Skip to navigation

Bug Fix Advisory ksh bug fix and enhancement update

Advisory: RHBA-2012:0159-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

An updated ksh package that fixes multiple bugs and adds one enhancement is now
available for Red Hat Enterprise Linux 5.

KSH-93 is the most recent version of the KornShell by David Korn of AT&T Bell
Laboratories. KornShell is a shell programming language which is also compatible
with sh, the original Bourne Shell.

This updated ksh package includes numerous bug fixes and one enhancement. Space
precludes documenting all of these changes in this advisory. Users are directed
to the Red Hat Enterprise Linux 5.8 Technical Notes for information on the most
significant of these changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.8_Technical_Notes/ksh.html#RHBA-2012-0159

All users of ksh are advised to upgrade to this updated package, which fixes
these bugs and adds this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ksh-20100621-5.el5.src.rpm
File outdated by:  RHBA-2014:0317
    MD5: 2c43aa0c75e12d89ab31a15317e1b51e
SHA-256: 3b012df8358ad1b424ce061272fac7c7cf0c9ae7cddd1db7602a3976c8f3dc4b
 
IA-32:
ksh-20100621-5.el5.i386.rpm
File outdated by:  RHBA-2014:0317
    MD5: f4a36cf9d2668d4fb3d5ea755fd29b90
SHA-256: 4067af2008a56195da134083deb862523a5ce55bf13db204315c3ae71dac0e99
 
x86_64:
ksh-20100621-5.el5.x86_64.rpm
File outdated by:  RHBA-2014:0317
    MD5: 4a3bdf58d32093d32d3b226a6e9cf858
SHA-256: d8a57c2bf9306e79955a8cf2e74c859ae3bb1c814412510ab5be1a07fb6ba90c
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ksh-20100621-5.el5.src.rpm
File outdated by:  RHBA-2014:0317
    MD5: 2c43aa0c75e12d89ab31a15317e1b51e
SHA-256: 3b012df8358ad1b424ce061272fac7c7cf0c9ae7cddd1db7602a3976c8f3dc4b
 
IA-32:
ksh-20100621-5.el5.i386.rpm
File outdated by:  RHBA-2014:0317
    MD5: f4a36cf9d2668d4fb3d5ea755fd29b90
SHA-256: 4067af2008a56195da134083deb862523a5ce55bf13db204315c3ae71dac0e99
 
IA-64:
ksh-20100621-5.el5.ia64.rpm
File outdated by:  RHBA-2014:0317
    MD5: 6a4625bfe6c03eedc471908b897a03b3
SHA-256: b663e23af2e9cdc87eb90a6da257a05426568d9a77a08a444826f728ba19c308
 
PPC:
ksh-20100621-5.el5.ppc.rpm
File outdated by:  RHBA-2014:0317
    MD5: a39cdfc4d54d0f81e6c5c736e6f49b7c
SHA-256: d3b45b0ce5f0a52e0745191ec4c1aa3a0ef6761040081e993dfdc2bfb8df7e05
 
s390x:
ksh-20100621-5.el5.s390x.rpm
File outdated by:  RHBA-2014:0317
    MD5: 7c7192ed2fec7582ab669a482aa227e6
SHA-256: bb1312d72d17f402a85bbf916d5da39ba04316607147e8ddae624f772638dfea
 
x86_64:
ksh-20100621-5.el5.x86_64.rpm
File outdated by:  RHBA-2014:0317
    MD5: 4a3bdf58d32093d32d3b226a6e9cf858
SHA-256: d8a57c2bf9306e79955a8cf2e74c859ae3bb1c814412510ab5be1a07fb6ba90c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

573936 - [PATCH] read in a ksh script in utf-8 locale does not restore tty settings
584704 - Return of a command substitution from within another command substitution causes stdin of coprocess to be closed in a ksh script
586923 - ksh memory leak significantly slows the execution of shell scripts
587127 - whence -q broken
615284 - wrong redirections with SIGPIPE traps
616853 - ksh crashes
640379 - pipefail option causes intermittent failure of 'ls|! grep'
642508 - ksh doesn't close the file including the function definition
644128 - problem with here-doc in function called from here-doc
647524 - completion after an environment variable results in a "bad substitution" error
650998 - The dot command may misdirect output
659459 - In ksh scripts, files may be created but then fail to be immediately opened.
683722 - ksh crashes when IFS is unset inside a function
691850 - misprocessing of invalid PID argument for ksh built-in kill
699641 - KSH default path missing 'cwd' /bin:/usr/bin missing colon at the end
709774 - ksh handling variable assignment with the use of multiple pipes and different variable assignment mechanisms
726199 - wait fails on pid of co-process
727891 - ksh crashes when IFS is unset inside a function - PART 2
743302 - ksh script never comes back
747249 - Dereference of uninitialized value (ksh)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/