Small cosmetic bug for 1.5.0
Willem Jan Withagen
wjw at digiware.nl
Fri Apr 17 07:26:15 UTC 2015
On 16/04/2015 18:52, Warren Block wrote:
> On Thu, 16 Apr 2015, Willem Jan Withagen wrote:
>
>>
>> Running 1.5.0 gives:
>>
>> # pkg audit -F
>> vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable:
>> Ruby -- OpenSSL Hostname Verification Vulnerability
>> CVE: CVE-2015-1855
>> WWW:
>> http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html
>>
>>
>> 1 problem(s) in the installed packages found.
>>
>> ----------
>>
>> Note the lack of a '\n' after 'vulnxml file up-to-date'
>
> I thought you meant that "problem(s)" string.
No the vulnxml oke message used to be written on stderr, and Bapt
changed that into stdout.
As for the (s) ....
Well after all it is software, so one could fix that as well.
--WjW
More information about the freebsd-pkg
mailing list