- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0676 - Bug Fix Advisory
Synopsis
tcsh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated tcsh package that fixes several bugs is now available.
Description
Tcsh is an enhanced and compatible version of the C shell (csh). Tcsh is
a command language interpreter, which can be used as an interactive login
shell, as well as a shell script command processor.
This updated package fixes the following bugs:
- a bug in the "/etc/csh.cshrc" script prevented tcsh debugging scripts
from running. For example, a tcsh script that contained "#!/bin/tcsh -Xvn"
failed to run, producing output similar to the following:
if ( "$group" == "$user" && $uid > 99 ) then
endif
if ( $?prompt ) then
$?prompt: No match.
This has been resolved in this updated package.
- in the previous tcsh package, MAXVARLEN had a maximum value of 30.
Attempting to use a variable with a name longer than 30 characters may
have resulted in a "Variable name too long" error. In this updated package,
MAXVARLEN has a maximum value of 256, which resolves this issue.
- the previous tcsh man page stated that memory limits could be set using
the "memoryuse" option; however, this option was not honored, and memory
limits were never applied. It is not possible to limit memory usage using
the "memoryuse" option. The tcsh man page has been updated to reflect
this, as well as not being able to use RLIMIT_RSS to limit tcsh memory
usuage.
- tcsh scripts broke when using case statements that contained the "end"
keyword. Running a tcsh script that contained the "end" keyword produced
the following output when the "end" statement was reached:
end: Not in while/foreach.
In this updated package, "end" keywords no longer break scripts.
Users of tcsh are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 204029 - the /etc/csh.cshrc blocks csh/tcsh scripts from debugging
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
tcsh-6.13-10.el4.src.rpm | SHA-256: a8349c5e241b53522d06b8f53f2622948bd72fff695384b5b2786e7506bd6841 |
x86_64 | |
tcsh-6.13-10.el4.x86_64.rpm | SHA-256: 728bed8075b5d15017dbc51800656195886a71d421dd660f42f873c469760c8c |
tcsh-6.13-10.el4.x86_64.rpm | SHA-256: 728bed8075b5d15017dbc51800656195886a71d421dd660f42f873c469760c8c |
ia64 | |
tcsh-6.13-10.el4.ia64.rpm | SHA-256: dbd0383bde11f570f85b41a83f6cb8e756099159f8680912c2eaa8339d87c1e5 |
tcsh-6.13-10.el4.ia64.rpm | SHA-256: dbd0383bde11f570f85b41a83f6cb8e756099159f8680912c2eaa8339d87c1e5 |
i386 | |
tcsh-6.13-10.el4.i386.rpm | SHA-256: 990a6887329e5ac79180aa5472ef5ade5065cc095008dc3c5f39c409130c534b |
tcsh-6.13-10.el4.i386.rpm | SHA-256: 990a6887329e5ac79180aa5472ef5ade5065cc095008dc3c5f39c409130c534b |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
tcsh-6.13-10.el4.src.rpm | SHA-256: a8349c5e241b53522d06b8f53f2622948bd72fff695384b5b2786e7506bd6841 |
x86_64 | |
tcsh-6.13-10.el4.x86_64.rpm | SHA-256: 728bed8075b5d15017dbc51800656195886a71d421dd660f42f873c469760c8c |
ia64 | |
tcsh-6.13-10.el4.ia64.rpm | SHA-256: dbd0383bde11f570f85b41a83f6cb8e756099159f8680912c2eaa8339d87c1e5 |
i386 | |
tcsh-6.13-10.el4.i386.rpm | SHA-256: 990a6887329e5ac79180aa5472ef5ade5065cc095008dc3c5f39c409130c534b |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
tcsh-6.13-10.el4.src.rpm | SHA-256: a8349c5e241b53522d06b8f53f2622948bd72fff695384b5b2786e7506bd6841 |
x86_64 | |
tcsh-6.13-10.el4.x86_64.rpm | SHA-256: 728bed8075b5d15017dbc51800656195886a71d421dd660f42f873c469760c8c |
i386 | |
tcsh-6.13-10.el4.i386.rpm | SHA-256: 990a6887329e5ac79180aa5472ef5ade5065cc095008dc3c5f39c409130c534b |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
tcsh-6.13-10.el4.src.rpm | SHA-256: a8349c5e241b53522d06b8f53f2622948bd72fff695384b5b2786e7506bd6841 |
s390x | |
tcsh-6.13-10.el4.s390x.rpm | SHA-256: af8aabf36c0b01b65ec900e6b78179a44bead38f5965281787313262c0894d3d |
s390 | |
tcsh-6.13-10.el4.s390.rpm | SHA-256: 2809f2308482f661d6d4ebf8d13d5654f157389b018b83007404dadad609d043 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
tcsh-6.13-10.el4.src.rpm | SHA-256: a8349c5e241b53522d06b8f53f2622948bd72fff695384b5b2786e7506bd6841 |
ppc | |
tcsh-6.13-10.el4.ppc.rpm | SHA-256: 6c96c959df143fa5c587cd054a892fdffcc4bed27442b8ee9f84050d3160e1bf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.