Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bug:* Previously, the KornShell became unresponsive when setting a variable from acommand that produced more than 120 k and was then piped. A patch has beenprovided to fix this bug, and KornShell now executes commands correctly.(BZ#1148830) Users of ksh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ksh-20120801-10.el6_5.12.src.rpm
    MD5: a19f515fd002970f6c96625eed125c58SHA-256: e4a0df6ea06731969dcdd66a1ba0f1ab4465f9314dd74002597da4ababdf4640
 
IA-32:
ksh-20120801-10.el6_5.12.i686.rpm
    MD5: a072e506540502069585e47b77490113SHA-256: c7938c484a2d066b284d655d5237530dcdd080e5b4fe36b178a697aac9d12a91
ksh-debuginfo-20120801-10.el6_5.12.i686.rpm
    MD5: 4cf305e410940b607a31fc934e91fa74SHA-256: 46d45eed04ff41c16a2c683a50fe20812e1406e431c0f874669e4ed05f3031d8
 
x86_64:
ksh-20120801-10.el6_5.12.x86_64.rpm
    MD5: 537f7097229582a3d44ae5f7fb3771aeSHA-256: 304e2f74b24397c9f9186f3605275aed4f95230877311b602ff91f9bcf838e6f
ksh-debuginfo-20120801-10.el6_5.12.x86_64.rpm
    MD5: dc42109d0992de93d3c9a6063873f53bSHA-256: 8036d3fa01ef1c1a83d8b028ce88751217d017b74263ae89b9f494fcaa6baaad
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ksh-20120801-10.el6_5.12.src.rpm
    MD5: a19f515fd002970f6c96625eed125c58SHA-256: e4a0df6ea06731969dcdd66a1ba0f1ab4465f9314dd74002597da4ababdf4640
 
x86_64:
ksh-20120801-10.el6_5.12.x86_64.rpm
    MD5: 537f7097229582a3d44ae5f7fb3771aeSHA-256: 304e2f74b24397c9f9186f3605275aed4f95230877311b602ff91f9bcf838e6f
ksh-debuginfo-20120801-10.el6_5.12.x86_64.rpm
    MD5: dc42109d0992de93d3c9a6063873f53bSHA-256: 8036d3fa01ef1c1a83d8b028ce88751217d017b74263ae89b9f494fcaa6baaad
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ksh-20120801-10.el6_5.12.src.rpm
    MD5: a19f515fd002970f6c96625eed125c58SHA-256: e4a0df6ea06731969dcdd66a1ba0f1ab4465f9314dd74002597da4ababdf4640
 
IA-32:
ksh-20120801-10.el6_5.12.i686.rpm
    MD5: a072e506540502069585e47b77490113SHA-256: c7938c484a2d066b284d655d5237530dcdd080e5b4fe36b178a697aac9d12a91
ksh-debuginfo-20120801-10.el6_5.12.i686.rpm
    MD5: 4cf305e410940b607a31fc934e91fa74SHA-256: 46d45eed04ff41c16a2c683a50fe20812e1406e431c0f874669e4ed05f3031d8
 
PPC:
ksh-20120801-10.el6_5.12.ppc64.rpm
    MD5: 20fe4b0b6b193af55d9b88fdd0bc43f2SHA-256: 2e083583f2490c32429f1eedfa5246a57899855653a48b7fbbccfde245cdee7d
ksh-debuginfo-20120801-10.el6_5.12.ppc64.rpm
    MD5: dc93a9785ae23f16ebe714e24db8b2eeSHA-256: a611b379e97c101135a7d90986b1c0b82b7310ac12c7b991573eeedea1c7f6df
 
s390x:
ksh-20120801-10.el6_5.12.s390x.rpm
    MD5: b34f8da4340246667ee4f5031314a318SHA-256: 5ab0971d1a624cc82e85241a602e2847e9363895c817f199b46ee9b85e3d5823
ksh-debuginfo-20120801-10.el6_5.12.s390x.rpm
    MD5: 6202c0ffc73f0791b63f311554143385SHA-256: c56bcef64a9b81116520dfe24e10e2055717e1528f5a13e27970dc62de1fa2b4
 
x86_64:
ksh-20120801-10.el6_5.12.x86_64.rpm
    MD5: 537f7097229582a3d44ae5f7fb3771aeSHA-256: 304e2f74b24397c9f9186f3605275aed4f95230877311b602ff91f9bcf838e6f
ksh-debuginfo-20120801-10.el6_5.12.x86_64.rpm
    MD5: dc42109d0992de93d3c9a6063873f53bSHA-256: 8036d3fa01ef1c1a83d8b028ce88751217d017b74263ae89b9f494fcaa6baaad
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
ksh-20120801-10.el6_5.12.src.rpm
    MD5: a19f515fd002970f6c96625eed125c58SHA-256: e4a0df6ea06731969dcdd66a1ba0f1ab4465f9314dd74002597da4ababdf4640
 
