Eric Blake <ebl...@redhat.com> writes:

> The following is a better test for whether CVE-2014-7187 can be
> exploited to remotely attack your system:
>
> f='() { echo vulnerable; } bash -c f
Missing quote character.

f='() { echo vulnerable; }' bash -c f

Andreas.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."

Reply via email to