Also, please, no one ever run any command along the line of "curl foo |
bash" -- a malicious web server could easily give some friendly-looking
content to a web browser but malware payload to curl.

Download the script, read the script, validate published signatures, and
only then execute the script directly if you still trust it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1378071

Title:
  bash crashed with SIGSEGV in strlen()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1378071/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to