- Issued:
- 2012-06-20
- Updated:
- 2012-06-20
RHBA-2012:0952 - Bug Fix Advisory
Synopsis
ksh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ksh packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 6.
Description
KSH-93 is the most recent version of the KornShell by David Korn of AT&T Bell
Laboratories. KornShell is a shell programming language which is also compatible
with sh, the original Bourne Shell.
This update fixes the following bugs:
- Previously, ksh sometimes did not restore terminal settings after read timeout
when operating in a multibyte environment. This could cause the terminal to no
longer echo input characters. This updates applies a patch ensuring that the
terminal is restored properly after the timeout and the user's input is now
echoed as expected. (BZ#577223)
- When exiting a subshell after a command substitution, ksh could prematurely
exit without any error message. With this update, ksh no longer terminates under
these circumstances and all subsequent commands are processed correctly.
(BZ#742930)
- Previously, ksh did not prevent modifications of variables of the read-only
type. As a consequence, ksh terminated unexpectedly with a segmentation fault
when such a variable was modified. With this update, modification of read-only
variables are not allowed, and ksh prints an error message in this scenario.
(BZ#743840)
- Previously, ksh did not close certain file descriptors prior to execution.
This could lead to a file descriptor leak, and certain applications could
consequently report error messages. With this update, file descriptors are
marked to be closed on execution if appropriate, so file descriptor leaks no
longer occur. (BZ#781498)
- In certain cases, ksh unnecessarily called the vfork() function. An extra
process was created, and it could be difficult to determine how many instances
of a script were running. A patch has been applied to address this problem, and
extra processes are no longer created if not required. (BZ#781976)
- Previously, ksh could incorrectly seek in the input stream. This could lead to
data corruption in the here-document section of a script. This update corrects
the seek behavior, so the data no longer gets corrupted in this scenario.
(BZ#786787)
- Previously, ksh did not allocate the correct amount of memory for its data
structures containing information about file descriptors. When running a task
that used file descriptors extensively, ksh terminated unexpectedly with a
segmentation fault. With this update, the proper amount of memory is allocated,
and ksh no longer crashes if file descriptors are used extensively. (BZ#798868)
- Previously, ksh did not expand the tilde (~) character properly. For example,
characters in the tilde prefix were not treated as a login name but as a part of
the path and the "No such file or directory" message was displayed. The
underlying source code has been modified and tilde expansion now works as
expected in such a scenario. (BZ#800684)
All users of ksh are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
- BZ - 743840 - ksh segfaults on oop code
- BZ - 781498 - ksh shell forking during variable assignment fails to close the file descriptors in the child process prior to exec
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
x86_64 | |
ksh-20100621-16.el6.x86_64.rpm | SHA-256: 4746a139221d6c457223f947a683bf97b1cc1b204c232136383a5b351515f367 |
ksh-debuginfo-20100621-16.el6.x86_64.rpm | SHA-256: d4cd07e9865075236a6a8a7940063ada19c129248470dda52421a3640dfee1e0 |
i386 | |
ksh-20100621-16.el6.i686.rpm | SHA-256: 8dc6e144b449c3bd38cde7d675a7e1f4cfeda963d717dcfa43d26f1125df61c0 |
ksh-debuginfo-20100621-16.el6.i686.rpm | SHA-256: 6e13ff034abf3836fd2fc1c97d4394a5c3194338739716eb18644591df78d257 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
