Skip to navigation

Bug Fix Advisory pdksh bug fix update

Advisory: RHBA-2012:1193-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-08-22
Last updated on: 2012-08-22
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated pdksh packages that fix a bug are now available for Red Hat Enterprise
Linux 5.

The pdksh package contains a public domain implementation the Korn shell
(ksh-88). The ksh shell is a command interpreter intended for both interactive
and shell script use.

This update fixes the following bug:

* Prior to this update, the pdksh binary file was installed as "/bin/pdksh" but
the path written to the /etc/shells file was "/usr/bin/pdksh". As a consequence,
some audit tools reported errors. This update fixes the path written to
/etc/shells and audit tools no longer report errors in the described scenario.
(BZ#848078)

Users of pdksh are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
pdksh-5.2.14-37.el5_8.1.src.rpm     MD5: 2e5cef983556f74c77ebc011a3c38d50
SHA-256: c49a8d8e5317b2d48a118c4d1c74e723243c56903ae1cc7a31746ca2533a51e0
 
IA-32:
pdksh-5.2.14-37.el5_8.1.i386.rpm     MD5: 535a6f62514aa8f519a8d1166df53882
SHA-256: 7cc792754930cd2f099158966bcccfb92fe5e3def0f6673be3f83552a6c38b3c
pdksh-debuginfo-5.2.14-37.el5_8.1.i386.rpm     MD5: a7fb8b33765c1c853bbd0e0de6545929
SHA-256: d32ee2f268d6dd7e9e81c73114bde5cbfb15379f877e0daa8b624be90f27b7a2
 
IA-64:
pdksh-5.2.14-37.el5_8.1.ia64.rpm     MD5: e2c8b19157da6abbc41a141606921836
SHA-256: b7d73b49a2d2dd5d31050438f2a07e971924c0ea824927d791fd6a8c19d357cc
pdksh-debuginfo-5.2.14-37.el5_8.1.ia64.rpm     MD5: ae50d3966534213d92eb4237bc534aee
SHA-256: 90cbfa14374dbe90d0e30cb18c75c466aa9a5c5bc29bb537d6d3ae419e1d9588
 
PPC:
pdksh-5.2.14-37.el5_8.1.ppc.rpm     MD5: 7ff63f5b46a9149c2db3d1823730e788
SHA-256: 3154582ec0582af34c2743ab2a983eef235b68559d3c0960bbb19adc114e2876
pdksh-debuginfo-5.2.14-37.el5_8.1.ppc.rpm     MD5: 5a7a770bdfc97ed01268b588b959ea56
SHA-256: d7413e23f7d1bc61829d8457b0b6e6a3262cb3b120fe581ce613aa0e8f9c3689
 
s390x:
pdksh-5.2.14-37.el5_8.1.s390x.rpm     MD5: 5eb0cdd95a1ce003ffd2f2c9afe00591
SHA-256: c48de0f05eae1c96f3efd2fe4b49310832885dad37c8bb9bc31f700af1956219
pdksh-debuginfo-5.2.14-37.el5_8.1.s390x.rpm     MD5: f81cace1ad4d08520fb49ae9080070cf
SHA-256: 824ac6c2157adfa99898cce9597c696dc8df4fcebedbdff5426751b7d018dda1
 
x86_64:
pdksh-5.2.14-37.el5_8.1.x86_64.rpm     MD5: 660ccfc00b66f77fa1f8b68e31040fed
SHA-256: 1c86c5014bb0de99cb6666e98035c63ad3595a7f30c363a75c345bf13cba3464
pdksh-debuginfo-5.2.14-37.el5_8.1.x86_64.rpm     MD5: 255c800dbed44a60b6b9f32ecc453083
SHA-256: e1ae2f95bca709340a78f046823d2966cc17a60f19eb4c3fc3edd63817cc1951
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
pdksh-5.2.14-37.el5_8.1.src.rpm     MD5: 2e5cef983556f74c77ebc011a3c38d50
SHA-256: c49a8d8e5317b2d48a118c4d1c74e723243c56903ae1cc7a31746ca2533a51e0
 
IA-32:
pdksh-5.2.14-37.el5_8.1.i386.rpm     MD5: 535a6f62514aa8f519a8d1166df53882
SHA-256: 7cc792754930cd2f099158966bcccfb92fe5e3def0f6673be3f83552a6c38b3c
pdksh-debuginfo-5.2.14-37.el5_8.1.i386.rpm     MD5: a7fb8b33765c1c853bbd0e0de6545929
SHA-256: d32ee2f268d6dd7e9e81c73114bde5cbfb15379f877e0daa8b624be90f27b7a2
 
x86_64:
pdksh-5.2.14-37.el5_8.1.x86_64.rpm     MD5: 660ccfc00b66f77fa1f8b68e31040fed
SHA-256: 1c86c5014bb0de99cb6666e98035c63ad3595a7f30c363a75c345bf13cba3464
pdksh-debuginfo-5.2.14-37.el5_8.1.x86_64.rpm     MD5: 255c800dbed44a60b6b9f32ecc453083
SHA-256: e1ae2f95bca709340a78f046823d2966cc17a60f19eb4c3fc3edd63817cc1951
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

pdksh


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/