Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bug:* Previously, the KornShell became unresponsive when setting a variable from acommand that produced more than 120 k and was then piped. A patch has beenapplied to fix this bug, and KornShell now executes commands correctly.(BZ#1148831) Users of ksh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ksh-20120801-21.el6.1.src.rpm
    MD5: 4a6ec6ea8b75949f2b961cfdfdeacc31SHA-256: 6d2c459e1f022434ca67337a637131ba15f8156539c78a086fe63c8a40f27e05
 
IA-32:
ksh-20120801-21.el6.1.i686.rpm
    MD5: 2b937be2f0fb3c54c3328c7f58cca53eSHA-256: e3e41a62b3be7ca969d980d8cf70f3ecc45f18d4a7ad337aa6534f066c3e0416
ksh-debuginfo-20120801-21.el6.1.i686.rpm
    MD5: 56c48c97251580f8e93a6ec031353e20SHA-256: 8a07a9bd33f4fce1f044411786bcdc0a6306eade0cb6261286cfe6b5f58d5bd9
 
x86_64:
ksh-20120801-21.el6.1.x86_64.rpm
    MD5: 30e3c0ef0210b9457c307b371cbfcd46SHA-256: 7333047765d0c1ce9a205305c8daffde694aaf7702247b006ea48d684bf1257f
ksh-debuginfo-20120801-21.el6.1.x86_64.rpm
    MD5: bb6fcfa46e2a2c9d6d52ff9d4774a55dSHA-256: 7e616bdd754dbc7247272bd0b64aab03d4878787949caddd816461e2bfb4c9d4
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ksh-20120801-21.el6.1.src.rpm
    MD5: 4a6ec6ea8b75949f2b961cfdfdeacc31SHA-256: 6d2c459e1f022434ca67337a637131ba15f8156539c78a086fe63c8a40f27e05
 
x86_64:
ksh-20120801-21.el6.1.x86_64.rpm
    MD5: 30e3c0ef0210b9457c307b371cbfcd46SHA-256: 7333047765d0c1ce9a205305c8daffde694aaf7702247b006ea48d684bf1257f
ksh-debuginfo-20120801-21.el6.1.x86_64.rpm
    MD5: bb6fcfa46e2a2c9d6d52ff9d4774a55dSHA-256: 7e616bdd754dbc7247272bd0b64aab03d4878787949caddd816461e2bfb4c9d4
 
Red Hat Enterprise Linux High Availability EUS (v. 6.6.z)

SRPMS:
ksh-20120801-21.el6.1.src.rpm
    MD5: 4a6ec6ea8b75949f2b961cfdfdeacc31SHA-256: 6d2c459e1f022434ca67337a637131ba15f8156539c78a086fe63c8a40f27e05
 
x86_64:
ksh-20120801-21.el6.1.x86_64.rpm
    MD5: 30e3c0ef0210b9457c307b371cbfcd46SHA-256: 7333047765d0c1ce9a205305c8daffde694aaf7702247b006ea48d684bf1257f
ksh-debuginfo-20120801-21.el6.1.x86_64.rpm
    MD5: bb6fcfa46e2a2c9d6d52ff9d4774a55dSHA-256: 7e616bdd754dbc7247272bd0b64aab03d4878787949caddd816461e2bfb4c9d4
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ksh-20120801-21.el6.1.src.rpm
    MD5: 4a6ec6ea8b75949f2b961cfdfdeacc31SHA-256: 6d2c459e1f022434ca67337a637131ba15f8156539c78a086fe63c8a40f27e05
 
IA-32:
ksh-20120801-21.el6.1.i686.rpm
    MD5: 2b937be2f0fb3c54c3328c7f58cca53eSHA-256: e3e41a62b3be7ca969d980d8cf70f3ecc45f18d4a7ad337aa6534f066c3e0416
ksh-debuginfo-20120801-21.el6.1.i686.rpm
    MD5: 56c48c97251580f8e93a6ec031353e20SHA-256: 8a07a9bd33f4fce1f044411786bcdc0a6306eade0cb6261286cfe6b5f58d5bd9
 
PPC:
ksh-20120801-21.el6.1.ppc64.rpm
    MD5: 5f28c1744ab9112ecaf8d66f9ec1add3SHA-256: 716fa734c7d2a427c3042b5dbd36a012d1dbc8fdc02fbbf5d507c74b4bcf0ec5
ksh-debuginfo-20120801-21.el6.1.ppc64.rpm
    MD5: fbab1942bd14647bf55c55fd3ba025ccSHA-256: c7f6407d682108927b5c49d2954f24f6951cde6b142f7184e8eb56e320dd5b1d
 
