Date: Mon, 18 Mar 2013 17:01:14 +0100 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Ryan Steinmetz <zi@FreeBSD.org> Cc: freebsd-security@freebsd.org Subject: Re: old perl vulnerabilitiy Message-ID: <86zjy04rzp.fsf@ds4.des.no> In-Reply-To: <20130315135454.GA41210@exodus.zi0r.com> (Ryan Steinmetz's message of "Fri, 15 Mar 2013 09:54:55 -0400") References: <1472823038.20130315173020@tern.ru> <20130315135454.GA41210@exodus.zi0r.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Ryan Steinmetz <zi@FreeBSD.org> writes: > It does have the same issue. I've corrected the VuXML entry and you > should see updated portaudit results within 30 minutes. Your 5.8.9 > perl-threaded installation should also show up as vulnerable to the same > issue. This wouldn't keep happening if we used CPEs whenever possible... DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86zjy04rzp.fsf>