On Thu, Sep 25, 2014 at 01:54:10PM +0100, Kerin Millar wrote
> On 25/09/2014 02:58, Walter Dnes wrote:
>
> [snip]
>
> > ...with malicious stuff, and it could get ugly. app-shells/bash-4.2_p48
> > has been pushed to Gentoo stable. The same "env" command results in...
>
> Unfortunately, that ver
On 2014-09-25 16:02, cov...@ccs.covici.com wrote:
Kerin Millar wrote:
On 25/09/2014 02:58, Walter Dnes wrote:
[snip]
> ...with malicious stuff, and it could get ugly. app-shells/bash-4.2_p48
> has been pushed to Gentoo stable. The same "env" command results in...
Unfortunately, that versi
Kerin Millar wrote:
> On 25/09/2014 02:58, Walter Dnes wrote:
>
> [snip]
>
> > ...with malicious stuff, and it could get ugly. app-shells/bash-4.2_p48
> > has been pushed to Gentoo stable. The same "env" command results in...
>
> Unfortunately, that version did fully address the problem. Ins
On 25/09/2014 13:54, Kerin Millar wrote:
On 25/09/2014 02:58, Walter Dnes wrote:
[snip]
...with malicious stuff, and it could get ugly. app-shells/bash-4.2_p48
has been pushed to Gentoo stable. The same "env" command results in...
Unfortunately, that version did fully address the problem.
On 25/09/2014 02:58, Walter Dnes wrote:
[snip]
...with malicious stuff, and it could get ugly. app-shells/bash-4.2_p48
has been pushed to Gentoo stable. The same "env" command results in...
Unfortunately, that version did fully address the problem. Instead,
upgrade to 4.2_p48-r1 or any of
Slashdot article
http://linux.slashdot.org/story/14/09/24/1638207/remote-exploit-vulnerability-found-in-bash
Story at
http://www.csoonline.com/article/2687265/application-security/remote-exploit-in-bash-cve-2014-6271.html
CVE ID CVE-2014-6271 at http://seclists.org/oss-sec/2014/q3/650
6 matches
Mail list logo