Date: Sat, 7 Nov 2015 17:44:55 -0500 From: Jason Unovitch <junovitch@FreeBSD.org> To: JosC <bsdports@cloudzeeland.nl> Cc: FreeBSD Ports ML <freebsd-ports@freebsd.org> Subject: Re: Port Vulnerabilities | php5-phar-5.4.45 Message-ID: <20151107224455.GA5379@Silverstone.nc-us.unovitch.com> In-Reply-To: <563E4FC4.4030601@cloudzeeland.nl> References: <563E4FC4.4030601@cloudzeeland.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Sat, Nov 07, 2015 at 08:23:48PM +0100, JosC wrote: > Dear port maintainer, > > Can you check this port as it shows to have some vulnerabilities: > > Checking for packages with security vulnerabilities: > > Database fetched: Fri Nov 6 01:06:33 CET 2015 > php5-phar-5.4.45 > > Thanks, > Jos Chrispijn Jos, See http://www.php.net/eol.php PHP 5.4 is no longer supported by the PHP project as of 3 September 2015. Please update to a supported PHP release, such as the ports default version--PHP 5.6, using the steps in /usr/ports/UPDATING entry 20150220. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQF8BAEBCgBmBQJWPn7XXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ0NURGNTQ1OTkzQkJFMzc3OTNDQUNERUU2 RkQ0OUMzMDE2MUNBQTZFAAoJEG/UnDAWHKpuU/YH/2z3PLeYvd6QJrxmbnBPyFve k4p5+3mskTN6S2rMxXuUUMHUxWVCoIuw816DeBuCw4HCZEIfhTuEOkLzLz5fCJxW cxcUqTsKafGZVcbbnONH/g0zLIVXUJeuT6pwBlH0qJcc33XE5q97OBERUmw2YNRZ 0M1hWcr8o9bgSRjfwrfRBxCWI6JdU6dI8DwFT/V+N3Nmbk74XBM91h6rguApklCc DK008Gc4cyCc8o1DyU1qYqqzIXTFjW3+2K+pUUWLwZPoGZKOVUpt8Hj6Px9+GdQd CufUPHJKHs0xa6EOYQ9MHM2xrfEkUjhtwtH+7bDxPCGoEsZF932pGvob4vyqxGc= =NGar -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20151107224455.GA5379>