ca6c2ee3da
Fixes the following security issue: - CVE-2021-45444: In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion. The 5.8.1 release is not listed in MD5SUM, so drop the md5 hash. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
4 lines
194 B
Plaintext
4 lines
194 B
Plaintext
# Locally calculated
|
|
sha256 b6973520bace600b4779200269b1e5d79e5f505ac4952058c11ad5bbf0dd9919 zsh-5.8.1.tar.xz
|
|
sha256 d06fdf3ef9b1ec69d6b9e170b0a9516fbad3523261ff1668bde3bfea6e0ef5f5 LICENCE
|