Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Sep 2014 18:46:38 +0200
From:      Bartek Rutkowski <robak@freebsd.org>
To:        Bryan Drewery <bdrewery@freebsd.org>
Cc:        freebsd-security <freebsd-security@freebsd.org>, freebsd-ports <freebsd-ports@freebsd.org>
Subject:   Re: bash velnerability
Message-ID:  <CAHcXP%2Bdx2etYgQPNiAxk2P68Z-4j%2BbTvdMoHfz%2BxKsBDKh9Z9g@mail.gmail.com>
In-Reply-To: <542596E3.3070707@FreeBSD.org>
References:  <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com> <00000148ab969845-5940abcc-bb88-4111-8f7f-8671b0d0300b-000000@us-west-2.amazonses.com> <54243F0F.6070904@FreeBSD.org> <54244982.8010002@FreeBSD.org> <16EB2C50-FBBA-4797-83B0-FB340A737238@circl.lu> <542596E3.3070707@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Sep 26, 2014 at 6:40 PM, Bryan Drewery <bdrewery@freebsd.org> wrote=
:
> On 9/26/2014 2:36 AM, Steve Clement wrote:
>> Dear all,
>>
>> In case you urgently need to go the manual route, here is one way to rea=
lly patch your systems:
>>
>> https://www.circl.lu/pub/tr-27/
>>
>> Until the patch is in the bash upstream=E2=80=A6 (which it might be by n=
ow)
>>
>> Take care,
>>
>
> The port has had the fixes since yesterday. The packages are building.
>
> --
> Regards,
> Bryan Drewery
>

Apparently, the full fix is still not delivered, accordingly to this:
http://seclists.org/oss-sec/2014/q3/741

Kind regards,
Bartek Rutkowski



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAHcXP%2Bdx2etYgQPNiAxk2P68Z-4j%2BbTvdMoHfz%2BxKsBDKh9Z9g>