Date: Thu, 30 Jul 2020 19:08:22 +0200 From: "Tobias C. Berner" <tcberner@freebsd.org> To: Kyle Evans <kevans@freebsd.org> Cc: "Tobias C. Berner" <tcberner@freebsd.org>, ports-committers <ports-committers@freebsd.org>, svn-ports-all <svn-ports-all@freebsd.org>, svn-ports-head <svn-ports-head@freebsd.org> Subject: Re: svn commit: r543799 - head/security/vuxml Message-ID: <CAOshKtcdBuHO_Yp3L=wdRLQLjeM5Pgw17LnPn=7EyRZa_q4DUg@mail.gmail.com> In-Reply-To: <CACNAnaFUqEUk%2BNYztV2x23mio0CE8HQ_3hzFJKKEBkwxst1fUA@mail.gmail.com> References: <202007301554.06UFsLku005954@repo.freebsd.org> <CACNAnaFUqEUk%2BNYztV2x23mio0CE8HQ_3hzFJKKEBkwxst1fUA@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Oops, I was channeling my inner Australian; I'll fix it shortly mfg Tobias On Thu, 30 Jul 2020 at 18:55, Kyle Evans <kevans@freebsd.org> wrote: > > On Thu, Jul 30, 2020 at 10:54 AM Tobias C. Berner <tcberner@freebsd.org> wrote: > > > > Author: tcberner > > Date: Thu Jul 30 15:54:21 2020 > > New Revision: 543799 > > URL: https://svnweb.freebsd.org/changeset/ports/543799 > > > > Log: > > Document vulnerability in archivers/ark > > > > - fixed in r543704 (head), r543705 (2020Q3) > > > > Modified: > > head/security/vuxml/vuln.xml > > > > Modified: head/security/vuxml/vuln.xml > > ============================================================================== > > --- head/security/vuxml/vuln.xml Thu Jul 30 15:54:05 2020 (r543798) > > +++ head/security/vuxml/vuln.xml Thu Jul 30 15:54:21 2020 (r543799) > > @@ -41,7 +41,7 @@ QUICK GUIDE TO ADDING A NEW ENTRY > > 5. use 'make VID=xxx-yyy-zzz html' to emit the entry's html file for formatting review > > 6. profit! > > > > -Additional tests can be done this way: > > +edditional tests can be done this way: > > $ pkg audit -f ./vuln.xml py26-django-1.6 > > $ pkg audit -f ./vuln.xml py27-django-1.6.1 > > > > Ah, I think the old spelling was correct here. :-) > > Thanks, > > Kyle Evans
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAOshKtcdBuHO_Yp3L=wdRLQLjeM5Pgw17LnPn=7EyRZa_q4DUg>