Skip to navigation

Bug Fix Advisory ksh bug fix update

Advisory: RHBA-2012:0004-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-01-06
Last updated on: 2012-01-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated ksh package that fixes one bug is now available for Red Hat
Enterprise Linux 6.

KSH-93 is the most recent version of the KornShell by David Korn of AT&T Bell
Laboratories. KornShell is a shell programming language which is also compatible
with sh, the original Bourne Shell.

This update fixes the following bug:

* When exiting a subshell after a command substitution, ksh could prematurely
exit without any error. With this update, ksh no longer terminates under these
circumstances and all subsequent commands are processed correctly. (BZ#768917)

All users of ksh are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ksh-20100621-12.el6_2.1.src.rpm
File outdated by:  RHBA-2014:0281
    MD5: 42df99a7add139b6932a484e843067db
SHA-256: 96aff6f8b9374c1483c7114ca9401055c832de52d543161227150d16d9127fcc
 
IA-32:
ksh-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2014:0281
    MD5: 7891f17f53d0537c7ec6e6dc36c2dc71
SHA-256: cd189148b8d1da50d11a180f95532e4badea090632886a7ce8a9ea3302cf4777
ksh-debuginfo-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2014:0281
    MD5: aa9470a1dd21f9b2b26d91faef038c95
SHA-256: f189eb5a04fad28ea0a449872766351cf041360a967e4aef052256f715f3b9b5
 
x86_64:
ksh-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: f675ffdc6cee17a246daf47b46db2193
SHA-256: b5025d298a4b6bfc47b0799b13e09850b7463ac9c16832c432f7e2833e2fb6be
ksh-debuginfo-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: 970bd466b141603662794d3db98ea182
SHA-256: 185ad44a8d1a2f9f993d70565f8ca14472851c944b7bff0954f5dfd9ea632f0d
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ksh-20100621-12.el6_2.1.src.rpm
File outdated by:  RHBA-2014:0281
    MD5: 42df99a7add139b6932a484e843067db
SHA-256: 96aff6f8b9374c1483c7114ca9401055c832de52d543161227150d16d9127fcc
 
x86_64:
ksh-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: f675ffdc6cee17a246daf47b46db2193
SHA-256: b5025d298a4b6bfc47b0799b13e09850b7463ac9c16832c432f7e2833e2fb6be
ksh-debuginfo-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: 970bd466b141603662794d3db98ea182
SHA-256: 185ad44a8d1a2f9f993d70565f8ca14472851c944b7bff0954f5dfd9ea632f0d
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ksh-20100621-12.el6_2.1.src.rpm
File outdated by:  RHBA-2014:0281
    MD5: 42df99a7add139b6932a484e843067db
SHA-256: 96aff6f8b9374c1483c7114ca9401055c832de52d543161227150d16d9127fcc
 
IA-32:
ksh-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2014:0281
    MD5: 7891f17f53d0537c7ec6e6dc36c2dc71
SHA-256: cd189148b8d1da50d11a180f95532e4badea090632886a7ce8a9ea3302cf4777
ksh-debuginfo-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2014:0281
    MD5: aa9470a1dd21f9b2b26d91faef038c95
SHA-256: f189eb5a04fad28ea0a449872766351cf041360a967e4aef052256f715f3b9b5
 
PPC:
ksh-20100621-12.el6_2.1.ppc64.rpm
File outdated by:  RHBA-2014:0281
    MD5: eba27f64c8946f9219d7d64d57c4da6d
SHA-256: be914a8e6d65853ce505c07f24cd9108934bc7d2e6ab56ea2c894e772cc1ad33
ksh-debuginfo-20100621-12.el6_2.1.ppc64.rpm
File outdated by:  RHBA-2014:0281
    MD5: 9daa8122fcfd600df737456475f756d8
SHA-256: acce304bf0dc3f34e38e92710afb13753b9d19c26ba983c41421fdf2aa090c86
 
s390x:
ksh-20100621-12.el6_2.1.s390x.rpm
File outdated by:  RHBA-2014:0281
    MD5: 7977710cc919fd3c13b754e239fdf4c4
SHA-256: ca16464a4373d8fa597c964b42cf7af099a94d7ea843622850cafac81be6f2d4
ksh-debuginfo-20100621-12.el6_2.1.s390x.rpm
File outdated by:  RHBA-2014:0281
    MD5: da02e8faf14bcc286fcc0e9493bad423
SHA-256: 2caa2d60b3f81feb612c7a959fd0d71337063be38bf36c803ba1c172e808ba42
 
