Updated tcsh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

The tcsh packages contain an enhanced and compatible version of the C shell(csh), which is a command language interpreter, and can be used as aninteractive login shell, as well as a shell script command processor.This update fixes the following bug:* Previously, the background process was able to finish so quickly that thesubsequent execution of the “wait” built-in command, due to its bug, was not yetready to handle finishing background processes. As a consequence, starting acommand in the background followed by an immediate call to “wait” built-in couldlead to the tcsh process becoming unresponsive. With this update, the “wait”built-in safely traces all the ending background processes, and the tcsh shellthus no longer hangs. (BZ#1186325)All users of tcsh are advised to upgrade to these updated packages, whichfix this bug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
tcsh-6.17-25.el6_6.src.rpm
    MD5: 5ac0a25e8eaaa833f8ab975ca110318aSHA-256: 59778d6aa906bd9708e297c17cea4a558fd546902b65a9773b26fba4bc68cc17
 
IA-32:
tcsh-6.17-25.el6_6.i686.rpm
    MD5: 011349c5fa1725b3810e34bbc1768360SHA-256: 8a963fd51e68c0c04aa3efd1c920b0df2d1edecb2f7323a6c40bf3845eb93f96
tcsh-debuginfo-6.17-25.el6_6.i686.rpm
    MD5: 9454c4c83b5615751578d6ab8ec0446eSHA-256: 332bf9fb9421f71614a87f651b276e3420e5ecbce2f3c46b9d7ad4440d3fa3f7
 
x86_64:
tcsh-6.17-25.el6_6.x86_64.rpm
    MD5: 82e611a0842524ea8a1726d476329711SHA-256: 891eeae2c86d6d89040304e368c9620902fb4bcac6c9b3d46bcec76bff76cbaa
tcsh-debuginfo-6.17-25.el6_6.x86_64.rpm
    MD5: 12c89a73a0fce2569042c70af5be47aeSHA-256: a568fc616c2547461fe0db511d7d08a74b9d075d80496d0e189d0c6f28e8a44e
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
tcsh-6.17-25.el6_6.src.rpm
    MD5: 5ac0a25e8eaaa833f8ab975ca110318aSHA-256: 59778d6aa906bd9708e297c17cea4a558fd546902b65a9773b26fba4bc68cc17
 
x86_64:
tcsh-6.17-25.el6_6.x86_64.rpm
    MD5: 82e611a0842524ea8a1726d476329711SHA-256: 891eeae2c86d6d89040304e368c9620902fb4bcac6c9b3d46bcec76bff76cbaa
tcsh-debuginfo-6.17-25.el6_6.x86_64.rpm
    MD5: 12c89a73a0fce2569042c70af5be47aeSHA-256: a568fc616c2547461fe0db511d7d08a74b9d075d80496d0e189d0c6f28e8a44e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
tcsh-6.17-25.el6_6.src.rpm
    MD5: 5ac0a25e8eaaa833f8ab975ca110318aSHA-256: 59778d6aa906bd9708e297c17cea4a558fd546902b65a9773b26fba4bc68cc17
 
IA-32:
tcsh-6.17-25.el6_6.i686.rpm
    MD5: 011349c5fa1725b3810e34bbc1768360SHA-256: 8a963fd51e68c0c04aa3efd1c920b0df2d1edecb2f7323a6c40bf3845eb93f96
tcsh-debuginfo-6.17-25.el6_6.i686.rpm
    MD5: 9454c4c83b5615751578d6ab8ec0446eSHA-256: 332bf9fb9421f71614a87f651b276e3420e5ecbce2f3c46b9d7ad4440d3fa3f7
 
PPC:
tcsh-6.17-25.el6_6.ppc64.rpm
    MD5: 795c5e5aef9b18a70723f5958247fc40SHA-256: d4a4362ae13e1edff09831585057de9a09c6818baab8f3936c66566b6118067b
tcsh-debuginfo-6.17-25.el6_6.ppc64.rpm
    MD5: 31077b1b8b59e192ad2ea389e4d305a6SHA-256: a364f761f1dec0d1115a0957b7986211fdaecd20623c53c3fd64ecefe66395cf
 
s390x:
tcsh-6.17-25.el6_6.s390x.rpm
    MD5: c755ba33207eef76cbc01251e3854210SHA-256: f1e391e6a3b84bd3ba795377d1dbf430c75e1aeb448785f25cf1490649d7b95e
tcsh-debuginfo-6.17-25.el6_6.s390x.rpm
    MD5: 282fa1abc002c6570024d709cad6c6c8SHA-256: 1b7edae1954bf3ffdca9d1f91a0f127f30f0c64a881155be36fc5c49b3edba63
 
