diff options
author | Axel Beckert <abe@deuxchevaux.org> | 2022-02-12 20:55:40 +0100 |
---|---|---|
committer | Axel Beckert <abe@deuxchevaux.org> | 2022-02-12 20:55:40 +0100 |
commit | 12eb3e5356f2fc3351eed58ef1cef1b8fb83b504 (patch) | |
tree | 426eca82c8d3316351732d0e6d5cb2359d3d7e63 /NEWS | |
parent | 94c033d2e281eb1f49e8366d21fc259ce8c0c4f5 (diff) | |
parent | 1a490c7050cfacd5daf8376d5a1f0e8cb14ccda5 (diff) | |
download | zsh-12eb3e5356f2fc3351eed58ef1cef1b8fb83b504.tar.gz zsh-12eb3e5356f2fc3351eed58ef1cef1b8fb83b504.zip |
New upstream version 5.8.1
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 20 |
1 files changed, 20 insertions, 0 deletions
@@ -4,6 +4,26 @@ CHANGES FROM PREVIOUS VERSIONS OF ZSH Note also the list of incompatibilities in the README file. +Changes since 5.8 +----------------- + +CVE-2021-45444: Some prompt expansion sequences, such as %F, support +'arguments' which are themselves expanded in case they contain colour +values, etc. This additional expansion would trigger PROMPT_SUBST +evaluation, if enabled. This could be abused to execute code the user +didn't expect. e.g., given a certain prompt configuration, an attacker +could trick a user into executing arbitrary code by having them check +out a Git branch with a specially crafted name. + +This is fixed in the shell itself by no longer performing PROMPT_SUBST +evaluation on these prompt-expansion arguments. + +Users who are concerned about an exploit but unable to update their +binaries may apply the partial work-around described in the file +Etc/CVE-2021-45444-VCS_Info-workaround.patch included with the shell +source. [ Reported by RyotaK <security@ryotak.me>. Additional thanks to +Marc Cornellà <hello@mcornella.com>. ] + Changes since 5.7.1-test-3 -------------------------- |