Skip to navigation

Bug Fix Advisory tcsh bug fix update

Advisory: RHBA-2010:0570-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-07-28
Last updated on: 2010-07-28
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 4)

Details

An updated tcsh package that fixes the issue of a null pointer dereference in
proc cwd is now available for Red Hat Enterprise Linux 4.

Tcsh is an enhanced and compatible version of the C shell (csh). Tcsh is a
command language interpreter, which can be used as an interactive login shell,
as well as a shell script command processor.

This updated tcsh package resolves the following issue:

* when using the tcsh shell, a null pointer dereference in proc cwd could occur
on some terms and cause a crash of the shell. This update provides a fix to the
relevant part of the source code.

All tcsh users are advised to upgrade to this updated package, which resolves
this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
tcsh-6.13-10.el4_8.1.src.rpm     MD5: 242f9ead1a2dacab741ce7a799e53667
SHA-256: d1b342390dfa6d4d71bf004347710d2554fc48dc5cf7928bb75f541e79f11cc6
 
IA-32:
tcsh-6.13-10.el4_8.1.i386.rpm     MD5: 7273aa7bdbbdc631947eff970ae1537d
SHA-256: c077ba4ad1b37e55531ee57230dc900e3cd5b9fcc24204e8c7a5ac446d303964
 
x86_64:
tcsh-6.13-10.el4_8.1.x86_64.rpm     MD5: 98d40bd0750501893284fce73f541c01
SHA-256: 8189dddf67cfd3cb15d314d87cfd8db09929e6d175a46ddc529f78d872558005
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
tcsh-6.13-10.el4_8.1.src.rpm     MD5: 242f9ead1a2dacab741ce7a799e53667
SHA-256: d1b342390dfa6d4d71bf004347710d2554fc48dc5cf7928bb75f541e79f11cc6
 
IA-32:
tcsh-6.13-10.el4_8.1.i386.rpm     MD5: 7273aa7bdbbdc631947eff970ae1537d
SHA-256: c077ba4ad1b37e55531ee57230dc900e3cd5b9fcc24204e8c7a5ac446d303964
 
IA-64:
tcsh-6.13-10.el4_8.1.ia64.rpm     MD5: 2748e95e675467797363bd66b774c3a0
SHA-256: a362c20182f2778f96cb3f7d39d58f11e7ab6f162062d53d4b84a1a99e2acece
 
PPC:
tcsh-6.13-10.el4_8.1.ppc.rpm     MD5: 548dd20bd4b4b230276b29f0f5c83028
SHA-256: bf94d9c8de35f0eb993983f8ddb10b01bfcf32e3cc030bf4b9f082cb88e8f2ac
 
s390:
tcsh-6.13-10.el4_8.1.s390.rpm     MD5: 26bf13ee7bcca8acaa7a768d99a64363
SHA-256: 0392ac3e2947c4a718fc1823e5c2ca6f8868806604671e3fa9c04d73359d2e3b
 
s390x:
tcsh-6.13-10.el4_8.1.s390x.rpm     MD5: ae2b7ddca9c0799db164e36b062f837a
SHA-256: 03bdbca2de54bb4176d48052ad08d08f3e31812d6549871906348608054c20a3
 
x86_64:
tcsh-6.13-10.el4_8.1.x86_64.rpm     MD5: 98d40bd0750501893284fce73f541c01
SHA-256: 8189dddf67cfd3cb15d314d87cfd8db09929e6d175a46ddc529f78d872558005
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
tcsh-6.13-10.el4_8.1.src.rpm     MD5: 242f9ead1a2dacab741ce7a799e53667
SHA-256: d1b342390dfa6d4d71bf004347710d2554fc48dc5cf7928bb75f541e79f11cc6
 
IA-32:
tcsh-6.13-10.el4_8.1.i386.rpm     MD5: 7273aa7bdbbdc631947eff970ae1537d
SHA-256: c077ba4ad1b37e55531ee57230dc900e3cd5b9fcc24204e8c7a5ac446d303964
 
IA-64:
tcsh-6.13-10.el4_8.1.ia64.rpm     MD5: 2748e95e675467797363bd66b774c3a0
SHA-256: a362c20182f2778f96cb3f7d39d58f11e7ab6f162062d53d4b84a1a99e2acece
 
