From 4eb5b88d9eb1a88094ac3ae85f20e29e7510e97b Mon Sep 17 00:00:00 2001 From: Doug Barton Date: Fri, 14 Oct 2011 22:30:49 +0000 Subject: As previously advertised, complete removal of vulnerable ports that no one has stepped up to deal with: archivers/pecl-phar Vulnerable since 2011-01-13 comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN databases/mysql323-server Vulnerable since 2006-10-29 databases/mysql323-client Vulnerable since 2006-10-29 databases/mysql323-scripts Vulnerable since 2006-10-29 databases/mysql40-server Vulnerable since 2006-10-29 databases/mysql40-client Vulnerable since 2006-10-29 databases/mysql40-scripts Vulnerable since 2006-10-29 databases/p5-DBD-mysql40 Depends on databases/mysql40-server, which is FORBIDDEN deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN deskutils/libopensync-plugin-syncml Depends on comms/libsyncml, which is DEPRECATED devel/libsoup22 Vulnerable since 2011-07-28 dns/bind9-sdb-ldap Vulnerable since 2011-06-04 dns/bind9-sdb-postgresql Vulnerable since 2011-06-04 ftp/wgetpro Vulnerable since 2004-12-14 games/quake2forge Vulnerable since 2005-01-21 graphics/linux-tiff Vulnerable since 2004-10-13 japanese/mutt Vulnerable since 2007-07-29 japanese/asterisk14-sounds Depends on net/asterisk14, which is FORBIDDEN net/asterisk14 Vulnerable since 2011-06-25 net/isc-dhcp31-client Vulnerable since 2011-04-10 net/isc-dhcp31-server Vulnerable since 2011-04-10 net/isc-dhcp31-relay Vulnerable since 2011-04-10 net/asterisk-app-ldap Depends on net/asterisk14, which is FORBIDDEN net/asterisk-app-notify Depends on net/asterisk14, which is FORBIDDEN net/asterisk-oh323 Depends on net/asterisk14, which is FORBIDDEN, does not compile on sparc64 net/asterisk14-addons Depends on net/asterisk14, which is FORBIDDEN net/astfax Depends on net/asterisk14, which is FORBIDDEN net-mgmt/nagios2 Vulnerable since 2009-06-30 www/gforge Vulnerable since 2005-08-09 www/linux-flashplugin7 Vulnerable since at least 2008-05-30 www/opera-devel Vulnerable since 2010-06-25, does not fetch www/plone3 Vulnerable and unsupported upstream www/serendipity-devel Vulnerable since 2008-04-25 www/ziproxy Vulnerable since 2010-06-15 www/asterisk-gui Depends on net/asterisk14, which is FORBIDDEN x11-toolkits/linux-pango Vulnerable since 2009-05-13 --- net/asterisk14/files/patch-rtp_timeout | 25 ------------------------- 1 file changed, 25 deletions(-) delete mode 100644 net/asterisk14/files/patch-rtp_timeout (limited to 'net/asterisk14/files/patch-rtp_timeout') diff --git a/net/asterisk14/files/patch-rtp_timeout b/net/asterisk14/files/patch-rtp_timeout deleted file mode 100644 index 6f60c74cff41..000000000000 --- a/net/asterisk14/files/patch-rtp_timeout +++ /dev/null @@ -1,25 +0,0 @@ ---- channels/chan_sip.c.orig 2009-04-14 08:58:13.000000000 +0100 -+++ channels/chan_sip.c 2009-04-14 09:00:58.000000000 +0100 -@@ -16287,7 +16287,6 @@ - restartsearch: - /* Check for interfaces needing to be killed */ - ast_mutex_lock(&iflock); -- t = time(NULL); - /* don't scan the interface list if it hasn't been a reasonable period - of time since the last time we did it (when MWI is being sent, we can - get back to this point every millisecond or less) -@@ -16306,12 +16305,14 @@ - (sip->owner->_state == AST_STATE_UP) && - !sip->redirip.sin_addr.s_addr && - sip->t38.state != T38_ENABLED) { -+ t = time(NULL); - if (sip->lastrtptx && - ast_rtp_get_rtpkeepalive(sip->rtp) && - (t > sip->lastrtptx + ast_rtp_get_rtpkeepalive(sip->rtp))) { - /* Need to send an empty RTP packet */ - sip->lastrtptx = time(NULL); - ast_rtp_sendcng(sip->rtp, 0); -+ t = time(NULL); - } - if (sip->lastrtprx && - (ast_rtp_get_rtptimeout(sip->rtp) || ast_rtp_get_rtpholdtimeout(sip->rtp)) && -- cgit v1.2.3