Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 7 Nov 2015 17:44:55 -0500
From:      Jason Unovitch <junovitch@FreeBSD.org>
To:        JosC <bsdports@cloudzeeland.nl>
Cc:        FreeBSD Ports ML <freebsd-ports@freebsd.org>
Subject:   Re: Port Vulnerabilities | php5-phar-5.4.45
Message-ID:  <20151107224455.GA5379@Silverstone.nc-us.unovitch.com>
In-Reply-To: <563E4FC4.4030601@cloudzeeland.nl>
References:  <563E4FC4.4030601@cloudzeeland.nl>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On Sat, Nov 07, 2015 at 08:23:48PM +0100, JosC wrote:
> Dear port maintainer,
> 
> Can you check this port as it shows to have some vulnerabilities:
> 
> Checking for packages with security vulnerabilities:
> 
> Database fetched: Fri Nov 6 01:06:33 CET 2015
> php5-phar-5.4.45
> 
> Thanks,
> Jos Chrispijn

Jos,
See http://www.php.net/eol.php

PHP 5.4 is no longer supported by the PHP project as of 3 September
2015. Please update to a supported PHP release, such as the ports
default version--PHP 5.6, using the steps in /usr/ports/UPDATING entry
20150220.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=
=NGar
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20151107224455.GA5379>