Skip to navigation

Bug Fix Advisory tcsh617 bug fix update

Advisory: RHBA-2013:0052-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated tcsh617 package that fixes three bugs is now available for Red Hat
Enterprise Linux 5.

The tcsh617 package is a mutually-exclusive replacement for the tcsh package.
Tcsh is a command language interpreter compatible with the C shell (csh), which
can be used as an interactive login shell, as well as a shell script command
processor.

This update fixes the following bugs:

* Prior to this update, the tcsh617 processes were not handling the ".history"
file exclusively. Consequently, when running several tcsh617 processes
simultaneously, the .history file got malformed. This behavior, apart from
corrupting .history content, slowed down the startup of the tcsh617 scripts.
With this update, the .history file locking mechanism has been introduced. As a
result, the file is merged correctly after modification by several processes.
(BZ#648592)

* The tcsh617 package introduced a change in the default value of the $status
variable for lists and pipelines. This change was made to provide compatibility
with POSIX-compliant shells, like bash, ksh, resh, etc. However, the
modification affected existing applications, which relied on previous csh
behavior, present for many years. With this update, the $status value has been
reverted to the csh default. In addition, the $tcsh_posix_status variable has
been added to opt-in the POSIX-like behavior. As a result, compliance with both
csh and POSIX is made possible within tcsh617. (BZ#759132)

* Due to a syntax error in the tcsh617 package, the source command failed to
function correctly when a single-line if-statement was used. This bug has been
fixed and the source command now works properly in the described scenario.
(BZ#858281)

All users of tcsh617 are advised to upgrade to this updated package, which fixes
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
tcsh617-6.17-7.el5.src.rpm     MD5: b6b331c976c1355e58057ee5a635d956
SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0
 
IA-32:
tcsh617-6.17-7.el5.i386.rpm     MD5: c86a813e63576fa5f48fdf8b926ffc2c
SHA-256: 8ea74015a90924a17d5405a4b3a8f017dd9773f3004b8fb7c583461c64d12076
tcsh617-debuginfo-6.17-7.el5.i386.rpm     MD5: 0e9fc49e05111b3c8aff3ffbb68cf767
SHA-256: 62f08512643c946bb67793e10e8bb1be3a175c6bcb6a99429d23bcd5bae08995
 
IA-64:
tcsh617-6.17-7.el5.ia64.rpm     MD5: cf82aa8712348459f880bfda245999a2
SHA-256: 93017aa3b51ba2be09b7d024fc7868682e467d3044529b4646db46888b9b69a4
tcsh617-debuginfo-6.17-7.el5.ia64.rpm     MD5: 8df9f61e359710df1114c1266e21de77
SHA-256: 20ba50705651b716050173ad6cbbefb5825baf0c1d5e774826565957a026dd34
 
PPC:
tcsh617-6.17-7.el5.ppc.rpm     MD5: cc967978cb7949d313520b28965ae02e
SHA-256: 22730a3b33ee59de483eb919cc6e59c410089bffb21edefacb870061242491d4
tcsh617-debuginfo-6.17-7.el5.ppc.rpm     MD5: 6359aba3ee6b51ec72a020851c8b1a6b
SHA-256: dabc3d3a329b831e1fea2dc90ca4c885e0c94e4a953e7b45888e11b93ea760f6
 
s390x:
tcsh617-6.17-7.el5.s390x.rpm     MD5: 64ac5a4d8af81dc4f33c646b7c232ee6
SHA-256: 092bf67ecf80bbeef694e4c82b64e1d4ae596b26f1da0d65615c9febe0b7b59f
tcsh617-debuginfo-6.17-7.el5.s390x.rpm     MD5: 31900bd78876aa792f0933ac51e4d9c8
SHA-256: 0ad1643584bab71d08acc82f9a22131037d4c8315011fbc1fbeb5f56865eadae
 
x86_64:
tcsh617-6.17-7.el5.x86_64.rpm     MD5: 39da9da27760fad099d51ef284781f05
SHA-256: c1aaeafa3d3dae817d2fa3e37f91f6cec49295801273971e4463722bb587f475
tcsh617-debuginfo-6.17-7.el5.x86_64.rpm     MD5: 58b9e497c500713efb70eca63151b109
SHA-256: 458c60bfe40289182fa2e9d71ffc1b0aa0e7015692ce5fe6c9656c529a63aabc
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
tcsh617-6.17-7.el5.src.rpm     MD5: b6b331c976c1355e58057ee5a635d956
SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0
 
IA-32:
tcsh617-6.17-7.el5.i386.rpm     MD5: c86a813e63576fa5f48fdf8b926ffc2c
SHA-256: 8ea74015a90924a17d5405a4b3a8f017dd9773f3004b8fb7c583461c64d12076
tcsh617-debuginfo-6.17-7.el5.i386.rpm     MD5: 0e9fc49e05111b3c8aff3ffbb68cf767
SHA-256: 62f08512643c946bb67793e10e8bb1be3a175c6bcb6a99429d23bcd5bae08995
 
x86_64:
tcsh617-6.17-7.el5.x86_64.rpm     MD5: 39da9da27760fad099d51ef284781f05
SHA-256: c1aaeafa3d3dae817d2fa3e37f91f6cec49295801273971e4463722bb587f475
tcsh617-debuginfo-6.17-7.el5.x86_64.rpm     MD5: 58b9e497c500713efb70eca63151b109
SHA-256: 458c60bfe40289182fa2e9d71ffc1b0aa0e7015692ce5fe6c9656c529a63aabc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

759132 - Fix regression in default $status value in case of lists/pipelines
858281 - source command fails with single-line if-statement



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/