Shell with comprehensive completion

Edit Package zsh
http://www.zsh.org

Zsh is a UNIX command interpreter (shell) that resembles the Korn shell
(ksh). It is not completely compatible. It includes many enhancements,
notably in the command-line editor, options for customizing its
behavior, file name globbing, features to make C-shell (csh) users feel
at home, and extra features drawn from tcsh (another `custom' shell).
Zsh is well known for its command line completion.

Refresh
Refresh
Source Files
Filename Size Changed
dotzshrc.rh 0000000658 658 Bytes
ncurses-fix.patch 0000002509 2.45 KB
trim-unneeded-completions.patch 0000000739 739 Bytes
zlogin.rhs 0000000252 252 Bytes
zlogout.rhs 0000000086 86 Bytes
zprofile 0000000198 198 Bytes
zprofile.rhs 0000000375 375 Bytes
zsh-5.8.1.tar.xz 0003200540 3.05 MB
zsh-5.8.1.tar.xz.asc 0000000488 488 Bytes
zsh-osc-completion.patch 0000000767 767 Bytes
zsh.changes 0000042817 41.8 KB
zsh.keyring 0000001725 1.68 KB
zsh.spec 0000008064 7.88 KB
zshenv 0000000045 45 Bytes
zshenv.rhs 0000000304 304 Bytes
zshrc 0000008934 8.72 KB
zshrc.rhs 0000001135 1.11 KB
Revision 232 (latest revision is 250)
Paolo Perego's avatar Paolo Perego (pperego) accepted request 963340 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 232)
- update to 5.8.1 (bsc#1196435, CVE-2021-45444):
  * CVE-2021-45444: Some prompt expansion sequences, such as %F, support
    'arguments' which are themselves expanded in case they contain colour
    values, etc. This additional expansion would trigger PROMPT_SUBST
    evaluation, if enabled. This could be abused to execute code the user
    didn't expect. e.g., given a certain prompt configuration, an attacker
    could trick a user into executing arbitrary code by having them check
    out a Git branch with a specially crafted name.
    This is fixed in the shell itself by no longer performing PROMPT_SUBST
    evaluation on these prompt-expansion arguments.
    Users who are concerned about an exploit but unable to update their
    binaries may apply the partial work-around described in the file
    Etc/CVE-2021-45444-VCS_Info-workaround.patch included with the shell
    source. [ Reported by RyotaK <security@ryotak.me>. Additional thanks to
    Marc Cornellà <hello@mcornella.com>. ]
Comments 3

Olivier Belleux's avatar

Hello, Since the last commit, ZSH is no longer built for openSUSE Leap. Would it be possible to fix this failure? Thanks in advance.


Paolo Perego's avatar

Can you please open a bug on bugzilla? Thanks


openSUSE Build Service is sponsored by