Date: Wed, 3 Jul 2013 18:35:36 +1000 From: "Dewayne Geraghty" <dewayne.geraghty@heuristicsystems.com.au> To: "'Jason Helfman'" <jgh@freebsd.org>, "'Leslie Jensen'" <leslie@eskk.nu> Cc: 'FreeBSD Ports List' <freebsd-ports@freebsd.org> Subject: RE: curl fails to upgrade on 9.1-RELEASE-p3 but succeeds on 8.3 Message-ID: <64492650C3F14478BEF9B095144095D1@white> In-Reply-To: <6704D05234504657A6FE773E6FA1DB8D@white> References: <51D3BD22.6020506@eskk.nu> <CAMuy=%2BjDEb0=vprUtOKS0vHSbDmcAjdFU7njfioefEQNOmscsQ@mail.gmail.com> <6704D05234504657A6FE773E6FA1DB8D@white>
next in thread | previous in thread | raw e-mail | index | archive | help
> -----Original Message----- > From: owner-freebsd-ports@freebsd.org > [mailto:owner-freebsd-ports@freebsd.org] On Behalf Of Dewayne > Sent: Wednesday, 3 July 2013 4:57 PM > To: 'Jason Helfman'; 'Leslie Jensen' > Cc: 'FreeBSD Ports List' > Subject: RE: curl fails to upgrade on 9.1-RELEASE-p3 but > succeeds on 8.3 > > The quick way to build the latest curl on FreeBSD 9.1 is to > pass DISABLE_VULNERABILITIES to the make command. Its > probably a good idea to leave your audit db alone, for this task. > > cd /usr/ports/ftp/curl && make -DDISABLE_VULNERABILITIES > > For portmaster this takes the form of > portmaster -m -DDISABLE_VULNERABILITIES ftp/curl > > I'm unfamiliar with portupgrade. > Regards, Dewayne > > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to > "freebsd-ports-unsubscribe@freebsd.org" Leslie, et al, It has just been brought to my attention that the portaudit database was updated to reflect Xin Li's patch to curl. Thank-you John Marshall. Perform a portaudit -F and the curl build will proceed successfully. Regards, Dewayne.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?64492650C3F14478BEF9B095144095D1>