- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0058 - Bug Fix Advisory
Synopsis
ksh bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated ksh package that fixes various bugs is now available.
Description
KSH-93 is the most recent version of the KornShell by David Korn of AT&T
Bell Laboratories. KornShell is a shell programming language, which is
upwards-compatible with "sh" (the Bourne Shell).
This updated ksh package ugrades ksh to the more recent 2008-02-02 upstream
version (release ksh93s+) In addition, this updated ksh package includes
fixes for the following bugs:
- the support for handling miltibyte characters has been improved
- running "ksh -R" without an argument caused a segmentation fault. In this
updated package, ksh now checks for a valid argument. If no argument is
found, it returns "Usage: ksh -R requires [scriptname]". The usage of -R
option was clarified in the manual page as well
- referencing the "OPTIND" variable when it was unset caused a segmentation
fault. In this updated package, the Korn shell now returns null if the
"OPTIND" variable is referenced while unset.
- the ksh man page incorrectly indicated that a "-m" switch, which allowed
or disallowed the running of background jobs as separate processes, was
available. Allowing or disallowing background jobs to run as separate
processes is controlled by the "set" command within the Korn shell. This
updated package includes a corrected man page SYNOPSIS which no longer
lists the "-m" switch as an option outside the "set" command.
- after switching the editing mode with the command "set -o vi", and under
certain conditions related to the editing mode also being set or unset in
the user's "~/.profile" file, the ksh shell would segmentation fault. In
this updated package, switching the editing mode does not cause a
segmentation fault.
- the new package contains various bug fixes in ksh job control that might
have caused some scripts to fail, and might have caused ksh to shift its
parent process to the background on exiting.
All users of ksh are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 429488 - execute "ksh -R file", Segmentation Fault will occur
- BZ - 430955 - sr# 1796722 : ksh segaults on nget_optindex
- BZ - 459228 - option "-R filename" not clear
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ksh-20080202-2.el5.src.rpm | SHA-256: 22cc7dce952e284a1c844b4e049d3531ab44c5be9757f4bb247ac67a747c1d82 |
x86_64 | |
ksh-20080202-2.el5.x86_64.rpm | SHA-256: 7bf142301760d559af56fd23a649c12a8b4a9bb1f45657ed0e789c9ea56635da |
ia64 | |
ksh-20080202-2.el5.ia64.rpm | SHA-256: 5885aa4b81501e67b406403e03d4e8321de810dd59be77990dbeda3ef1c3758b |
i386 | |
ksh-20080202-2.el5.i386.rpm | SHA-256: 5f7438fe3e7bb7838524f3cc6dbbd64662291589be75d4df96b4b4000c80d8b0 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ksh-20080202-2.el5.src.rpm | SHA-256: 22cc7dce952e284a1c844b4e049d3531ab44c5be9757f4bb247ac67a747c1d82 |
x86_64 | |
ksh-20080202-2.el5.x86_64.rpm | SHA-256: 7bf142301760d559af56fd23a649c12a8b4a9bb1f45657ed0e789c9ea56635da |
i386 | |
ksh-20080202-2.el5.i386.rpm | SHA-256: 5f7438fe3e7bb7838524f3cc6dbbd64662291589be75d4df96b4b4000c80d8b0 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ksh-20080202-2.el5.src.rpm | SHA-256: 22cc7dce952e284a1c844b4e049d3531ab44c5be9757f4bb247ac67a747c1d82 |
s390x | |
ksh-20080202-2.el5.s390x.rpm | SHA-256: 839b83f9ae3694592ecd8e744e7ab9860fbec3183b1e8200ff374b597a60e52c |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ksh-20080202-2.el5.src.rpm | SHA-256: 22cc7dce952e284a1c844b4e049d3531ab44c5be9757f4bb247ac67a747c1d82 |
ppc | |
ksh-20080202-2.el5.ppc.rpm | SHA-256: 05f5c822ff5ea705b0c44088ac960fe5c3636764401b0dd773b4919b47c41826 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ksh-20080202-2.el5.src.rpm | SHA-256: 22cc7dce952e284a1c844b4e049d3531ab44c5be9757f4bb247ac67a747c1d82 |
x86_64 | |
ksh-20080202-2.el5.x86_64.rpm | SHA-256: 7bf142301760d559af56fd23a649c12a8b4a9bb1f45657ed0e789c9ea56635da |
i386 | |
ksh-20080202-2.el5.i386.rpm | SHA-256: 5f7438fe3e7bb7838524f3cc6dbbd64662291589be75d4df96b4b4000c80d8b0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.