- Issued:
- 2015-01-29
- Updated:
- 2015-01-29
RHBA-2015:0107 - Bug Fix Advisory
Synopsis
tcsh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated tcsh packages that fix one bug are now available for Red Hat Enterprise
Linux 6.5 Extended Update Support.
Description
The tcsh packages contain an enhanced and compatible version of the C shell
(csh), which is a command language interpreter, and can be used as an
interactive login shell, as well as a shell script command processor.
This update fixes the following bug:
- Previously, the background process was able to finish so quickly that the
subsequent execution of the "wait" built-in command, due to its bug, was not yet
ready to handle finishing background processes. As a consequence, starting a
command in the background followed by an immediate call to "wait" built-in could
lead to the tcsh process becoming unresponsive. With this update, the "wait"
built-in safely traces all the ending background processes, and the tcsh shell
thus no longer hangs. (BZ#1186323)
All users of tcsh are advised to upgrade to these updated packages, which
fix this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 i386
- Red Hat Enterprise Linux EUS Compute Node 6.5 x86_64
- Red Hat Enterprise Linux Server - AUS 6.5 x86_64
- Red Hat Enterprise Linux Server - TUS 6.5 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5
SRPM | |
---|---|
tcsh-6.17-25.el6_5.src.rpm | SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b |
x86_64 | |
tcsh-6.17-25.el6_5.x86_64.rpm | SHA-256: 7ff8297615c538af16062cc6867308d9248ab06cef14170b6065f5d5a22e1079 |
tcsh-debuginfo-6.17-25.el6_5.x86_64.rpm | SHA-256: 9945612ffb969cef363fdf406c5047ea206c9d98c5f3ab66720521a336f779fc |
i386 | |
tcsh-6.17-25.el6_5.i686.rpm | SHA-256: ecd275c2e3af962d5e5cca840454f7e3dca185e7d5503a3c6c2eed05a247558f |
tcsh-debuginfo-6.17-25.el6_5.i686.rpm | SHA-256: a8352cb1dbec824412421c4abbf1db923b8dae2bc7885e3bbdab85d367861bab |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5
SRPM | |
---|---|
tcsh-6.17-25.el6_5.src.rpm | SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b |
s390x | |
tcsh-6.17-25.el6_5.s390x.rpm | SHA-256: ca2c2216220bd755f626bb2b183b2ae0e6f93bbae4a5390d3b5048bee09e950a |
tcsh-debuginfo-6.17-25.el6_5.s390x.rpm | SHA-256: f072221a81212cf103601f9b560297ceac2eff1b076d2d342c769c59cc647f01 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5
SRPM | |
---|---|
tcsh-6.17-25.el6_5.src.rpm | SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b |
ppc64 | |
tcsh-6.17-25.el6_5.ppc64.rpm | SHA-256: 8495a0b8452d949642bfac2640e25052851af3f12cf37104b9c24817433757b3 |
tcsh-debuginfo-6.17-25.el6_5.ppc64.rpm | SHA-256: 5d2e4b4c9800e1ad7d76cd2e3e70cb2f06b57e79a6eda7e9e23345fb037558a1 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5
SRPM | |
---|---|
tcsh-6.17-25.el6_5.src.rpm | SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b |
x86_64 | |
tcsh-6.17-25.el6_5.x86_64.rpm | SHA-256: 7ff8297615c538af16062cc6867308d9248ab06cef14170b6065f5d5a22e1079 |
tcsh-debuginfo-6.17-25.el6_5.x86_64.rpm | SHA-256: 9945612ffb969cef363fdf406c5047ea206c9d98c5f3ab66720521a336f779fc |
i386 | |
tcsh-6.17-25.el6_5.i686.rpm | SHA-256: ecd275c2e3af962d5e5cca840454f7e3dca185e7d5503a3c6c2eed05a247558f |
tcsh-debuginfo-6.17-25.el6_5.i686.rpm | SHA-256: a8352cb1dbec824412421c4abbf1db923b8dae2bc7885e3bbdab85d367861bab |
Red Hat Enterprise Linux EUS Compute Node 6.5
SRPM | |
---|---|
tcsh-6.17-25.el6_5.src.rpm | SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b |
x86_64 | |
tcsh-6.17-25.el6_5.x86_64.rpm | SHA-256: 7ff8297615c538af16062cc6867308d9248ab06cef14170b6065f5d5a22e1079 |
tcsh-debuginfo-6.17-25.el6_5.x86_64.rpm | SHA-256: 9945612ffb969cef363fdf406c5047ea206c9d98c5f3ab66720521a336f779fc |
Red Hat Enterprise Linux Server - AUS 6.5
SRPM | |
---|---|
tcsh-6.17-25.el6_5.src.rpm | SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b |
x86_64 | |
tcsh-6.17-25.el6_5.x86_64.rpm | SHA-256: 7ff8297615c538af16062cc6867308d9248ab06cef14170b6065f5d5a22e1079 |
tcsh-debuginfo-6.17-25.el6_5.x86_64.rpm | SHA-256: 9945612ffb969cef363fdf406c5047ea206c9d98c5f3ab66720521a336f779fc |
Red Hat Enterprise Linux Server - TUS 6.5
SRPM | |
---|---|
tcsh-6.17-25.el6_5.src.rpm | SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b |
x86_64 | |
tcsh-6.17-25.el6_5.x86_64.rpm | SHA-256: 7ff8297615c538af16062cc6867308d9248ab06cef14170b6065f5d5a22e1079 |
tcsh-debuginfo-6.17-25.el6_5.x86_64.rpm | SHA-256: 9945612ffb969cef363fdf406c5047ea206c9d98c5f3ab66720521a336f779fc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.