non port: archivers/pecl-phar/Makefile |
Number of commits found: 9 |
Friday, 14 Oct 2011
|
22:30 dougb
As previously advertised, complete removal of vulnerable ports that
no one has stepped up to deal with:
archivers/pecl-phar Vulnerable since 2011-01-13
comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN
databases/mysql323-server Vulnerable since 2006-10-29
databases/mysql323-client Vulnerable since 2006-10-29
databases/mysql323-scripts Vulnerable since 2006-10-29
databases/mysql40-server Vulnerable since 2006-10-29
databases/mysql40-client Vulnerable since 2006-10-29
databases/mysql40-scripts Vulnerable since 2006-10-29
databases/p5-DBD-mysql40
Depends on databases/mysql40-server, which is FORBIDDEN
deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN
deskutils/libopensync-plugin-syncml
Depends on comms/libsyncml, which is DEPRECATED
devel/libsoup22 Vulnerable since 2011-07-28
dns/bind9-sdb-ldap Vulnerable since 2011-06-04
dns/bind9-sdb-postgresql Vulnerable since 2011-06-04
ftp/wgetpro Vulnerable since 2004-12-14
games/quake2forge Vulnerable since 2005-01-21
graphics/linux-tiff Vulnerable since 2004-10-13
japanese/mutt Vulnerable since 2007-07-29
japanese/asterisk14-sounds Depends on net/asterisk14, which is FORBIDDEN
net/asterisk14 Vulnerable since 2011-06-25
net/isc-dhcp31-client Vulnerable since 2011-04-10
net/isc-dhcp31-server Vulnerable since 2011-04-10
net/isc-dhcp31-relay Vulnerable since 2011-04-10
net/asterisk-app-ldap Depends on net/asterisk14, which is FORBIDDEN
net/asterisk-app-notify Depends on net/asterisk14, which is FORBIDDEN
net/asterisk-oh323
Depends on net/asterisk14, which is FORBIDDEN, does not compile on sparc64
net/asterisk14-addons Depends on net/asterisk14, which is FORBIDDEN
net/astfax Depends on net/asterisk14, which is FORBIDDEN
net-mgmt/nagios2 Vulnerable since 2009-06-30
www/gforge Vulnerable since 2005-08-09
www/linux-flashplugin7 Vulnerable since at least 2008-05-30
www/opera-devel Vulnerable since 2010-06-25, does not fetch
www/plone3 Vulnerable and unsupported upstream
www/serendipity-devel Vulnerable since 2008-04-25
www/ziproxy Vulnerable since 2010-06-15
www/asterisk-gui Depends on net/asterisk14, which is FORBIDDEN
x11-toolkits/linux-pango Vulnerable since 2009-05-13
|
Monday, 26 Sep 2011
|
09:24 dougb
Mark FORBIDDEN the remaining ports that are vulnerable for more than
2 weeks according to portaudit (ranging from 23 days to 7 years).
The maintainers were notified by mail that this action would be taken
on 2011-09-03. (Ports for which maintainers responded have been/will be
dealt with separately.)
Also mark DEPRECATED ports that rely on the FORBIDDEN ports, and a few
ports that rely on those DEPRECATED ports.
|
Monday, 20 Dec 2010
|
06:27 miwi
* Add LICENSE
* Add IGNORE_WITH_PHP=4 as this is a php 5.X only module.
* Remove MD5 line from distinfo
PR: 152931
Submitted by: "Tom Judge" <tom@tomjudge.com>
|
Tuesday, 16 Jun 2009
|
19:27 miwi
- Update to 2.0.0RC2
|
Saturday, 11 Apr 2009
|
09:09 miwi
- Reset ditesh (at) gathani.org due to long period of inactivity.
- Take over some ports
Approved by: portmgr (linimon)
|
Saturday, 4 Apr 2009
|
19:06 miwi
- Fix build [1]
- pet portlint
Reported by: ionbot [1]
|
18:19 miwi
- Update to 2.0.0-RC1
PR: 132824
Submitted by: miwi
Approved by: maintainer timeout
|
Sunday, 27 Apr 2008
|
09:44 miwi
- Update to 1.2.3
PR: 122292
Submitted by: Wen heping <wenheping@gmail.com>
Approved by: maintainer timeout
|
Tuesday, 21 Aug 2007
|
09:10 miwi
The phar extension provides the phar stream wrapper and the Phar
class for manipulating self-contained PHP Archive (phar) files.
The Phar class can be used to create and to extract contents of
phar files as well as iterating over their contents.
PHP Archive files (Phars) are special collections of files that
can be transparently run right out of the file, similar to Java's
jar archive files. Using a phar archive, it is possible to distribute
a complete PHP application in a single file that will run out of the
file without modification or extraction.
WWW: http://pecl.php.net/package/phar/
PR: ports/115224
Submitted by: Ditesh Shashikant Gathani <ditesh at gathani.org>
|
Number of commits found: 9 |