Date: Thu, 25 Sep 2014 06:40:12 +0000 From: Koichiro IWAO <meta@vmeta.jp> To: "Riyaz T.K" <riyaz@admod.com> Cc: ports@freebsd.org Subject: Re: bash velnerability Message-ID: <00000148ab89dfa1-01c034ff-823b-417a-888e-357e85240ccb-000000@us-west-2.amazonses.com> In-Reply-To: <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com> References: <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
I think not yet[1]. But it will be shortly updated to patched version because the vulnerability is already documented written in security/vuxml [2]. That means port committer(s) already aware of the bash vulnerability. [1] http://svnweb.freebsd.org/ports/head/shells/bash/Makefile?revision=369185&view=markup [2] http://svnweb.freebsd.org/ports?view=revision&revision=369192 On Thu, Sep 25, 2014 at 11:58:30AM +0530, Riyaz T.K wrote: > Hi, > > https://www.freebsd.org/cgi/ports.cgi?query=The+GNU+Project%27s+Bourne+Again+SHell&stype=text&sektion=all > > Is this version patched from the bash vulnerability? > > https://access.redhat.com/articles/1200223 > > > > > -- > Riyaz T K > Admod Technologies > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" -- `whois vmeta.jp | nkf -w` meta <meta@vmeta.jp>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00000148ab89dfa1-01c034ff-823b-417a-888e-357e85240ccb-000000>