x86_64:
tcsh-6.17-25.el6_6.x86_64.rpm
    MD5: 82e611a0842524ea8a1726d476329711SHA-256: 891eeae2c86d6d89040304e368c9620902fb4bcac6c9b3d46bcec76bff76cbaa
tcsh-debuginfo-6.17-25.el6_6.x86_64.rpm
    MD5: 12c89a73a0fce2569042c70af5be47aeSHA-256: a568fc616c2547461fe0db511d7d08a74b9d075d80496d0e189d0c6f28e8a44e
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
tcsh-6.17-25.el6_6.src.rpm
    MD5: 5ac0a25e8eaaa833f8ab975ca110318aSHA-256: 59778d6aa906bd9708e297c17cea4a558fd546902b65a9773b26fba4bc68cc17
 
IA-32:
tcsh-6.17-25.el6_6.i686.rpm
    MD5: 011349c5fa1725b3810e34bbc1768360SHA-256: 8a963fd51e68c0c04aa3efd1c920b0df2d1edecb2f7323a6c40bf3845eb93f96
tcsh-debuginfo-6.17-25.el6_6.i686.rpm
    MD5: 9454c4c83b5615751578d6ab8ec0446eSHA-256: 332bf9fb9421f71614a87f651b276e3420e5ecbce2f3c46b9d7ad4440d3fa3f7
 
PPC:
tcsh-6.17-25.el6_6.ppc64.rpm
    MD5: 795c5e5aef9b18a70723f5958247fc40SHA-256: d4a4362ae13e1edff09831585057de9a09c6818baab8f3936c66566b6118067b
tcsh-debuginfo-6.17-25.el6_6.ppc64.rpm
    MD5: 31077b1b8b59e192ad2ea389e4d305a6SHA-256: a364f761f1dec0d1115a0957b7986211fdaecd20623c53c3fd64ecefe66395cf
 
s390x:
tcsh-6.17-25.el6_6.s390x.rpm
    MD5: c755ba33207eef76cbc01251e3854210SHA-256: f1e391e6a3b84bd3ba795377d1dbf430c75e1aeb448785f25cf1490649d7b95e
tcsh-debuginfo-6.17-25.el6_6.s390x.rpm
    MD5: 282fa1abc002c6570024d709cad6c6c8SHA-256: 1b7edae1954bf3ffdca9d1f91a0f127f30f0c64a881155be36fc5c49b3edba63
 
x86_64:
tcsh-6.17-25.el6_6.x86_64.rpm
    MD5: 82e611a0842524ea8a1726d476329711SHA-256: 891eeae2c86d6d89040304e368c9620902fb4bcac6c9b3d46bcec76bff76cbaa
tcsh-debuginfo-6.17-25.el6_6.x86_64.rpm
    MD5: 12c89a73a0fce2569042c70af5be47aeSHA-256: a568fc616c2547461fe0db511d7d08a74b9d075d80496d0e189d0c6f28e8a44e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
tcsh-6.17-25.el6_6.src.rpm
    MD5: 5ac0a25e8eaaa833f8ab975ca110318aSHA-256: 59778d6aa906bd9708e297c17cea4a558fd546902b65a9773b26fba4bc68cc17
 
IA-32:
tcsh-6.17-25.el6_6.i686.rpm
    MD5: 011349c5fa1725b3810e34bbc1768360SHA-256: 8a963fd51e68c0c04aa3efd1c920b0df2d1edecb2f7323a6c40bf3845eb93f96
tcsh-debuginfo-6.17-25.el6_6.i686.rpm
    MD5: 9454c4c83b5615751578d6ab8ec0446eSHA-256: 332bf9fb9421f71614a87f651b276e3420e5ecbce2f3c46b9d7ad4440d3fa3f7
 
x86_64:
tcsh-6.17-25.el6_6.x86_64.rpm
    MD5: 82e611a0842524ea8a1726d476329711SHA-256: 891eeae2c86d6d89040304e368c9620902fb4bcac6c9b3d46bcec76bff76cbaa
tcsh-debuginfo-6.17-25.el6_6.x86_64.rpm
    MD5: 12c89a73a0fce2569042c70af5be47aeSHA-256: a568fc616c2547461fe0db511d7d08a74b9d075d80496d0e189d0c6f28e8a44e
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply