- Issued:
- 2007-11-15
- Updated:
- 2007-11-15
RHBA-2007:0667 - Bug Fix Advisory
Synopsis
pdksh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated pdksh packages that fix several bugs are now available.
Description
The pdksh package contains PD-ksh, a clone of the Korn shell (ksh). The ksh
shell is a command interpreter intended for both interactive and shell
script use. Ksh's command language is a superset of the sh shell language.
The following bugs were addressed:
- pdksh did not recognize signals by name.
- pdksh died with sigsegv.
- pdksh in emacs edit mode improperly displayed multiline prompt.
Users should upgrade to these updated packages, which resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 186422 - Trashes stack and segfaults with test case
- BZ - 198734 - pdksh prompt skips to last newline in emacs mode
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
pdksh-5.2.14-30.6.src.rpm | SHA-256: 2fa3b0c9243ca8682e7845c1c1577e33a179db751682c020f2ee807b6c97af7b |
x86_64 | |
pdksh-5.2.14-30.6.x86_64.rpm | SHA-256: eb59183d12d5ae767e3a75277c94ee138f3824c8caeaf1db8b58f81420fa3006 |
pdksh-5.2.14-30.6.x86_64.rpm | SHA-256: eb59183d12d5ae767e3a75277c94ee138f3824c8caeaf1db8b58f81420fa3006 |
ia64 | |
pdksh-5.2.14-30.6.ia64.rpm | SHA-256: 601a202c7e5e3e002f82d748e4d413ce4d177faff949d5202001e3520897ae98 |
pdksh-5.2.14-30.6.ia64.rpm | SHA-256: 601a202c7e5e3e002f82d748e4d413ce4d177faff949d5202001e3520897ae98 |
i386 | |
pdksh-5.2.14-30.6.i386.rpm | SHA-256: 23b9efbafa06e8bc955229892ecb030345fd8b62aee7a7be4f161e38b4fa3695 |
pdksh-5.2.14-30.6.i386.rpm | SHA-256: 23b9efbafa06e8bc955229892ecb030345fd8b62aee7a7be4f161e38b4fa3695 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
pdksh-5.2.14-30.6.src.rpm | SHA-256: 2fa3b0c9243ca8682e7845c1c1577e33a179db751682c020f2ee807b6c97af7b |
x86_64 | |
pdksh-5.2.14-30.6.x86_64.rpm | SHA-256: eb59183d12d5ae767e3a75277c94ee138f3824c8caeaf1db8b58f81420fa3006 |
ia64 | |
pdksh-5.2.14-30.6.ia64.rpm | SHA-256: 601a202c7e5e3e002f82d748e4d413ce4d177faff949d5202001e3520897ae98 |
i386 | |
pdksh-5.2.14-30.6.i386.rpm | SHA-256: 23b9efbafa06e8bc955229892ecb030345fd8b62aee7a7be4f161e38b4fa3695 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
pdksh-5.2.14-30.6.src.rpm | SHA-256: 2fa3b0c9243ca8682e7845c1c1577e33a179db751682c020f2ee807b6c97af7b |
x86_64 | |
pdksh-5.2.14-30.6.x86_64.rpm | SHA-256: eb59183d12d5ae767e3a75277c94ee138f3824c8caeaf1db8b58f81420fa3006 |
i386 | |
pdksh-5.2.14-30.6.i386.rpm | SHA-256: 23b9efbafa06e8bc955229892ecb030345fd8b62aee7a7be4f161e38b4fa3695 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
pdksh-5.2.14-30.6.src.rpm | SHA-256: 2fa3b0c9243ca8682e7845c1c1577e33a179db751682c020f2ee807b6c97af7b |
s390x | |
pdksh-5.2.14-30.6.s390x.rpm | SHA-256: c22705a0a3748f2647400c41dbd5e3844dd831aa886e1c9551ddd54305cdd2cf |
s390 | |
pdksh-5.2.14-30.6.s390.rpm | SHA-256: 009adc8330b3ad47e5f1ff95377083c4c7b0bf2079988826c1d58c72e3e89b8b |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
pdksh-5.2.14-30.6.src.rpm | SHA-256: 2fa3b0c9243ca8682e7845c1c1577e33a179db751682c020f2ee807b6c97af7b |
ppc | |
pdksh-5.2.14-30.6.ppc.rpm | SHA-256: 47aa340e3ed9873db3dc491232d8feadf18b1dc3037853f4c041e0b238f447e2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.