Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 9 Aug 2011 16:15:22 -0400
From:      "Michael D. Stackhouse" <mstackhouse@samsa.com>
To:        <ale@FreeBSD.org>
Cc:        ports@FreeBSD.org, Jason Cousineau <JCousineau@samsa.com>, Mark Kunitzer <mkunitzer@samsa.com>, Jeff Alles <JAlles@samsa.com>
Subject:   FreeBSD Port: php5-5.3.6_1
Message-ID:  <407390A9C396D342802A99E1295F55609D2B8A@samsafs01.samsa.local>

next in thread | raw e-mail | index | archive | help
We're being informed by our PCI scanning company that we must update to
php5.3.7 to correct a vulnerability in 5.3.6:

http://svn.php.net/viewvc?view=3Drevision&revision=3D312103

=20

We have 5.3.6 installed from Freebsd port.  Can you please direct me to
documentation for applying that patch and recompiling so I can pass our
PCI audit?

=20

Any help you could provide would be much appreciated.

=20

Michael D. Stackhouse
President | SAMSA, Inc.
P: 989-790-0507
F: 989-249-6729
Saginaw, MI  USA
www.samsa.com <http://www.samsa.com>=20

=20

samsaisgreat (spam filter)

=20

=20




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?407390A9C396D342802A99E1295F55609D2B8A>