Skip to navigation

Bug Fix Advisory ksh bug fix update

Advisory: RHBA-2012:0432-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-03-28
Last updated on: 2012-03-28
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

An updated ksh package that fixes one bug is now available for Red Hat
Enterprise Linux 5.

KSH-93 is the most recent version of the KornShell by David Korn of AT&T Bell
Laboratories. KornShell is a shell programming language which is also compatible
with sh, the original Bourne Shell.

This update fixes the following bug:

* Previously, ksh did not expand the tilde (~) character properly. For example,
characters in the tilde prefix were not treated as a login name but as a part of
the path and the "No such file or directory" message was displayed. The
underlying source code has been modified and tilde expansion now works as
expected in such a scenario. (BZ#805459)

All users of ksh are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ksh-20100621-5.el5_8.1.src.rpm
File outdated by:  RHBA-2014:0317
    MD5: b9cb00cfd3f12f34231b52b7e7efbeb9
SHA-256: 0839373aa990aadfeb87cd9ff5de70468c625b2115e6cd3295f299512f3fb365
 
IA-32:
ksh-20100621-5.el5_8.1.i386.rpm
File outdated by:  RHBA-2014:0317
    MD5: e505b28defe057b8ebb18225a223dc24
SHA-256: 716cacfb6c161d032e9a193f25a833a6ddd054369a610545a1f3e007b3b45754
ksh-debuginfo-20100621-5.el5_8.1.i386.rpm
File outdated by:  RHBA-2014:0317
    MD5: 1352cd9f01135d363f48ab5495a14c58
SHA-256: 585c1911d6a9205f0e610871eec448d449e5f19c22e1b1f3b70e4594490fc9ee
 
x86_64:
ksh-20100621-5.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2014:0317
    MD5: aea804c16e1510312e5147d09820aed6
SHA-256: c1c21364a9c691d4a2eac133ebca49eeba0668531d9802cb1683cb847f0e14f5
ksh-debuginfo-20100621-5.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2014:0317
    MD5: b0c6ac656ebda2821445e8bcefd018d2
SHA-256: 39bf3e8306ad6808cb12febc61459c80e716774436ca680eba8d964da403ca74
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ksh-20100621-5.el5_8.1.src.rpm
File outdated by:  RHBA-2014:0317
    MD5: b9cb00cfd3f12f34231b52b7e7efbeb9
SHA-256: 0839373aa990aadfeb87cd9ff5de70468c625b2115e6cd3295f299512f3fb365
 
IA-32:
ksh-20100621-5.el5_8.1.i386.rpm
File outdated by:  RHBA-2014:0317
    MD5: e505b28defe057b8ebb18225a223dc24
SHA-256: 716cacfb6c161d032e9a193f25a833a6ddd054369a610545a1f3e007b3b45754
ksh-debuginfo-20100621-5.el5_8.1.i386.rpm
File outdated by:  RHBA-2014:0317
    MD5: 1352cd9f01135d363f48ab5495a14c58
SHA-256: 585c1911d6a9205f0e610871eec448d449e5f19c22e1b1f3b70e4594490fc9ee
 
IA-64:
ksh-20100621-5.el5_8.1.ia64.rpm
File outdated by:  RHBA-2014:0317
    MD5: 4eb3e00ca5e970b55969959104f0ad56
SHA-256: b23e44a2abc7422b0b258ea5696457b84ef3cd6399cd1da5c41a6fba02ef9085
ksh-debuginfo-20100621-5.el5_8.1.ia64.rpm
File outdated by:  RHBA-2014:0317
    MD5: c45126394a949c911c6bd7daffdc5e7e
SHA-256: b175467711f897e0e092ed5d350e907f5681c95e9fa14f777e837499d86f755e
 
PPC:
ksh-20100621-5.el5_8.1.ppc.rpm
File outdated by:  RHBA-2014:0317
    MD5: 867136f5c067be408206800ae658b002
SHA-256: 6d2cb2c161b65d1f24d6a5dbd063b675a2fa43e5dc6fd7b07c55fa2c6ad580e0
ksh-debuginfo-20100621-5.el5_8.1.ppc.rpm
File outdated by:  RHBA-2014:0317
    MD5: 53e800d00aeb339d49ba51944cc1a526
SHA-256: 6f453709454b7475ea03ba926edc6d8d9810b3ffac5d59f7c005ed7bd9fd3910
 
s390x:
ksh-20100621-5.el5_8.1.s390x.rpm
File outdated by:  RHBA-2014:0317
    MD5: ade5b293d655fb3985b25c451e8b7cd7
SHA-256: 73109ec50b03d2489fc15a34d8fe1aa249a452bb55b0152723d26c23b5c81cb0
ksh-debuginfo-20100621-5.el5_8.1.s390x.rpm
File outdated by:  RHBA-2014:0317
    MD5: a0572fcd533c59af673165ecba51cbc9
SHA-256: 2bfbfdf18a9f8b3e7e38424a97afc70736f9e3a5215d7fa3a9ed44cd08b6cc12
 
x86_64:
ksh-20100621-5.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2014:0317
    MD5: aea804c16e1510312e5147d09820aed6
SHA-256: c1c21364a9c691d4a2eac133ebca49eeba0668531d9802cb1683cb847f0e14f5
ksh-debuginfo-20100621-5.el5_8.1.x86_64.rpm
File outdated by:  RHBA-2014:0317
    MD5: b0c6ac656ebda2821445e8bcefd018d2
SHA-256: 39bf3e8306ad6808cb12febc61459c80e716774436ca680eba8d964da403ca74
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

805459 - Tilda expansion failing in ksh


Keywords

ksh


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/