Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 5.

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bug:* Previously, the ksh shell did not filter environment variables it inherited.As a result, the ksh environment contained variables that ksh was not able touse or unset. This updated version filters variables duringinitialization, and thus no longer inherits variables that are invalid for ksh.As a result, ksh functions can now use all variables present in the environment.(BZ#1195655) Users of ksh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client)

SRPMS:
ksh-20100621-24.el5_11.src.rpm
    MD5: 83a04f130f1795335ba3915c8561f5beSHA-256: 2fa76a79b1512d1ce8bbfccd7a9d44136dd04a6da235d02529b7771c95dfcb32
 
IA-32:
ksh-20100621-24.el5_11.i386.rpm
    MD5: 2430c8823b99de94a703948f068e0f76SHA-256: e41c97d5c70190dd65643ed6fb17a6bef9d5022b493bd684fe3efae1f75ff99c
ksh-debuginfo-20100621-24.el5_11.i386.rpm
    MD5: f9c79620add3bce89ecf3b01a3618790SHA-256: ca799b1ed61bcc6d9335996bafa61aed930dca3af3e4ae411d1c7a07f37861b7
 
x86_64:
ksh-20100621-24.el5_11.x86_64.rpm
    MD5: f551c56f97973740383468a12b97db87SHA-256: 4228eaae5c6df9711980eaa2a356c72b5eb3953d36da7195c110528070076b21
ksh-debuginfo-20100621-24.el5_11.x86_64.rpm
    MD5: 01ac01e5450ee11e8c067d5060ced2a2SHA-256: b851dea99e3157959bfea6eef00be4dfd234fadd1ee7e9a1190212df27a4f524
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ksh-20100621-24.el5_11.src.rpm
    MD5: 83a04f130f1795335ba3915c8561f5beSHA-256: 2fa76a79b1512d1ce8bbfccd7a9d44136dd04a6da235d02529b7771c95dfcb32
 
IA-32:
ksh-20100621-24.el5_11.i386.rpm
    MD5: 2430c8823b99de94a703948f068e0f76SHA-256: e41c97d5c70190dd65643ed6fb17a6bef9d5022b493bd684fe3efae1f75ff99c
ksh-debuginfo-20100621-24.el5_11.i386.rpm
    MD5: f9c79620add3bce89ecf3b01a3618790SHA-256: ca799b1ed61bcc6d9335996bafa61aed930dca3af3e4ae411d1c7a07f37861b7
 
IA-64:
ksh-20100621-24.el5_11.ia64.rpm
    MD5: d84f60fdda7094d46abcc446fcd9ffe5SHA-256: 955b954721582c169fc3b39bfb760179295925ee9c2fe7dd40c7ab717a4f4be6
ksh-debuginfo-20100621-24.el5_11.ia64.rpm
    MD5: 2f76056cc6fad156b631129551c21114SHA-256: 3eda95e32c25378a1e2c65db51b38d166232edfaa97fb620135ac35703b33b50
 
PPC:
ksh-20100621-24.el5_11.ppc.rpm
    MD5: 26eb028694f074a8408b82692f7a06e0SHA-256: 80b46ca44dae4c04658ec048a9c97a253b11265d4d2444da7e1408a0fe879c3f
ksh-debuginfo-20100621-24.el5_11.ppc.rpm
    MD5: 2f699f708b4ee75ec737187cc207d03aSHA-256: 602c1dd3920cba8b26b07fb71a02c3fb9c1e3860531f6b6e5ff77f5b11ab4a82
 
s390x:
ksh-20100621-24.el5_11.s390x.rpm
    MD5: 1b49346dc3d20c36d67266c9d9681f67SHA-256: dfd335e64a3cebe91f9dd18c6d086a563f3daa37f74153d9fe6b5f41fb7e7b7f
ksh-debuginfo-20100621-24.el5_11.s390x.rpm
    MD5: 59a2514049a5bb30369feaefc88ba0feSHA-256: 7bf8f9f5a780fef04e22258ea618691bfa506a3ffd5109cc0e0f9cb2ce18890e
 
x86_64:
ksh-20100621-24.el5_11.x86_64.rpm
    MD5: f551c56f97973740383468a12b97db87SHA-256: 4228eaae5c6df9711980eaa2a356c72b5eb3953d36da7195c110528070076b21
ksh-debuginfo-20100621-24.el5_11.x86_64.rpm
    MD5: 01ac01e5450ee11e8c067d5060ced2a2SHA-256: b851dea99e3157959bfea6eef00be4dfd234fadd1ee7e9a1190212df27a4f524
 
(The unlinked packages above are only available from the Red Hat Network)
1195655 – Bash fix for CVE-2014-7169 breaks ksh scripts that try to clear the environment

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply