Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Aug 2016 21:27:32 +0200
From:      Kurt Jaeger <lists@opsec.eu>
To:        JosC <bsdports@cloudzeeland.nl>
Cc:        FreeBSD Ports ML <freebsd-ports@freebsd.org>
Subject:   Re: Perl upgrade - 5.20.x vulnerable
Message-ID:  <20160811192732.GD96200@home.opsec.eu>
In-Reply-To: <a884020e-26e1-15ca-066b-c6b833415f8f@cloudzeeland.nl>
References:  <3f8f41ff-3262-1021-2e28-2aaae89849b6@cloudzeeland.nl> <20160811185136.GC96200@home.opsec.eu> <a884020e-26e1-15ca-066b-c6b833415f8f@cloudzeeland.nl>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi!

> Just a question: so there is a stable version (5.20 in this case) - see 
> in the ports collection that it is possible to install up to v5.24. Does 
> that mean that 5.20+ versions aren't stable or how should I interprete 
> these version availabilities?

I'm using 5.20, 5.22 and 5.24 on different boxes for different
use cases, no issues in general.

But: There's one issue that keeps me on 5.20 for some production boxes:
mod_perl has problems with newer versions of perl. See

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=209459

for details. If you do not plan to use mod_perl, there should
be no issue.

-- 
pi@opsec.eu            +49 171 3101372                         4 years to go !



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20160811192732.GD96200>