actually use the cve match_location correctly.
authorespie <espie@openbsd.org>
Sat, 19 Jul 2014 08:48:44 +0000 (08:48 +0000)
committerespie <espie@openbsd.org>
Sat, 19 Jul 2014 08:48:44 +0000 (08:48 +0000)
problem noticed by aja@

usr.sbin/pkg_add/OpenBSD/PkgAdd.pm

index 27cb639..1cdd474 100644 (file)
@@ -1,7 +1,7 @@
 #! /usr/bin/perl
 
 # ex:ts=8 sw=4:
-# $OpenBSD: PkgAdd.pm,v 1.72 2014/07/12 22:08:23 espie Exp $
+# $OpenBSD: PkgAdd.pm,v 1.73 2014/07/19 08:48:44 espie Exp $
 #
 # Copyright (c) 2003-2014 Marc Espie <espie@openbsd.org>
 #
@@ -280,7 +280,8 @@ sub check_security
                        if (defined $bad) {
                                require OpenBSD::PkgSpec;
                                my $spec = OpenBSD::PkgSpec->new($bad);
-                               if ($spec->match_locations([$h->{location}])) {
+                               my $r = $spec->match_locations([$h->{location}]);
+                               if (@$r != 0) {
                                        $error++;
                                }
                        }