Date: Thu, 16 Apr 2015 12:23:44 +0200 From: Baptiste Daroussin <bapt@FreeBSD.org> To: Willem Jan Withagen <wjw@digiware.nl> Cc: pkg@freebsd.org Subject: Re: Small cosmetic bug for 1.5.0 Message-ID: <20150416102344.GQ39658@ivaldir.etoilebsd.net> In-Reply-To: <552F8A4E.8070803@digiware.nl> References: <552F8A4E.8070803@digiware.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
--3wfpuDtTLg8/Vq6g Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Apr 16, 2015 at 12:09:18PM +0200, Willem Jan Withagen wrote: >=20 > Running 1.5.0 gives: >=20 > # pkg audit -F > vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable: > Ruby -- OpenSSL Hostname Verification Vulnerability > CVE: CVE-2015-1855 > WWW: > http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html >=20 > 1 problem(s) in the installed packages found. >=20 > ---------- >=20 > Note the lack of a '\n' after 'vulnxml file up-to-date' > Proabably due to my previous remark that it would be nice to report that > on stdout. > So my script now works, but it looks a bit odd. >=20 Fixed in git already, will be in 1.5.1 Best regars, Bapt --3wfpuDtTLg8/Vq6g Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAlUvjbAACgkQ8kTtMUmk6Ex1BACfYMd++Wi7mb0vhguxRpjKqlgI zqYAn3/EFqoHQz7AgtK+iOKJQ8798Dtg =h50W -----END PGP SIGNATURE----- --3wfpuDtTLg8/Vq6g--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150416102344.GQ39658>