<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Bash Patch </title><link>https://sourceforge.net/p/old412forever/wiki/Bash%2520Patch%2520/</link><description>Recent changes to Bash Patch </description><atom:link href="https://sourceforge.net/p/old412forever/wiki/Bash%20Patch%20/feed" rel="self"/><language>en</language><lastBuildDate>Wed, 01 Oct 2014 06:38:46 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/old412forever/wiki/Bash%20Patch%20/feed" rel="self" type="application/rss+xml"/><item><title>Bash Patch  modified by Daz Hale</title><link>https://sourceforge.net/p/old412forever/wiki/Bash%2520Patch%2520/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Info here:&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.murga-linux.com/puppy/viewtopic.php?t=95819" rel="nofollow"&gt;http://www.murga-linux.com/puppy/viewtopic.php?t=95819&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;You may have heard through the media by now of the Bash Vulnerability and the guys on the forum have been busy applying a patch to the Bash Shell. If you are not sure about what the situation with Puppy Linux please check the appropriate forum post&lt;/p&gt;
&lt;p&gt;I have included the updated patched version of Bash below and here from Wary/Racy. Many thanks to mavrothal (forum name) for the update which works with Puppy-4.1.2. There is also 'Bash Vulnerability patch.pdf' which gives info on testing that the update is successful. This should be read before installing bash-3.0.18-i486.pet.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daz Hale</dc:creator><pubDate>Wed, 01 Oct 2014 06:38:46 -0000</pubDate><guid>https://sourceforge.net54d115e6a8779b642161c30b64ca5a4600ad30be</guid></item></channel></rss>