- Issued:
- 2015-03-09
- Updated:
- 2015-03-09
RHBA-2015:0654 - Bug Fix Advisory
Synopsis
ksh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ksh packages that fix one bug are now available for Red Hat Enterprise
Linux 6.5 Extended Update Support.
Description
KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which is
backward-compatible with the Bourne shell (Bash) and includes many features of
the C shell. The most recent version is KSH-93. KornShell complies with the
POSIX.2 standard (IEEE Std 1003.2-1992).
This update fixes the following bug:
- Previously, the ksh shell did not filter environment variables it inherited.
As a result, the ksh environment contained variables that ksh was not able to
use or unset. This updated version filters variables during
initialization, and thus no longer inherits variables that are invalid for ksh.
As a result, ksh functions can now use all variables present in the environment.
(BZ#1195647)
Users of ksh are advised to upgrade to these updated packages, which fix this
bug.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5 i386
- Red Hat Enterprise Linux EUS Compute Node 6.5 x86_64
- Red Hat Enterprise Linux Server - AUS 6.5 x86_64
- Red Hat Enterprise Linux Server - TUS 6.5 x86_64
Fixes
- BZ - 1195647 - Bash fix for CVE-2014-7169 breaks ksh scripts that try to clear the environment
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.5
SRPM | |
---|---|
ksh-20120801-10.el6_5.13.src.rpm | SHA-256: c983ab627131e01a3b772c70e545c4113d4636b1e673e31cf2b0836d8f557969 |
x86_64 | |
ksh-20120801-10.el6_5.13.x86_64.rpm | SHA-256: c4ec08a7309185bfd6309cdce2f82eb0fc9ad3ae74951f24b3b7287a31c14b61 |
ksh-debuginfo-20120801-10.el6_5.13.x86_64.rpm | SHA-256: 8e5dca591b1fabb738d805e97355d5bd6c017c573afc62ac3fe6e5a6e3a60c3d |
i386 | |
ksh-20120801-10.el6_5.13.i686.rpm | SHA-256: c6e898ee5e5fc3c31e5cf5579adfcb4907f386af81eb3c250fa2e600e110c094 |
ksh-debuginfo-20120801-10.el6_5.13.i686.rpm | SHA-256: 1299651e2bbc5231f355895ee31a6f99f7a9a06dd9456f292c3039b518d80611 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.5
SRPM | |
---|---|
ksh-20120801-10.el6_5.13.src.rpm | SHA-256: c983ab627131e01a3b772c70e545c4113d4636b1e673e31cf2b0836d8f557969 |
s390x | |
ksh-20120801-10.el6_5.13.s390x.rpm | SHA-256: b8dc91475f328b7a616f567296505bf1f26e6f67883689e9feb49f85a1674e05 |
ksh-debuginfo-20120801-10.el6_5.13.s390x.rpm | SHA-256: b4441a6b6be21ace97840a4683ea0889307390038f52b7c82388897dfe8bf1e7 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.5
SRPM | |
---|---|
ksh-20120801-10.el6_5.13.src.rpm | SHA-256: c983ab627131e01a3b772c70e545c4113d4636b1e673e31cf2b0836d8f557969 |
ppc64 | |
ksh-20120801-10.el6_5.13.ppc64.rpm | SHA-256: aee0da1021398fe86124f8318ad7bc720b81f9dc7aa18042321a0518db94334e |
ksh-debuginfo-20120801-10.el6_5.13.ppc64.rpm | SHA-256: 659fbe5384f062a188cc02fce474fdf62841bb63a2636ed5dcb7a73d5d29269f |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.5
SRPM | |
---|---|
ksh-20120801-10.el6_5.13.src.rpm | SHA-256: c983ab627131e01a3b772c70e545c4113d4636b1e673e31cf2b0836d8f557969 |
x86_64 | |
ksh-20120801-10.el6_5.13.x86_64.rpm | SHA-256: c4ec08a7309185bfd6309cdce2f82eb0fc9ad3ae74951f24b3b7287a31c14b61 |
ksh-debuginfo-20120801-10.el6_5.13.x86_64.rpm | SHA-256: 8e5dca591b1fabb738d805e97355d5bd6c017c573afc62ac3fe6e5a6e3a60c3d |
i386 | |
ksh-20120801-10.el6_5.13.i686.rpm | SHA-256: c6e898ee5e5fc3c31e5cf5579adfcb4907f386af81eb3c250fa2e600e110c094 |
ksh-debuginfo-20120801-10.el6_5.13.i686.rpm | SHA-256: 1299651e2bbc5231f355895ee31a6f99f7a9a06dd9456f292c3039b518d80611 |
Red Hat Enterprise Linux EUS Compute Node 6.5
SRPM | |
---|---|
ksh-20120801-10.el6_5.13.src.rpm | SHA-256: c983ab627131e01a3b772c70e545c4113d4636b1e673e31cf2b0836d8f557969 |
x86_64 | |
ksh-20120801-10.el6_5.13.x86_64.rpm | SHA-256: c4ec08a7309185bfd6309cdce2f82eb0fc9ad3ae74951f24b3b7287a31c14b61 |
ksh-debuginfo-20120801-10.el6_5.13.x86_64.rpm | SHA-256: 8e5dca591b1fabb738d805e97355d5bd6c017c573afc62ac3fe6e5a6e3a60c3d |
Red Hat Enterprise Linux Server - AUS 6.5
SRPM | |
---|---|
ksh-20120801-10.el6_5.13.src.rpm | SHA-256: c983ab627131e01a3b772c70e545c4113d4636b1e673e31cf2b0836d8f557969 |
x86_64 | |
ksh-20120801-10.el6_5.13.x86_64.rpm | SHA-256: c4ec08a7309185bfd6309cdce2f82eb0fc9ad3ae74951f24b3b7287a31c14b61 |
ksh-debuginfo-20120801-10.el6_5.13.x86_64.rpm | SHA-256: 8e5dca591b1fabb738d805e97355d5bd6c017c573afc62ac3fe6e5a6e3a60c3d |
Red Hat Enterprise Linux Server - TUS 6.5
SRPM | |
---|---|
ksh-20120801-10.el6_5.13.src.rpm | SHA-256: c983ab627131e01a3b772c70e545c4113d4636b1e673e31cf2b0836d8f557969 |
x86_64 | |
ksh-20120801-10.el6_5.13.x86_64.rpm | SHA-256: c4ec08a7309185bfd6309cdce2f82eb0fc9ad3ae74951f24b3b7287a31c14b61 |
ksh-debuginfo-20120801-10.el6_5.13.x86_64.rpm | SHA-256: 8e5dca591b1fabb738d805e97355d5bd6c017c573afc62ac3fe6e5a6e3a60c3d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.