- Issued:
- 2013-07-08
- Updated:
- 2013-07-08
RHBA-2013:1019 - Bug Fix Advisory
Synopsis
ksh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ksh packages that fix one bug are now available for Red Hat Enterprise
Linux 6 Extended Update Support.
Description
KornShell (ksh) is a Unix shell developed by Bell Labs, which is
backward-compatible with the Bourne shell and includes many features of the C
shell. KornShell complies with POSIX.2 [Shell and Utilities, Command
Interpreter] standard.
This update fixes the following bug:
- Previously, the output a of command substitutions was not always redirected
properly. Consequently, the output in a here-document could be lost. This update
fixes the redirection code for command substitutions, and now the here-document
contains the output of command substitutions as expected. (BZ#927584)
Users of ksh are advised to upgrade to these updated packages, which fix this
bug.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3
SRPM | |
---|---|
ksh-20100621-16.el6_3.2.src.rpm | SHA-256: 51f0b50702bdb988a369a19f6f8b25fcfcb82f3f31fcaf4987fbe57c9396e6e2 |
x86_64 | |
ksh-20100621-16.el6_3.2.x86_64.rpm | SHA-256: 42f084424ad83c1941582dde90eb0a18ba0a84792dda25b0b3551881ec6d5eab |
ksh-debuginfo-20100621-16.el6_3.2.x86_64.rpm | SHA-256: 2728d5a95f774a224bdc732c5348e7083575ea0dba3474ebe6b3e1f5b1720152 |
i386 | |
ksh-20100621-16.el6_3.2.i686.rpm | SHA-256: 6edec11757092a8dc967265f646faa3f3bf3b09835fdbfd15c8ba022835262ba |
ksh-debuginfo-20100621-16.el6_3.2.i686.rpm | SHA-256: 7b6da1462f7ce49d922cd9ef0008c58aad3fa7c54ec442d2d87b0e0936b5a43a |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3
SRPM | |
---|---|
ksh-20100621-16.el6_3.2.src.rpm | SHA-256: 51f0b50702bdb988a369a19f6f8b25fcfcb82f3f31fcaf4987fbe57c9396e6e2 |
s390x | |
ksh-20100621-16.el6_3.2.s390x.rpm | SHA-256: 937bf479aefe03ed8a935b8bf22f35f547932b8fed12a14560f5a1035ce3d8d8 |
ksh-debuginfo-20100621-16.el6_3.2.s390x.rpm | SHA-256: 466b52e6afd0dc8d8c22eb10d6b9f813ce7f4315333f00208ae7fe79d7ff67d0 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3
SRPM | |
---|---|
ksh-20100621-16.el6_3.2.src.rpm | SHA-256: 51f0b50702bdb988a369a19f6f8b25fcfcb82f3f31fcaf4987fbe57c9396e6e2 |
ppc64 | |
ksh-20100621-16.el6_3.2.ppc64.rpm | SHA-256: 14aed8ca8418bce38d384d8a82b3c1583881bd1b2dc79e2b34f16abea06c6f80 |
ksh-debuginfo-20100621-16.el6_3.2.ppc64.rpm | SHA-256: af55bd38af4cde6c3ff5a4bb0b7427ae243a49a6e61543865569694921760989 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3
SRPM | |
---|---|
ksh-20100621-16.el6_3.2.src.rpm | SHA-256: 51f0b50702bdb988a369a19f6f8b25fcfcb82f3f31fcaf4987fbe57c9396e6e2 |
x86_64 | |
ksh-20100621-16.el6_3.2.x86_64.rpm | SHA-256: 42f084424ad83c1941582dde90eb0a18ba0a84792dda25b0b3551881ec6d5eab |
ksh-debuginfo-20100621-16.el6_3.2.x86_64.rpm | SHA-256: 2728d5a95f774a224bdc732c5348e7083575ea0dba3474ebe6b3e1f5b1720152 |
i386 | |
ksh-20100621-16.el6_3.2.i686.rpm | SHA-256: 6edec11757092a8dc967265f646faa3f3bf3b09835fdbfd15c8ba022835262ba |
ksh-debuginfo-20100621-16.el6_3.2.i686.rpm | SHA-256: 7b6da1462f7ce49d922cd9ef0008c58aad3fa7c54ec442d2d87b0e0936b5a43a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.