- Issued:
- 2013-02-20
- Updated:
- 2013-02-20
RHBA-2013:0446 - Bug Fix Advisory
Synopsis
tcsh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated tcsh packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 6.
Description
The tcsh packages provide an enhanced and compatible version of the C shell
(csh) command language interpreter, which can be used as an interactive login
shell, as well as a shell script command processor.
This update fixes the following bugs:
- Prior to this update, the tcsh command language interpreter could run out of
memory because of random "sbrk()" failures in the internal "malloc()" function.
As a consequence, tcsh could abort with a segmentation fault. This update uses
"system malloc" instead and tcsh no longer aborts. (BZ#769157)
- Prior to this update, aliases were inserted into the history buffer when
saving the history in loops if the alias included a statement that did not work
in the loop. This update no longer allows to save the history in loops. Now,
only the first line of loops and the "if" statement are saved in the history.
Aliases now work as expected. (BZ#814069)
- Prior to this update, casting was removed when calling a function in the
history file locking patch. As a consequence, multibyte tests failed. This
update reverts the status before the patch and tests no longer fail. (BZ#821796)
- Prior to this update, the tcsh logic did not handle file sourcing as expected.
As a consequence, source commands failed when using a single-line "if"
statement. This update modifies the underlying code to handle source commands as
expected. (BZ#847102)
- Prior to this update, the SIGINT signal was not blocked when the tcsh command
language interpreter waited for the child process to finish. As a consequence,
tcsh could be aborted with the key combination Ctrl+c. This update blocks the
SIGINT signal and tcsh is no longer aborted. (BZ#884937)
All users of tcsh are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 821796 - Upstream multibyte tests are failing on i386 architecture
- BZ - 847102 - source command fails with single-line if-statement
- BZ - 884937 - tcsh scripts do not allow programs to run sigint handlers with Ctrl-C
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
x86_64 | |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
i386 | |
tcsh-6.17-24.el6.i686.rpm | SHA-256: 2ba6dac0ad8fa47dcb0d3a20b9eb41c3441cb4330fe86664d7de2fb122c6fdda |
tcsh-debuginfo-6.17-24.el6.i686.rpm | SHA-256: 9054de3d3a3eae3ecbb900d299a9f404167dc4993903c2227a456a95af0babd7 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
x86_64 | |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
i386 | |
tcsh-6.17-24.el6.i686.rpm | SHA-256: 2ba6dac0ad8fa47dcb0d3a20b9eb41c3441cb4330fe86664d7de2fb122c6fdda |
tcsh-debuginfo-6.17-24.el6.i686.rpm | SHA-256: 9054de3d3a3eae3ecbb900d299a9f404167dc4993903c2227a456a95af0babd7 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
x86_64 | |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
i386 | |
tcsh-6.17-24.el6.i686.rpm | SHA-256: 2ba6dac0ad8fa47dcb0d3a20b9eb41c3441cb4330fe86664d7de2fb122c6fdda |
tcsh-debuginfo-6.17-24.el6.i686.rpm | SHA-256: 9054de3d3a3eae3ecbb900d299a9f404167dc4993903c2227a456a95af0babd7 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
x86_64 | |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
i386 | |
tcsh-6.17-24.el6.i686.rpm | SHA-256: 2ba6dac0ad8fa47dcb0d3a20b9eb41c3441cb4330fe86664d7de2fb122c6fdda |
tcsh-debuginfo-6.17-24.el6.i686.rpm | SHA-256: 9054de3d3a3eae3ecbb900d299a9f404167dc4993903c2227a456a95af0babd7 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
s390x | |
tcsh-6.17-24.el6.s390x.rpm | SHA-256: 6c91d0bf808081119510c4c9cf0481c781a2cd67552e918432f93d634f750ad0 |
tcsh-debuginfo-6.17-24.el6.s390x.rpm | SHA-256: 2850f2ed4da9afc6f6099bbfb566b85258fd0f9587717e0767a81d8fea6fd544 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
ppc64 | |
tcsh-6.17-24.el6.ppc64.rpm | SHA-256: 7cf2477f38165d43b6af54141d80208437f7d5dc667bb5900b03ff9ce2a5eea4 |
tcsh-debuginfo-6.17-24.el6.ppc64.rpm | SHA-256: 359696fd8cfec6edb7c22f7889ae4fbb96a226a2609c942d838d5d7aacc1ce78 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
x86_64 | |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
x86_64 | |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
i386 | |
tcsh-6.17-24.el6.i686.rpm | SHA-256: 2ba6dac0ad8fa47dcb0d3a20b9eb41c3441cb4330fe86664d7de2fb122c6fdda |
tcsh-debuginfo-6.17-24.el6.i686.rpm | SHA-256: 9054de3d3a3eae3ecbb900d299a9f404167dc4993903c2227a456a95af0babd7 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
s390x | |
tcsh-6.17-24.el6.s390x.rpm | SHA-256: 6c91d0bf808081119510c4c9cf0481c781a2cd67552e918432f93d634f750ad0 |
tcsh-debuginfo-6.17-24.el6.s390x.rpm | SHA-256: 2850f2ed4da9afc6f6099bbfb566b85258fd0f9587717e0767a81d8fea6fd544 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
x86_64 | |
tcsh-6.17-24.el6.x86_64.rpm | SHA-256: 1b1df7881ac67b449c96d42dca56128d50e49f6e04d9797180c04ede44b169f4 |
tcsh-debuginfo-6.17-24.el6.x86_64.rpm | SHA-256: 1d4b8be17add32fa215d68b8c02786e872bfe0852225f908d016edf4fa5b89ef |
i386 | |
tcsh-6.17-24.el6.i686.rpm | SHA-256: 2ba6dac0ad8fa47dcb0d3a20b9eb41c3441cb4330fe86664d7de2fb122c6fdda |
tcsh-debuginfo-6.17-24.el6.i686.rpm | SHA-256: 9054de3d3a3eae3ecbb900d299a9f404167dc4993903c2227a456a95af0babd7 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
tcsh-6.17-24.el6.src.rpm | SHA-256: dcf9f5940f34678f743d537b851a7ba12431464f9c15ac1191c4bca8a05d0d85 |
s390x | |
tcsh-6.17-24.el6.s390x.rpm | SHA-256: 6c91d0bf808081119510c4c9cf0481c781a2cd67552e918432f93d634f750ad0 |
tcsh-debuginfo-6.17-24.el6.s390x.rpm | SHA-256: 2850f2ed4da9afc6f6099bbfb566b85258fd0f9587717e0767a81d8fea6fd544 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.