Updated tcsh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.4 Extended Update Support.

The tcsh packages contain an enhanced and compatible version of the C shell(csh), which is a command language interpreter, and can be used as aninteractive login shell, as well as a shell script command processor.This update fixes the following bug:* Previously, the background process was able to finish so quickly that thesubsequent execution of the “wait” built-in command, due to its bug, was not yetready to handle finishing background processes. As a consequence, starting acommand in the background followed by an immediate call to “wait” built-in couldlead to the tcsh process becoming unresponsive. With this update, the “wait”built-in safely traces all the ending background processes, and the tcsh shellthus no longer hangs. (BZ#1186322)Users of tcsh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
tcsh-6.17-25.el6_4.src.rpm
    MD5: 31e1f39e28c3e5a593f5b18cb4443c8aSHA-256: 3daf7e03b5c5d211307d160f41d5257aa775ee2b7d05b875810c68d9ea9b5fe1
 
x86_64:
tcsh-6.17-25.el6_4.x86_64.rpm
    MD5: 9dfd70783519384bf7800284c1b57779SHA-256: d973a0bbff83da8266f5e5ce2f4778b62c1a13f5295161f7e13d84d77c5f747d
tcsh-debuginfo-6.17-25.el6_4.x86_64.rpm
    MD5: aac34400c1235e61d57cb099cceb734aSHA-256: e3f6890fd484ed3b5c8414f7f5c829a51810f62040274017a1dab7eda7c48939
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
tcsh-6.17-25.el6_4.src.rpm
    MD5: 31e1f39e28c3e5a593f5b18cb4443c8aSHA-256: 3daf7e03b5c5d211307d160f41d5257aa775ee2b7d05b875810c68d9ea9b5fe1
 
IA-32:
tcsh-6.17-25.el6_4.i686.rpm
    MD5: 311f4b349f01cae6c9bf2f66b0262dd1SHA-256: e53bbae21a094d1502fc18344d55197d9417595a1f3125636eacee4b95f6e30a
tcsh-debuginfo-6.17-25.el6_4.i686.rpm
    MD5: 3fe72910108ca59f087e9b17353d6c19SHA-256: 4ce5cb0a6f2965a030926fa8e493e69750c99a650d98d71bf1147d6e4ef2b698
 
PPC:
tcsh-6.17-25.el6_4.ppc64.rpm
    MD5: 92e59c5615719f945553e11e84dcb56aSHA-256: a0b93dc76a79769a44761445a9db259ff516508b75868116bdcf2e76312cbb77
tcsh-debuginfo-6.17-25.el6_4.ppc64.rpm
    MD5: 011ba2d54da2ec9b66685793d5f906a1SHA-256: 7f9df1893cbb2f78df6e0d82138738a0cdf2e5d4e129f27f50501630ac5be7d1
 
s390x:
tcsh-6.17-25.el6_4.s390x.rpm
    MD5: 5f56be9569e90284fb1b9935e05963a2SHA-256: 4bc51f5195682432069f8b8a1ca18e907da99e83caaa80cd79d5cca8d6188928
tcsh-debuginfo-6.17-25.el6_4.s390x.rpm
    MD5: 45739a79d1773474075a00ecd73609f0SHA-256: 11d9d694b922638ae35b5eee637049e1d8b19295e2f686f527c967d3b7d1cdd6
 
x86_64:
tcsh-6.17-25.el6_4.x86_64.rpm
    MD5: 9dfd70783519384bf7800284c1b57779SHA-256: d973a0bbff83da8266f5e5ce2f4778b62c1a13f5295161f7e13d84d77c5f747d
tcsh-debuginfo-6.17-25.el6_4.x86_64.rpm
    MD5: aac34400c1235e61d57cb099cceb734aSHA-256: e3f6890fd484ed3b5c8414f7f5c829a51810f62040274017a1dab7eda7c48939
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply