df7f4da0f6
- update to 5.8.1 (bsc#1196435, CVE-2021-45444): * CVE-2021-45444: Some prompt expansion sequences, such as %F, support 'arguments' which are themselves expanded in case they contain colour values, etc. This additional expansion would trigger PROMPT_SUBST evaluation, if enabled. This could be abused to execute code the user didn't expect. e.g., given a certain prompt configuration, an attacker could trick a user into executing arbitrary code by having them check out a Git branch with a specially crafted name. This is fixed in the shell itself by no longer performing PROMPT_SUBST evaluation on these prompt-expansion arguments. Users who are concerned about an exploit but unable to update their binaries may apply the partial work-around described in the file Etc/CVE-2021-45444-VCS_Info-workaround.patch included with the shell source. [ Reported by RyotaK <security@ryotak.me>. Additional thanks to Marc Cornellà <hello@mcornella.com>. ] OBS-URL: https://build.opensuse.org/request/show/963340 OBS-URL: https://build.opensuse.org/package/show/shells/zsh?expand=0&rev=232 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
dotzshrc.rh | ||
ncurses-fix.patch | ||
trim-unneeded-completions.patch | ||
zlogin.rhs | ||
zlogout.rhs | ||
zprofile | ||
zprofile.rhs | ||
zsh-5.8.1.tar.xz | ||
zsh-5.8.1.tar.xz.asc | ||
zsh-osc-completion.patch | ||
zsh.changes | ||
zsh.keyring | ||
zsh.spec | ||
zshenv | ||
zshenv.rhs | ||
zshrc | ||
zshrc.rhs |