Date: Thu, 25 Sep 2014 06:54:06 +0000 From: Koichiro IWAO <meta@vmeta.jp> To: "Riyaz T.K" <riyaz@admod.com> Cc: ports@freebsd.org Subject: Re: bash velnerability Message-ID: <00000148ab969845-5940abcc-bb88-4111-8f7f-8671b0d0300b-000000@us-west-2.amazonses.com> In-Reply-To: <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com> References: <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Please let me make corrections. The "shellshock" bash vulnerabilities are described by 2 CVEs. - CVE-2014-6271 - CVE-2014-7169 The first CVE is already fixed in latest freebsd ports tree (r369185), so far the second CVE is not fixed yet. On Thu, Sep 25, 2014 at 11:58:30AM +0530, Riyaz T.K wrote: > Hi, > > https://www.freebsd.org/cgi/ports.cgi?query=The+GNU+Project%27s+Bourne+Again+SHell&stype=text&sektion=all > > Is this version patched from the bash vulnerability? > > https://access.redhat.com/articles/1200223 > > > > > -- > Riyaz T K > Admod Technologies > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" -- `whois vmeta.jp | nkf -w` meta <meta@vmeta.jp>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00000148ab969845-5940abcc-bb88-4111-8f7f-8671b0d0300b-000000>