[Info-vax] DCL vulnerability write up on The Register
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Wed Feb 7 09:15:11 EST 2018
In article <p5eslo$jdt$1 at dont-email.me>, "Craig A. Berry" <craigberry at nospam.mac.com> writes:
>On 2/6/18 9:27 PM, IanD wrote:
>> Could not the security exploit release have have waited for another
>> 6-8 months more (1.6% of the time it existed for!) until VSI rolled
>> out x86 and given people a positive pathway forward?
>
>This doesn't make any sense. People can get the vulnerability patched
>today on Alpha and Itanium. They do have to get to a current release,
>which apparently even includes that very loose definition of "current"
>which is HPE v8.4. An architecture change to x86_64 may be attractive
>for many reasons, but has nothing to do with addressing this particular
>vulnerability.
>
>Side note: the Register article incorrectly stated that Itanium
>customers have to get the patch from HPE, but if you have VSI support
>you can get it from them and it was available there sooner.
Itanium customers don't need any patch.
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list