Updated tcsh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.5 Extended Update Support.

The tcsh packages contain an enhanced and compatible version of the C shell(csh), which is a command language interpreter, and can be used as aninteractive login shell, as well as a shell script command processor.This update fixes the following bug:* Previously, the background process was able to finish so quickly that thesubsequent execution of the “wait” built-in command, due to its bug, was not yetready to handle finishing background processes. As a consequence, starting acommand in the background followed by an immediate call to “wait” built-in couldlead to the tcsh process becoming unresponsive. With this update, the “wait”built-in safely traces all the ending background processes, and the tcsh shellthus no longer hangs. (BZ#1186323)All users of tcsh are advised to upgrade to these updated packages, whichfix this bug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
tcsh-6.17-25.el6_5.src.rpm
    MD5: 83c7e3df9005b08826d1f612f60a8fd1SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b
 
x86_64:
tcsh-6.17-25.el6_5.x86_64.rpm
    MD5: 0246f5c3994fa1c9d4360671e2b76b3bSHA-256: 7ff8297615c538af16062cc6867308d9248ab06cef14170b6065f5d5a22e1079
tcsh-debuginfo-6.17-25.el6_5.x86_64.rpm
    MD5: 10cabaf9e0d9004678fcf2b50ccb1976SHA-256: 9945612ffb969cef363fdf406c5047ea206c9d98c5f3ab66720521a336f779fc
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
tcsh-6.17-25.el6_5.src.rpm
    MD5: 83c7e3df9005b08826d1f612f60a8fd1SHA-256: 8dede90accab4bde5c46a7e92f46888c1bb7b211e91ae1b05193c868998a210b
 
IA-32:
tcsh-6.17-25.el6_5.i686.rpm
    MD5: 7dd8d65880c720c5ff05a37f4659b394SHA-256: ecd275c2e3af962d5e5cca840454f7e3dca185e7d5503a3c6c2eed05a247558f
tcsh-debuginfo-6.17-25.el6_5.i686.rpm
    MD5: 7d8e67271d2ed99aa4a2fd660e35bddbSHA-256: a8352cb1dbec824412421c4abbf1db923b8dae2bc7885e3bbdab85d367861bab
 
PPC:
tcsh-6.17-25.el6_5.ppc64.rpm
    MD5: 028c72d295c9b3fe59efef5049d320f6SHA-256: 8495a0b8452d949642bfac2640e25052851af3f12cf37104b9c24817433757b3
tcsh-debuginfo-6.17-25.el6_5.ppc64.rpm
    MD5: dc929ca894665b0c37564cfac5acf2c6SHA-256: 5d2e4b4c9800e1ad7d76cd2e3e70cb2f06b57e79a6eda7e9e23345fb037558a1
 
s390x:
tcsh-6.17-25.el6_5.s390x.rpm
    MD5: 43c4d59c6a96ba2253b395d78254d7c2SHA-256: ca2c2216220bd755f626bb2b183b2ae0e6f93bbae4a5390d3b5048bee09e950a
tcsh-debuginfo-6.17-25.el6_5.s390x.rpm
    MD5: 860e9ff5d475040fe74f3ee3956d2444SHA-256: f072221a81212cf103601f9b560297ceac2eff1b076d2d342c769c59cc647f01
 
x86_64:
tcsh-6.17-25.el6_5.x86_64.rpm
    MD5: 0246f5c3994fa1c9d4360671e2b76b3bSHA-256: 7ff8297615c538af16062cc6867308d9248ab06cef14170b6065f5d5a22e1079
tcsh-debuginfo-6.17-25.el6_5.x86_64.rpm
    MD5: 10cabaf9e0d9004678fcf2b50ccb1976SHA-256: 9945612ffb969cef363fdf406c5047ea206c9d98c5f3ab66720521a336f779fc
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply