SHA256
1
0
forked from pool/zsh
zsh/zsh-5.8.1.tar.xz.asc
Paolo Perego df7f4da0f6 Accepting request 963340 from home:dirkmueller:Factory
- update to 5.8.1 (bsc#1196435, CVE-2021-45444):
  * CVE-2021-45444: Some prompt expansion sequences, such as %F, support
    'arguments' which are themselves expanded in case they contain colour
    values, etc. This additional expansion would trigger PROMPT_SUBST
    evaluation, if enabled. This could be abused to execute code the user
    didn't expect. e.g., given a certain prompt configuration, an attacker
    could trick a user into executing arbitrary code by having them check
    out a Git branch with a specially crafted name.
    This is fixed in the shell itself by no longer performing PROMPT_SUBST
    evaluation on these prompt-expansion arguments.
    Users who are concerned about an exploit but unable to update their
    binaries may apply the partial work-around described in the file
    Etc/CVE-2021-45444-VCS_Info-workaround.patch included with the shell
    source. [ Reported by RyotaK <security@ryotak.me>. Additional thanks to
    Marc Cornellà <hello@mcornella.com>. ]

OBS-URL: https://build.opensuse.org/request/show/963340
OBS-URL: https://build.opensuse.org/package/show/shells/zsh?expand=0&rev=232
2022-03-25 11:28:53 +00:00

12 lines
488 B
Plaintext

-----BEGIN PGP SIGNATURE-----
iQEzBAABCAAdFiEEfKfsqvBiFrkPiUFGrPgUbK6Mu8QFAmIHy2YACgkQrPgUbK6M
u8RlaAgAxhHK9+kn+yzsS2/eED+VjLjCNcyPqdVdBl+bS4xeN5v2Ga0D36TfYJ4J
3n6INHTeR8gpocFyY5RRxZcDeGPtsPV4JQlmAJMa43piLP1LZvbgKAVeooWWeIKk
JMzXXAKWhZQ2+IG+OXlLNaHSLy6YBJ//Kj3lUkI7NHLSjOhce9ER1QwrHyeHmsKV
RmjeKlu4gwCPtXGgRmRihnIYJNI38db9Hc2vjunasGaM30l+8ymeVBjH395EDXL7
bfn8Vb0rN6TQY5q+4kVkG9J6m7kfgozcbCuiygsDG7zPdbI6Iwgzx+WmMoKWFfX6
y5MZIeVwkWUscDcghU8uUhQ2mu3pmw==
=2cR1
-----END PGP SIGNATURE-----