- Issued:
- 2013-09-30
- Updated:
- 2013-09-30
RHBA-2013:1351 - Bug Fix Advisory
Synopsis
ksh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ksh packages that fix several bugs are now available for Red Hat
Enterprise Linux 5.
Description
KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which is
backward-compatible with the Bourne shell (Bash) and includes many features of
the C shell. The most recent version is KSH-93. KornShell complies with the
POSIX.2 standard (IEEE Std 1003.2-1992).
This update fixes the following bugs:
- Due to a bug in the ksh package, command substitutions containing the pipe
("|") character returned incorrect return codes. This bug has been fixed, and
the pipe character can now be used inside command substitutions without
complications. (BZ#892206)
- Previously, the ksh SIGTSTP signal handler could trigger another SIGTSTP
signal. Consequently, ksh would enter an infinite loop. This updated version
fixes the SIGTSTP signal processing and ksh now handles this signal without
problems. (BZ#910923)
- In certain cases, ksh did not execute command substitution inside of "here"
documents. Consequently, some content of a here document could be missing. With
this update, the command substitution for here documents has been fixed. As a
result, here documents include data from command substitutions as expected.
(BZ#912443)
- Previously, when using arrays inside of ksh functions, memory leaks occurred.
This bug has been fixed, and memory leaks no longer occur in the described
scenario. (BZ#921138)
- Previously, ksh did not resize the file descriptor list every time it was
necessary. Consequently, a memory corruption could occur when a large amount of
file descriptors were used. With this update, ksh has been modified to resize
the file descriptor list every time it is needed. As a result, memory corruption
no longer occurs in the described scenario. (BZ#958195)
- Previously, ksh did not prevent modifications of variables of the read-only
type. As a consequence, ksh terminated unexpectedly with a segmentation fault
when such a variable had been modified. With this update, modification of
read-only variables are not allowed, and ksh prints an error message in this
scenario. (BZ#972732)
Users of ksh are advised to upgrade to these updated packages, which fix these
bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 892206 - Using a pipe in a command substitution triggers wrong return codes
- BZ - 984944 - cppcheck found new leak in ksh
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ksh-20100621-18.el5.src.rpm | SHA-256: 13fe5f85133cad63c7ccf608cb735fe6a632a176e844a1a8f0aef2c169ea142e |
x86_64 | |
ksh-20100621-18.el5.x86_64.rpm | SHA-256: ce7ef8011cb48aea8b3a08413f1e7d7e586a05bbd5bcd5ff1bc4a9a858bad0ad |
ksh-debuginfo-20100621-18.el5.x86_64.rpm | SHA-256: fcffc265491e5ee791292b6aed12ab8c6a0a42e05b32ea4639cbdaadd42191b4 |
ia64 | |
ksh-20100621-18.el5.ia64.rpm | SHA-256: 0701a5e30d08556972e8f5d97ccd02ca81e9e0df076738c51707e4768ef56589 |
ksh-debuginfo-20100621-18.el5.ia64.rpm | SHA-256: 40e748a735a7d17aa6d4e4e464ddf3c867f665ccc1a7695b4b59e1b80de958f5 |
i386 | |
ksh-20100621-18.el5.i386.rpm | SHA-256: cfe1df80c78d8bf7e8396860e17394fc2f7fb72a6bfe206e89f067123b95ddd8 |
ksh-debuginfo-20100621-18.el5.i386.rpm | SHA-256: bb9115227af4b12426334667d715744f449806fe7e9809f0512c5cd01372e924 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ksh-20100621-18.el5.src.rpm | SHA-256: 13fe5f85133cad63c7ccf608cb735fe6a632a176e844a1a8f0aef2c169ea142e |
x86_64 | |
ksh-20100621-18.el5.x86_64.rpm | SHA-256: ce7ef8011cb48aea8b3a08413f1e7d7e586a05bbd5bcd5ff1bc4a9a858bad0ad |
ksh-debuginfo-20100621-18.el5.x86_64.rpm | SHA-256: fcffc265491e5ee791292b6aed12ab8c6a0a42e05b32ea4639cbdaadd42191b4 |
i386 | |
ksh-20100621-18.el5.i386.rpm | SHA-256: cfe1df80c78d8bf7e8396860e17394fc2f7fb72a6bfe206e89f067123b95ddd8 |
ksh-debuginfo-20100621-18.el5.i386.rpm | SHA-256: bb9115227af4b12426334667d715744f449806fe7e9809f0512c5cd01372e924 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ksh-20100621-18.el5.src.rpm | SHA-256: 13fe5f85133cad63c7ccf608cb735fe6a632a176e844a1a8f0aef2c169ea142e |
s390x | |
ksh-20100621-18.el5.s390x.rpm | SHA-256: 5dba33f47ae366b53b3529809b379a36b5e09fb99649a503020294bb2bb7a6a1 |
ksh-debuginfo-20100621-18.el5.s390x.rpm | SHA-256: f3d3cf53a90c3e9e205ebc6b69ca6e885d3a384a62291b6aa3f0d4eb87f06c0b |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ksh-20100621-18.el5.src.rpm | SHA-256: 13fe5f85133cad63c7ccf608cb735fe6a632a176e844a1a8f0aef2c169ea142e |
ppc | |
ksh-20100621-18.el5.ppc.rpm | SHA-256: 5dafcca84fb43ac82e340f9fa835cf131a760205cc4e8a6ea041b8ad48a704e8 |
ksh-debuginfo-20100621-18.el5.ppc.rpm | SHA-256: e820c572e643f6b424c7390dcf639b5a52ca32d2b1f766ca61a876a27ce0d528 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ksh-20100621-18.el5.src.rpm | SHA-256: 13fe5f85133cad63c7ccf608cb735fe6a632a176e844a1a8f0aef2c169ea142e |
x86_64 | |
ksh-20100621-18.el5.x86_64.rpm | SHA-256: ce7ef8011cb48aea8b3a08413f1e7d7e586a05bbd5bcd5ff1bc4a9a858bad0ad |
ksh-debuginfo-20100621-18.el5.x86_64.rpm | SHA-256: fcffc265491e5ee791292b6aed12ab8c6a0a42e05b32ea4639cbdaadd42191b4 |
i386 | |
ksh-20100621-18.el5.i386.rpm | SHA-256: cfe1df80c78d8bf7e8396860e17394fc2f7fb72a6bfe206e89f067123b95ddd8 |
ksh-debuginfo-20100621-18.el5.i386.rpm | SHA-256: bb9115227af4b12426334667d715744f449806fe7e9809f0512c5cd01372e924 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.