From 4eb5b88d9eb1a88094ac3ae85f20e29e7510e97b Mon Sep 17 00:00:00 2001 From: Doug Barton Date: Fri, 14 Oct 2011 22:30:49 +0000 Subject: As previously advertised, complete removal of vulnerable ports that no one has stepped up to deal with: archivers/pecl-phar Vulnerable since 2011-01-13 comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN databases/mysql323-server Vulnerable since 2006-10-29 databases/mysql323-client Vulnerable since 2006-10-29 databases/mysql323-scripts Vulnerable since 2006-10-29 databases/mysql40-server Vulnerable since 2006-10-29 databases/mysql40-client Vulnerable since 2006-10-29 databases/mysql40-scripts Vulnerable since 2006-10-29 databases/p5-DBD-mysql40 Depends on databases/mysql40-server, which is FORBIDDEN deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN deskutils/libopensync-plugin-syncml Depends on comms/libsyncml, which is DEPRECATED devel/libsoup22 Vulnerable since 2011-07-28 dns/bind9-sdb-ldap Vulnerable since 2011-06-04 dns/bind9-sdb-postgresql Vulnerable since 2011-06-04 ftp/wgetpro Vulnerable since 2004-12-14 games/quake2forge Vulnerable since 2005-01-21 graphics/linux-tiff Vulnerable since 2004-10-13 japanese/mutt Vulnerable since 2007-07-29 japanese/asterisk14-sounds Depends on net/asterisk14, which is FORBIDDEN net/asterisk14 Vulnerable since 2011-06-25 net/isc-dhcp31-client Vulnerable since 2011-04-10 net/isc-dhcp31-server Vulnerable since 2011-04-10 net/isc-dhcp31-relay Vulnerable since 2011-04-10 net/asterisk-app-ldap Depends on net/asterisk14, which is FORBIDDEN net/asterisk-app-notify Depends on net/asterisk14, which is FORBIDDEN net/asterisk-oh323 Depends on net/asterisk14, which is FORBIDDEN, does not compile on sparc64 net/asterisk14-addons Depends on net/asterisk14, which is FORBIDDEN net/astfax Depends on net/asterisk14, which is FORBIDDEN net-mgmt/nagios2 Vulnerable since 2009-06-30 www/gforge Vulnerable since 2005-08-09 www/linux-flashplugin7 Vulnerable since at least 2008-05-30 www/opera-devel Vulnerable since 2010-06-25, does not fetch www/plone3 Vulnerable and unsupported upstream www/serendipity-devel Vulnerable since 2008-04-25 www/ziproxy Vulnerable since 2010-06-15 www/asterisk-gui Depends on net/asterisk14, which is FORBIDDEN x11-toolkits/linux-pango Vulnerable since 2009-05-13 --- .../files/patch-scripts::mysqlhotcopy.sh | 49 ---------------------- 1 file changed, 49 deletions(-) delete mode 100644 databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh (limited to 'databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh') diff --git a/databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh b/databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh deleted file mode 100644 index 19d4395fa09f..000000000000 --- a/databases/mysql323-server/files/patch-scripts::mysqlhotcopy.sh +++ /dev/null @@ -1,49 +0,0 @@ ---- scripts/mysqlhotcopy.sh.orig Sun Dec 21 19:01:29 2003 -+++ scripts/mysqlhotcopy.sh Thu Sep 23 11:02:45 2004 -@@ -7,6 +7,7 @@ - use File::Path; - use DBI; - use Sys::Hostname; -+use File::Temp; - - =head1 NAME - -@@ -607,7 +608,6 @@ - sub copy_index - { - my ($method, $files, $source, $target) = @_; -- my $tmpfile="$opt_tmpdir/mysqlhotcopy$$"; - - print "Copying indices for ".@$files." files...\n" unless $opt{quiet}; - foreach my $file (@$files) -@@ -633,23 +633,23 @@ - } - close OUTPUT || die "Error on close of $to: $!\n"; - } -- elsif ($opt{method} eq 'scp') -+ elsif ($opt{method} =~ /^scp\b/) - { -- my $tmp=$tmpfile; -- open(OUTPUT,">$tmp") || die "Can\'t create file $tmp: $!\n"; -- if (syswrite(OUTPUT,$buff) != length($buff)) -+ my ($fh, $tmp)=tempfile('mysqlhotcopy-XXXXXX', DIR => $opt_tmpdir); -+ die "Can\'t create/open file in $opt_tmpdir\n"; -+ if (syswrite($fh,$buff) != length($buff)) - { - die "Error when writing data to $tmp: $!\n"; - } -- close OUTPUT || die "Error on close of $tmp: $!\n"; -- safe_system("scp $tmp $to"); -+ close $fh || die "Error on close of $tmp: $!\n"; -+ safe_system("$opt{method} $tmp $to"); -+ unlink $tmp; - } - else - { - die "Can't use unsupported method '$opt{method}'\n"; - } - } -- unlink "$tmpfile" if ($opt{method} eq 'scp'); - } - - -- cgit v1.2.3