Isso o (SSA:2014-268-01) On Thu, Sep 25, 2014 at 8:53 PM, Oda <[email protected]> wrote:
> instalou o de hoje, ne? > On Sep 25, 2014 8:40 PM, "J. Tozo" <[email protected]> wrote: > >> ufa! >> >> root@host:/root# env x='() { :;}; echo vulnerable' bash -c "echo this is >> a test" >> env x='() { :;}; echo vulnerable' bash -c "echo this is a test" >> bash: warning: x: ignoring function definition attempt >> bash: error importing function definition for `x' >> this is a test >> >> >> >> ---------- Forwarded message ---------- >> From: Slackware Security Team <[email protected]> >> Date: Thu, Sep 25, 2014 at 5:38 PM >> Subject: [slackware-security] bash (SSA:2014-268-01) >> To: [email protected] >> >> >> >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> [slackware-security] bash (SSA:2014-268-01) >> >> New bash packages are available for Slackware 13.0, 13.1, 13.37, 14.0, >> 14.1, >> and -current to fix a security issue. >> >> >> Here are the details from the Slackware 14.1 ChangeLog: >> +--------------------------+ >> patches/packages/bash-4.2.048-i486-2_slack14.1.txz: Rebuilt. >> Patched an additional trailing string processing vulnerability >> discovered >> by Tavis Ormandy. >> For more information, see: >> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 >> (* Security fix *) >> +--------------------------+ >> >> >> Where to find the new packages: >> +-----------------------------+ >> >> Thanks to the friendly folks at the OSU Open Source Lab >> (http://osuosl.org) for donating FTP and rsync hosting >> to the Slackware project! :-) >> >> Also see the "Get Slack" section on http://slackware.com for >> additional mirror sites near you. >> >> Updated package for Slackware 13.0: >> >> ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/bash-3.1.018-i486-2_slack13.0.txz >> >> Updated package for Slackware x86_64 13.0: >> >> ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/bash-3.1.018-x86_64-2_slack13.0.txz >> >> Updated package for Slackware 13.1: >> >> ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/bash-4.1.012-i486-2_slack13.1.txz >> >> Updated package for Slackware x86_64 13.1: >> >> ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/bash-4.1.012-x86_64-2_slack13.1.txz >> >> Updated package for Slackware 13.37: >> >> ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/bash-4.1.012-i486-2_slack13.37.txz >> >> Updated package for Slackware x86_64 13.37: >> >> ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/bash-4.1.012-x86_64-2_slack13.37.txz >> >> Updated package for Slackware 14.0: >> >> ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bash-4.2.048-i486-2_slack14.0.txz >> >> Updated package for Slackware x86_64 14.0: >> >> ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bash-4.2.048-x86_64-2_slack14.0.txz >> >> Updated package for Slackware 14.1: >> >> ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bash-4.2.048-i486-2_slack14.1.txz >> >> Updated package for Slackware x86_64 14.1: >> >> ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bash-4.2.048-x86_64-2_slack14.1.txz >> >> Updated package for Slackware -current: >> >> ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/bash-4.3.025-i486-2.txz >> >> Updated package for Slackware x86_64 -current: >> >> ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/bash-4.3.025-x86_64-2.txz >> >> >> MD5 signatures: >> +-------------+ >> >> Slackware 13.0 package: >> 93780575208505d17b5305b202294e16 bash-3.1.018-i486-2_slack13.0.txz >> >> Slackware x86_64 13.0 package: >> 6ec269c8e958cd6265821b480af8e5d7 bash-3.1.018-x86_64-2_slack13.0.txz >> >> Slackware 13.1 package: >> 21235413470903bb8eec907acb5b3248 bash-4.1.012-i486-2_slack13.1.txz >> >> Slackware x86_64 13.1 package: >> e69bacaf484e8f924c09eacd91c8c737 