(Only the first 10 of 290 ports in this commit are shown above. )
As previously advertised, complete removal of vulnerable ports that
no one has stepped up to deal with:
archivers/pecl-phar Vulnerable since 2011-01-13
comms/libsyncml Depends on devel/libsoup22, which is FORBIDDEN
databases/mysql323-server Vulnerable since 2006-10-29
databases/mysql323-client Vulnerable since 2006-10-29
databases/mysql323-scripts Vulnerable since 2006-10-29
databases/mysql40-server Vulnerable since 2006-10-29
databases/mysql40-client Vulnerable since 2006-10-29
databases/mysql40-scripts Vulnerable since 2006-10-29
databases/p5-DBD-mysql40
Depends on databases/mysql40-server, which is FORBIDDEN
deskutils/buoh Depends on devel/libsoup22, which is FORBIDDEN
deskutils/libopensync-plugin-syncml
(Only the first 15 lines of the commit message are shown above )
Libsyncml is an implementation of the SyncML protocol.
It's purpose is PIM data synchronization with mobile
devices over HTTP or OBEX/Bluetooth channels.
WWW: http://libsyncml.opensync.org/
PR: ports/121632
Submitted by: Daniel Roethlisberger <daniel@roe.ch>
Approved by: gabor (mentor)