PPC:
tcsh-6.13-10.el4_8.1.ppc.rpm     MD5: 548dd20bd4b4b230276b29f0f5c83028
SHA-256: bf94d9c8de35f0eb993983f8ddb10b01bfcf32e3cc030bf4b9f082cb88e8f2ac
 
s390:
tcsh-6.13-10.el4_8.1.s390.rpm     MD5: 26bf13ee7bcca8acaa7a768d99a64363
SHA-256: 0392ac3e2947c4a718fc1823e5c2ca6f8868806604671e3fa9c04d73359d2e3b
 
s390x:
tcsh-6.13-10.el4_8.1.s390x.rpm     MD5: ae2b7ddca9c0799db164e36b062f837a
SHA-256: 03bdbca2de54bb4176d48052ad08d08f3e31812d6549871906348608054c20a3
 
x86_64:
tcsh-6.13-10.el4_8.1.x86_64.rpm     MD5: 98d40bd0750501893284fce73f541c01
SHA-256: 8189dddf67cfd3cb15d314d87cfd8db09929e6d175a46ddc529f78d872558005
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
tcsh-6.13-10.el4_8.1.src.rpm     MD5: 242f9ead1a2dacab741ce7a799e53667
SHA-256: d1b342390dfa6d4d71bf004347710d2554fc48dc5cf7928bb75f541e79f11cc6
 
IA-32:
tcsh-6.13-10.el4_8.1.i386.rpm     MD5: 7273aa7bdbbdc631947eff970ae1537d
SHA-256: c077ba4ad1b37e55531ee57230dc900e3cd5b9fcc24204e8c7a5ac446d303964
 
IA-64:
tcsh-6.13-10.el4_8.1.ia64.rpm     MD5: 2748e95e675467797363bd66b774c3a0
SHA-256: a362c20182f2778f96cb3f7d39d58f11e7ab6f162062d53d4b84a1a99e2acece
 
x86_64:
tcsh-6.13-10.el4_8.1.x86_64.rpm     MD5: 98d40bd0750501893284fce73f541c01
SHA-256: 8189dddf67cfd3cb15d314d87cfd8db09929e6d175a46ddc529f78d872558005
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
tcsh-6.13-10.el4_8.1.src.rpm     MD5: 242f9ead1a2dacab741ce7a799e53667
SHA-256: d1b342390dfa6d4d71bf004347710d2554fc48dc5cf7928bb75f541e79f11cc6
 
IA-32:
tcsh-6.13-10.el4_8.1.i386.rpm     MD5: 7273aa7bdbbdc631947eff970ae1537d
SHA-256: c077ba4ad1b37e55531ee57230dc900e3cd5b9fcc24204e8c7a5ac446d303964
 
IA-64:
tcsh-6.13-10.el4_8.1.ia64.rpm     MD5: 2748e95e675467797363bd66b774c3a0
SHA-256: a362c20182f2778f96cb3f7d39d58f11e7ab6f162062d53d4b84a1a99e2acece
 
x86_64:
tcsh-6.13-10.el4_8.1.x86_64.rpm     MD5: 98d40bd0750501893284fce73f541c01
SHA-256: 8189dddf67cfd3cb15d314d87cfd8db09929e6d175a46ddc529f78d872558005
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
tcsh-6.13-10.el4_8.1.src.rpm     MD5: 242f9ead1a2dacab741ce7a799e53667
SHA-256: d1b342390dfa6d4d71bf004347710d2554fc48dc5cf7928bb75f541e79f11cc6
 
IA-32:
tcsh-6.13-10.el4_8.1.i386.rpm     MD5: 7273aa7bdbbdc631947eff970ae1537d
SHA-256: c077ba4ad1b37e55531ee57230dc900e3cd5b9fcc24204e8c7a5ac446d303964
 
IA-64:
tcsh-6.13-10.el4_8.1.ia64.rpm     MD5: 2748e95e675467797363bd66b774c3a0
SHA-256: a362c20182f2778f96cb3f7d39d58f11e7ab6f162062d53d4b84a1a99e2acece
 
x86_64:
tcsh-6.13-10.el4_8.1.x86_64.rpm     MD5: 98d40bd0750501893284fce73f541c01
SHA-256: 8189dddf67cfd3cb15d314d87cfd8db09929e6d175a46ddc529f78d872558005
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

614755 - null pointer dereference crashes tcsh



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/