Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992). This update fixes the following bug: * Previously, the ksh shell did not filter environment variables it inherited.As a result, the ksh environment contained variables that ksh was not able touse or unset. This updated version filters variables duringinitialization, and thus no longer inherits variables that are invalid for ksh.As a result, ksh functions can now use all variables present in the environment.(BZ#1195648) Users of ksh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ksh-20120801-21.el6_6.2.src.rpm
    MD5: 2205ff2439d967cc131262ff78763ce7SHA-256: aee274f0fccbafadef7e4ef34af089e28c265bd72e7121ab52bf880c432d6099
 
IA-32:
ksh-20120801-21.el6_6.2.i686.rpm
    MD5: 5718ed27bda6cb6644bf125148c26e0dSHA-256: 2166b5c858c295fa099e8b3bfbde80646d61614c38137814ddadaec371941160
ksh-debuginfo-20120801-21.el6_6.2.i686.rpm
    MD5: 74f85eaa9c97c417bdecdef90529a003SHA-256: c203356b21777792e77e53e25568fef70f58233cd700d88532067f332e6030f2
 
x86_64:
ksh-20120801-21.el6_6.2.x86_64.rpm
    MD5: 0a53ac2e79505ffc2a0c3575b3531136SHA-256: 69a7a6d14800322a0f52c9c1a78ab34f4b7394619a1f251f63adaef176b093ba
ksh-debuginfo-20120801-21.el6_6.2.x86_64.rpm
    MD5: ea638080e9ea2942164024c5bf4194b1SHA-256: 5f5f47b3b4e9f5d752a0cf0640426c2090fe58c801fd570c93fe524e9aad3e83
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ksh-20120801-21.el6_6.2.src.rpm
    MD5: 2205ff2439d967cc131262ff78763ce7SHA-256: aee274f0fccbafadef7e4ef34af089e28c265bd72e7121ab52bf880c432d6099
 
x86_64:
ksh-20120801-21.el6_6.2.x86_64.rpm
    MD5: 0a53ac2e79505ffc2a0c3575b3531136SHA-256: 69a7a6d14800322a0f52c9c1a78ab34f4b7394619a1f251f63adaef176b093ba
ksh-debuginfo-20120801-21.el6_6.2.x86_64.rpm
    MD5: ea638080e9ea2942164024c5bf4194b1SHA-256: 5f5f47b3b4e9f5d752a0cf0640426c2090fe58c801fd570c93fe524e9aad3e83
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ksh-20120801-21.el6_6.2.src.rpm
    MD5: 2205ff2439d967cc131262ff78763ce7SHA-256: aee274f0fccbafadef7e4ef34af089e28c265bd72e7121ab52bf880c432d6099
 
IA-32:
ksh-20120801-21.el6_6.2.i686.rpm
    MD5: 5718ed27bda6cb6644bf125148c26e0dSHA-256: 2166b5c858c295fa099e8b3bfbde80646d61614c38137814ddadaec371941160
ksh-debuginfo-20120801-21.el6_6.2.i686.rpm
    MD5: 74f85eaa9c97c417bdecdef90529a003SHA-256: c203356b21777792e77e53e25568fef70f58233cd700d88532067f332e6030f2
 
PPC:
ksh-20120801-21.el6_6.2.ppc64.rpm
    MD5: 88a77f0bf8a219e310a952c44327cae2SHA-256: c3d12f1b8cb041d19f8ac3647235de697bd6e193c2e45b4efcb56695ed7b5ae3
ksh-debuginfo-20120801-21.el6_6.2.ppc64.rpm
    MD5: 87ceeab92b539c032686d4c19b0a6dd9SHA-256: fc94ac5437e535e55cb67e02f05b8617358ef22bf6d3e69d20b24d57db49f223
 
s390x:
ksh-20120801-21.el6_6.2.s390x.rpm
    MD5: 33a2ca424d3994f92a91342e11d1aa89SHA-256: 3e9497dbb8a9ed32d8405373dbed931cdb39f6c3b8f9c66dafee6f082a2e3715
ksh-debuginfo-20120801-21.el6_6.2.s390x.rpm
    MD5: 95c1203e0386ccf69e9dd9d5b6c332c7SHA-256: 93f36b6de5c112fd07a21179ff2d0e22dcef28d89e26e1f1f6c8e43aa9f9b280
 
x86_64:
ksh-20120801-21.el6_6.2.x86_64.rpm
    MD5: 0a53ac2e79505ffc2a0c3575b3531136SHA-256: 69a7a6d14800322a0f52c9c1a78ab34f4b7394619a1f251f63adaef176b093ba
ksh-debuginfo-20120801-21.el6_6.2.x86_64.rpm
    MD5: ea638080e9ea2942164024c5bf4194b1SHA-256: 5f5f47b3b4e9f5d752a0cf0640426c2090fe58c801fd570c93fe524e9aad3e83
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
ksh-20120801-21.el6_6.2.src.rpm
    MD5: 2205ff2439d967cc131262ff78763ce7SHA-256: aee274f0fccbafadef7e4ef34af089e28c265bd72e7121ab52bf880c432d6099
 
IA-32:
ksh-20120801-21.el6_6.2.i686.rpm
    MD5: 5718ed27bda6cb6644bf125148c26e0dSHA-256: 2166b5c858c295fa099e8b3bfbde80646d61614c38137814ddadaec371941160
ksh-debuginfo-20120801-21.el6_6.2.i686.rpm
    MD5: 74f85eaa9c97c417bdecdef90529a003SHA-256: c203356b21777792e77e53e25568fef70f58233cd700d88532067f332e6030f2
 
PPC:
ksh-20120801-21.el6_6.2.ppc64.rpm
    MD5: 88a77f0bf8a219e310a952c44327cae2SHA-256: c3d12f1b8cb041d19f8ac3647235de697bd6e193c2e45b4efcb56695ed7b5ae3
ksh-debuginfo-20120801-21.el6_6.2.ppc64.rpm
    MD5: 87ceeab92b539c032686d4c19b0a6dd9SHA-256: fc94ac5437e535e55cb67e02f05b8617358ef22bf6d3e69d20b24d57db49f223
 
s390x:
ksh-20120801-21.el6_6.2.s390x.rpm
    MD5: 33a2ca424d3994f92a91342e11d1aa89SHA-256: 3e9497dbb8a9ed32d8405373dbed931cdb39f6c3b8f9c66dafee6f082a2e3715
ksh-debuginfo-20120801-21.el6_6.2.s390x.rpm
    MD5: 95c1203e0386ccf69e9dd9d5b6c332c7SHA-256: 93f36b6de5c112fd07a21179ff2d0e22dcef28d89e26e1f1f6c8e43aa9f9b280
 
x86_64:
ksh-20120801-21.el6_6.2.x86_64.rpm
    MD5: 0a53ac2e79505ffc2a0c3575b3531136SHA-256: 69a7a6d14800322a0f52c9c1a78ab34f4b7394619a1f251f63adaef176b093ba
ksh-debuginfo-20120801-21.el6_6.2.x86_64.rpm
    MD5: ea638080e9ea2942164024c5bf4194b1SHA-256: 5f5f47b3b4e9f5d752a0cf0640426c2090fe58c801fd570c93fe524e9aad3e83
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ksh-20120801-21.el6_6.2.src.rpm
    MD5: 2205ff2439d967cc131262ff78763ce7SHA-256: aee274f0fccbafadef7e4ef34af089e28c265bd72e7121ab52bf880c432d6099
 
IA-32:
ksh-20120801-21.el6_6.2.i686.rpm
    MD5: 5718ed27bda6cb6644bf125148c26e0dSHA-256: 2166b5c858c295fa099e8b3bfbde80646d61614c38137814ddadaec371941160
ksh-debuginfo-20120801-21.el6_6.2.i686.rpm
    MD5: 74f85eaa9c97c417bdecdef90529a003SHA-256: c203356b21777792e77e53e25568fef70f58233cd700d88532067f332e6030f2
 
x86_64:
ksh-20120801-21.el6_6.2.x86_64.rpm
    MD5: 0a53ac2e79505ffc2a0c3575b3531136SHA-256: 69a7a6d14800322a0f52c9c1a78ab34f4b7394619a1f251f63adaef176b093ba
ksh-debuginfo-20120801-21.el6_6.2.x86_64.rpm
    MD5: ea638080e9ea2942164024c5bf4194b1SHA-256: 5f5f47b3b4e9f5d752a0cf0640426c2090fe58c801fd570c93fe524e9aad3e83
 
(The unlinked packages above are only available from the Red Hat Network)
1195648 – Bash fix for CVE-2014-7169 breaks ksh scripts that try to clear the environment

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply