- Issued:
- 2010-11-03
- Updated:
- 2010-11-03
RHBA-2010:0823 - Bug Fix Advisory
Synopsis
tcsh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated tcsh package that fixes a bugs is now available.
Description
Tcsh is an enhanced and compatible version of the C shell (csh). It is a command
language interpreter, which can be used as an interactive login shell, as well
as a shell script command processor.
This updated tcsh package fixes the following bugs:
- Previously, under certain circumstances, a null pointer may have been
incorrectly dereferenced, causing the tcsh shell to terminate unexpectedly. With
this update, the pointer is now checked properly and tcsh no longer crashes.
(#631815)
- Previously, when command substitution with backquotes was used, extra fork()
was performed. With this update, only one fork() is performed. (#640251)
- Previously, if printexitvalue was set, tcsh returns the exit code as part of
the command output, rendering the output unusable. With this update, output of
command is correct. (#640252)
All users of tcsh are advised to upgrade to this updated package, which resolves
these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 631815 - null pointer dereference crashes tcsh
- BZ - 640251 - Extra fork when tcsh processes backquotes
- BZ - 640252 - tcsh obeys printexitvalue for back-ticks
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
tcsh-6.14-17.el5_5.2.src.rpm | SHA-256: 20f2b957a6cd9990ea6174265721222701fd9e3d520dc6077b1ed2659bdb51f9 |
x86_64 | |
tcsh-6.14-17.el5_5.2.x86_64.rpm | SHA-256: 3bc03b968f1e7472a835063eda93298418d5cd209066463de10448f273a2b248 |
ia64 | |
tcsh-6.14-17.el5_5.2.ia64.rpm | SHA-256: a9a6a8287e380da1c5884296c6ed75352d41d92fd43832c25a23bcbaa8d569c8 |
i386 | |
tcsh-6.14-17.el5_5.2.i386.rpm | SHA-256: d520e6be17a47774e8eeed8dd60987633c9ff44a7b14876823c6a50fbfb1657d |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
tcsh-6.14-17.el5_5.2.src.rpm | SHA-256: 20f2b957a6cd9990ea6174265721222701fd9e3d520dc6077b1ed2659bdb51f9 |
x86_64 | |
tcsh-6.14-17.el5_5.2.x86_64.rpm | SHA-256: 3bc03b968f1e7472a835063eda93298418d5cd209066463de10448f273a2b248 |
i386 | |
tcsh-6.14-17.el5_5.2.i386.rpm | SHA-256: d520e6be17a47774e8eeed8dd60987633c9ff44a7b14876823c6a50fbfb1657d |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
tcsh-6.14-17.el5_5.2.src.rpm | SHA-256: 20f2b957a6cd9990ea6174265721222701fd9e3d520dc6077b1ed2659bdb51f9 |
x86_64 | |
tcsh-6.14-17.el5_5.2.x86_64.rpm | SHA-256: 3bc03b968f1e7472a835063eda93298418d5cd209066463de10448f273a2b248 |
i386 | |
tcsh-6.14-17.el5_5.2.i386.rpm | SHA-256: d520e6be17a47774e8eeed8dd60987633c9ff44a7b14876823c6a50fbfb1657d |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
tcsh-6.14-17.el5_5.2.src.rpm | SHA-256: 20f2b957a6cd9990ea6174265721222701fd9e3d520dc6077b1ed2659bdb51f9 |
s390x | |
tcsh-6.14-17.el5_5.2.s390x.rpm | SHA-256: 1558376f118006f09d583b9ec02e435f685563a0d1899f668487c16b55dfde3a |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
tcsh-6.14-17.el5_5.2.src.rpm | SHA-256: 20f2b957a6cd9990ea6174265721222701fd9e3d520dc6077b1ed2659bdb51f9 |
ppc | |
tcsh-6.14-17.el5_5.2.ppc.rpm | SHA-256: 39ca8eab6525de003462ea341f4a0e2dd8dede82e5eeb0483ebdade96176ef68 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
tcsh-6.14-17.el5_5.2.src.rpm | SHA-256: 20f2b957a6cd9990ea6174265721222701fd9e3d520dc6077b1ed2659bdb51f9 |
x86_64 | |
tcsh-6.14-17.el5_5.2.x86_64.rpm | SHA-256: 3bc03b968f1e7472a835063eda93298418d5cd209066463de10448f273a2b248 |
i386 | |
tcsh-6.14-17.el5_5.2.i386.rpm | SHA-256: d520e6be17a47774e8eeed8dd60987633c9ff44a7b14876823c6a50fbfb1657d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.