Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 3 Jul 2013 16:57:14 +1000
From:      "Dewayne" <dewayne.geraghty@heuristicsystems.com.au>
To:        "'Jason Helfman'" <jgh@freebsd.org>, "'Leslie Jensen'" <leslie@eskk.nu>
Cc:        'FreeBSD Ports List' <freebsd-ports@freebsd.org>
Subject:   RE: curl fails to upgrade on 9.1-RELEASE-p3 but succeeds on 8.3
Message-ID:  <6704D05234504657A6FE773E6FA1DB8D@white>
In-Reply-To: <CAMuy=%2BjDEb0=vprUtOKS0vHSbDmcAjdFU7njfioefEQNOmscsQ@mail.gmail.com>
References:  <51D3BD22.6020506@eskk.nu> <CAMuy=%2BjDEb0=vprUtOKS0vHSbDmcAjdFU7njfioefEQNOmscsQ@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
The quick way to build the latest curl on FreeBSD 9.1 is to pass DISABLE_VULNERABILITIES to the make command.  Its probably a good
idea to leave your audit db alone, for this task.

cd /usr/ports/ftp/curl && make -DDISABLE_VULNERABILITIES

For portmaster this takes the form of 
portmaster  -m -DDISABLE_VULNERABILITIES ftp/curl

I'm unfamiliar with portupgrade.
Regards, Dewayne




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6704D05234504657A6FE773E6FA1DB8D>