We're working on a fix. The risk is minimal as we don't publish some of the ENV
variables that are required to use the exploit to it's fullest extent.
Darrick
Sent from my mobile device. Please excuse my brevity.
-----Original Message-----
From: Michael Knill [michael.kn...@ipcsolutions.com.au]
Received: Friday, 26 Sep 2014, 5:59PM
To: AstLinux Users Mailing List [astlinux-users@lists.sourceforge.net]
Subject: [Astlinux-users] Bash vulnerability
My customers are asking me if Astlinux suffers from this vulnerability and what
the risks are.
>From my reading so far, it is.
Can anyone confirm the risks and mitigations until the new Astlinux version
comes.
Regards
Michael Knill
------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users
Donations to support AstLinux are graciously accepted via PayPal to
pay...@krisk.org.