Skip to navigation

Bug Fix Advisory new package: tcsh617

Advisory: RHBA-2011:1072-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An new tcsh617 package that serves as a replacement for the tcsh package, and
provides a number of bug fixes and enhancements over the tcsh package, is now
available for Red Hat Enterprise Linux 5.

Tcsh is a command language interpreter compatible with the C shell (csh), which
can be used as an interactive login shell, as well as a shell script command
processor.

This new tcsh617 package serves as a replacement for the tcsh package, and
upgrades tcsh to upstream version 6.17, which incorporates a number of bug fixes
and enhancements over the previous version (6.14), which was released as a part
of Red Hat Enterprise Linux 5.5. The tcsh package has been retained for
compatibility with the older version of tcsh.

The tcsh and tcsh617 packages are mutually-exclusive: both packages cannot be
installed simultaneously. Users of tcsh who require the bug fixes and
enhancements included in this upgraded package are advised to first uninstall
the tcsh package and then install this new tcsh617 package. Space precludes
documenting all of these changes in this advisory. Users are directed to the Red
Hat Enterprise Linux 5.7 (BZ#676136)

Space precludes documenting all of these changes in this advisory. Refer to the
Red Hat Enterprise Linux 5.7 Technical Notes for information about these
changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/RHBA-2011-1072.html

All users of the tcsh package who want to upgrade their version of tcsh to 6.17
are advised to uninstall the tcsh package and then install this upgraded tcsh617
package, which provides these bug fixes and enhancements.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

IA-32:
tcsh617-6.17-5.el5.i386.rpm
File outdated by:  RHBA-2013:0052
    MD5: 3c430184eb91cf12382be957dcff412d
SHA-256: 4b26a669a3058581c5ba458fb90059d9d55113ca89118bd4b207b12bb7699910
 
IA-64:
tcsh617-6.17-5.el5.ia64.rpm
File outdated by:  RHBA-2013:0052
    MD5: 56c1378ec9eea4e2be2daaf429fd7302
SHA-256: 07558033a7411d364029a9f34b491defffa4dde03c0c6cffb964d6772df28c8d
 
PPC:
tcsh617-6.17-5.el5.ppc.rpm
File outdated by:  RHBA-2013:0052
    MD5: 61a8e674c065fbca8c2fc143ab7f2f50
SHA-256: 3f00708723c59778ed5a7dbcb938ae39a1980c3b6c19a63bc74e18736066abbb
 
s390x:
tcsh617-6.17-5.el5.s390x.rpm
File outdated by:  RHBA-2013:0052
    MD5: 6417903e56919e1886b83698823307b7
SHA-256: b8880a24284c5ad5f1e2093124323e82e484a297c54b7196d1badeadac1c366d
 
x86_64:
tcsh617-6.17-5.el5.x86_64.rpm
File outdated by:  RHBA-2013:0052
    MD5: 92e8e35da201c78f1ec5d2cadf96426d
SHA-256: f8218130b677c2a30006a25c7dddfd85cc8eb8830518a376169ef6fe5dc95ea0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

IA-32:
tcsh617-6.17-5.el5.i386.rpm
File outdated by:  RHBA-2013:0052
    MD5: 3c430184eb91cf12382be957dcff412d
SHA-256: 4b26a669a3058581c5ba458fb90059d9d55113ca89118bd4b207b12bb7699910
 
x86_64:
tcsh617-6.17-5.el5.x86_64.rpm
File outdated by:  RHBA-2013:0052
    MD5: 92e8e35da201c78f1ec5d2cadf96426d
SHA-256: f8218130b677c2a30006a25c7dddfd85cc8eb8830518a376169ef6fe5dc95ea0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

433908 - "The shell will not run a set-user ID script without this option." should be deleted.
436439 - The argument 'group' of builtin 'newgrp' should be optional.
436901 - It should not be allowed if environment variable begins with a digit
437079 - 'nohup' without an argument can also be used via pipe
437080 - 'hup' without an argument can also be used via pipe
618723 - csh does not exit properly and uses 100% cpu
638955 - Incorrect value of $status ($?) in case of pipelines
650363 - tcsh-6.14-17.el5_5.2 core dumps with backtick subsistution
676136 - tcsh calls malloc() related functions inside signal handlers
676305 - Using tcsh, xterm ignores 14 keypresses after umlauf
688170 - Extra fork when tcsh processes backquotes
688173 - Running tcsh with '-v' option dumps contents of ~/.history
688175 - $REMOTEHOST is set empty on the local machine in csh and tcsh
689381 - tcsh obeys printexitvalue for back-ticks
689382 - null pointer dereference crashes tcsh
690500 - tcsh doesn't exit when child killed, consumes 100% cpu


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/