So, here is what happened. I naively assumed that all of the entries
that go into creating the auditfile are located in
security/vuxml/vuln.xml. It turns out that is not true. There is a bunch
of stuff in ports-mgmt/portaudit-db/database that gets appended to the
auditfile. (Thanks to flo, simon, and remko for helping me get sorted out.)
The entry that incorrectly matched the aspell dictionaries was there.
With Simon's permission I removed it, and now none of the aspell ports
are labelled vulnerable.
My apologies if I implied in any way that you were falling down on the
job by not fixing this yourself. :-/
Doug
--
Nothin' ever doesn't change, but nothin' changes much.
-- OK Go
Breadth of IT experience, and depth of knowledge in the DNS.
Yours for the right price. :) http://SupersetSolutions.com/
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "[email protected]"