From owner-freebsd-pkg@FreeBSD.ORG Thu Apr 16 16:52:46 2015 Return-Path: Delivered-To: pkg@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6C15C126 for ; Thu, 16 Apr 2015 16:52:46 +0000 (UTC) Received: from wonkity.com (wonkity.com [67.158.26.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "wonkity.com", Issuer "wonkity.com" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 22A1C8AB for ; Thu, 16 Apr 2015 16:52:45 +0000 (UTC) Received: from wonkity.com (localhost [127.0.0.1]) by wonkity.com (8.14.9/8.14.9) with ESMTP id t3GGqdm8068860 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 16 Apr 2015 10:52:39 -0600 (MDT) (envelope-from wblock@wonkity.com) Received: from localhost (wblock@localhost) by wonkity.com (8.14.9/8.14.9/Submit) with ESMTP id t3GGqdYp068857; Thu, 16 Apr 2015 10:52:39 -0600 (MDT) (envelope-from wblock@wonkity.com) Date: Thu, 16 Apr 2015 10:52:39 -0600 (MDT) From: Warren Block To: Willem Jan Withagen cc: pkg@freebsd.org Subject: Re: Small cosmetic bug for 1.5.0 In-Reply-To: <552F8A4E.8070803@digiware.nl> Message-ID: References: <552F8A4E.8070803@digiware.nl> User-Agent: Alpine 2.20 (BSF 67 2015-01-07) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (wonkity.com [127.0.0.1]); Thu, 16 Apr 2015 10:52:39 -0600 (MDT) X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 Apr 2015 16:52:46 -0000 On Thu, 16 Apr 2015, Willem Jan Withagen wrote: > > Running 1.5.0 gives: > > # pkg audit -F > vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable: > Ruby -- OpenSSL Hostname Verification Vulnerability > CVE: CVE-2015-1855 > WWW: > http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html > > 1 problem(s) in the installed packages found. > > ---------- > > Note the lack of a '\n' after 'vulnxml file up-to-date' I thought you meant that "problem(s)" string.