Eric Blake <ebl...@redhat.com> writes: > The following is a better test for whether CVE-2014-7187 can be > exploited to remotely attack your system: > > f='() { echo vulnerable; } bash -c f
Missing quote character. f='() { echo vulnerable; }' bash -c f Andreas. -- Andreas Schwab, sch...@linux-m68k.org GPG Key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5 "And now for something completely different."