From owner-freebsd-emulation@FreeBSD.ORG Thu Jul 10 13:52:21 2014 Return-Path: Delivered-To: freebsd-emulation@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 56B4C142 for ; Thu, 10 Jul 2014 13:52:21 +0000 (UTC) Received: from mail-vc0-x22c.google.com (mail-vc0-x22c.google.com [IPv6:2607:f8b0:400c:c03::22c]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 181FD2D5C for ; Thu, 10 Jul 2014 13:52:21 +0000 (UTC) Received: by mail-vc0-f172.google.com with SMTP id hy10so10690102vcb.3 for ; Thu, 10 Jul 2014 06:52:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:cc:content-type; bh=u9Bme5M4t4T0Ce48fSLFyjqh4j6t0z/ohWXoKpNNq9c=; b=EXpuyVNX/wH2ab1Xz6aUwe3II/2QRpX5ADU02GMfSnGqS1NIWCkRvOEzlWgN19czjN kSOPLOx0ydL3HgUfuNkCx6ji3lTxG/8KP38UrCdpxYRsChqPZl/pBddSzPguq9bsNR04 bG/vMJjfQcooOte0hVxwcLnugA2dVw9okS0Rzjv3XHqzFWnijDMpfEpzaIfaXfkiWl8Z OoymkiVpUnpybjIy/9ZMqpbT5HjHyBkbZIE/8X/ZPbO7uXyloK9rlo6DyVr2PiXTclwF YQS8AaRflqPjdm9rLdjivPP0Vr0kO0M9pDcXhD1lOI/2X2HGUdf+lrFz9jDhlTkHv3+q /YuA== MIME-Version: 1.0 X-Received: by 10.221.9.72 with SMTP id ov8mr3441294vcb.27.1405000340139; Thu, 10 Jul 2014 06:52:20 -0700 (PDT) Received: by 10.221.61.72 with HTTP; Thu, 10 Jul 2014 06:52:20 -0700 (PDT) Date: Thu, 10 Jul 2014 15:52:20 +0200 Message-ID: Subject: Re: linux-f10-* Multiple Vulnerabilities per Portaudit From: Carlos Jacobo Puga Medina To: aorchid@mac.com Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.18 Cc: freebsd-emulation@freebsd.org X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jul 2014 13:52:21 -0000 Hi, If you want install these ports, use DISABLE_VULNERABILITIES variable at your own risk. If you use portmaster(8) to update your ports, run: # portmaster -m DISABLE_VULNERABILITIES=yes foo/fooport Note that Fedora 10 reached its end-of-life (EoL) in 2009 for updates [1]. On the other hand, CentOS 6 ports are available [2], but it need a full review before commit them into the ports tree. Regards, --CJPM [1] https://www.redhat.com/archives/fedora-announce-list/2009-December/msg00014.html [2] https://github.com/xmj/linux-ports