Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 05 Sep 2011 03:09:24 -0700
From:      Doug Barton <dougb@FreeBSD.org>
To:        Thierry Thomas <thierry@FreeBSD.org>
Cc:        cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org
Subject:   Re: cvs commit: ports/textproc/fy-aspell Makefile ports/textproc/ml-aspell Makefile ports/textproc/tk-aspell Makefile
Message-ID:  <4E649FD4.6090908@FreeBSD.org>
In-Reply-To: <4E640D06.6060605@FreeBSD.org>
References:  <201109041252.p84CqgaG049222@repoman.freebsd.org> <4E640D06.6060605@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
So, here is what happened. I naively assumed that all of the entries
that go into creating the auditfile are located in
security/vuxml/vuln.xml. It turns out that is not true. There is a bunch
of stuff in ports-mgmt/portaudit-db/database that gets appended to the
auditfile. (Thanks to flo, simon, and remko for helping me get sorted out.)

The entry that incorrectly matched the aspell dictionaries was there.
With Simon's permission I removed it, and now none of the aspell ports
are labelled vulnerable.

My apologies if I implied in any way that you were falling down on the
job by not fixing this yourself. :-/


Doug

-- 

	Nothin' ever doesn't change, but nothin' changes much.
			-- OK Go

	Breadth of IT experience, and depth of knowledge in the DNS.
	Yours for the right price.  :)  http://SupersetSolutions.com/




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E649FD4.6090908>