x86_64:
ksh-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: f675ffdc6cee17a246daf47b46db2193
SHA-256: b5025d298a4b6bfc47b0799b13e09850b7463ac9c16832c432f7e2833e2fb6be
ksh-debuginfo-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: 970bd466b141603662794d3db98ea182
SHA-256: 185ad44a8d1a2f9f993d70565f8ca14472851c944b7bff0954f5dfd9ea632f0d
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
ksh-20100621-12.el6_2.1.src.rpm
File outdated by:  RHBA-2014:0281
    MD5: 42df99a7add139b6932a484e843067db
SHA-256: 96aff6f8b9374c1483c7114ca9401055c832de52d543161227150d16d9127fcc
 
x86_64:
ksh-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2012:1428
    MD5: f675ffdc6cee17a246daf47b46db2193
SHA-256: b5025d298a4b6bfc47b0799b13e09850b7463ac9c16832c432f7e2833e2fb6be
ksh-debuginfo-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2012:1428
    MD5: 970bd466b141603662794d3db98ea182
SHA-256: 185ad44a8d1a2f9f993d70565f8ca14472851c944b7bff0954f5dfd9ea632f0d
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
ksh-20100621-12.el6_2.1.src.rpm
File outdated by:  RHBA-2014:0281
    MD5: 42df99a7add139b6932a484e843067db
SHA-256: 96aff6f8b9374c1483c7114ca9401055c832de52d543161227150d16d9127fcc
 
IA-32:
ksh-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2012:1428
    MD5: 7891f17f53d0537c7ec6e6dc36c2dc71
SHA-256: cd189148b8d1da50d11a180f95532e4badea090632886a7ce8a9ea3302cf4777
ksh-debuginfo-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2012:1428
    MD5: aa9470a1dd21f9b2b26d91faef038c95
SHA-256: f189eb5a04fad28ea0a449872766351cf041360a967e4aef052256f715f3b9b5
 
PPC:
ksh-20100621-12.el6_2.1.ppc64.rpm
File outdated by:  RHBA-2012:1428
    MD5: eba27f64c8946f9219d7d64d57c4da6d
SHA-256: be914a8e6d65853ce505c07f24cd9108934bc7d2e6ab56ea2c894e772cc1ad33
ksh-debuginfo-20100621-12.el6_2.1.ppc64.rpm
File outdated by:  RHBA-2012:1428
    MD5: 9daa8122fcfd600df737456475f756d8
SHA-256: acce304bf0dc3f34e38e92710afb13753b9d19c26ba983c41421fdf2aa090c86
 
s390x:
ksh-20100621-12.el6_2.1.s390x.rpm
File outdated by:  RHBA-2012:1428
    MD5: 7977710cc919fd3c13b754e239fdf4c4
SHA-256: ca16464a4373d8fa597c964b42cf7af099a94d7ea843622850cafac81be6f2d4
ksh-debuginfo-20100621-12.el6_2.1.s390x.rpm
File outdated by:  RHBA-2012:1428
    MD5: da02e8faf14bcc286fcc0e9493bad423
SHA-256: 2caa2d60b3f81feb612c7a959fd0d71337063be38bf36c803ba1c172e808ba42
 
x86_64:
ksh-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2012:1428
    MD5: f675ffdc6cee17a246daf47b46db2193
SHA-256: b5025d298a4b6bfc47b0799b13e09850b7463ac9c16832c432f7e2833e2fb6be
ksh-debuginfo-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2012:1428
    MD5: 970bd466b141603662794d3db98ea182
SHA-256: 185ad44a8d1a2f9f993d70565f8ca14472851c944b7bff0954f5dfd9ea632f0d
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ksh-20100621-12.el6_2.1.src.rpm
File outdated by:  RHBA-2014:0281
    MD5: 42df99a7add139b6932a484e843067db
SHA-256: 96aff6f8b9374c1483c7114ca9401055c832de52d543161227150d16d9127fcc
 
IA-32:
ksh-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2014:0281
    MD5: 7891f17f53d0537c7ec6e6dc36c2dc71
SHA-256: cd189148b8d1da50d11a180f95532e4badea090632886a7ce8a9ea3302cf4777
ksh-debuginfo-20100621-12.el6_2.1.i686.rpm
File outdated by:  RHBA-2014:0281
    MD5: aa9470a1dd21f9b2b26d91faef038c95
SHA-256: f189eb5a04fad28ea0a449872766351cf041360a967e4aef052256f715f3b9b5
 
x86_64:
ksh-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: f675ffdc6cee17a246daf47b46db2193
SHA-256: b5025d298a4b6bfc47b0799b13e09850b7463ac9c16832c432f7e2833e2fb6be
ksh-debuginfo-20100621-12.el6_2.1.x86_64.rpm
File outdated by:  RHBA-2014:0281
    MD5: 970bd466b141603662794d3db98ea182
SHA-256: 185ad44a8d1a2f9f993d70565f8ca14472851c944b7bff0954f5dfd9ea632f0d
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

ksh


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/