Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Sep 2014 06:40:12 +0000
From:      Koichiro IWAO <meta@vmeta.jp>
To:        "Riyaz T.K" <riyaz@admod.com>
Cc:        ports@freebsd.org
Subject:   Re: bash velnerability
Message-ID:  <00000148ab89dfa1-01c034ff-823b-417a-888e-357e85240ccb-000000@us-west-2.amazonses.com>
In-Reply-To: <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com>
References:  <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
I think not yet[1]. But it will be shortly updated to patched version because
the vulnerability is already documented written in security/vuxml [2]. That
means port committer(s) already aware of the bash vulnerability.

[1] http://svnweb.freebsd.org/ports/head/shells/bash/Makefile?revision=369185&view=markup
[2] http://svnweb.freebsd.org/ports?view=revision&revision=369192


On Thu, Sep 25, 2014 at 11:58:30AM +0530, Riyaz T.K wrote:
> Hi,
> 
> https://www.freebsd.org/cgi/ports.cgi?query=The+GNU+Project%27s+Bourne+Again+SHell&stype=text&sektion=all
> 
> Is this version patched from the bash vulnerability?
> 
> https://access.redhat.com/articles/1200223
> 
> 
> 
> 
> -- 
> Riyaz T K
> Admod Technologies
> _______________________________________________
> freebsd-ports@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ports
> To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org"

-- 
`whois vmeta.jp | nkf -w`
meta <meta@vmeta.jp>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00000148ab89dfa1-01c034ff-823b-417a-888e-357e85240ccb-000000>