Date: Tue, 9 Aug 2011 16:49:12 -0400 From: "Michael D. Stackhouse" <mstackhouse@samsa.com> To: "Alex Dupre" <ale@FreeBSD.org> Cc: ports@FreeBSD.org, Jason Cousineau <JCousineau@samsa.com>, Mark Kunitzer <mkunitzer@samsa.com>, Jeff Alles <JAlles@samsa.com> Subject: RE: FreeBSD Port: php5-5.3.6_1 Message-ID: <407390A9C396D342802A99E1295F55609D2B92@samsafs01.samsa.local> In-Reply-To: <10052F92DE6344EF96780E6201E56C26@samsa.local> References: <407390A9C396D342802A99E1295F55609D2B8A@samsafs01.samsa.local> <10052F92DE6344EF96780E6201E56C26@samsa.local>
next in thread | previous in thread | raw e-mail | index | archive | help
Wonderful - thanks! Michael D. Stackhouse President | SAMSA, Inc. P: 989-790-0507 F: 989-249-6729 Saginaw, MI=A0 USA www.samsa.com samsaisgreat (spam filter) -----Original Message----- From: Alex Dupre [mailto:ale@FreeBSD.org]=20 Sent: Tuesday, August 09, 2011 4:31 PM To: Michael D. Stackhouse Cc: ports@FreeBSD.org; Jason Cousineau; Jeff Alles; Mark Kunitzer Subject: Re: FreeBSD Port: php5-5.3.6_1 Michael D. Stackhouse ha scritto: > We have 5.3.6 installed from Freebsd port. Can you please direct me to = > documentation for applying that patch and recompiling so I can pass=20 > our PCI audit? You should say to your PCI scanning company to look deeper. Such = vulnerability is already patched by the FreeBSD port. -- Alex Dupre
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?407390A9C396D342802A99E1295F55609D2B92>