Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Apr 2015 12:23:44 +0200
From:      Baptiste Daroussin <bapt@FreeBSD.org>
To:        Willem Jan Withagen <wjw@digiware.nl>
Cc:        pkg@freebsd.org
Subject:   Re: Small cosmetic bug for 1.5.0
Message-ID:  <20150416102344.GQ39658@ivaldir.etoilebsd.net>
In-Reply-To: <552F8A4E.8070803@digiware.nl>
References:  <552F8A4E.8070803@digiware.nl>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
On Thu, Apr 16, 2015 at 12:09:18PM +0200, Willem Jan Withagen wrote:
> 
> Running 1.5.0 gives:
> 
> # pkg audit -F
> vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable:
> Ruby -- OpenSSL Hostname Verification Vulnerability
> CVE: CVE-2015-1855
> WWW:
> http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html
> 
> 1 problem(s) in the installed packages found.
> 
> ----------
> 
> Note the lack of a '\n' after 'vulnxml file up-to-date'
> Proabably due to my previous remark that it would be nice to report that
> on stdout.
> So my script now works, but it looks a bit odd.
> 

Fixed in git already, will be in 1.5.1

Best regars,
Bapt

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlUvjbAACgkQ8kTtMUmk6Ex1BACfYMd++Wi7mb0vhguxRpjKqlgI
zqYAn3/EFqoHQz7AgtK+iOKJQ8798Dtg
=h50W
-----END PGP SIGNATURE-----
help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150416102344.GQ39658>