- name: Check for shellshock fix (checks for both CVE-2014-6271 and CVE-2014-7169)
shell: cd /tmp && rm -f /tmp/echo && env 'x=() { :;}; echo vulnerable' 'f=() { (a)=>\' bash -c 'echo echo vulnerable'; cat echo
args:
executable: /bin/bash
sudo: no
register: shellshock_result2
changed_when: False
failed_when: "'vulnerable' in shellshock_result2.stderr"
ERROR: There was an error while parsing the task "shell cd /tmp && rm -f /tmp/echo && env 'x=() { :;}; echo vulnerable' 'f=() { (a)=>\\' bash -c 'echo echo vulnerable'; cat echo". Make sure quotes are matched or escaped properly
To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/CAGuansqODOOhR_u84L%3DKwU1Voc30HXBVGD6BuDxAfkt5uwa%3D8Q%40mail.gmail.com.
Absolutely it fitted perfectly
-- Best, Igor
To view this discussion on the web visit https://groups.google.com/d/msgid/ansible-project/CA%2BnsWgxAE19OMPFCvWim%3DP5jv%2BFOjhEbrBpt3_Oo3vkr_P6XEw%40mail.gmail.com.