x86_64 | |
ksh-20100621-16.el6.x86_64.rpm | SHA-256: 4746a139221d6c457223f947a683bf97b1cc1b204c232136383a5b351515f367 |
ksh-debuginfo-20100621-16.el6.x86_64.rpm | SHA-256: d4cd07e9865075236a6a8a7940063ada19c129248470dda52421a3640dfee1e0 |
i386 | |
ksh-20100621-16.el6.i686.rpm | SHA-256: 8dc6e144b449c3bd38cde7d675a7e1f4cfeda963d717dcfa43d26f1125df61c0 |
ksh-debuginfo-20100621-16.el6.i686.rpm | SHA-256: 6e13ff034abf3836fd2fc1c97d4394a5c3194338739716eb18644591df78d257 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
x86_64 | |
ksh-20100621-16.el6.x86_64.rpm | SHA-256: 4746a139221d6c457223f947a683bf97b1cc1b204c232136383a5b351515f367 |
ksh-debuginfo-20100621-16.el6.x86_64.rpm | SHA-256: d4cd07e9865075236a6a8a7940063ada19c129248470dda52421a3640dfee1e0 |
i386 | |
ksh-20100621-16.el6.i686.rpm | SHA-256: 8dc6e144b449c3bd38cde7d675a7e1f4cfeda963d717dcfa43d26f1125df61c0 |
ksh-debuginfo-20100621-16.el6.i686.rpm | SHA-256: 6e13ff034abf3836fd2fc1c97d4394a5c3194338739716eb18644591df78d257 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
x86_64 | |
ksh-20100621-16.el6.x86_64.rpm | SHA-256: 4746a139221d6c457223f947a683bf97b1cc1b204c232136383a5b351515f367 |
ksh-debuginfo-20100621-16.el6.x86_64.rpm | SHA-256: d4cd07e9865075236a6a8a7940063ada19c129248470dda52421a3640dfee1e0 |
i386 | |
ksh-20100621-16.el6.i686.rpm | SHA-256: 8dc6e144b449c3bd38cde7d675a7e1f4cfeda963d717dcfa43d26f1125df61c0 |
ksh-debuginfo-20100621-16.el6.i686.rpm | SHA-256: 6e13ff034abf3836fd2fc1c97d4394a5c3194338739716eb18644591df78d257 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
s390x | |
ksh-20100621-16.el6.s390x.rpm | SHA-256: e8ea8cf03defbd40fea4c658e222dc796ea936ecdebd9272b44e6f7d8aba4732 |
ksh-debuginfo-20100621-16.el6.s390x.rpm | SHA-256: bf3fcdbbbfb20e9dd7813e951fcabdd8f85a433afd77900d12a97aa0d0cd8337 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
ppc64 | |
ksh-20100621-16.el6.ppc64.rpm | SHA-256: 0f887bf4c091947b0fe77397f215810d021059e45467701a7e4bfa3031ff1de2 |
ksh-debuginfo-20100621-16.el6.ppc64.rpm | SHA-256: 015647ef86adb8b586388ff51c72f8515601a46fc25d8620b5adac7ab46a2dbd |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
x86_64 | |
ksh-20100621-16.el6.x86_64.rpm | SHA-256: 4746a139221d6c457223f947a683bf97b1cc1b204c232136383a5b351515f367 |
ksh-debuginfo-20100621-16.el6.x86_64.rpm | SHA-256: d4cd07e9865075236a6a8a7940063ada19c129248470dda52421a3640dfee1e0 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
x86_64 | |
ksh-20100621-16.el6.x86_64.rpm | SHA-256: 4746a139221d6c457223f947a683bf97b1cc1b204c232136383a5b351515f367 |
ksh-debuginfo-20100621-16.el6.x86_64.rpm | SHA-256: d4cd07e9865075236a6a8a7940063ada19c129248470dda52421a3640dfee1e0 |
i386 | |
ksh-20100621-16.el6.i686.rpm | SHA-256: 8dc6e144b449c3bd38cde7d675a7e1f4cfeda963d717dcfa43d26f1125df61c0 |
ksh-debuginfo-20100621-16.el6.i686.rpm | SHA-256: 6e13ff034abf3836fd2fc1c97d4394a5c3194338739716eb18644591df78d257 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
s390x | |
ksh-20100621-16.el6.s390x.rpm | SHA-256: e8ea8cf03defbd40fea4c658e222dc796ea936ecdebd9272b44e6f7d8aba4732 |
ksh-debuginfo-20100621-16.el6.s390x.rpm | SHA-256: bf3fcdbbbfb20e9dd7813e951fcabdd8f85a433afd77900d12a97aa0d0cd8337 |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
ksh-20100621-16.el6.src.rpm | SHA-256: 58c4e2d1d45b7db4964e5d6de241f9b3b1a1bf6c47901ac2938ed8db2efc773b |
x86_64 | |
ksh-20100621-16.el6.x86_64.rpm | SHA-256: 4746a139221d6c457223f947a683bf97b1cc1b204c232136383a5b351515f367 |
ksh-debuginfo-20100621-16.el6.x86_64.rpm | SHA-256: d4cd07e9865075236a6a8a7940063ada19c129248470dda52421a3640dfee1e0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.