Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bug:* Due to a race condition in the job list code, the ksh shell could terminateunexpectedly with a segmentation fault when the user had run custom scripts ontheir system. With this update, the race condition has been fixed, andsegmentation faults in ksh no longer occur. (BZ#1097293)Users of ksh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously-released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ksh-20120801-10.el6_5.5.src.rpm
    MD5: 47d3f3c4c9c837839ec88c50c69811ceSHA-256: 5484f7761e65a799092958bb62dd1c95a5dc0e06c471454b092df6e55d2bddad
 
IA-32:
ksh-20120801-10.el6_5.5.i686.rpm
    MD5: bb13226bf64770b527a6f25dbad2524bSHA-256: 94f6f4cb093f51780c94e5de564fe042454c9ad08b3eb2e68985b8e5f10a69ec
ksh-debuginfo-20120801-10.el6_5.5.i686.rpm
    MD5: 00db703b73c84865d8b2db2185dc25baSHA-256: de35ec8fbf328a052315bbe32d6e87c042df1cfee07a86820838b8f1a498f718
 
x86_64:
ksh-20120801-10.el6_5.5.x86_64.rpm
    MD5: 59a3ba7195f73714ca719751317dfa09SHA-256: 324285dec198ae0c4fa753bf96a907e44547d259fc01263ae5ac7bdfab128c0b
ksh-debuginfo-20120801-10.el6_5.5.x86_64.rpm
    MD5: 2786e29a44607405521521684bb8b602SHA-256: be86db679d5f8fffb2b898e056d6469d963e71fe1722f830a8ae700e66f9ea63
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ksh-20120801-10.el6_5.5.src.rpm
    MD5: 47d3f3c4c9c837839ec88c50c69811ceSHA-256: 5484f7761e65a799092958bb62dd1c95a5dc0e06c471454b092df6e55d2bddad
 
x86_64:
ksh-20120801-10.el6_5.5.x86_64.rpm
    MD5: 59a3ba7195f73714ca719751317dfa09SHA-256: 324285dec198ae0c4fa753bf96a907e44547d259fc01263ae5ac7bdfab128c0b
ksh-debuginfo-20120801-10.el6_5.5.x86_64.rpm
    MD5: 2786e29a44607405521521684bb8b602SHA-256: be86db679d5f8fffb2b898e056d6469d963e71fe1722f830a8ae700e66f9ea63
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ksh-20120801-10.el6_5.5.src.rpm
    MD5: 47d3f3c4c9c837839ec88c50c69811ceSHA-256: 5484f7761e65a799092958bb62dd1c95a5dc0e06c471454b092df6e55d2bddad
 
IA-32:
ksh-20120801-10.el6_5.5.i686.rpm
    MD5: bb13226bf64770b527a6f25dbad2524bSHA-256: 94f6f4cb093f51780c94e5de564fe042454c9ad08b3eb2e68985b8e5f10a69ec
ksh-debuginfo-20120801-10.el6_5.5.i686.rpm
    MD5: 00db703b73c84865d8b2db2185dc25baSHA-256: de35ec8fbf328a052315bbe32d6e87c042df1cfee07a86820838b8f1a498f718
 
PPC:
ksh-20120801-10.el6_5.5.ppc64.rpm
    MD5: 0fd9b78b49581d5bb71caba779cd9f8aSHA-256: f12144e4ca07b74e9623a11e2065506c2edf0fcb686f8c4198d60ef870260609
ksh-debuginfo-20120801-10.el6_5.5.ppc64.rpm
    MD5: fe850af28fed5606d21b93c00a225138SHA-256: bd04afb9263065268c95457a67e51299aa639cde92e5bd19ed9ad47cd8e8dfb6
 
s390x:
ksh-20120801-10.el6_5.5.s390x.rpm
    MD5: f1d737ed8abc17de904dd1c4e6d1152fSHA-256: d24fe7ce16d23d24ca4565611b5c19d5e8c2249771700a4f6eb93f304e31dca3
ksh-debuginfo-20120801-10.el6_5.5.s390x.rpm
    MD5: 7723fb50d92cb1eb5b3e88cc3a972f79SHA-256: 258bd4fabe5f0ec3dd719b12e778004fdd287e0adb2fc27333cd964d7e886d7f
 
