I agree to the use of cookies in accordance with the Sourcefabric Privacy Policy.

Support our media development efforts

Please note: due to the quarantine measures required by the coronavirus outbreak, we are unable to answer the phone in our Prague office. Please send an email to contact@sourcefabric.org and someone will get back to you as soon as possible.

Who, what, when, where and why

Get the latest news about Sourcefabric software, solutions and ideas.

BACK TO BLOG OVERVIEW

What you need to know about Shellshock

All Sourcefabric servers have been secured I Photo Sourcefabric (CC BY-NC-SA 2.0)
All Sourcefabric servers have been secured I Photo Sourcefabric (CC BY-NC-SA 2.0)

This blog post explains briefly what the Shellshock Bug is, how it affected Sourcefabric services, and what you should do to improve your security.


The Bash bug (a.k.a. Shellshock) is a serious vulnerability in the popular GNU Bash program --a Unix shell widely adopted as a default shell of Linux and GNU/Linux-like operating systems, Mac OS X, and several others.

The bug can allow, in some circumstances, attackers to remotely access and control systems using Bash (and programs that call Bash) as an attack vector. Additional technical details can be found at CVE-2014-6271 and CVE-2014-7169.

Sourcefabric is not vulnerable to Shellshock.

Sourcefabric’s servers powering our software-as-a-service sites (Airtime Pro, Booktype Pro, Newscoop Pro and Superdesk Pro) are GNU/Linux systems containing GNU Bash. However, our Systems Team has confirmed none of our services meet the conditions required for the vulnerability to be exploited. All Sourcefabric servers have been secured anyhow with official vendor updates.

We strongly recommend you check with any other hosting providers you are using to see how you may be affected, or not.

If you need further information, please visit these sites:

BACK TO TOP