Date: Mon, 05 Sep 2011 03:09:24 -0700 From: Doug Barton <dougb@FreeBSD.org> To: Thierry Thomas <thierry@FreeBSD.org> Cc: cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org Subject: Re: cvs commit: ports/textproc/fy-aspell Makefile ports/textproc/ml-aspell Makefile ports/textproc/tk-aspell Makefile Message-ID: <4E649FD4.6090908@FreeBSD.org> In-Reply-To: <4E640D06.6060605@FreeBSD.org> References: <201109041252.p84CqgaG049222@repoman.freebsd.org> <4E640D06.6060605@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
So, here is what happened. I naively assumed that all of the entries that go into creating the auditfile are located in security/vuxml/vuln.xml. It turns out that is not true. There is a bunch of stuff in ports-mgmt/portaudit-db/database that gets appended to the auditfile. (Thanks to flo, simon, and remko for helping me get sorted out.) The entry that incorrectly matched the aspell dictionaries was there. With Simon's permission I removed it, and now none of the aspell ports are labelled vulnerable. My apologies if I implied in any way that you were falling down on the job by not fixing this yourself. :-/ Doug -- Nothin' ever doesn't change, but nothin' changes much. -- OK Go Breadth of IT experience, and depth of knowledge in the DNS. Yours for the right price. :) http://SupersetSolutions.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E649FD4.6090908>