- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2013:0052 - Bug Fix Advisory
Synopsis
tcsh617 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated tcsh617 package that fixes three bugs is now available for Red Hat
Enterprise Linux 5.
Description
The tcsh617 package is a mutually-exclusive replacement for the tcsh package.
Tcsh is a command language interpreter compatible with the C shell (csh), which
can be used as an interactive login shell, as well as a shell script command
processor.
This update fixes the following bugs:
- Prior to this update, the tcsh617 processes were not handling the ".history"
file exclusively. Consequently, when running several tcsh617 processes
simultaneously, the .history file got malformed. This behavior, apart from
corrupting .history content, slowed down the startup of the tcsh617 scripts.
With this update, the .history file locking mechanism has been introduced. As a
result, the file is merged correctly after modification by several processes.
(BZ#648592)
- The tcsh617 package introduced a change in the default value of the $status
variable for lists and pipelines. This change was made to provide compatibility
with POSIX-compliant shells, like bash, ksh, resh, etc. However, the
modification affected existing applications, which relied on previous csh
behavior, present for many years. With this update, the $status value has been
reverted to the csh default. In addition, the $tcsh_posix_status variable has
been added to opt-in the POSIX-like behavior. As a result, compliance with both
csh and POSIX is made possible within tcsh617. (BZ#759132)
- Due to a syntax error in the tcsh617 package, the source command failed to
function correctly when a single-line if-statement was used. This bug has been
fixed and the source command now works properly in the described scenario.
(BZ#858281)
All users of tcsh617 are advised to upgrade to this updated package, which fixes
these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 759132 - Fix regression in default $status value in case of lists/pipelines
- BZ - 858281 - source command fails with single-line if-statement
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
tcsh617-6.17-7.el5.src.rpm | SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0 |
x86_64 | |
tcsh617-6.17-7.el5.x86_64.rpm | SHA-256: c1aaeafa3d3dae817d2fa3e37f91f6cec49295801273971e4463722bb587f475 |
tcsh617-debuginfo-6.17-7.el5.x86_64.rpm | SHA-256: 458c60bfe40289182fa2e9d71ffc1b0aa0e7015692ce5fe6c9656c529a63aabc |
ia64 | |
tcsh617-6.17-7.el5.ia64.rpm | SHA-256: 93017aa3b51ba2be09b7d024fc7868682e467d3044529b4646db46888b9b69a4 |
tcsh617-debuginfo-6.17-7.el5.ia64.rpm | SHA-256: 20ba50705651b716050173ad6cbbefb5825baf0c1d5e774826565957a026dd34 |
i386 | |
tcsh617-6.17-7.el5.i386.rpm | SHA-256: 8ea74015a90924a17d5405a4b3a8f017dd9773f3004b8fb7c583461c64d12076 |
tcsh617-debuginfo-6.17-7.el5.i386.rpm | SHA-256: 62f08512643c946bb67793e10e8bb1be3a175c6bcb6a99429d23bcd5bae08995 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
tcsh617-6.17-7.el5.src.rpm | SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0 |
x86_64 | |
tcsh617-6.17-7.el5.x86_64.rpm | SHA-256: c1aaeafa3d3dae817d2fa3e37f91f6cec49295801273971e4463722bb587f475 |
tcsh617-debuginfo-6.17-7.el5.x86_64.rpm | SHA-256: 458c60bfe40289182fa2e9d71ffc1b0aa0e7015692ce5fe6c9656c529a63aabc |
i386 | |
tcsh617-6.17-7.el5.i386.rpm | SHA-256: 8ea74015a90924a17d5405a4b3a8f017dd9773f3004b8fb7c583461c64d12076 |
tcsh617-debuginfo-6.17-7.el5.i386.rpm | SHA-256: 62f08512643c946bb67793e10e8bb1be3a175c6bcb6a99429d23bcd5bae08995 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
tcsh617-6.17-7.el5.src.rpm | SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0 |
x86_64 | |
tcsh617-6.17-7.el5.x86_64.rpm | SHA-256: c1aaeafa3d3dae817d2fa3e37f91f6cec49295801273971e4463722bb587f475 |
tcsh617-debuginfo-6.17-7.el5.x86_64.rpm | SHA-256: 458c60bfe40289182fa2e9d71ffc1b0aa0e7015692ce5fe6c9656c529a63aabc |
i386 | |
tcsh617-6.17-7.el5.i386.rpm | SHA-256: 8ea74015a90924a17d5405a4b3a8f017dd9773f3004b8fb7c583461c64d12076 |
tcsh617-debuginfo-6.17-7.el5.i386.rpm | SHA-256: 62f08512643c946bb67793e10e8bb1be3a175c6bcb6a99429d23bcd5bae08995 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
tcsh617-6.17-7.el5.src.rpm | SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0 |
s390x | |
tcsh617-6.17-7.el5.s390x.rpm | SHA-256: 092bf67ecf80bbeef694e4c82b64e1d4ae596b26f1da0d65615c9febe0b7b59f |
tcsh617-debuginfo-6.17-7.el5.s390x.rpm | SHA-256: 0ad1643584bab71d08acc82f9a22131037d4c8315011fbc1fbeb5f56865eadae |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
tcsh617-6.17-7.el5.src.rpm | SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0 |
ppc | |
tcsh617-6.17-7.el5.ppc.rpm | SHA-256: 22730a3b33ee59de483eb919cc6e59c410089bffb21edefacb870061242491d4 |
tcsh617-debuginfo-6.17-7.el5.ppc.rpm | SHA-256: dabc3d3a329b831e1fea2dc90ca4c885e0c94e4a953e7b45888e11b93ea760f6 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
tcsh617-6.17-7.el5.src.rpm | SHA-256: 67fda2963c55228c9ae2aed9649c460f8428c2bbf0a516730d3a1f5e0d00e5c0 |
x86_64 | |
tcsh617-6.17-7.el5.x86_64.rpm | SHA-256: c1aaeafa3d3dae817d2fa3e37f91f6cec49295801273971e4463722bb587f475 |
tcsh617-debuginfo-6.17-7.el5.x86_64.rpm | SHA-256: 458c60bfe40289182fa2e9d71ffc1b0aa0e7015692ce5fe6c9656c529a63aabc |
i386 | |
tcsh617-6.17-7.el5.i386.rpm | SHA-256: 8ea74015a90924a17d5405a4b3a8f017dd9773f3004b8fb7c583461c64d12076 |
tcsh617-debuginfo-6.17-7.el5.i386.rpm | SHA-256: 62f08512643c946bb67793e10e8bb1be3a175c6bcb6a99429d23bcd5bae08995 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.