From owner-freebsd-ports@freebsd.org Thu Aug 11 19:19:17 2016 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id ECDE7BB622B for ; Thu, 11 Aug 2016 19:19:17 +0000 (UTC) (envelope-from bsdports@cloudzeeland.nl) Received: from ares.cloudzeeland.nl (cloudzeeland.xs4all.nl [83.161.133.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "cloudzeeland.nl", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id ADABD13AC for ; Thu, 11 Aug 2016 19:19:16 +0000 (UTC) (envelope-from bsdports@cloudzeeland.nl) Received: from ares.cloudzeeland.nl (ares.cloudzeeland.nl [10.10.10.32]) by ares.cloudzeeland.nl (Postfix) with ESMTP id 9164B4FAD4D1; Thu, 11 Aug 2016 21:19:13 +0200 (CEST) Received: from [10.10.10.34] (daedalus.cloudzeeland.nl [10.10.10.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by ares.cloudzeeland.nl (Postfix) with ESMTPSA id 76A044FAD4D0; Thu, 11 Aug 2016 21:19:13 +0200 (CEST) Subject: Re: Perl upgrade - 5.20.x vulnerable To: Kurt Jaeger References: <3f8f41ff-3262-1021-2e28-2aaae89849b6@cloudzeeland.nl> <20160811185136.GC96200@home.opsec.eu> Cc: FreeBSD Ports ML From: JosC Message-ID: Date: Thu, 11 Aug 2016 21:19:15 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: <20160811185136.GC96200@home.opsec.eu> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV using ClamSMTP on ares.cloudzeeland.nl X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Aug 2016 19:19:18 -0000 In een bericht van 11-8-2016 20:51: > The patch to update was committed only a few hours ago. The > packages on the pkg reposities need a bit more time until they > are available. Then perl (any version) will be secure. Thanks, will wait for that. Just a question: so there is a stable version (5.20 in this case) - see in the ports collection that it is possible to install up to v5.24. Does that mean that 5.20+ versions aren't stable or how should I interprete these version availabilities? Beste regards, Jos Chrispijn