mirror of
git://git.code.sf.net/p/zsh/code
synced 2025-01-01 05:16:05 +01:00
CVE-2021-45444: Update NEWS/README
This commit is contained in:
parent
fdb8b0ce62
commit
bdc4d70a7e
3 changed files with 28 additions and 0 deletions
|
@ -1,5 +1,7 @@
|
|||
2022-01-27 dana <dana@dana.is>
|
||||
|
||||
* CVE-2021-45444: NEWS, README: Document preceding two changes
|
||||
|
||||
* Marc Cornellà: security/89:
|
||||
Etc/CVE-2021-45444-VCS_Info-workaround.patch: Add patch which
|
||||
can optionally be used to work around recursive PROMPT_SUBST
|
||||
|
|
20
NEWS
20
NEWS
|
@ -4,6 +4,26 @@ CHANGES FROM PREVIOUS VERSIONS OF ZSH
|
|||
|
||||
Note also the list of incompatibilities in the README file.
|
||||
|
||||
Changes since 5.8
|
||||
-----------------
|
||||
|
||||
CVE-2021-45444: Some prompt expansion sequences, such as %F, support
|
||||
'arguments' which are themselves expanded in case they contain colour
|
||||
values, etc. This additional expansion would trigger PROMPT_SUBST
|
||||
evaluation, if enabled. This could be abused to execute code the user
|
||||
didn't expect. e.g., given a certain prompt configuration, an attacker
|
||||
could trick a user into executing arbitrary code by having them check
|
||||
out a Git branch with a specially crafted name.
|
||||
|
||||
This is fixed in the shell itself by no longer performing PROMPT_SUBST
|
||||
evaluation on these prompt-expansion arguments.
|
||||
|
||||
Users who are concerned about an exploit but unable to update their
|
||||
binaries may apply the partial work-around described in the file
|
||||
Etc/CVE-2021-45444-VCS_Info-workaround.patch included with the shell
|
||||
source. [ Reported by RyotaK <security@ryotak.me>. Additional thanks to
|
||||
Marc Cornellà <hello@mcornella.com>. ]
|
||||
|
||||
Changes since 5.7.1-test-3
|
||||
--------------------------
|
||||
|
||||
|
|
6
README
6
README
|
@ -31,6 +31,12 @@ Zsh is a shell with lots of features. For a list of some of these, see the
|
|||
file FEATURES, and for the latest changes see NEWS. For more
|
||||
details, see the documentation.
|
||||
|
||||
Incompatibilities since 5.8
|
||||
---------------------------
|
||||
|
||||
PROMPT_SUBST expansion is no longer performed on arguments to prompt-
|
||||
expansion sequences such as %F.
|
||||
|
||||
Incompatibilities since 5.7.1
|
||||
-----------------------------
|
||||
|
||||
|
|
Loading…
Reference in a new issue