Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 18 Mar 2013 17:01:14 +0100
From:      =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>
To:        Ryan Steinmetz <zi@FreeBSD.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: old perl vulnerabilitiy
Message-ID:  <86zjy04rzp.fsf@ds4.des.no>
In-Reply-To: <20130315135454.GA41210@exodus.zi0r.com> (Ryan Steinmetz's message of "Fri, 15 Mar 2013 09:54:55 -0400")
References:  <1472823038.20130315173020@tern.ru> <20130315135454.GA41210@exodus.zi0r.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Ryan Steinmetz <zi@FreeBSD.org> writes:
> It does have the same issue.  I've corrected the VuXML entry and you
> should see updated portaudit results within 30 minutes.  Your 5.8.9
> perl-threaded installation should also show up as vulnerable to the same
> issue.

This wouldn't keep happening if we used CPEs whenever possible...

DES
--=20
Dag-Erling Sm=C3=B8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86zjy04rzp.fsf>