So far, nothing from Apple and I ran the command to test my system and as expected, it's vulnerable. However, that's assuming someone can get into my system, and that part of the equation is not fully explained in any of the articles I've read so far.
By default, unless you're doing something unusual on your Mac, people elsewhere can't exploit this vulnerability.
If you are doing something unusual that specifically allows shell access to other people on the Internet, then it is possible for someone to exploit this remotely. In order to do that, you would have to be running some kind of server on your Mac that allows shell access.
You could, for example, run a Web server on your Mac and have it allow CGI scripts to access the shell, and then you might be vulnerable to attack. If that all sounds like gibberish to you, you're probably not doing it.
It's not gibberish and I'm not doing it.
I was pretty sure that regular users were not vulnerable, but with all the hand-flapping and BIG SCARY HEADLINES (the press just loves those!) combined with the inadequate explanations of how or if this actually affected the average computer user, I wasn't about to go out on a limb and say "don't panic."
Now I will.
Don't panic.