Small cosmetic bug for 1.5.0

Baptiste Daroussin bapt at FreeBSD.org
Thu Apr 16 10:23:50 UTC 2015


On Thu, Apr 16, 2015 at 12:09:18PM +0200, Willem Jan Withagen wrote:
> 
> Running 1.5.0 gives:
> 
> # pkg audit -F
> vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable:
> Ruby -- OpenSSL Hostname Verification Vulnerability
> CVE: CVE-2015-1855
> WWW:
> http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html
> 
> 1 problem(s) in the installed packages found.
> 
> ----------
> 
> Note the lack of a '\n' after 'vulnxml file up-to-date'
> Proabably due to my previous remark that it would be nice to report that
> on stdout.
> So my script now works, but it looks a bit odd.
> 

Fixed in git already, will be in 1.5.1

Best regars,
Bapt
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 181 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-pkg/attachments/20150416/43e990eb/attachment.sig>


More information about the freebsd-pkg mailing list