Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 9 Aug 2011 16:49:12 -0400
From:      "Michael D. Stackhouse" <mstackhouse@samsa.com>
To:        "Alex Dupre" <ale@FreeBSD.org>
Cc:        ports@FreeBSD.org, Jason Cousineau <JCousineau@samsa.com>, Mark Kunitzer <mkunitzer@samsa.com>, Jeff Alles <JAlles@samsa.com>
Subject:   RE: FreeBSD Port: php5-5.3.6_1
Message-ID:  <407390A9C396D342802A99E1295F55609D2B92@samsafs01.samsa.local>
In-Reply-To: <10052F92DE6344EF96780E6201E56C26@samsa.local>
References:  <407390A9C396D342802A99E1295F55609D2B8A@samsafs01.samsa.local> <10052F92DE6344EF96780E6201E56C26@samsa.local>

next in thread | previous in thread | raw e-mail | index | archive | help
Wonderful - thanks!

Michael D. Stackhouse
President | SAMSA, Inc.
P: 989-790-0507
F: 989-249-6729
Saginaw, MI=A0 USA
www.samsa.com

samsaisgreat (spam filter)


-----Original Message-----
From: Alex Dupre [mailto:ale@FreeBSD.org]=20
Sent: Tuesday, August 09, 2011 4:31 PM
To: Michael D. Stackhouse
Cc: ports@FreeBSD.org; Jason Cousineau; Jeff Alles; Mark Kunitzer
Subject: Re: FreeBSD Port: php5-5.3.6_1

Michael D. Stackhouse ha scritto:
> We have 5.3.6 installed from Freebsd port. Can you please direct me to =

> documentation for applying that patch and recompiling so I can pass=20
> our PCI audit?

You should say to your PCI scanning company to look deeper. Such =
vulnerability is already patched by the FreeBSD port.

--
Alex Dupre





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?407390A9C396D342802A99E1295F55609D2B92>