From owner-freebsd-emulation@FreeBSD.ORG Thu Jul 10 14:43:30 2014 Return-Path: Delivered-To: freebsd-emulation@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0BEE0DB for ; Thu, 10 Jul 2014 14:43:30 +0000 (UTC) Received: from mho-02-ewr.mailhop.org (mho-02-ewr.mailhop.org [204.13.248.72]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D767C222A for ; Thu, 10 Jul 2014 14:43:29 +0000 (UTC) Received: from [149.142.83.60] (helo=localhost) by mho-02-ewr.mailhop.org with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from ) id 1X5FZI-0002ez-27; Thu, 10 Jul 2014 14:43:28 +0000 X-Mail-Handler: Dyn Standard SMTP by Dyn X-Originating-IP: 149.142.83.60 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/sendlabs/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX19RbCqg86ytrUJohiKFJhD2 From: Aric Gregson To: Carlos Jacobo Puga Medina Subject: Re: linux-f10-* Multiple Vulnerabilities per Portaudit Organization: http://xochitlfilms.com References: Date: Thu, 10 Jul 2014 07:43:26 -0700 In-Reply-To: (Carlos Jacobo Puga Medina's message of "Thu, 10 Jul 2014 15:52:20 +0200") Message-ID: <861ttt46lt.fsf@freeenv.ad.medctr.ucla.edu> User-Agent: Gnus/5.130011 (Ma Gnus v0.11) Emacs/24.4.50 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain Cc: freebsd-emulation@freebsd.org X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jul 2014 14:43:30 -0000 Carlos Jacobo Puga Medina writes: > If you want install these ports, use DISABLE_VULNERABILITIES variable at > your own risk. If you use portmaster(8) to update your ports, run: > > # portmaster -m DISABLE_VULNERABILITIES=yes foo/fooport > > Note that Fedora 10 reached its end-of-life (EoL) in 2009 for updates [1]. > On the other hand, CentOS 6 ports are available [2], but it need a full > review before commit them into the ports tree. Thank you Carlos. I have done as above. I have some problems with some of the CentOS ports, but have gone ahead and moved to CentOS as the linux base. It seems that it may not remove all security issues, but it did remove most. Thanks, Aric -- ~O /\_, ###-\ |_ (*) / (*)