From 4eb5b88d9eb1a88094ac3ae85f20e29e7510e97b Mon Sep 17 00:00:00 2001 From: Doug Barton Date: Fri, 14 Oct 2011 22:30:49 +0000 Subject: As previously advertised, complete removal of vulnerable ports that no one has stepped up to deal with: archivers/pecl-phar Vulnerable since 2011-01-13 comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN databases/mysql323-server Vulnerable since 2006-10-29 databases/mysql323-client Vulnerable since 2006-10-29 databases/mysql323-scripts Vulnerable since 2006-10-29 databases/mysql40-server Vulnerable since 2006-10-29 databases/mysql40-client Vulnerable since 2006-10-29 databases/mysql40-scripts Vulnerable since 2006-10-29 databases/p5-DBD-mysql40 Depends on databases/mysql40-server, which is FORBIDDEN deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN deskutils/libopensync-plugin-syncml Depends on comms/libsyncml, which is DEPRECATED devel/libsoup22 Vulnerable since 2011-07-28 dns/bind9-sdb-ldap Vulnerable since 2011-06-04 dns/bind9-sdb-postgresql Vulnerable since 2011-06-04 ftp/wgetpro Vulnerable since 2004-12-14 games/quake2forge Vulnerable since 2005-01-21 graphics/linux-tiff Vulnerable since 2004-10-13 japanese/mutt Vulnerable since 2007-07-29 japanese/asterisk14-sounds Depends on net/asterisk14, which is FORBIDDEN net/asterisk14 Vulnerable since 2011-06-25 net/isc-dhcp31-client Vulnerable since 2011-04-10 net/isc-dhcp31-server Vulnerable since 2011-04-10 net/isc-dhcp31-relay Vulnerable since 2011-04-10 net/asterisk-app-ldap Depends on net/asterisk14, which is FORBIDDEN net/asterisk-app-notify Depends on net/asterisk14, which is FORBIDDEN net/asterisk-oh323 Depends on net/asterisk14, which is FORBIDDEN, does not compile on sparc64 net/asterisk14-addons Depends on net/asterisk14, which is FORBIDDEN net/astfax Depends on net/asterisk14, which is FORBIDDEN net-mgmt/nagios2 Vulnerable since 2009-06-30 www/gforge Vulnerable since 2005-08-09 www/linux-flashplugin7 Vulnerable since at least 2008-05-30 www/opera-devel Vulnerable since 2010-06-25, does not fetch www/plone3 Vulnerable and unsupported upstream www/serendipity-devel Vulnerable since 2008-04-25 www/ziproxy Vulnerable since 2010-06-15 www/asterisk-gui Depends on net/asterisk14, which is FORBIDDEN x11-toolkits/linux-pango Vulnerable since 2009-05-13 --- dns/bind9-sdb-postgresql/pkg-message | 18 ------------------ 1 file changed, 18 deletions(-) delete mode 100644 dns/bind9-sdb-postgresql/pkg-message (limited to 'dns/bind9-sdb-postgresql/pkg-message') diff --git a/dns/bind9-sdb-postgresql/pkg-message b/dns/bind9-sdb-postgresql/pkg-message deleted file mode 100644 index bb713abdd1d3..000000000000 --- a/dns/bind9-sdb-postgresql/pkg-message +++ /dev/null @@ -1,18 +0,0 @@ -************************************************************************* -* _ _____ _____ _____ _ _ _____ ___ ___ _ _ * -* / \|_ _|_ _| ____| \ | |_ _|_ _/ _ \| \ | | * -* / _ \ | | | | | _| | \| | | | | | | | | \| | * -* / ___ \| | | | | |___| |\ | | | | | |_| | |\ | * -* /_/ \_\_| |_| |_____|_| \_| |_| |___\___/|_| \_| * -* * -* If you are running BIND 9 in a chroot environment, make * -* sure that there is a /dev/random device in the chroot. * -* * -* BIND 9 also requires configuration of rndc, including a * -* "secret" key. The easiest, and most secure way to configure * -* rndc is to run 'rndc-confgen -a' to generate the proper conf * -* file, with a new random key, and appropriate file permissions. * -* * -* The /etc/rc.d/named script in the base will do both for you. * -* * -************************************************************************* -- cgit v1.2.3