(Only the first 10 of 290 ports in this commit are shown above. )
As previously advertised, complete removal of vulnerable ports that
no one has stepped up to deal with:
archivers/pecl-phar Vulnerable since 2011-01-13
comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN
databases/mysql323-server Vulnerable since 2006-10-29
databases/mysql323-client Vulnerable since 2006-10-29
databases/mysql323-scripts Vulnerable since 2006-10-29
databases/mysql40-server Vulnerable since 2006-10-29
databases/mysql40-client Vulnerable since 2006-10-29
databases/mysql40-scripts Vulnerable since 2006-10-29
Depends on databases/mysql40-server, which is FORBIDDEN
deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN
(Only the first 15 lines of the commit message are shown above )
The phar extension provides the phar stream wrapper and the Phar
class for manipulating self-contained PHP Archive (phar) files.
The Phar class can be used to create and to extract contents of
phar files as well as iterating over their contents.
PHP Archive files (Phars) are special collections of files that
can be transparently run right out of the file, similar to Java's
jar archive files. Using a phar archive, it is possible to distribute
a complete PHP application in a single file that will run out of the
file without modification or extraction.
Submitted by: Ditesh Shashikant Gathani <ditesh at gathani.org>