From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 353 invoked by alias); 2 Oct 2014 16:16:52 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: X-Seq: 33334 Received: (qmail 25969 invoked from network); 2 Oct 2014 16:16:51 -0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on f.primenet.com.au X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.2 From: Bart Schaefer Message-id: <141002091656.ZM12380@torch.brasslantern.com> Date: Thu, 02 Oct 2014 09:16:56 -0700 In-reply-to: <20141002165807.0dc13b68@pwslap01u.europe.root.pri> Comments: In reply to Peter Stephenson "Re: zsh 5.0.7" (Oct 2, 4:58pm) References: <20141001203847.2a7c000d@pws-pc.ntlworld.com> <20141002165807.0dc13b68@pwslap01u.europe.root.pri> X-Mailer: OpenZMail Classic (0.9.2 24April2005) To: Peter Stephenson , "Zsh Hackers' List" Subject: Re: zsh 5.0.7 MIME-version: 1.0 Content-type: text/plain; charset=us-ascii On Oct 2, 4:58pm, Peter Stephenson wrote: } } Source distribution documentation. Does this sound right? I'd leave out the word "major" -- we don't know of any exploits, do we? Otherwise fine.