Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Apr 2015 12:09:18 +0200
From:      Willem Jan Withagen <wjw@digiware.nl>
To:        pkg@freebsd.org
Subject:   Small cosmetic bug for 1.5.0
Message-ID:  <552F8A4E.8070803@digiware.nl>

next in thread | raw e-mail | index | archive | help

Running 1.5.0 gives:

# pkg audit -F
vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable:
Ruby -- OpenSSL Hostname Verification Vulnerability
CVE: CVE-2015-1855
WWW:
http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html

1 problem(s) in the installed packages found.

----------

Note the lack of a '\n' after 'vulnxml file up-to-date'
Proabably due to my previous remark that it would be nice to report that
on stdout.
So my script now works, but it looks a bit odd.

--WjW



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?552F8A4E.8070803>