summaryrefslogtreecommitdiff
path: root/databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh
diff options
context:
space:
mode:
authorDoug Barton <dougb@FreeBSD.org>2011-10-14 22:30:49 +0000
committerDoug Barton <dougb@FreeBSD.org>2011-10-14 22:30:49 +0000
commit4eb5b88d9eb1a88094ac3ae85f20e29e7510e97b (patch)
tree07820ebb6104ca954e4d94f3a2fdb93d78912435 /databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh
parentAdd doulos-compact 4.110, Doulos SIL TrueType font collection, compact (diff)
As previously advertised, complete removal of vulnerable ports that
no one has stepped up to deal with: archivers/pecl-phar Vulnerable since 2011-01-13 comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN databases/mysql323-server Vulnerable since 2006-10-29 databases/mysql323-client Vulnerable since 2006-10-29 databases/mysql323-scripts Vulnerable since 2006-10-29 databases/mysql40-server Vulnerable since 2006-10-29 databases/mysql40-client Vulnerable since 2006-10-29 databases/mysql40-scripts Vulnerable since 2006-10-29 databases/p5-DBD-mysql40 Depends on databases/mysql40-server, which is FORBIDDEN deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN deskutils/libopensync-plugin-syncml Depends on comms/libsyncml, which is DEPRECATED devel/libsoup22 Vulnerable since 2011-07-28 dns/bind9-sdb-ldap Vulnerable since 2011-06-04 dns/bind9-sdb-postgresql Vulnerable since 2011-06-04 ftp/wgetpro Vulnerable since 2004-12-14 games/quake2forge Vulnerable since 2005-01-21 graphics/linux-tiff Vulnerable since 2004-10-13 japanese/mutt Vulnerable since 2007-07-29 japanese/asterisk14-sounds Depends on net/asterisk14, which is FORBIDDEN net/asterisk14 Vulnerable since 2011-06-25 net/isc-dhcp31-client Vulnerable since 2011-04-10 net/isc-dhcp31-server Vulnerable since 2011-04-10 net/isc-dhcp31-relay Vulnerable since 2011-04-10 net/asterisk-app-ldap Depends on net/asterisk14, which is FORBIDDEN net/asterisk-app-notify Depends on net/asterisk14, which is FORBIDDEN net/asterisk-oh323 Depends on net/asterisk14, which is FORBIDDEN, does not compile on sparc64 net/asterisk14-addons Depends on net/asterisk14, which is FORBIDDEN net/astfax Depends on net/asterisk14, which is FORBIDDEN net-mgmt/nagios2 Vulnerable since 2009-06-30 www/gforge Vulnerable since 2005-08-09 www/linux-flashplugin7 Vulnerable since at least 2008-05-30 www/opera-devel Vulnerable since 2010-06-25, does not fetch www/plone3 Vulnerable and unsupported upstream www/serendipity-devel Vulnerable since 2008-04-25 www/ziproxy Vulnerable since 2010-06-15 www/asterisk-gui Depends on net/asterisk14, which is FORBIDDEN x11-toolkits/linux-pango Vulnerable since 2009-05-13
Notes
Notes: svn path=/head/; revision=283540
Diffstat (limited to 'databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh')
-rw-r--r--databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh49
1 files changed, 0 insertions, 49 deletions
diff --git a/databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh b/databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh
deleted file mode 100644
index 19d4395fa09f..000000000000
--- a/databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh
+++ /dev/null
@@ -1,49 +0,0 @@
---- scripts/mysqlhotcopy.sh.orig Sun Dec 21 19:01:29 2003
-+++ scripts/mysqlhotcopy.sh Thu Sep 23 11:02:45 2004
-@@ -7,6 +7,7 @@
- use File::Path;
- use DBI;
- use Sys::Hostname;
-+use File::Temp;
-
- =head1 NAME
-
-@@ -607,7 +608,6 @@
- sub copy_index
- {
- my ($method, $files, $source, $target) = @_;
-- my $tmpfile="$opt_tmpdir/mysqlhotcopy$$";
-
- print "Copying indices for ".@$files." files...\n" unless $opt{quiet};
- foreach my $file (@$files)
-@@ -633,23 +633,23 @@
- }
- close OUTPUT || die "Error on close of $to: $!\n";
- }
-- elsif ($opt{method} eq 'scp')
-+ elsif ($opt{method} =~ /^scp\b/)
- {
-- my $tmp=$tmpfile;
-- open(OUTPUT,">$tmp") || die "Can\'t create file $tmp: $!\n";
-- if (syswrite(OUTPUT,$buff) != length($buff))
-+ my ($fh, $tmp)=tempfile('mysqlhotcopy-XXXXXX', DIR => $opt_tmpdir);
-+ die "Can\'t create/open file in $opt_tmpdir\n";
-+ if (syswrite($fh,$buff) != length($buff))
- {
- die "Error when writing data to $tmp: $!\n";
- }
-- close OUTPUT || die "Error on close of $tmp: $!\n";
-- safe_system("scp $tmp $to");
-+ close $fh || die "Error on close of $tmp: $!\n";
-+ safe_system("$opt{method} $tmp $to");
-+ unlink $tmp;
- }
- else
- {
- die "Can't use unsupported method '$opt{method}'\n";
- }
- }
-- unlink "$tmpfile" if ($opt{method} eq 'scp');
- }
-
-