Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Apr 2015 09:25:52 +0200
From:      Willem Jan Withagen <wjw@digiware.nl>
To:        Warren Block <wblock@wonkity.com>
Cc:        pkg@freebsd.org
Subject:   Re: Small cosmetic bug for 1.5.0
Message-ID:  <5530B580.7080600@digiware.nl>
In-Reply-To: <alpine.BSF.2.20.1504161050170.51960@wonkity.com>
References:  <552F8A4E.8070803@digiware.nl> <alpine.BSF.2.20.1504161050170.51960@wonkity.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 16/04/2015 18:52, Warren Block wrote:
> On Thu, 16 Apr 2015, Willem Jan Withagen wrote:
> 
>>
>> Running 1.5.0 gives:
>>
>> # pkg audit -F
>> vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable:
>> Ruby -- OpenSSL Hostname Verification Vulnerability
>> CVE: CVE-2015-1855
>> WWW:
>> http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html
>>
>>
>> 1 problem(s) in the installed packages found.
>>
>> ----------
>>
>> Note the lack of a '\n' after 'vulnxml file up-to-date'
> 
> I thought you meant that "problem(s)" string.

No the vulnxml oke message used to be written on stderr, and Bapt
changed that into stdout.

As for the (s) ....
Well after all it is software, so one could fix that as well.

--WjW




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5530B580.7080600>