Skip to navigation

Bug Fix Advisory zsh bug fix update

Advisory: RHBA-2012:1204-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated zsh packages that fix two bugs are now available for Red Hat Enterprise
Linux 5.

The zsh shell is a command interpreter usable as an interactive login shell and
as a shell script command processor. Zsh resembles the ksh shell, but includes
many enhancements. The zsh shell supports command line editing, built-in
spelling correction, programmable command completion, shell functions with
autoloading, a history mechanism, and more.

This update fixes the following bugs:

* Prior to this update, zsh interpreted variable assignments as other commands
and tried to execute them when running zsh in ksh compatibility mode due to a
parser error. This update modifies the underling code to interpret variable
assignments as expected. (BZ#758681)

* Prior to this update, the tab completion for Apache Subversion (SVN) did not
work as expected when running the "svn diff" command in zsh. This update
modifies the underlying code to ensure that SVN runs as expected. (BZ#788050)

All users of zsh are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
zsh-4.2.6-8.el5.src.rpm
File outdated by:  RHBA-2013:1337
    MD5: 4afab5f708f987c55b80a1665884b3fc
SHA-256: e38761456e46f87381206e5479435e156ed6d251d19f4c8cbe4e1649f5a3e6b4
 
IA-32:
zsh-4.2.6-8.el5.i386.rpm
File outdated by:  RHBA-2013:1337
    MD5: de3a18dfb3eba9597b016f0450620f1a
SHA-256: 505d224f99f9c84f5b85cb9acfe0660b61eac2dd6e953cf62976cf90ddf9489e
zsh-debuginfo-4.2.6-8.el5.i386.rpm
File outdated by:  RHBA-2013:1337
    MD5: 3b117c3c5e5a8b0092bcdd4dc6197df1
SHA-256: e1df4fb55f25a0f8d59165abc4dd074fa5b02cab036bbf8ff451c659c3a91cb2
zsh-html-4.2.6-8.el5.i386.rpm
File outdated by:  RHBA-2013:1337
    MD5: 09cbc880139abb3a67c8d11b2cd00734
SHA-256: 23b9eb5ce9d1648e03bbcdf63b6e9c9031d641ab0526b3e0ade74f626db46bfe
 
IA-64:
zsh-4.2.6-8.el5.ia64.rpm
File outdated by:  RHBA-2013:1337
    MD5: b181a16eab3742189643afc8b08f3b0e
SHA-256: 169a2664e667f82e5a58f91488a1cb237e2352fae69df44ab6fb668c99d27d74
zsh-debuginfo-4.2.6-8.el5.ia64.rpm
File outdated by:  RHBA-2013:1337
    MD5: 96cee9a635c3c3759a5228b983b8cee9
SHA-256: 8263361ee27c8a814a616e24ff5a974748f6d779922ccf66b26186aff4674f5d
zsh-html-4.2.6-8.el5.ia64.rpm
File outdated by:  RHBA-2013:1337
    MD5: e806fff2df13ddb2ef8ead340859933c
SHA-256: c00df925ceec3785befe12cc81f5248b50434c068e45db48d6ad00e632cacb32
 
PPC:
zsh-4.2.6-8.el5.ppc.rpm
File outdated by:  RHBA-2013:1337
    MD5: 9364d798ea7f0ebe535c8b90aec1b5cc
SHA-256: 66f24dafb3a45e34a0b1ba7f7b1b3d441bfc77db3e98f51780a5873548b8bf6f
zsh-debuginfo-4.2.6-8.el5.ppc.rpm
File outdated by:  RHBA-2013:1337
    MD5: 2f632b706d7f81849a1f42664193ee62
SHA-256: 26cd51714802e7638ee3f427b9b28f6f73e15eb2b9c6b7e6b70d06099b527702
zsh-html-4.2.6-8.el5.ppc.rpm
File outdated by:  RHBA-2013:1337
    MD5: 66d9db51007d5b20978afb75d59a541f
SHA-256: 9ea7d86a6444e68ebed14bb302e18eedbc45181b670165880a51763b1c272e36
 
