From owner-freebsd-questions@FreeBSD.ORG Wed Feb 14 05:12:40 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id EB84C16A406 for ; Wed, 14 Feb 2007 05:12:40 +0000 (UTC) (envelope-from kstewart@owt.com) Received: from smtp.owt.com (smtp.owt.com [204.118.6.19]) by mx1.freebsd.org (Postfix) with ESMTP id C5F8513C46B for ; Wed, 14 Feb 2007 05:12:40 +0000 (UTC) (envelope-from kstewart@owt.com) Received: from topaz-out (owt-207-41-94-233.owt.com [207.41.94.233]) by smtp.owt.com (8.12.11.20060308/8.12.8) with ESMTP id l1E5C9NW006288; Tue, 13 Feb 2007 21:12:09 -0800 From: Kent Stewart To: freebsd-questions@freebsd.org Date: Tue, 13 Feb 2007 21:12:37 -0800 User-Agent: KMail/1.9.5 References: <20070213172123.620e32b3@tania.servebbs.org> <20070213174754.088e97b9@tania.servebbs.org> <20070213215329.G2526@wonkity.com> In-Reply-To: <20070213215329.G2526@wonkity.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200702132112.38339.kstewart@owt.com> Cc: Bob Subject: Re: Forcing a portupgrade? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Feb 2007 05:12:41 -0000 On Tuesday 13 February 2007 21:00, Warren Block wrote: > On Tue, 13 Feb 2007, Bob wrote: > > On Tue, 13 Feb 2007 16:41:29 -0600 > > > > Paul Schmehl wrote: > >> Yikes! That's a bit drastic. What's wrong with make > >> DISABLE_VULNERABILITIES install? > > > > Where would I find the documentation on all the possible > > command-line options to make? IE, where is DISABLE_VULNERABILITIES > > documented? > > man ports > > ISTR using it with portupgrade with the -M option. > Here is what I use. I gave it an alias and called it portforce portupgrade -puf -m -DDISABLE_VULNERABILITIES Kent > A probably-better way to fix the vulnerabilities of Mozilla is to > switch to the newest version, which is now called Seamonkey. > > > I am sure I would have occasion to use others if I knew what and > > where they were. > > Also in the ports man page. Other targets also avoid brute-force > removal of files, like rmconfig. > > -Warren Block * Rapid City, South Dakota USA > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "freebsd-questions-unsubscribe@freebsd.org" -- Kent Stewart Richland, WA http://www.soyandina.com/ "I am Andean project". http://users.owt.com/kstewart/index.html