Barry, the way I read the warning was that it's one of the processes that Exim does with the contents of the header. The internal processes of Exim are in question, not the exposed processes. I don't know which cgi scripts are used by the UTM in Exim, nor whether the bash fix took this new (discovered last week) exploit into account, so I don't know whether to worry about this.
Cheers - Bob
Sophos UTM Community Moderator Sophos Certified Architect - UTM Sophos Certified Engineer - XG Gold Solution Partner since 2005
Barry, the way I read the warning was that it's one of the processes that Exim does with the contents of the header. The internal processes of Exim are in question, not the exposed processes. I don't know which cgi scripts are used by the UTM in Exim, nor whether the bash fix took this new (discovered last week) exploit into account, so I don't know whether to worry about this.
Cheers - Bob
Sophos UTM Community Moderator Sophos Certified Architect - UTM Sophos Certified Engineer - XG Gold Solution Partner since 2005