summaryrefslogtreecommitdiff
path: root/NEWS
diff options
context:
space:
mode:
authorAxel Beckert <abe@deuxchevaux.org>2022-02-12 20:55:40 +0100
committerAxel Beckert <abe@deuxchevaux.org>2022-02-12 20:55:40 +0100
commit12eb3e5356f2fc3351eed58ef1cef1b8fb83b504 (patch)
tree426eca82c8d3316351732d0e6d5cb2359d3d7e63 /NEWS
parent94c033d2e281eb1f49e8366d21fc259ce8c0c4f5 (diff)
parent1a490c7050cfacd5daf8376d5a1f0e8cb14ccda5 (diff)
downloadzsh-12eb3e5356f2fc3351eed58ef1cef1b8fb83b504.tar.gz
zsh-12eb3e5356f2fc3351eed58ef1cef1b8fb83b504.zip
New upstream version 5.8.1
Diffstat (limited to 'NEWS')
-rw-r--r--NEWS20
1 files changed, 20 insertions, 0 deletions
diff --git a/NEWS b/NEWS
index 964e1633f..327b449a0 100644
--- a/NEWS
+++ b/NEWS
@@ -4,6 +4,26 @@ CHANGES FROM PREVIOUS VERSIONS OF ZSH
Note also the list of incompatibilities in the README file.
+Changes since 5.8
+-----------------
+
+CVE-2021-45444: Some prompt expansion sequences, such as %F, support
+'arguments' which are themselves expanded in case they contain colour
+values, etc. This additional expansion would trigger PROMPT_SUBST
+evaluation, if enabled. This could be abused to execute code the user
+didn't expect. e.g., given a certain prompt configuration, an attacker
+could trick a user into executing arbitrary code by having them check
+out a Git branch with a specially crafted name.
+
+This is fixed in the shell itself by no longer performing PROMPT_SUBST
+evaluation on these prompt-expansion arguments.
+
+Users who are concerned about an exploit but unable to update their
+binaries may apply the partial work-around described in the file
+Etc/CVE-2021-45444-VCS_Info-workaround.patch included with the shell
+source. [ Reported by RyotaK <security@ryotak.me>. Additional thanks to
+Marc Cornellà <hello@mcornella.com>. ]
+
Changes since 5.7.1-test-3
--------------------------