delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2014/09/24/14:12:49

X-Recipient: archive-cygwin AT delorie DOT com
DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id
:list-unsubscribe:list-subscribe:list-archive:list-post
:list-help:sender:mime-version:date:message-id:subject:from:to
:content-type; q=dns; s=default; b=vmJERyEj06SOen7LpJtpGt4Zz0U5H
t7dtJkxvB/Grg2L8GM2q27SEYXmLxStp6ELWRdeSDyYLLO5L64jHmYUPtKOzcQZ/
TE9Qy00E3MPrK0UFlWkmnHvnLlXNf6KjjHtnBafkzAr2JK/sp6xTobeG6BHovxj1
ZCzcLbZMS4rwbY=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id
:list-unsubscribe:list-subscribe:list-archive:list-post
:list-help:sender:mime-version:date:message-id:subject:from:to
:content-type; s=default; bh=PaXrb2MAwbXB5ok+Px0Eu7KcMy0=; b=K3U
iuWqXqaVaNW8xHc3MeRWV/HpEJ/y8OB2TSqPvfMTI5mgLdz+cK7mpMyTkjB3mYgu
WB7VbXtxbScqAmOhxFEzlaqK/vbz3w0BNN3dBDuOf1Iq5e+D1aPi26nBZfDMDPGp
QW5DqUVpAuRoH+O/jiurV9eot0Q6MjErDuMCs2X4=
Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm
List-Id: <cygwin.cygwin.com>
List-Subscribe: <mailto:cygwin-subscribe AT cygwin DOT com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-help AT cygwin DOT com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner AT cygwin DOT com
Mail-Followup-To: cygwin AT cygwin DOT com
Delivered-To: mailing list cygwin AT cygwin DOT com
Authentication-Results: sourceware.org; auth=none
X-Virus-Found: No
X-Spam-SWARE-Status: No, score=-0.1 required=5.0 tests=AWL,BAYES_00,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham version=3.3.2
X-HELO: mail-lb0-f174.google.com
MIME-Version: 1.0
X-Received: by 10.112.16.129 with SMTP id g1mr7617714lbd.19.1411582348803; Wed, 24 Sep 2014 11:12:28 -0700 (PDT)
Date: Wed, 24 Sep 2014 14:12:28 -0400
Message-ID: <CAKs0fxFNsOnxf8PbZ3XQTLo_0-Qe7dyfLXE8wGfp=f6KyTjs4w@mail.gmail.com>
Subject: New bash vulnerability.
From: David Young <david DOT a DOT young AT gmail DOT com>
To: cygwin AT cygwin DOT com

Hi,

I've been seeing some traffic on this new bash vulnerability and
wanted to know if cygwin team will be updating bash with these
patches.

http://lists.gnu.org/archive/html/bug-bash/2014-09/index.html

Alternatively, is there a build guide that I can use to compile
bash-src with this patch myself?  After extracting the cygwin bash-src
package, I'm unclear as to how to move forward with these src.patch
cygwin.patch files and also what tools are necessary to build.  I'm
interested in 3.2.51(now 52 with the patch).


Thanks.

-- 
David Young

--
Problem reports:       http://cygwin.com/problems.html
FAQ:                   http://cygwin.com/faq/
Documentation:         http://cygwin.com/docs.html
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019