From 9766a65fd0afeee48b78ea6bda3a90fa11014f9e Mon Sep 17 00:00:00 2001 From: Doug Barton Date: Fri, 30 Sep 2011 09:12:36 +0000 Subject: As previously advertised, delete ports that have vulnerabilities listed in portaudit, and those that depend on them - part 1 math/mupad Relies on xpm, vulnerable since 2004-09-15 net-p2p/torrentflux Vulnerable since 2006-10-07 net/tptest Vulnerable since 2009-12-17 security/pgp6 Vulnerable since 2005-07-31 www/p5-RTx-RightsMatrix Only works with www/rt36, which is FORBIDDEN www/p5-RTx-Shredder Only works with www/rt36, which is FORBIDDEN www/p5-RTx-Statistics Only works with www/rt36, which is FORBIDDEN www/plone Vulnerable since 2011-02-10 www/pyblosxom Vulnerable since 2009-02-11 www/rt36 Vulnerable since 2009-12-09 www/zope-archetypes Depends on www/plone, which is FORBIDDEN www/zope-calendaring Depends on www/plone, which is FORBIDDEN www/zope-coreblog2 Depends on www/plone, which is FORBIDDEN www/zope-i18nlayer Depends on www/plone, which is FORBIDDEN www/zope-plonelanguagetool Depends on www/plone, which is FORBIDDEN www/zope-simpleblog Depends on www/plone, which is FORBIDDEN --- security/pgp6/files/patch-cc | 19 ------------------- 1 file changed, 19 deletions(-) delete mode 100644 security/pgp6/files/patch-cc (limited to 'security/pgp6/files/patch-cc') diff --git a/security/pgp6/files/patch-cc b/security/pgp6/files/patch-cc deleted file mode 100644 index 9366ea2eafeb..000000000000 --- a/security/pgp6/files/patch-cc +++ /dev/null @@ -1,19 +0,0 @@ ---- clients/pgp/cmdline/doencode.c Thu Sep 30 20:10:21 1999 -+++ clients/pgp/cmdline/doencode.c Thu Jan 11 20:50:20 2001 -@@ -283,6 +283,7 @@ - PGPBoolean batchmode = pgpenvGetInt( env, PGPENV_BATCHMODE, &pri, &err ); - PGPBoolean verbose = pgpenvGetInt( env, PGPENV_VERBOSE, &pri, &err ); - PGPBoolean quietmode = pgpenvGetInt( env, PGPENV_NOOUT, &pri, &err); -+ PGPBoolean force = pgpenvGetInt( env, PGPENV_FORCE, &pri, &err); - PGPKeySetRef tmpset; - - err = PGPNewEmptyKeySet( toSet, &tmpset ); -@@ -317,7 +318,7 @@ - if(verbose) - pgpShowKeyValidity( filebPtr, key ); - -- if( validity < kPGPValidity_Marginal ) { -+ if( validity < kPGPValidity_Marginal && !force) { - char useridstr[ kPGPMaxUserIDSize ]; - PGPBoolean answer; - err = pgpGetUserIDStringFromKey( key, useridstr ); -- cgit v1.2.3