[Info-vax] DCL vulnerability write up on The Register

johnwallace4 at yahoo.co.uk johnwallace4 at yahoo.co.uk
Thu Feb 8 10:49:57 EST 2018


On Thursday, 8 February 2018 14:52:18 UTC, Bill Gunshannon  wrote:
> On 02/08/2018 06:52 AM, Ian Miller wrote:
> > On Thursday, February 8, 2018 at 2:32:06 AM UTC, Craig A. Berry wrote:
> >> On 2/7/18 7:28 PM, Arne Vajhøj wrote:
> >>> On 2/7/2018 7:49 AM, Craig A. Berry wrote:
> >>
> >>>> Side note: the Register article incorrectly stated that Itanium
> >>>> customers have to get the patch from HPE, but if you have VSI support
> >>>> you can get it from them and it was available there sooner.
> >>>
> >>> So HPE also released a patch?
> >>
> >> I assume they repackaged VSI's patch, and I take the Register's word for
> >> it that you can get a patch from HPE. I just know they are wrong in
> >> saying you *have* to get it from them.
> > 
> > I've not seen a patch nor announcement from HPE on this yet.
> > 
> > As previously mentioned, VSI have done the right thing after receiving the report of the issue.
> > 
> 
> Maybe someone needs to contact the Register, enlighten them
> and ask for them to publish a correction.  Would be good
> publicity for VSI.
> 
> bill

It might be better still if an official "correction" or whatever
could also link to a page on the VSI website where definitive
information on the subject of the CVE in question and how to 
obtain further information and assistance (from VSI or from
VSI partners of one form or another) could be found, which 
might help add real credibility to claims like this: 

"VSI has redefined how professional services are provided to platform users. Given the particularly tight requirements of our mission critical customers, and the low supply of OpenVMS experts, VSI has teamed up with the best OpenVMS service providers on the platform, worldwide."




More information about the Info-vax mailing list