Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Sep 2014 06:54:06 +0000
From:      Koichiro IWAO <meta@vmeta.jp>
To:        "Riyaz T.K" <riyaz@admod.com>
Cc:        ports@freebsd.org
Subject:   Re: bash velnerability
Message-ID:  <00000148ab969845-5940abcc-bb88-4111-8f7f-8671b0d0300b-000000@us-west-2.amazonses.com>
In-Reply-To: <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com>
References:  <CAHFU5H5WOnAXuFmfQEGkTvwoECATTCC3eKYE3yts%2BBqh1M_8ww@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Please let me make corrections.  The "shellshock" bash vulnerabilities are described by 2 CVEs.
 - CVE-2014-6271
 - CVE-2014-7169

The first CVE is already fixed in latest freebsd ports tree (r369185),
so far the second CVE is not fixed yet.

On Thu, Sep 25, 2014 at 11:58:30AM +0530, Riyaz T.K wrote:
> Hi,
> 
> https://www.freebsd.org/cgi/ports.cgi?query=The+GNU+Project%27s+Bourne+Again+SHell&stype=text&sektion=all
> 
> Is this version patched from the bash vulnerability?
> 
> https://access.redhat.com/articles/1200223
> 
> 
> 
> 
> -- 
> Riyaz T K
> Admod Technologies
> _______________________________________________
> freebsd-ports@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ports
> To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org"

-- 
`whois vmeta.jp | nkf -w`
meta <meta@vmeta.jp>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00000148ab969845-5940abcc-bb88-4111-8f7f-8671b0d0300b-000000>