x86_64:
ksh-20120801-10.el6_5.5.x86_64.rpm
    MD5: 59a3ba7195f73714ca719751317dfa09SHA-256: 324285dec198ae0c4fa753bf96a907e44547d259fc01263ae5ac7bdfab128c0b
ksh-debuginfo-20120801-10.el6_5.5.x86_64.rpm
    MD5: 2786e29a44607405521521684bb8b602SHA-256: be86db679d5f8fffb2b898e056d6469d963e71fe1722f830a8ae700e66f9ea63
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
ksh-20120801-10.el6_5.5.src.rpm
    MD5: 47d3f3c4c9c837839ec88c50c69811ceSHA-256: 5484f7761e65a799092958bb62dd1c95a5dc0e06c471454b092df6e55d2bddad
 
x86_64:
ksh-20120801-10.el6_5.5.x86_64.rpm
    MD5: 59a3ba7195f73714ca719751317dfa09SHA-256: 324285dec198ae0c4fa753bf96a907e44547d259fc01263ae5ac7bdfab128c0b
ksh-debuginfo-20120801-10.el6_5.5.x86_64.rpm
    MD5: 2786e29a44607405521521684bb8b602SHA-256: be86db679d5f8fffb2b898e056d6469d963e71fe1722f830a8ae700e66f9ea63
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
ksh-20120801-10.el6_5.5.src.rpm
    MD5: 47d3f3c4c9c837839ec88c50c69811ceSHA-256: 5484f7761e65a799092958bb62dd1c95a5dc0e06c471454b092df6e55d2bddad
 
IA-32:
ksh-20120801-10.el6_5.5.i686.rpm
    MD5: bb13226bf64770b527a6f25dbad2524bSHA-256: 94f6f4cb093f51780c94e5de564fe042454c9ad08b3eb2e68985b8e5f10a69ec
ksh-debuginfo-20120801-10.el6_5.5.i686.rpm
    MD5: 00db703b73c84865d8b2db2185dc25baSHA-256: de35ec8fbf328a052315bbe32d6e87c042df1cfee07a86820838b8f1a498f718
 
PPC:
ksh-20120801-10.el6_5.5.ppc64.rpm
    MD5: 0fd9b78b49581d5bb71caba779cd9f8aSHA-256: f12144e4ca07b74e9623a11e2065506c2edf0fcb686f8c4198d60ef870260609
ksh-debuginfo-20120801-10.el6_5.5.ppc64.rpm
    MD5: fe850af28fed5606d21b93c00a225138SHA-256: bd04afb9263065268c95457a67e51299aa639cde92e5bd19ed9ad47cd8e8dfb6
 
s390x:
ksh-20120801-10.el6_5.5.s390x.rpm
    MD5: f1d737ed8abc17de904dd1c4e6d1152fSHA-256: d24fe7ce16d23d24ca4565611b5c19d5e8c2249771700a4f6eb93f304e31dca3
ksh-debuginfo-20120801-10.el6_5.5.s390x.rpm
    MD5: 7723fb50d92cb1eb5b3e88cc3a972f79SHA-256: 258bd4fabe5f0ec3dd719b12e778004fdd287e0adb2fc27333cd964d7e886d7f
 
x86_64:
ksh-20120801-10.el6_5.5.x86_64.rpm
    MD5: 59a3ba7195f73714ca719751317dfa09SHA-256: 324285dec198ae0c4fa753bf96a907e44547d259fc01263ae5ac7bdfab128c0b
ksh-debuginfo-20120801-10.el6_5.5.x86_64.rpm
    MD5: 2786e29a44607405521521684bb8b602SHA-256: be86db679d5f8fffb2b898e056d6469d963e71fe1722f830a8ae700e66f9ea63
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ksh-20120801-10.el6_5.5.src.rpm
    MD5: 47d3f3c4c9c837839ec88c50c69811ceSHA-256: 5484f7761e65a799092958bb62dd1c95a5dc0e06c471454b092df6e55d2bddad
 
IA-32:
ksh-20120801-10.el6_5.5.i686.rpm
    MD5: bb13226bf64770b527a6f25dbad2524bSHA-256: 94f6f4cb093f51780c94e5de564fe042454c9ad08b3eb2e68985b8e5f10a69ec
ksh-debuginfo-20120801-10.el6_5.5.i686.rpm
    MD5: 00db703b73c84865d8b2db2185dc25baSHA-256: de35ec8fbf328a052315bbe32d6e87c042df1cfee07a86820838b8f1a498f718
 
x86_64:
ksh-20120801-10.el6_5.5.x86_64.rpm
    MD5: 59a3ba7195f73714ca719751317dfa09SHA-256: 324285dec198ae0c4fa753bf96a907e44547d259fc01263ae5ac7bdfab128c0b
ksh-debuginfo-20120801-10.el6_5.5.x86_64.rpm
    MD5: 2786e29a44607405521521684bb8b602SHA-256: be86db679d5f8fffb2b898e056d6469d963e71fe1722f830a8ae700e66f9ea63
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply