Date: Tue, 9 Aug 2011 16:15:22 -0400 From: "Michael D. Stackhouse" <mstackhouse@samsa.com> To: <ale@FreeBSD.org> Cc: ports@FreeBSD.org, Jason Cousineau <JCousineau@samsa.com>, Mark Kunitzer <mkunitzer@samsa.com>, Jeff Alles <JAlles@samsa.com> Subject: FreeBSD Port: php5-5.3.6_1 Message-ID: <407390A9C396D342802A99E1295F55609D2B8A@samsafs01.samsa.local>
next in thread | raw e-mail | index | archive | help
We're being informed by our PCI scanning company that we must update to php5.3.7 to correct a vulnerability in 5.3.6: http://svn.php.net/viewvc?view=3Drevision&revision=3D312103 =20 We have 5.3.6 installed from Freebsd port. Can you please direct me to documentation for applying that patch and recompiling so I can pass our PCI audit? =20 Any help you could provide would be much appreciated. =20 Michael D. Stackhouse President | SAMSA, Inc. P: 989-790-0507 F: 989-249-6729 Saginaw, MI USA www.samsa.com <http://www.samsa.com>=20 =20 samsaisgreat (spam filter) =20 =20
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?407390A9C396D342802A99E1295F55609D2B8A>