Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Application Foundations
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:0060 - Bug Fix Advisory
Issued:
2009-01-20
Updated:
2009-01-20

RHBA-2009:0060 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

tcsh bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated tcsh package that fixes various bugs is now available.

Description

Tcsh is an enhanced and compatible version of the C shell (csh). Tcsh is a
command language interpreter, which can be used as an interactive login
shell, as well as a shell script command processor.

This updated tcsh package includes fixes for the following bugs:

  • the default Red Hat Enterprise Linux 5 kernel runs with the

"kernel.randomize_va_space" sysctl turned on, which randomizes the system's
address space. Because tcsh used its own custom, internal implementation of
the malloc() function which did not handle address space randomization
well, applications run from the tcsh shell would occasionally crash due to
a segmentation fault. In this updated package, tcsh has been changed to use
the system malloc() function, thus resolving this issue.

  • tcsh scripts broke when using case statements that contained the "end"

keyword. Running a tcsh script that contained the "end" keyword produced
the following output when the "end" statement was reached:

end: Not in while/foreach.

In this updated package, "end" keywords no longer break scripts.

  • strings of numbers which began with the number "0", and which should have

been interpreted as octal numbers by tcsh, were instead being interpreted
as decimal numbers. In this updated package, tcsh correctly considers
strings of digits starting with zero to be octal numbers.

  • in the following construction, tcsh did not check whether both variables,

sel1 and sel2, were in range when selecting only part of multi
word-variable--it only checked sel2:

$name[sel1-sel2]

In this updated package, both parts of a selector in this kind of
construction are checked, thus resolving the issue.

  • due to a pointer position miscalculation error, tcsh would sometimes

"garble" multi-byte characters in certain such situations, such as within
here-documents. In this updated package, tcsh no longer corrupts multi-byte
characters, resolving the issue.

  • the previous tcsh man page stated that memory limits could be set using

the "memoryuse" option. However, this option was not honored by tcsh, and
memory limits were never applied. It is not possible to limit memory usage
using either the "memoryuse" or the "RLIMIT_RSS" option. The tcsh man page
has been updated to reflect this.

  • the previous tcsh(1) man page did not state distinctly that, when

multiple operators with the same precedence level are used within a single
expression, the operators are are then evaluated from right-to-left,
starting with the rightmost one. The tcsh(1) man page is now clearer about
this point.

  • the description of the second form of the shell built-in "set" command

was given twice in the tcsh man page. The redundant description has been
removed in this updated package.

All users of tcsh are advised to upgrade to this updated package, which
resolves these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 430459 - A description of builtin "set" is redundant
  • BZ - 435398 - $name[selector]:it should fail when any number of 'selector' is out of range
  • BZ - 436956 - [BUG] CRM# 1478864 - tcsh scripts with case statements having end keyword breaks oddly.
  • BZ - 438109 - strings which begin with '0' are not recognized as octal numbers
  • BZ - 442536 - [5.3] Manpage change clarifying the calculation order of operator '%', '/' and '*' in tcsh.

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
tcsh-6.14-14.el5.src.rpm SHA-256: 5d7f6d4e00761c3ead7bafb03195a7a85d3f7023dd10991fda980dc3eaba9901
x86_64
tcsh-6.14-14.el5.x86_64.rpm SHA-256: 87b427f70d21e48735003d491067190c2c84cb157618559d174a9850137228c0
ia64
tcsh-6.14-14.el5.ia64.rpm SHA-256: 1cc282c9a47d1d8c921d086d58642d88cbc6357b24270be9c9d9efe44d3ee425
i386
tcsh-6.14-14.el5.i386.rpm SHA-256: c509c6ae1ba970bcb76803019367a83884e6b5dec9d22a188dfd8ab1b3cfcade

Red Hat Enterprise Linux Workstation 5

SRPM
tcsh-6.14-14.el5.src.rpm SHA-256: 5d7f6d4e00761c3ead7bafb03195a7a85d3f7023dd10991fda980dc3eaba9901
x86_64
tcsh-6.14-14.el5.x86_64.rpm SHA-256: 87b427f70d21e48735003d491067190c2c84cb157618559d174a9850137228c0
i386
tcsh-6.14-14.el5.i386.rpm SHA-256: c509c6ae1ba970bcb76803019367a83884e6b5dec9d22a188dfd8ab1b3cfcade

Red Hat Enterprise Linux Desktop 5

SRPM
tcsh-6.14-14.el5.src.rpm SHA-256: 5d7f6d4e00761c3ead7bafb03195a7a85d3f7023dd10991fda980dc3eaba9901
x86_64
tcsh-6.14-14.el5.x86_64.rpm SHA-256: 87b427f70d21e48735003d491067190c2c84cb157618559d174a9850137228c0
i386
tcsh-6.14-14.el5.i386.rpm SHA-256: c509c6ae1ba970bcb76803019367a83884e6b5dec9d22a188dfd8ab1b3cfcade

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
tcsh-6.14-14.el5.src.rpm SHA-256: 5d7f6d4e00761c3ead7bafb03195a7a85d3f7023dd10991fda980dc3eaba9901
s390x
tcsh-6.14-14.el5.s390x.rpm SHA-256: a0982b3a347ef0e4f4ead8afdc742c1da1d4a1f4494603d2f3e015b50f786745

Red Hat Enterprise Linux for Power, big endian 5

SRPM
tcsh-6.14-14.el5.src.rpm SHA-256: 5d7f6d4e00761c3ead7bafb03195a7a85d3f7023dd10991fda980dc3eaba9901
ppc
tcsh-6.14-14.el5.ppc.rpm SHA-256: 6e716be71000fd2a10cc4aaa7c2129b2c6a5cd8a5129f052e891531f82272111

Red Hat Enterprise Linux Server from RHUI 5

SRPM
tcsh-6.14-14.el5.src.rpm SHA-256: 5d7f6d4e00761c3ead7bafb03195a7a85d3f7023dd10991fda980dc3eaba9901
x86_64
tcsh-6.14-14.el5.x86_64.rpm SHA-256: 87b427f70d21e48735003d491067190c2c84cb157618559d174a9850137228c0
i386
tcsh-6.14-14.el5.i386.rpm SHA-256: c509c6ae1ba970bcb76803019367a83884e6b5dec9d22a188dfd8ab1b3cfcade

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Policy effective July 1st, 2023.
Red Hat Summit
Twitter