Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Oct 2015 07:44:55 -0400
From:      Jason Unovitch <jason.unovitch@gmail.com>
To:        Kurt Jaeger <lists@opsec.eu>
Cc:        f-ports <freebsd-ports@freebsd.org>, Jos Chrispijn <ports@webrz.net>
Subject:   Re: php5-phar-5.4.45
Message-ID:  <CABW2x9o-KkysLkW%2B==E5a6NZhDfBwsF5m4HDidhdBMawpVKY6g@mail.gmail.com>
In-Reply-To: <20151027111907.GV19913@home.opsec.eu>
References:  <562F4766.3060604@webrz.net> <20151027111907.GV19913@home.opsec.eu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Oct 27, 2015 7:19 AM, "Kurt Jaeger" <lists@opsec.eu> wrote:
>
> Hi!
>
> > Checking for packages with security vulnerabilities:
> > Database fetched: Mon Oct 26 00:09:27 CET 2015
> > php5-phar-5.4.45
> >
> > Can you tell when we can expect the update of this port?
>
> Is there an application that does not cope with newer versions of PHP ?
>

As mentioned above, PHP 5.4 passed end of life and there was no upstream
release to go along with the recent 5.5 and 5.6 updates. If there are any
applications that do not cope with newer PHP versions, your assistance to
identify it and a PR to document it would be helpful!

Thanks!



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CABW2x9o-KkysLkW%2B==E5a6NZhDfBwsF5m4HDidhdBMawpVKY6g>