Small cosmetic bug for 1.5.0

Willem Jan Withagen wjw at digiware.nl
Fri Apr 17 07:26:15 UTC 2015


On 16/04/2015 18:52, Warren Block wrote:
> On Thu, 16 Apr 2015, Willem Jan Withagen wrote:
> 
>>
>> Running 1.5.0 gives:
>>
>> # pkg audit -F
>> vulnxml file up-to-dateruby-2.0.0.598_1,1 is vulnerable:
>> Ruby -- OpenSSL Hostname Verification Vulnerability
>> CVE: CVE-2015-1855
>> WWW:
>> http://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-933b-61de4d0b0fdb.html
>>
>>
>> 1 problem(s) in the installed packages found.
>>
>> ----------
>>
>> Note the lack of a '\n' after 'vulnxml file up-to-date'
> 
> I thought you meant that "problem(s)" string.

No the vulnxml oke message used to be written on stderr, and Bapt
changed that into stdout.

As for the (s) ....
Well after all it is software, so one could fix that as well.

--WjW



More information about the freebsd-pkg mailing list