Bug Fix Advisory ksh bug fix update

Advisory: RHBA-2014:1015-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2014-08-06
Last updated on: 2014-08-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.5)
Red Hat Enterprise Linux Server EUS (v. 6.5.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated ksh packages that fix one bug are now available for Red Hat Enterprise
Linux 6.

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which is
backward-compatible with the Bourne shell (Bash) and includes many features of
the C shell. The most recent version is KSH-93. KornShell complies with the
POSIX.2 standard (IEEE Std 1003.2-1992).

This update fixes the following bug:

* Prior to this update, the compiler optimization dropped parts from the ksh job
locking mechanism from the binary code. As a consequence, ksh could terminate
unexpectedly with a segmentation fault after it received the SIGCHLD signal.
This update implements a fix to ensure the compiler does not drop parts of the
ksh mechanism and the crash no longer occurs. (BZ#1112306)

Users of ksh are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ksh-20120801-10.el6_5.8.src.rpm
File outdated by:  RHBA-2014:1641
    MD5: 8db01b7131d03b92c649d820da2d725c
SHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1
 
IA-32:
ksh-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1641
    MD5: e5e0b1f89323f2000fb485b87ec414fe
SHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15
ksh-debuginfo-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1641
    MD5: 5d8c5784d85d023401c00328690d4645
SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1
 
x86_64:
ksh-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 064764175dea70ad75faa777bb658791
SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530
ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 15d3dfad0df23d1090803add31849668
SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ksh-20120801-10.el6_5.8.src.rpm
File outdated by:  RHBA-2014:1641
    MD5: 8db01b7131d03b92c649d820da2d725c
SHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1
 
x86_64:
ksh-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 064764175dea70ad75faa777bb658791
SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530
ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 15d3dfad0df23d1090803add31849668
SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ksh-20120801-10.el6_5.8.src.rpm
File outdated by:  RHBA-2014:1641
    MD5: 8db01b7131d03b92c649d820da2d725c
SHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1
 
IA-32:
ksh-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1641
    MD5: e5e0b1f89323f2000fb485b87ec414fe
SHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15
ksh-debuginfo-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1641
    MD5: 5d8c5784d85d023401c00328690d4645
SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1
 
PPC:
ksh-20120801-10.el6_5.8.ppc64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 96d0341193d34cefb0cca642912dd968
SHA-256: 3fb7fdcfa786bc33580ab8f9e9b724d3170d8349187f0b05d5a4973375d53670
ksh-debuginfo-20120801-10.el6_5.8.ppc64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 6d1382b06f8e6ac201570a30d3ad3fad
SHA-256: daef216387b8a8a8bc8fd298a0a7293648f126404c5cd76e946ea14d6d8ab045
 
s390x:
ksh-20120801-10.el6_5.8.s390x.rpm
File outdated by:  RHBA-2014:1641
    MD5: da389d1091afef82231111d86cc08817
SHA-256: 7ec3ff35596b97b15e6f984c874a1a26d47e012a4450f74bf315ece63876b25b
ksh-debuginfo-20120801-10.el6_5.8.s390x.rpm
File outdated by:  RHBA-2014:1641
    MD5: 707b3a28c3187febf0b122d5067df931
SHA-256: 1ea2777186b193f8eb5b4df307401c890835605cc631b3cf324ede8fa2ff1a85
 
x86_64:
ksh-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 064764175dea70ad75faa777bb658791
SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530
ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 15d3dfad0df23d1090803add31849668
SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
ksh-20120801-10.el6_5.8.src.rpm
File outdated by:  RHBA-2014:1641
    MD5: 8db01b7131d03b92c649d820da2d725c
SHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1
 
x86_64:
ksh-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1395
    MD5: 064764175dea70ad75faa777bb658791
SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530
ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1395
    MD5: 15d3dfad0df23d1090803add31849668
SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
ksh-20120801-10.el6_5.8.src.rpm
File outdated by:  RHBA-2014:1641
    MD5: 8db01b7131d03b92c649d820da2d725c
SHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1
 
IA-32:
ksh-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1395
    MD5: e5e0b1f89323f2000fb485b87ec414fe
SHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15
ksh-debuginfo-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1395
    MD5: 5d8c5784d85d023401c00328690d4645
SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1
 
PPC:
ksh-20120801-10.el6_5.8.ppc64.rpm
File outdated by:  RHBA-2014:1395
    MD5: 96d0341193d34cefb0cca642912dd968
SHA-256: 3fb7fdcfa786bc33580ab8f9e9b724d3170d8349187f0b05d5a4973375d53670
ksh-debuginfo-20120801-10.el6_5.8.ppc64.rpm
File outdated by:  RHBA-2014:1395
    MD5: 6d1382b06f8e6ac201570a30d3ad3fad
SHA-256: daef216387b8a8a8bc8fd298a0a7293648f126404c5cd76e946ea14d6d8ab045
 
s390x:
ksh-20120801-10.el6_5.8.s390x.rpm
File outdated by:  RHBA-2014:1395
    MD5: da389d1091afef82231111d86cc08817
SHA-256: 7ec3ff35596b97b15e6f984c874a1a26d47e012a4450f74bf315ece63876b25b
ksh-debuginfo-20120801-10.el6_5.8.s390x.rpm
File outdated by:  RHBA-2014:1395
    MD5: 707b3a28c3187febf0b122d5067df931
SHA-256: 1ea2777186b193f8eb5b4df307401c890835605cc631b3cf324ede8fa2ff1a85
 
x86_64:
ksh-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1395
    MD5: 064764175dea70ad75faa777bb658791
SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530
ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1395
    MD5: 15d3dfad0df23d1090803add31849668
SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ksh-20120801-10.el6_5.8.src.rpm
File outdated by:  RHBA-2014:1641
    MD5: 8db01b7131d03b92c649d820da2d725c
SHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1
 
IA-32:
ksh-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1641
    MD5: e5e0b1f89323f2000fb485b87ec414fe
SHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15
ksh-debuginfo-20120801-10.el6_5.8.i686.rpm
File outdated by:  RHBA-2014:1641
    MD5: 5d8c5784d85d023401c00328690d4645
SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1
 
x86_64:
ksh-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 064764175dea70ad75faa777bb658791
SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530
ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm
File outdated by:  RHBA-2014:1641
    MD5: 15d3dfad0df23d1090803add31849668
SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1123467 - ksh crashes because job locking mechanism does not survive compiler optimization


Keywords

ksh


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/