s390x:
zsh-4.2.6-8.el5.s390x.rpm
File outdated by:  RHBA-2013:1337
    MD5: 87f925396b4e6adae43484cdc5655fd2
SHA-256: e06d2f35672cc2caed68dfe946f7c1c8a475da270b8d0ee68aa4bd1ee0649d85
zsh-debuginfo-4.2.6-8.el5.s390x.rpm
File outdated by:  RHBA-2013:1337
    MD5: 99c124a6274177f7f9e28d25ca7a2c41
SHA-256: e34ecc545b4612a7da7032eb38fadbf50d46db238c71d56434426931fe53b617
zsh-html-4.2.6-8.el5.s390x.rpm
File outdated by:  RHBA-2013:1337
    MD5: 3e691f999a41affc44d054d19370719d
SHA-256: 76d103e8f5a293eacffcf454362ec171742cd7c83e0554793e84800ae3dd3cf4
 
x86_64:
zsh-4.2.6-8.el5.x86_64.rpm
File outdated by:  RHBA-2013:1337
    MD5: aa1b484e1f475dde77b93ad28c3bfd74
SHA-256: 24e1ca75d33b8a13721e07a34f0ea4039e79ca40c98a3032d53aff2746f1d92d
zsh-debuginfo-4.2.6-8.el5.x86_64.rpm
File outdated by:  RHBA-2013:1337
    MD5: 3a49795b10a1e3a811ceca5ac405bf9c
SHA-256: b7fe4bb4232011d4301ee09669d1e0d2f683b0f7ed56de7c6a3e2cd6fa5c0369
zsh-html-4.2.6-8.el5.x86_64.rpm
File outdated by:  RHBA-2013:1337
    MD5: 8072fb8f87be6299a1a88a61ea060650
SHA-256: 471f5e830d0b887aaf1833e1690edddd65895d643d2448f6b30361b7425338b3
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
zsh-4.2.6-8.el5.src.rpm
File outdated by:  RHBA-2013:1337
    MD5: 4afab5f708f987c55b80a1665884b3fc
SHA-256: e38761456e46f87381206e5479435e156ed6d251d19f4c8cbe4e1649f5a3e6b4
 
IA-32:
zsh-4.2.6-8.el5.i386.rpm
File outdated by:  RHBA-2013:1337
    MD5: de3a18dfb3eba9597b016f0450620f1a
SHA-256: 505d224f99f9c84f5b85cb9acfe0660b61eac2dd6e953cf62976cf90ddf9489e
zsh-debuginfo-4.2.6-8.el5.i386.rpm
File outdated by:  RHBA-2013:1337
    MD5: 3b117c3c5e5a8b0092bcdd4dc6197df1
SHA-256: e1df4fb55f25a0f8d59165abc4dd074fa5b02cab036bbf8ff451c659c3a91cb2
zsh-html-4.2.6-8.el5.i386.rpm
File outdated by:  RHBA-2013:1337
    MD5: 09cbc880139abb3a67c8d11b2cd00734
SHA-256: 23b9eb5ce9d1648e03bbcdf63b6e9c9031d641ab0526b3e0ade74f626db46bfe
 
x86_64:
zsh-4.2.6-8.el5.x86_64.rpm
File outdated by:  RHBA-2013:1337
    MD5: aa1b484e1f475dde77b93ad28c3bfd74
SHA-256: 24e1ca75d33b8a13721e07a34f0ea4039e79ca40c98a3032d53aff2746f1d92d
zsh-debuginfo-4.2.6-8.el5.x86_64.rpm
File outdated by:  RHBA-2013:1337
    MD5: 3a49795b10a1e3a811ceca5ac405bf9c
SHA-256: b7fe4bb4232011d4301ee09669d1e0d2f683b0f7ed56de7c6a3e2cd6fa5c0369
zsh-html-4.2.6-8.el5.x86_64.rpm
File outdated by:  RHBA-2013:1337
    MD5: 8072fb8f87be6299a1a88a61ea060650
SHA-256: 471f5e830d0b887aaf1833e1690edddd65895d643d2448f6b30361b7425338b3
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/