From owner-freebsd-ports@FreeBSD.ORG Thu Sep 25 06:48:50 2014 Return-Path: Delivered-To: ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id ECD45C63 for ; Thu, 25 Sep 2014 06:48:50 +0000 (UTC) Received: from a27-115.smtp-out.us-west-2.amazonses.com (a27-115.smtp-out.us-west-2.amazonses.com [54.240.27.115]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C39C7B0C for ; Thu, 25 Sep 2014 06:48:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=hsbnp7p3ensaochzwyq5wwmceodymuwv; d=amazonses.com; t=1411627212; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:Content-Type:In-Reply-To:Feedback-ID; bh=oOZ05VW0hDLru+DVtESWolRLh6kT0sXPDmd2AXzmsJk=; b=SAIyaxfd8kOUXwRGDRJDZSQdVQ6x5qgU9e9WXIOfEn8RAgDPkRaIGJYgYwoPuqLr Hac2SPDsTA53TuiqMtRf3p7b5hrSe+emkwm1j7AB/ETI2srD1DkQyNSVr4Rnm2zdoLQ 8R4J4hInNJ648jaNTysY0E4PljPbAxeJ21vmWwhI= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=7iuvfuckmdjngkit3px46zmjutqvp75o; d=vmeta.jp; t=1411627212; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:Content-Type:In-Reply-To; bh=oOZ05VW0hDLru+DVtESWolRLh6kT0sXPDmd2AXzmsJk=; b=O8iUsO1+tB/VpJOLSDh7nXg8ZVQOLXAc/SSQdEKuzJ1k8MZtnoPLKbMrEvlQHYBy diUsJghxBPkhEU1Jy67Uu4+BOeOatwVXK94NEj5JzwgALuGV+tyWMB89uz5s9sVRAtN aovGwdWCCVTev59LfdDVocPu+UBp981PjC/HbHo8= Date: Thu, 25 Sep 2014 06:40:12 +0000 From: Koichiro IWAO To: "Riyaz T.K" Subject: Re: bash velnerability Message-ID: <00000148ab89dfa1-01c034ff-823b-417a-888e-357e85240ccb-000000@us-west-2.amazonses.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-2022-jp Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD 10.1-BETA2 amd64 User-Agent: Mutt/1.5.23 (2014-03-12) X-SES-Outgoing: 2014.09.25-54.240.27.115 Feedback-ID: us-west-2.bWV0YUB2bWV0YS5qcA==:AmazonSES Cc: ports@freebsd.org X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Sep 2014 06:48:51 -0000 I think not yet[1]. But it will be shortly updated to patched version because the vulnerability is already documented written in security/vuxml [2]. That means port committer(s) already aware of the bash vulnerability. [1] http://svnweb.freebsd.org/ports/head/shells/bash/Makefile?revision=369185&view=markup [2] http://svnweb.freebsd.org/ports?view=revision&revision=369192 On Thu, Sep 25, 2014 at 11:58:30AM +0530, Riyaz T.K wrote: > Hi, > > https://www.freebsd.org/cgi/ports.cgi?query=The+GNU+Project%27s+Bourne+Again+SHell&stype=text&sektion=all > > Is this version patched from the bash vulnerability? > > https://access.redhat.com/articles/1200223 > > > > > -- > Riyaz T K > Admod Technologies > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" -- `whois vmeta.jp | nkf -w` meta