From owner-freebsd-pkg@FreeBSD.ORG Thu Apr 16 10:20:03 2015 Return-Path: Delivered-To: pkg@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 735B74C6 for ; Thu, 16 Apr 2015 10:20:03 +0000 (UTC) Received: from smtp.digiware.nl (unknown [IPv6:2001:4cb8:90:ffff::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 35379165 for ; Thu, 16 Apr 2015 10:20:02 +0000 (UTC) Received: from rack1.digiware.nl (unknown [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id E1A2416A403 for ; Thu, 16 Apr 2015 12:19:58 +0200 (CEST) X-Virus-Scanned: amavisd-new at digiware.nl Received: from smtp.digiware.nl ([127.0.0.1]) by rack1.digiware.nl (rack1.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w81CneZSCMmQ; Thu, 16 Apr 2015 12:19:30 +0200 (CEST) Received: from [192.168.10.10] (asus [192.168.10.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.digiware.nl (Postfix) with ESMTPSA id 1BBA916A407 for ; Thu, 16 Apr 2015 12:09:19 +0200 (CEST) Message-ID: <552F8A4E.8070803@digiware.nl> Date: Thu, 16 Apr 2015 12:09:18 +0200 From: Willem Jan Withagen User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: pkg@freebsd.org Subject: Small cosmetic bug for 1.5.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 Apr 2015 10:20:03 -0000 Running 1.5.0 gives: # pkg audit -F vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable: Ruby -- OpenSSL Hostname Verification Vulnerability CVE: CVE-2015-1855 WWW: http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html 1 problem(s) in the installed packages found. ---------- Note the lack of a '\n' after 'vulnxml file up-to-date' Proabably due to my previous remark that it would be nice to report that on stdout. So my script now works, but it looks a bit odd. --WjW