bash-4.1.012-x86_64-2_slack13.1.txz >> >> Slackware 13.37 package: >> fa05abe5c8d6557ec1cef124e5d877ce bash-4.1.012-i486-2_slack13.37.txz >> >> Slackware x86_64 13.37 package: >> 97a0005c1e0701c8912dc30f8a6f2908 bash-4.1.012-x86_64-2_slack13.37.txz >> >> Slackware 14.0 package: >> d319186a0ab7e85562684669afc878c3 bash-4.2.048-i486-2_slack14.0.txz >> >> Slackware x86_64 14.0 package: >> 8835dc729d6029fc20b6b1b1df72ce13 bash-4.2.048-x86_64-2_slack14.0.txz >> >> Slackware 14.1 package: >> fbb4b906de3a8f9bf5209fcc80e2a413 bash-4.2.048-i486-2_slack14.1.txz >> >> Slackware x86_64 14.1 package: >> a786b69705d1ebb67fbf31df9d032699 bash-4.2.048-x86_64-2_slack14.1.txz >> >> Slackware -current package: >> bba7e4260df8c4d91d99dbf13d44ec79 a/bash-4.3.025-i486-2.txz >> >> Slackware x86_64 -current package: >> 7c9a285415bd636469da0cf405bb5692 a/bash-4.3.025-x86_64-2.txz >> >> >> Installation instructions: >> +------------------------+ >> >> Upgrade the package as root: >> # upgradepkg bash-4.2.048-i486-2_slack14.1.txz >> >> >> +-----+ >> >> Slackware Linux Security Team >> http://slackware.com/gpg-key >> [email protected] >> >> +------------------------------------------------------------------------+ >> | To leave the slackware-security mailing list: | >> +------------------------------------------------------------------------+ >> | Send an email to [email protected] with this text in the body of >> | >> | the email message: | >> | | >> | unsubscribe slackware-security | >> | | >> | You will get a confirmation message back containing instructions to | >> | complete the process. Please do not reply to this email address. | >> +------------------------------------------------------------------------+ >> -----BEGIN PGP SIGNATURE----- >> Version: GnuPG v1 >> >> iEYEARECAAYFAlQkdUsACgkQakRjwEAQIjPl0wCfUS0xw+BCzbg4nM2MxCSvyhWx >> U0cAmQGEPijPWxKKdy42YLW1v64qvqzh >> =d2fH >> -----END PGP SIGNATURE----- >> >> >> >> -- >> Grato, >> >> Tozo >> >> -- >> GUS-BR - Grupo de Usuários de Slackware Brasil >> http://www.slackwarebrasil.org/ >> http://groups.google.com/group/slack-users-br >> >> Antes de perguntar: >> >> http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao >> >> Para sair da lista envie um e-mail para: >> [email protected] >> --- >> Você recebeu essa mensagem porque está inscrito no grupo "Slackware Users >> Group - Brazil" dos Grupos do Google. >> Para cancelar inscrição nesse grupo e parar de receber e-mails dele, >> envie um e-mail para [email protected]. >> Para mais opções, acesse https://groups.google.com/d/optout. >> > -- > GUS-BR - Grupo de Usuários de Slackware Brasil > http://www.slackwarebrasil.org/ > http://groups.google.com/group/slack-users-br > > Antes de perguntar: > > http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao > > Para sair da lista envie um e-mail para: > [email protected] > --- > Você recebeu essa mensagem porque está inscrito no grupo "Slackware Users > Group - Brazil" dos Grupos do Google. > Para cancelar inscrição nesse grupo e parar de receber e-mails dele, envie > um e-mail para [email protected]. > Para mais opções, acesse https://groups.google.com/d/optout. > -- Grato, Tozo -- GUS-BR - Grupo de Usuários de Slackware Brasil http://www.slackwarebrasil.org/ http://groups.google.com/group/slack-users-br Antes de perguntar: http://www.vivaolinux.com.br/artigo/Como-elaborar-perguntas-para-listas-de-discussao Para sair da lista envie um e-mail para: [email protected] --- Você está recebendo esta mensagem porque se inscreveu no grupo "Slackware Users Group - Brazil" dos Grupos do Google. Para cancelar inscrição nesse grupo e parar de receber e-mails dele, envie um e-mail para [email protected]. Para obter mais opções, acesse https://groups.google.com/d/optout.

