From owner-freebsd-pkg@FreeBSD.ORG Fri Apr 17 07:26:15 2015 Return-Path: Delivered-To: pkg@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 24D99509 for ; Fri, 17 Apr 2015 07:26:15 +0000 (UTC) Received: from smtp.digiware.nl (unknown [IPv6:2001:4cb8:90:ffff::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DB2BEF0B for ; Fri, 17 Apr 2015 07:26:14 +0000 (UTC) Received: from rack1.digiware.nl (unknown [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id E535C16A403; Fri, 17 Apr 2015 09:26:01 +0200 (CEST) X-Virus-Scanned: amavisd-new at digiware.nl Received: from smtp.digiware.nl ([127.0.0.1]) by rack1.digiware.nl (rack1.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J02ny9VINpBH; Fri, 17 Apr 2015 09:25:53 +0200 (CEST) Received: from [192.168.101.176] (unknown [192.168.101.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.digiware.nl (Postfix) with ESMTPSA id C4E7816A401; Fri, 17 Apr 2015 09:25:53 +0200 (CEST) Message-ID: <5530B580.7080600@digiware.nl> Date: Fri, 17 Apr 2015 09:25:52 +0200 From: Willem Jan Withagen User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: Warren Block CC: pkg@freebsd.org Subject: Re: Small cosmetic bug for 1.5.0 References: <552F8A4E.8070803@digiware.nl> In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Apr 2015 07:26:15 -0000 On 16/04/2015 18:52, Warren Block wrote: > On Thu, 16 Apr 2015, Willem Jan Withagen wrote: > >> >> Running 1.5.0 gives: >> >> # pkg audit -F >> vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable: >> Ruby -- OpenSSL Hostname Verification Vulnerability >> CVE: CVE-2015-1855 >> WWW: >> http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html >> >> >> 1 problem(s) in the installed packages found. >> >> ---------- >> >> Note the lack of a '\n' after 'vulnxml file up-to-date' > > I thought you meant that "problem(s)" string. No the vulnxml oke message used to be written on stderr, and Bapt changed that into stdout. As for the (s) .... Well after all it is software, so one could fix that as well. --WjW