Also, please, no one ever run any command along the line of "curl foo | bash" -- a malicious web server could easily give some friendly-looking content to a web browser but malware payload to curl.
Download the script, read the script, validate published signatures, and only then execute the script directly if you still trust it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1378071 Title: bash crashed with SIGSEGV in strlen() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1378071/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
