Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (sh) and includes many features of theC shell. The most recent version is KSH-93. KornShell complies with the POSIX.2standard (IEEE Std 1003.2-1992).This update fixes the following bug:* If the ksh shell was used as a login shell, it terminated unexpectedly whenredirecting standard output after a DEBUG signal trap was configured to createan empty file. This update fixes the underlying code and the described crash nolonger occurs. (BZ#1208853)Users of ksh are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ksh-20120801-21.el6_6.3.src.rpm
    MD5: 210a5a9db26fbff3d8359c289dbbe78aSHA-256: ba5d7dd9ba029255a93da564a54669a480ea8885fa4542ddd81e92d6b2e319cc
 
IA-32:
ksh-20120801-21.el6_6.3.i686.rpm
    MD5: a281a8aad1a30b88944bb5930357d3c1SHA-256: f24b47ebb2b79b97a92963cec3186ae741f709892526c85f141d480aabf65795
ksh-debuginfo-20120801-21.el6_6.3.i686.rpm
    MD5: b4a82161ef55354458422aa6cb2d1d00SHA-256: 406a5da9511dbda19b83273b2d49e684872377cc69549667ebb915acbb76c45b
 
x86_64:
ksh-20120801-21.el6_6.3.x86_64.rpm
    MD5: 8122d03cd76322089678575ed8348508SHA-256: fcda4143ed70fb1c9ad48d5346728a4866762d1325b6a844fa945061f3faf39f
ksh-debuginfo-20120801-21.el6_6.3.x86_64.rpm
    MD5: a9e2463c1d971f5f2641ed32994bfc93SHA-256: 4b1c86cba0058bcc992dedcec79de3974184ac2dc70fe0fad00e32040820a005
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ksh-20120801-21.el6_6.3.src.rpm
    MD5: 210a5a9db26fbff3d8359c289dbbe78aSHA-256: ba5d7dd9ba029255a93da564a54669a480ea8885fa4542ddd81e92d6b2e319cc
 
x86_64:
ksh-20120801-21.el6_6.3.x86_64.rpm
    MD5: 8122d03cd76322089678575ed8348508SHA-256: fcda4143ed70fb1c9ad48d5346728a4866762d1325b6a844fa945061f3faf39f
ksh-debuginfo-20120801-21.el6_6.3.x86_64.rpm
    MD5: a9e2463c1d971f5f2641ed32994bfc93SHA-256: 4b1c86cba0058bcc992dedcec79de3974184ac2dc70fe0fad00e32040820a005
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ksh-20120801-21.el6_6.3.src.rpm
    MD5: 210a5a9db26fbff3d8359c289dbbe78aSHA-256: ba5d7dd9ba029255a93da564a54669a480ea8885fa4542ddd81e92d6b2e319cc
 
IA-32:
ksh-20120801-21.el6_6.3.i686.rpm
    MD5: a281a8aad1a30b88944bb5930357d3c1SHA-256: f24b47ebb2b79b97a92963cec3186ae741f709892526c85f141d480aabf65795
ksh-debuginfo-20120801-21.el6_6.3.i686.rpm
    MD5: b4a82161ef55354458422aa6cb2d1d00SHA-256: 406a5da9511dbda19b83273b2d49e684872377cc69549667ebb915acbb76c45b
 
PPC:
ksh-20120801-21.el6_6.3.ppc64.rpm
    MD5: f1347596b1587e26ad4c591997f1c9a1SHA-256: 1afd5c0597652541a60865c20224640667dff4134eaf8b762d6e2d5d674608a0
ksh-debuginfo-20120801-21.el6_6.3.ppc64.rpm
    MD5: 97c20d6fbd00075bf4a554bb1e203885SHA-256: 94e19ff786fef0bf7775bcbf29113f86015730b4acbcdab6ec8bfee9cb448b29
 
s390x:
ksh-20120801-21.el6_6.3.s390x.rpm
    MD5: bf0abd57daffcb300705939670972f89SHA-256: bf4cbb93c402a1f2b1bafddd868f5c51319020ecefe2970621a76150189eb98d
ksh-debuginfo-20120801-21.el6_6.3.s390x.rpm
    MD5: 9b9907f1d0606c5509539f5bcc86b78cSHA-256: ad1fd0baf6783d4f5c9b384e4b68e7eae1e5df464837d6af809e867f4c6e2d92
 
