- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHBA-2011:1072 - Bug Fix Advisory
Synopsis
new package: tcsh617
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An new tcsh617 package that serves as a replacement for the tcsh package, and
provides a number of bug fixes and enhancements over the tcsh package, is now
available for Red Hat Enterprise Linux 5.
Description
Tcsh is a command language interpreter compatible with the C shell (csh), which
can be used as an interactive login shell, as well as a shell script command
processor.
This new tcsh617 package serves as a replacement for the tcsh package, and
upgrades tcsh to upstream version 6.17, which incorporates a number of bug fixes
and enhancements over the previous version (6.14), which was released as a part
of Red Hat Enterprise Linux 5.5. The tcsh package has been retained for
compatibility with the older version of tcsh.
The tcsh and tcsh617 packages are mutually-exclusive: both packages cannot be
installed simultaneously. Users of tcsh who require the bug fixes and
enhancements included in this upgraded package are advised to first uninstall
the tcsh package and then install this new tcsh617 package. Space precludes
documenting all of these changes in this advisory. Users are directed to the Red
Hat Enterprise Linux 5.7 (BZ#676136)
Space precludes documenting all of these changes in this advisory. Refer to the
Red Hat Enterprise Linux 5.7 Technical Notes for information about these
changes:
All users of the tcsh package who want to upgrade their version of tcsh to 6.17
are advised to uninstall the tcsh package and then install this upgraded tcsh617
package, which provides these bug fixes and enhancements.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 433908 - "The shell will not run a set-user ID script without this option." should be deleted.
- BZ - 436439 - The argument 'group' of builtin 'newgrp' should be optional.
- BZ - 436901 - It should not be allowed if environment variable begins with a digit
- BZ - 437079 - 'nohup' without an argument can also be used via pipe
- BZ - 437080 - 'hup' without an argument can also be used via pipe
- BZ - 618723 - csh does not exit properly and uses 100% cpu
- BZ - 638955 - Incorrect value of $status ($?) in case of pipelines
- BZ - 650363 - tcsh-6.14-17.el5_5.2 core dumps with backtick subsistution
- BZ - 676136 - tcsh calls malloc() related functions inside signal handlers
- BZ - 676305 - Using tcsh, xterm ignores 14 keypresses after umlauf
- BZ - 688170 - Extra fork when tcsh processes backquotes
- BZ - 688173 - Running tcsh with '-v' option dumps contents of ~/.history
- BZ - 688175 - $REMOTEHOST is set empty on the local machine in csh and tcsh
- BZ - 689381 - tcsh obeys printexitvalue for back-ticks
- BZ - 689382 - null pointer dereference crashes tcsh
- BZ - 690500 - tcsh doesn't exit when child killed, consumes 100% cpu
CVEs
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
tcsh617-6.17-5.el5.src.rpm | SHA-256: 9ca68519d7bf9da236f6260720d596377c34502219e7607d353f8beb997725f9 |
x86_64 | |
tcsh617-6.17-5.el5.x86_64.rpm | SHA-256: f8218130b677c2a30006a25c7dddfd85cc8eb8830518a376169ef6fe5dc95ea0 |
ia64 | |
tcsh617-6.17-5.el5.ia64.rpm | SHA-256: 07558033a7411d364029a9f34b491defffa4dde03c0c6cffb964d6772df28c8d |
i386 | |
tcsh617-6.17-5.el5.i386.rpm | SHA-256: 4b26a669a3058581c5ba458fb90059d9d55113ca89118bd4b207b12bb7699910 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
tcsh617-6.17-5.el5.src.rpm | SHA-256: 9ca68519d7bf9da236f6260720d596377c34502219e7607d353f8beb997725f9 |
x86_64 | |
tcsh617-6.17-5.el5.x86_64.rpm | SHA-256: f8218130b677c2a30006a25c7dddfd85cc8eb8830518a376169ef6fe5dc95ea0 |
i386 | |
tcsh617-6.17-5.el5.i386.rpm | SHA-256: 4b26a669a3058581c5ba458fb90059d9d55113ca89118bd4b207b12bb7699910 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
tcsh617-6.17-5.el5.src.rpm | SHA-256: 9ca68519d7bf9da236f6260720d596377c34502219e7607d353f8beb997725f9 |
x86_64 | |
tcsh617-6.17-5.el5.x86_64.rpm | SHA-256: f8218130b677c2a30006a25c7dddfd85cc8eb8830518a376169ef6fe5dc95ea0 |
i386 | |
tcsh617-6.17-5.el5.i386.rpm | SHA-256: 4b26a669a3058581c5ba458fb90059d9d55113ca89118bd4b207b12bb7699910 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
tcsh617-6.17-5.el5.src.rpm | SHA-256: 9ca68519d7bf9da236f6260720d596377c34502219e7607d353f8beb997725f9 |
s390x | |
tcsh617-6.17-5.el5.s390x.rpm | SHA-256: b8880a24284c5ad5f1e2093124323e82e484a297c54b7196d1badeadac1c366d |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
tcsh617-6.17-5.el5.src.rpm | SHA-256: 9ca68519d7bf9da236f6260720d596377c34502219e7607d353f8beb997725f9 |
ppc | |
tcsh617-6.17-5.el5.ppc.rpm | SHA-256: 3f00708723c59778ed5a7dbcb938ae39a1980c3b6c19a63bc74e18736066abbb |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
tcsh617-6.17-5.el5.src.rpm | SHA-256: 9ca68519d7bf9da236f6260720d596377c34502219e7607d353f8beb997725f9 |
x86_64 | |
tcsh617-6.17-5.el5.x86_64.rpm | SHA-256: f8218130b677c2a30006a25c7dddfd85cc8eb8830518a376169ef6fe5dc95ea0 |
i386 | |
tcsh617-6.17-5.el5.i386.rpm | SHA-256: 4b26a669a3058581c5ba458fb90059d9d55113ca89118bd4b207b12bb7699910 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.