Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Apr 2015 12:23:44 +0200
From:      Baptiste Daroussin <bapt@FreeBSD.org>
To:        Willem Jan Withagen <wjw@digiware.nl>
Cc:        pkg@freebsd.org
Subject:   Re: Small cosmetic bug for 1.5.0
Message-ID:  <20150416102344.GQ39658@ivaldir.etoilebsd.net>
In-Reply-To: <552F8A4E.8070803@digiware.nl>
References:  <552F8A4E.8070803@digiware.nl>

next in thread | previous in thread | raw e-mail | index | archive | help

--3wfpuDtTLg8/Vq6g
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Thu, Apr 16, 2015 at 12:09:18PM +0200, Willem Jan Withagen wrote:
>=20
> Running 1.5.0 gives:
>=20
> # pkg audit -F
> vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable:
> Ruby -- OpenSSL Hostname Verification Vulnerability
> CVE: CVE-2015-1855
> WWW:
> http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html
>=20
> 1 problem(s) in the installed packages found.
>=20
> ----------
>=20
> Note the lack of a '\n' after 'vulnxml file up-to-date'
> Proabably due to my previous remark that it would be nice to report that
> on stdout.
> So my script now works, but it looks a bit odd.
>=20

Fixed in git already, will be in 1.5.1

Best regars,
Bapt

--3wfpuDtTLg8/Vq6g
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlUvjbAACgkQ8kTtMUmk6Ex1BACfYMd++Wi7mb0vhguxRpjKqlgI
zqYAn3/EFqoHQz7AgtK+iOKJQ8798Dtg
=h50W
-----END PGP SIGNATURE-----

--3wfpuDtTLg8/Vq6g--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150416102344.GQ39658>