x86_64:
ksh-20120801-21.el6_6.3.x86_64.rpm
    MD5: 8122d03cd76322089678575ed8348508SHA-256: fcda4143ed70fb1c9ad48d5346728a4866762d1325b6a844fa945061f3faf39f
ksh-debuginfo-20120801-21.el6_6.3.x86_64.rpm
    MD5: a9e2463c1d971f5f2641ed32994bfc93SHA-256: 4b1c86cba0058bcc992dedcec79de3974184ac2dc70fe0fad00e32040820a005
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
ksh-20120801-21.el6_6.3.src.rpm
    MD5: 210a5a9db26fbff3d8359c289dbbe78aSHA-256: ba5d7dd9ba029255a93da564a54669a480ea8885fa4542ddd81e92d6b2e319cc
 
IA-32:
ksh-20120801-21.el6_6.3.i686.rpm
    MD5: a281a8aad1a30b88944bb5930357d3c1SHA-256: f24b47ebb2b79b97a92963cec3186ae741f709892526c85f141d480aabf65795
ksh-debuginfo-20120801-21.el6_6.3.i686.rpm
    MD5: b4a82161ef55354458422aa6cb2d1d00SHA-256: 406a5da9511dbda19b83273b2d49e684872377cc69549667ebb915acbb76c45b
 
PPC:
ksh-20120801-21.el6_6.3.ppc64.rpm
    MD5: f1347596b1587e26ad4c591997f1c9a1SHA-256: 1afd5c0597652541a60865c20224640667dff4134eaf8b762d6e2d5d674608a0
ksh-debuginfo-20120801-21.el6_6.3.ppc64.rpm
    MD5: 97c20d6fbd00075bf4a554bb1e203885SHA-256: 94e19ff786fef0bf7775bcbf29113f86015730b4acbcdab6ec8bfee9cb448b29
 
s390x:
ksh-20120801-21.el6_6.3.s390x.rpm
    MD5: bf0abd57daffcb300705939670972f89SHA-256: bf4cbb93c402a1f2b1bafddd868f5c51319020ecefe2970621a76150189eb98d
ksh-debuginfo-20120801-21.el6_6.3.s390x.rpm
    MD5: 9b9907f1d0606c5509539f5bcc86b78cSHA-256: ad1fd0baf6783d4f5c9b384e4b68e7eae1e5df464837d6af809e867f4c6e2d92
 
x86_64:
ksh-20120801-21.el6_6.3.x86_64.rpm
    MD5: 8122d03cd76322089678575ed8348508SHA-256: fcda4143ed70fb1c9ad48d5346728a4866762d1325b6a844fa945061f3faf39f
ksh-debuginfo-20120801-21.el6_6.3.x86_64.rpm
    MD5: a9e2463c1d971f5f2641ed32994bfc93SHA-256: 4b1c86cba0058bcc992dedcec79de3974184ac2dc70fe0fad00e32040820a005
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ksh-20120801-21.el6_6.3.src.rpm
    MD5: 210a5a9db26fbff3d8359c289dbbe78aSHA-256: ba5d7dd9ba029255a93da564a54669a480ea8885fa4542ddd81e92d6b2e319cc
 
IA-32:
ksh-20120801-21.el6_6.3.i686.rpm
    MD5: a281a8aad1a30b88944bb5930357d3c1SHA-256: f24b47ebb2b79b97a92963cec3186ae741f709892526c85f141d480aabf65795
ksh-debuginfo-20120801-21.el6_6.3.i686.rpm
    MD5: b4a82161ef55354458422aa6cb2d1d00SHA-256: 406a5da9511dbda19b83273b2d49e684872377cc69549667ebb915acbb76c45b
 
x86_64:
ksh-20120801-21.el6_6.3.x86_64.rpm
    MD5: 8122d03cd76322089678575ed8348508SHA-256: fcda4143ed70fb1c9ad48d5346728a4866762d1325b6a844fa945061f3faf39f
ksh-debuginfo-20120801-21.el6_6.3.x86_64.rpm
    MD5: a9e2463c1d971f5f2641ed32994bfc93SHA-256: 4b1c86cba0058bcc992dedcec79de3974184ac2dc70fe0fad00e32040820a005
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply