![](https://seccdn.libravatar.org/avatar/28fb60f36a5c05d6e95d00be1c0c257c.jpg?s=120&d=mm&r=g)
Le 25/09/2014 15:48, Christopher Myers a écrit :
My question is - how do other folks handle security vulnerabilities like this current bash vulnerability? Since oS isn't releasing patches for 11.4, 12.2, etc. anymore, how do you get around that? Just leave your machines vulnerable? Or compile your own patches?
Chris
for some years, I had to run an old server with an old debian install, I couldn't update because the config was awfull, I say I managed it because the pevious manager left :-( It have well run for 3 years like this before I could find time to rebuild the hole system (including hardware), but I monitored it pretty closely and never found any suspect activity (in fact nearly no activity at all :-) jdd -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org