Bug 896914

Summary: zsh completion and REPORTTIME broken
Product: [openSUSE] openSUSE Distribution Reporter: Forgotten User cI3FYhfYTs <forgotten_cI3FYhfYTs>
Component: BasesystemAssignee: Ismail Dönmez <ismail>
Status: RESOLVED WONTFIX QA Contact: E-mail List <qa-bugs>
Severity: Major    
Priority: P5 - None CC: bwiedemann, crrodriguez, ismail, junguo.wang, sweet_f_a, vpereira
Version: Leap 42.3Flags: vpereira: needinfo? (junguo.wang)
vpereira: needinfo? (ismail)
Target Milestone: ---   
Hardware: All   
OS: openSUSE 42.3   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Forgotten User cI3FYhfYTs 2014-09-16 13:12:58 UTC
User-Agent:       Mozilla/5.0 (X11; Linux x86_64; rv:34.0) Gecko/20100101 Firefox/34.0

When REPORTTIME=0 or 1 or some low value, and zsh tab completion is used,
steps taken in the completer routines will output timing values.


Reproducible: Always

Steps to Reproduce:
1. /bin/zsh
2. export REPORTTIME=0
3. git clone /tm TAB
Actual Results:  
freundt@quant:pts/5:~> git clone /tm  0.00s user 0.00s system 39% cpu 0.005 total
  0.00s user 0.00s system 46% cpu 0.004 total
p/


Expected Results:  
completed /tmp without any disruptive output.


This issue makes the zsh completion completely unusable.
Comment 1 Bernhard Wiedemann 2014-09-18 06:47:39 UTC
I can reproduce the issue as given above,
but when typing
echo /tm TAB

for me it does not occur. Could it be that it runs some program 
for tab-completion of git?
also when using
export REPORTTIME=1
everything looks good, too.

reading
http://nuclearsquid.com/writings/reporttime-in-zsh/
it says, that it is supposed to prefix "time" to every command run
that takes longer than the value in REPORTTIME
which would explain the behaviour.

If that really is a problem, the easiest way to avoid it,
would be to (temporarily) unset REPORTTIME before calling completion scripts
Comment 2 Forgotten User cI3FYhfYTs 2014-09-18 07:08:01 UTC
Well yes, echo's tab completion is fairly simple not involving any auxiliary  processes.

This issue has been discussed (and fixed) on the zsh mailing lists already:

http://www.zsh.org/mla/workers/2012/msg00592.html


I think the solution was quite similar.  To local REPORTTIME in completer functions, but then it appears that openSuSE either comes with outdated completion routines or custom routines that don't employ the fix.

A vanilla zsh installation (5.0.5) does not show the behaviour, at least.
Comment 3 Bernhard Wiedemann 2014-11-14 14:00:57 UTC
This is an autogenerated message for OBS integration:
This bug (896914) was mentioned in
https://build.opensuse.org/request/show/261601 13.1 / zsh
Comment 4 Bernhard Wiedemann 2014-11-17 13:07:11 UTC
please test
http://download.opensuse.org/update/13.1-test/x86_64/zsh-5.0.7-8.4.1.x86_64.rpm
and reopen if it does not work
otherwise this will be released in a few days
Comment 5 Swamp Workflow Management 2014-11-24 13:11:02 UTC
openSUSE-RU-2014:1482-1: An update that has three recommended fixes can now be installed.

Category: recommended (moderate)
Bug References: 888989,896914,902509
CVE References: 
Sources used:
openSUSE 13.1 (src):    zsh-5.0.7-8.4.1
Comment 6 Ruediger Meier 2018-02-26 13:35:02 UTC
Re-introduced in 42.3
Comment 7 Andreas Stieger 2018-02-27 09:58:31 UTC
added to SLE 12 pending updates list to be included in the next available update
Comment 11 jun wang 2018-04-09 08:58:18 UTC
this issue was NOT fixed on SLE12SP3, the Actual Results is the same with comment0.
Comment 16 Victor Pereira 2018-04-11 06:48:28 UTC
Hi Ismal, looks like in the last submission you forgot to mention the following isssues in the changes: CVE-2017-18206 bsc#1083250. Is that right? It was mentioned in the first submission.
Comment 17 Swamp Workflow Management 2018-04-25 16:09:12 UTC
SUSE-SU-2018:1072-1: An update that solves 9 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1082885,1082975,1082977,1082991,1082998,1083002,1083250,1084656,1087026,896914
CVE References: CVE-2014-10070,CVE-2014-10071,CVE-2014-10072,CVE-2016-10714,CVE-2017-18205,CVE-2017-18206,CVE-2018-1071,CVE-2018-1083,CVE-2018-7549
Sources used:
SUSE Linux Enterprise Server 12-SP3 (src):    zsh-5.0.5-6.7.2
SUSE Linux Enterprise Desktop 12-SP3 (src):    zsh-5.0.5-6.7.2
Comment 18 Swamp Workflow Management 2018-04-26 22:08:42 UTC
openSUSE-SU-2018:1093-1: An update that solves 9 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1082885,1082975,1082977,1082991,1082998,1083002,1083250,1084656,1087026,896914
CVE References: CVE-2014-10070,CVE-2014-10071,CVE-2014-10072,CVE-2016-10714,CVE-2017-18205,CVE-2017-18206,CVE-2018-1071,CVE-2018-1083,CVE-2018-7549
Sources used:
openSUSE Leap 42.3 (src):    zsh-5.0.5-9.3.1
Comment 19 Tomáš Chvátal 2019-07-11 11:02:52 UTC
This is automated batch bugzilla cleanup.

The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such
it is no longer maintained, which means that it will not receive any
further security or bug fix updates.
As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please
feel free to reopen this bug against that version (!you must update the
"Version" component in the bug fields, do not just reopen please), or
alternatively create a new ticket.

Thank you for reporting this bug and we are sorry it could not be fixed
during the lifetime of the release.

[1] https://en.opensuse.org/Lifetime