- Issued:
- 2009-10-13
- Updated:
- 2009-10-13
RHBA-2009:1494 - Bug Fix Advisory
Synopsis
tcsh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated tcsh package that fixes a bug is now available.
Description
Tcsh is an enhanced and compatible version of the C shell (csh). Tcsh is a
command language interpreter, which can be used as an interactive login
shell, as well as a shell script command processor.
This updated tcsh package fixes the following bug:
- when using the tcsh shell, running a command containing glob characters
(such as "echo FAIL *", for example) within a directory in which automount
mounted other directories (such as for NIS) based on a wildcard entry in
the automount map file caused the service to attempt to mount those
directories and fail, thereby increasing network traffic and system load.
This update provides a fix to tcsh glob-handling so that using globbing
characters as in the above example no longer triggers automount, thus
resolving the issue. (BZ#526459)
All users of tcsh are advised to upgrade to this updated package, which
resolves this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 526459 - [RHEL5.3] tcsh globbing causing bad automount
- BZ - 528470 - Globbing error reporting broken
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
tcsh-6.14-14.el5_4.2.src.rpm | SHA-256: dc128d34b059b3ef3cac233abb5df074188414a17663154883b60b863af755a7 |
x86_64 | |
tcsh-6.14-14.el5_4.2.x86_64.rpm | SHA-256: 81a3e9e3c1da6b47687dc8f98d0c8d318176a5758fc40220d4a8f5583497792f |
ia64 | |
tcsh-6.14-14.el5_4.2.ia64.rpm | SHA-256: 7e129099b486df712400c6beda03ccb34131bffdd9d4e35ea2f1e9e962a32195 |
i386 | |
tcsh-6.14-14.el5_4.2.i386.rpm | SHA-256: e3621009c00d493dcee914f511263ffd735a625d86cd29246d587791284b62f3 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4
SRPM | |
---|---|
x86_64 | |
ia64 | |
i386 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
tcsh-6.14-14.el5_4.2.src.rpm | SHA-256: dc128d34b059b3ef3cac233abb5df074188414a17663154883b60b863af755a7 |
x86_64 | |
tcsh-6.14-14.el5_4.2.x86_64.rpm | SHA-256: 81a3e9e3c1da6b47687dc8f98d0c8d318176a5758fc40220d4a8f5583497792f |
i386 | |
tcsh-6.14-14.el5_4.2.i386.rpm | SHA-256: e3621009c00d493dcee914f511263ffd735a625d86cd29246d587791284b62f3 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
tcsh-6.14-14.el5_4.2.src.rpm | SHA-256: dc128d34b059b3ef3cac233abb5df074188414a17663154883b60b863af755a7 |
x86_64 | |
tcsh-6.14-14.el5_4.2.x86_64.rpm | SHA-256: 81a3e9e3c1da6b47687dc8f98d0c8d318176a5758fc40220d4a8f5583497792f |
i386 | |
tcsh-6.14-14.el5_4.2.i386.rpm | SHA-256: e3621009c00d493dcee914f511263ffd735a625d86cd29246d587791284b62f3 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
tcsh-6.14-14.el5_4.2.src.rpm | SHA-256: dc128d34b059b3ef3cac233abb5df074188414a17663154883b60b863af755a7 |
s390x | |
tcsh-6.14-14.el5_4.2.s390x.rpm | SHA-256: 62cc509c81e245e104abee62d6ff5989b424b2024b3403d7c90389f1dec260ad |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4
SRPM | |
---|---|
s390x |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
tcsh-6.14-14.el5_4.2.src.rpm | SHA-256: dc128d34b059b3ef3cac233abb5df074188414a17663154883b60b863af755a7 |
ppc | |
tcsh-6.14-14.el5_4.2.ppc.rpm | SHA-256: dabe92424950a0b950a48479d15efe9048df95c46ec6dee48c15ee2857a61779 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4
SRPM | |
---|---|
ppc |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
tcsh-6.14-14.el5_4.2.src.rpm | SHA-256: dc128d34b059b3ef3cac233abb5df074188414a17663154883b60b863af755a7 |
x86_64 | |
tcsh-6.14-14.el5_4.2.x86_64.rpm | SHA-256: 81a3e9e3c1da6b47687dc8f98d0c8d318176a5758fc40220d4a8f5583497792f |
i386 | |
tcsh-6.14-14.el5_4.2.i386.rpm | SHA-256: e3621009c00d493dcee914f511263ffd735a625d86cd29246d587791284b62f3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.