1892-a1bf-cc72-8e1cc5892a65@FreeBSD.org> References: <201905061158.x46BwmWZ072987@repo.freebsd.org> <bc2d3b32-976b-36b6-f674-627247ab080e@FreeBSD.org> <239b5e72-ab45-c28d-b224-f1d487639fca@FreeBSD.org> <391a0a82-1892-a1bf-cc72-8e1cc5892a65@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --cVqZSHMCzb0fhvpl8KZOLPWKfMrS44RLi Content-Type: multipart/mixed; boundary="xFECHgpa5ktDnNe81zz73v47kTfdsp5OG"; protected-headers="v1" From: Lev Serebryakov <lev@FreeBSD.org> Reply-To: lev@FreeBSD.org To: koobs@FreeBSD.org, ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Cc: FreeBSD Ports Security Team <ports-secteam@freebsd.org> Message-ID: <de28e996-d1c1-1955-45c1-3fd2cee09885@FreeBSD.org> Subject: Re: svn commit: r500915 - head/devel/subversion-lts References: <201905061158.x46BwmWZ072987@repo.freebsd.org> <bc2d3b32-976b-36b6-f674-627247ab080e@FreeBSD.org> <239b5e72-ab45-c28d-b224-f1d487639fca@FreeBSD.org> <391a0a82-1892-a1bf-cc72-8e1cc5892a65@FreeBSD.org> In-Reply-To: <391a0a82-1892-a1bf-cc72-8e1cc5892a65@FreeBSD.org> --xFECHgpa5ktDnNe81zz73v47kTfdsp5OG Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 06.05.2019 15:18, Kubilay Kocak wrote: >> =C2=A0 And this vulnerability is already in security/vuxml, for other = ports. >> Good question is, should I fix this old security/vuxml record? >> >=20 > Since its the same underlying vulnerability, I'd amend the existing > vuxml entry (4af3241d-1f0c-11e9-b4bd-d43d7eed0ce2) >=20 > - Adding a second <package> entry for subversion-lts >=20 > I'd probably also remove "www/mod_dav_svn" from the topic, as if affect= s > multiple port/package names. Aaaaand commit failed! Sending vuln.xml Transmitting file data .done Committing transaction... svn: E165001: Commit failed (details follow): svn: E165001: Commit blocked by pre-commit hook (exit code 1) with output= : Sorry, you are trying to commit a 1229348 byte transaction! The safety limit is 1024000 bytes. You were about to ADD this to the rep= o. See svnadmin/hooks/scripts/sizelimit.py for instructions if this is intended. svn: E165001: Your commit message was left in a temporary file: svn: E165001: '/usr/home/lev/FreeBSD/ports/security/svn-commit.tmp' --=20 // Lev Serebryakov --xFECHgpa5ktDnNe81zz73v47kTfdsp5OG-- --cVqZSHMCzb0fhvpl8KZOLPWKfMrS44RLi Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE+W0coLX0MYtnSzMK6rA8WL/cR48FAlzQJ5xfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEY5 NkQxQ0EwQjVGNDMxOEI2NzRCMzMwQUVBQjAzQzU4QkZEQzQ3OEYACgkQ6rA8WL/c R4+5cxAAkKW/Pi/nAN8ptvVHQwMsVVgqmTFZbnttlmf5GP9friB5NLPYu6iz4eCR f/UYp5yt1pGUG9On9wx0O4OmQcCnS1mOm3/ekm/iYMZrMn3r9LZ8huq9nqcOmSUz voFBWr5Baax40cnQoCuxfhoL0XK95QXK4WlR+SxDiWGnf2VMwZiu5lHTW7qiVljg i/5igWih/t7KZYsevy9aiSM8uYxuucEIZtapUi4LnQW+TJ1SAQn3LIUxFlndOSd+ uQLnfMJ8zdXljXGYhrm5Af8TlV2eLSPoVxkjBEPUIKjWIN41LQM+EgnWmAyJYJLl PP/wZuIs5jzM+8Ch2iV590ghkERKyszKByWVgi7XYuqq6qcPtPoGCHMxy1ucFIef 4lz2MDYMLHZMTuhl6REQlPPelcXaG2GkssiICU1bMS4sE/y9aQXD8LHaWY9IX0Zd 94kIACn9k2FdzE+khGdx0i+IBDxfZL6GrLFEphmhjUP0mLL5B1tecN0woiDBfGIs w8A5KYq3iJ0I/Bmu5dt7mcTcnvlmtueFBetxEH88vibe+jQ2JJXSMcVUcbMzD8yt SyNOPtC3v1mQEOweRK2aft54fvBhkAAZVXKev7GekJT7bK7etGacqG1aqYctyujK 6MZpIqsbO/Vx2BaiaYzE2ilyIR03b2PUuPZ1XOorjS8skPGz5pY= =eMMx -----END PGP SIGNATURE----- --cVqZSHMCzb0fhvpl8KZOLPWKfMrS44RLi--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?de28e996-d1c1-1955-45c1-3fd2cee09885>