s390x:
ksh-20120801-21.el6.1.s390x.rpm
    MD5: 5377d329110b950f59ce53ff46efeebaSHA-256: 46ccfd8233e9597ee570a35b182ba96741f86a639dfcc402f5b2cdca09974cf8
ksh-debuginfo-20120801-21.el6.1.s390x.rpm
    MD5: cca4c3d449f27129bd10a8b929c29e46SHA-256: 63a1928604a7f05d7520eabb8f137851cf0f80038403a64716620e2471c2cd23
 
x86_64:
ksh-20120801-21.el6.1.x86_64.rpm
    MD5: 30e3c0ef0210b9457c307b371cbfcd46SHA-256: 7333047765d0c1ce9a205305c8daffde694aaf7702247b006ea48d684bf1257f
ksh-debuginfo-20120801-21.el6.1.x86_64.rpm
    MD5: bb6fcfa46e2a2c9d6d52ff9d4774a55dSHA-256: 7e616bdd754dbc7247272bd0b64aab03d4878787949caddd816461e2bfb4c9d4
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
ksh-20120801-21.el6.1.src.rpm
    MD5: 4a6ec6ea8b75949f2b961cfdfdeacc31SHA-256: 6d2c459e1f022434ca67337a637131ba15f8156539c78a086fe63c8a40f27e05
 
IA-32:
ksh-20120801-21.el6.1.i686.rpm
    MD5: 2b937be2f0fb3c54c3328c7f58cca53eSHA-256: e3e41a62b3be7ca969d980d8cf70f3ecc45f18d4a7ad337aa6534f066c3e0416
ksh-debuginfo-20120801-21.el6.1.i686.rpm
    MD5: 56c48c97251580f8e93a6ec031353e20SHA-256: 8a07a9bd33f4fce1f044411786bcdc0a6306eade0cb6261286cfe6b5f58d5bd9
 
PPC:
ksh-20120801-21.el6.1.ppc64.rpm
    MD5: 5f28c1744ab9112ecaf8d66f9ec1add3SHA-256: 716fa734c7d2a427c3042b5dbd36a012d1dbc8fdc02fbbf5d507c74b4bcf0ec5
ksh-debuginfo-20120801-21.el6.1.ppc64.rpm
    MD5: fbab1942bd14647bf55c55fd3ba025ccSHA-256: c7f6407d682108927b5c49d2954f24f6951cde6b142f7184e8eb56e320dd5b1d
 
s390x:
ksh-20120801-21.el6.1.s390x.rpm
    MD5: 5377d329110b950f59ce53ff46efeebaSHA-256: 46ccfd8233e9597ee570a35b182ba96741f86a639dfcc402f5b2cdca09974cf8
ksh-debuginfo-20120801-21.el6.1.s390x.rpm
    MD5: cca4c3d449f27129bd10a8b929c29e46SHA-256: 63a1928604a7f05d7520eabb8f137851cf0f80038403a64716620e2471c2cd23
 
x86_64:
ksh-20120801-21.el6.1.x86_64.rpm
    MD5: 30e3c0ef0210b9457c307b371cbfcd46SHA-256: 7333047765d0c1ce9a205305c8daffde694aaf7702247b006ea48d684bf1257f
ksh-debuginfo-20120801-21.el6.1.x86_64.rpm
    MD5: bb6fcfa46e2a2c9d6d52ff9d4774a55dSHA-256: 7e616bdd754dbc7247272bd0b64aab03d4878787949caddd816461e2bfb4c9d4
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ksh-20120801-21.el6.1.src.rpm
    MD5: 4a6ec6ea8b75949f2b961cfdfdeacc31SHA-256: 6d2c459e1f022434ca67337a637131ba15f8156539c78a086fe63c8a40f27e05
 
IA-32:
ksh-20120801-21.el6.1.i686.rpm
    MD5: 2b937be2f0fb3c54c3328c7f58cca53eSHA-256: e3e41a62b3be7ca969d980d8cf70f3ecc45f18d4a7ad337aa6534f066c3e0416
ksh-debuginfo-20120801-21.el6.1.i686.rpm
    MD5: 56c48c97251580f8e93a6ec031353e20SHA-256: 8a07a9bd33f4fce1f044411786bcdc0a6306eade0cb6261286cfe6b5f58d5bd9
 
x86_64:
ksh-20120801-21.el6.1.x86_64.rpm
    MD5: 30e3c0ef0210b9457c307b371cbfcd46SHA-256: 7333047765d0c1ce9a205305c8daffde694aaf7702247b006ea48d684bf1257f
ksh-debuginfo-20120801-21.el6.1.x86_64.rpm
    MD5: bb6fcfa46e2a2c9d6d52ff9d4774a55dSHA-256: 7e616bdd754dbc7247272bd0b64aab03d4878787949caddd816461e2bfb4c9d4
 
(The unlinked packages above are only available from the Red Hat Network)
1148831 – shell hangs if setting variable from command that produces more than 120k and is piped

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply