- Issued:
- 2013-09-30
- Updated:
- 2013-09-30
RHBA-2013:1337 - Bug Fix Advisory
Synopsis
zsh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated zsh packages that fix one bug are now available for Red Hat Enterprise
Linux 5.
Description
The zsh shell is a command interpreter which can be used as an interactive login
shell and as a shell script command processor. Zsh resembles the ksh shell (the
Korn shell), but includes many enhancements. Zsh supports command line editing,
built-in spelling correction, programmable command completion, shell functions
(with autoloading), a history mechanism, and more.
This update fixes the following bug:
- Due to a missing error flag check, validating the syntax of a comparison
expression (one that compares values with the less-than or greater-than signs)
as the condition of a while loop did not exit and return a single error message
as expected, but entered an infinite loop instead, returning a "bad math
expression" error message at every iteration of the loop. With this update, in
case an evaluated loop condition is not valid, the script that uses it exits
after the first iteration of the loop with an error message and exit code 2.
(BZ#813219)
Users of zsh are advised to upgrade to these updated packages, which fix this
bug.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 813219 - zsh gets in infinite loop when checking syntax
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
zsh-4.2.6-9.el5.src.rpm | SHA-256: 690c3c3e02b10bb664cac76ef65ee7da6c823349d5785209fbcb263d856b24fa |
x86_64 | |
zsh-4.2.6-9.el5.x86_64.rpm | SHA-256: f59361cc6056556a2d13d3c665d40b96c2feb99712d2cbc71125d517d9a4ae14 |
zsh-debuginfo-4.2.6-9.el5.x86_64.rpm | SHA-256: 8a34cd98ce2646229a827a8d3bc40e229164278e1f0f9c218f8b48bd167c83e8 |
zsh-html-4.2.6-9.el5.x86_64.rpm | SHA-256: 4b156dbf1c68fb7110c183a8b9c80e64d6dff196ed8a460d798275474f4a7b25 |
ia64 | |
zsh-4.2.6-9.el5.ia64.rpm | SHA-256: 7b96c017e4600d95c3489585be649943d052c4d273b5f84b32b15842cd54afa2 |
zsh-debuginfo-4.2.6-9.el5.ia64.rpm | SHA-256: e2347795c141b778de55f4b912ba3d27e930102be07ff6f689fd52538e0cfcdc |
zsh-html-4.2.6-9.el5.ia64.rpm | SHA-256: 79a60f1eafeaf6ce029b676719bc8558a0ce945d2b40e4e6abf81146a1ea88c5 |
i386 | |
zsh-4.2.6-9.el5.i386.rpm | SHA-256: 003bd0f056c0bc109ff0f58a68fabb49cb02bd207a012d4e31a8fa29b0208e12 |
zsh-debuginfo-4.2.6-9.el5.i386.rpm | SHA-256: 3ada260bb0919fe16e649c12a6a4bf15f3c3c2f02a0db7bc863daa021d13179b |
zsh-html-4.2.6-9.el5.i386.rpm | SHA-256: 58b7dfc9112a0a2d922a06109fb118628d1a9cc977cc08b94557b490322d9d9b |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
zsh-4.2.6-9.el5.src.rpm | SHA-256: 690c3c3e02b10bb664cac76ef65ee7da6c823349d5785209fbcb263d856b24fa |
x86_64 | |
zsh-4.2.6-9.el5.x86_64.rpm | SHA-256: f59361cc6056556a2d13d3c665d40b96c2feb99712d2cbc71125d517d9a4ae14 |
zsh-debuginfo-4.2.6-9.el5.x86_64.rpm | SHA-256: 8a34cd98ce2646229a827a8d3bc40e229164278e1f0f9c218f8b48bd167c83e8 |
zsh-html-4.2.6-9.el5.x86_64.rpm | SHA-256: 4b156dbf1c68fb7110c183a8b9c80e64d6dff196ed8a460d798275474f4a7b25 |
i386 | |
zsh-4.2.6-9.el5.i386.rpm | SHA-256: 003bd0f056c0bc109ff0f58a68fabb49cb02bd207a012d4e31a8fa29b0208e12 |
zsh-debuginfo-4.2.6-9.el5.i386.rpm | SHA-256: 3ada260bb0919fe16e649c12a6a4bf15f3c3c2f02a0db7bc863daa021d13179b |
zsh-html-4.2.6-9.el5.i386.rpm | SHA-256: 58b7dfc9112a0a2d922a06109fb118628d1a9cc977cc08b94557b490322d9d9b |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
zsh-4.2.6-9.el5.src.rpm | SHA-256: 690c3c3e02b10bb664cac76ef65ee7da6c823349d5785209fbcb263d856b24fa |
x86_64 | |
zsh-4.2.6-9.el5.x86_64.rpm | SHA-256: f59361cc6056556a2d13d3c665d40b96c2feb99712d2cbc71125d517d9a4ae14 |
zsh-debuginfo-4.2.6-9.el5.x86_64.rpm | SHA-256: 8a34cd98ce2646229a827a8d3bc40e229164278e1f0f9c218f8b48bd167c83e8 |
zsh-html-4.2.6-9.el5.x86_64.rpm | SHA-256: 4b156dbf1c68fb7110c183a8b9c80e64d6dff196ed8a460d798275474f4a7b25 |
i386 | |
zsh-4.2.6-9.el5.i386.rpm | SHA-256: 003bd0f056c0bc109ff0f58a68fabb49cb02bd207a012d4e31a8fa29b0208e12 |
zsh-debuginfo-4.2.6-9.el5.i386.rpm | SHA-256: 3ada260bb0919fe16e649c12a6a4bf15f3c3c2f02a0db7bc863daa021d13179b |
zsh-html-4.2.6-9.el5.i386.rpm | SHA-256: 58b7dfc9112a0a2d922a06109fb118628d1a9cc977cc08b94557b490322d9d9b |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
zsh-4.2.6-9.el5.src.rpm | SHA-256: 690c3c3e02b10bb664cac76ef65ee7da6c823349d5785209fbcb263d856b24fa |
s390x | |
zsh-4.2.6-9.el5.s390x.rpm | SHA-256: 418bd6ed58e68bad546fd8550944e41548ed55187242a1f1aaf54017ef39068b |
zsh-debuginfo-4.2.6-9.el5.s390x.rpm | SHA-256: 26e676927691e0d3ea059ed6add586b92943351b474092c723d7d4fc02e330d8 |
zsh-html-4.2.6-9.el5.s390x.rpm | SHA-256: edcf8f1d5063fb4ff6c07fc218e01ad88de4d60855d6b9195f835f0e2cb595ce |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
zsh-4.2.6-9.el5.src.rpm | SHA-256: 690c3c3e02b10bb664cac76ef65ee7da6c823349d5785209fbcb263d856b24fa |
ppc | |
zsh-4.2.6-9.el5.ppc.rpm | SHA-256: eb2605eadc519abb2cf96c461fc21f842d3416058097e6a1ab9d85c42e8374c6 |
zsh-debuginfo-4.2.6-9.el5.ppc.rpm | SHA-256: 7e51e303acc644d46434595e8dd5efae1f618630983c9c7d24c17766529a5ccf |
zsh-html-4.2.6-9.el5.ppc.rpm | SHA-256: 1831b4c12b18837422738ac0dedfb16b84de660692238aa8efaec9082bfce84e |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
zsh-4.2.6-9.el5.src.rpm | SHA-256: 690c3c3e02b10bb664cac76ef65ee7da6c823349d5785209fbcb263d856b24fa |
x86_64 | |
zsh-4.2.6-9.el5.x86_64.rpm | SHA-256: f59361cc6056556a2d13d3c665d40b96c2feb99712d2cbc71125d517d9a4ae14 |
zsh-debuginfo-4.2.6-9.el5.x86_64.rpm | SHA-256: 8a34cd98ce2646229a827a8d3bc40e229164278e1f0f9c218f8b48bd167c83e8 |
zsh-html-4.2.6-9.el5.x86_64.rpm | SHA-256: 4b156dbf1c68fb7110c183a8b9c80e64d6dff196ed8a460d798275474f4a7b25 |
i386 | |
zsh-4.2.6-9.el5.i386.rpm | SHA-256: 003bd0f056c0bc109ff0f58a68fabb49cb02bd207a012d4e31a8fa29b0208e12 |
zsh-debuginfo-4.2.6-9.el5.i386.rpm | SHA-256: 3ada260bb0919fe16e649c12a6a4bf15f3c3c2f02a0db7bc863daa021d13179b |
zsh-html-4.2.6-9.el5.i386.rpm | SHA-256: 58b7dfc9112a0a2d922a06109fb118628d1a9cc977cc08b94557b490322d9d9b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.