x86_64:
ksh-20120801-10.el6_5.12.x86_64.rpm
    MD5: 537f7097229582a3d44ae5f7fb3771aeSHA-256: 304e2f74b24397c9f9186f3605275aed4f95230877311b602ff91f9bcf838e6f
ksh-debuginfo-20120801-10.el6_5.12.x86_64.rpm
    MD5: dc42109d0992de93d3c9a6063873f53bSHA-256: 8036d3fa01ef1c1a83d8b028ce88751217d017b74263ae89b9f494fcaa6baaad
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
ksh-20120801-10.el6_5.12.src.rpm
    MD5: a19f515fd002970f6c96625eed125c58SHA-256: e4a0df6ea06731969dcdd66a1ba0f1ab4465f9314dd74002597da4ababdf4640
 
IA-32:
ksh-20120801-10.el6_5.12.i686.rpm
    MD5: a072e506540502069585e47b77490113SHA-256: c7938c484a2d066b284d655d5237530dcdd080e5b4fe36b178a697aac9d12a91
ksh-debuginfo-20120801-10.el6_5.12.i686.rpm
    MD5: 4cf305e410940b607a31fc934e91fa74SHA-256: 46d45eed04ff41c16a2c683a50fe20812e1406e431c0f874669e4ed05f3031d8
 
PPC:
ksh-20120801-10.el6_5.12.ppc64.rpm
    MD5: 20fe4b0b6b193af55d9b88fdd0bc43f2SHA-256: 2e083583f2490c32429f1eedfa5246a57899855653a48b7fbbccfde245cdee7d
ksh-debuginfo-20120801-10.el6_5.12.ppc64.rpm
    MD5: dc93a9785ae23f16ebe714e24db8b2eeSHA-256: a611b379e97c101135a7d90986b1c0b82b7310ac12c7b991573eeedea1c7f6df
 
s390x:
ksh-20120801-10.el6_5.12.s390x.rpm
    MD5: b34f8da4340246667ee4f5031314a318SHA-256: 5ab0971d1a624cc82e85241a602e2847e9363895c817f199b46ee9b85e3d5823
ksh-debuginfo-20120801-10.el6_5.12.s390x.rpm
    MD5: 6202c0ffc73f0791b63f311554143385SHA-256: c56bcef64a9b81116520dfe24e10e2055717e1528f5a13e27970dc62de1fa2b4
 
x86_64:
ksh-20120801-10.el6_5.12.x86_64.rpm
    MD5: 537f7097229582a3d44ae5f7fb3771aeSHA-256: 304e2f74b24397c9f9186f3605275aed4f95230877311b602ff91f9bcf838e6f
ksh-debuginfo-20120801-10.el6_5.12.x86_64.rpm
    MD5: dc42109d0992de93d3c9a6063873f53bSHA-256: 8036d3fa01ef1c1a83d8b028ce88751217d017b74263ae89b9f494fcaa6baaad
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ksh-20120801-10.el6_5.12.src.rpm
    MD5: a19f515fd002970f6c96625eed125c58SHA-256: e4a0df6ea06731969dcdd66a1ba0f1ab4465f9314dd74002597da4ababdf4640
 
IA-32:
ksh-20120801-10.el6_5.12.i686.rpm
    MD5: a072e506540502069585e47b77490113SHA-256: c7938c484a2d066b284d655d5237530dcdd080e5b4fe36b178a697aac9d12a91
ksh-debuginfo-20120801-10.el6_5.12.i686.rpm
    MD5: 4cf305e410940b607a31fc934e91fa74SHA-256: 46d45eed04ff41c16a2c683a50fe20812e1406e431c0f874669e4ed05f3031d8
 
x86_64:
ksh-20120801-10.el6_5.12.x86_64.rpm
    MD5: 537f7097229582a3d44ae5f7fb3771aeSHA-256: 304e2f74b24397c9f9186f3605275aed4f95230877311b602ff91f9bcf838e6f
ksh-debuginfo-20120801-10.el6_5.12.x86_64.rpm
    MD5: dc42109d0992de93d3c9a6063873f53bSHA-256: 8036d3fa01ef1c1a83d8b028ce88751217d017b74263ae89b9f494fcaa6baaad
 
(The unlinked packages above are only available from the Red Hat Network)
1148830 – shell hangs if setting variable from command that produces more than 120k and is piped

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply