Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Aug 2011 00:45:01 +0400
From:      Ruslan Mahmatkhanov <cvs-src@yandex.ru>
To:        "Michael D. Stackhouse" <mstackhouse@samsa.com>
Cc:        ports@FreeBSD.org, Jason Cousineau <JCousineau@samsa.com>, Mark Kunitzer <mkunitzer@samsa.com>, ale@FreeBSD.org, Jeff Alles <JAlles@samsa.com>
Subject:   Re: FreeBSD Port: php5-5.3.6_1
Message-ID:  <4E419C4D.3040701@yandex.ru>
In-Reply-To: <407390A9C396D342802A99E1295F55609D2B8A@samsafs01.samsa.local>
References:  <407390A9C396D342802A99E1295F55609D2B8A@samsafs01.samsa.local>

next in thread | previous in thread | raw e-mail | index | archive | help
Michael D. Stackhouse wrote on 10.08.2011 00:15:
> We're being informed by our PCI scanning company that we must update to
> php5.3.7 to correct a vulnerability in 5.3.6:
>
> http://svn.php.net/viewvc?view=revision&revision=312103
>
>
>
> We have 5.3.6 installed from Freebsd port.  Can you please direct me to
> documentation for applying that patch and recompiling so I can pass our
> PCI audit?
>
>
>
> Any help you could provide would be much appreciated.

In first, there is no 5.3.7. The last released php version is 5.3.6.
Second, this patch is already in ports tree.
See lang/php5/files/patch-main_rfc1867.c.
So if you running last php version from ports, you do not need to do 
anything - you already have patched version.

-- 
Regards,
Ruslan



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E419C4D.3040701>