6.6 C
London
Friday, November 24, 2017
Home Tags Bourne

Tag: Bourne

Original release date: September 25, 2014 | Last revised: September 26, 2014Systems Affected GNU Bash through 4.3.Linux and Mac OS X systems, on which Bash is part of the base operating system.Any BSD or UNIX system on which GNU Bash has been installed as an add-on.Any UNIX-like operating system on which the /bin/sh interface is implemented as GNU Bash.Overview A critical vulnerability has been reported in the GNU Bourne-Again Shell (Bash), the common command-line shell used in many Linux/UNIX operating systems and Apple’s Mac OS X. The flaw could allow an attacker to remotely execute shell commands by attaching malicious code in environment variables used by the operating system [1]. The United States Department of Homeland Security (DHS) is releasing this Technical Alert to provide further information about the GNU Bash vulnerability. Description GNU Bash versions 1.14 through 4.3 contain a flaw that processes commands placed after function definitions in the added environment variable, allowing remote attackers to execute arbitrary code via a crafted environment which enables network-based exploitation. [2, 3]Critical instances where the vulnerability may be exposed include: [4, 5]Apache HTTP Server using mod_cgi or mod_cgid scripts either written in bash, or spawn GNU Bash subshells, or on any system where the /bin/sh interface is implemented using GNU Bash.Override or Bypass ForceCommand feature in OpenSSH sshd and limited protection for some Git and Subversion deployments used to restrict shells and allows arbitrary command execution capabilities. This data path is vulnerable on systems where the /bin/sh interface is implemented using GNU Bash.Allow arbitrary commands to run on a DHCP client machine.Impact This vulnerability is classified by industry standards as “High” impact with CVSS Impact Subscore 10 and “Low” on complexity, which means it takes little skill to perform. This flaw allows attackers who can provide specially crafted environment variables containing arbitrary commands to execute on vulnerable systems. It is especially dangerous because of the prevalent use of the Bash shell and its ability to be called by an application in numerous ways. Solution Patches have been released to fix this vulnerability by major Linux vendors for affected versions. Solutions for CVE-2014-6271 do not completely resolve the vulnerability. It is advised to install existing patches and pay attention for updated patches to address CVE-2014-7169.Many UNIX-like operating systems, including Linux distributions and Apple Mac OS X include Bash and are likely to be affected. Contact your vendor for updated information. A list of vendors can be found in CERT Vulnerability Note VU#252743 [6].US-CERT recommends system administrators review the vendor patches and the NIST Vulnerability Summary for CVE-2014-7169, to mitigate damage caused by the exploit. References Ars Technica, Bug in Bash shell creates big security hole on anything with *nix in it; DHS NCSD; Vulnerability Summary for CVE-2014-6271 DHS NCSD; Vulnerability Summary for CVE-2014-7169 Red Hat, CVE-2014-6271 Red Hat, Bash specially-crafted environment variables code injection attack CERT Vulnerability Note VU#252743 Revision History September 25, 2014 - Initial Release September 26, 2014 - Minor Revisions This product is provided subject to this Notification and this Privacy & Use policy.
"Shellshock" bug in common GNU shell could be "worm-able," used to launch kernel exploits.
A bug in the Bash software used to control the command prompt in many Unix computers could be a bigger threat than the Heartbleed OpenSSL bug, security experts have warned. They have urged any organisation running Unix-based computers should install the security update immediately. Hackers could exploit the flaw in Bash (Bourne Again Shell) to take complete control of a targeted system, prompting the UK Computer Emergency Response Team (CERT-UK) to issue an alert. According to the alert, the Bash bug affects Unix-based operating systems, including Linux. However, CERT-UK said it is not yet clear whether other Unix-based systems, such as Apple’s Mac OS X, Google’s Android and other embedded systems in internet of things (IoT) devices, are affected. To test if a system is vulnerable, CERT-UK said users can enter the command: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If the system is vulnerable, the output will be: vulnerable this is a test An unaffected (or patched) system will output: bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x'  this is a test Bash bug presents threat to enterprise data  Security experts say the bug is easier to exploit and is a greater threat than the Heartbleed bug that only allowed attackers to spy on computers, not to take complete control. This means anyone exploiting the bug could access and potentially manipulate sensitive information on targeted Unix-based machines. This is of particular concern for enterprises, because a large proportion of enterprise servers are Unix-based. The US-CERT said a GNU Bash patch is available for experienced users and administrators. Other users are advised to get the necessary security update from software makers such as RedHat. Updates are also available for CentOS, Debian and Ubuntu, but Apple has yet to make an announcement about an update for OS X. However, a Stack Exchange post describes how Mac users can check for the vulnerability and patch it if necessary. Security experts have urged companies to seek and patch all vulnerable computers, but have warned that this could take some time for large organisations. Businesses still reeling from Heartbleed OpenSSL bug Some organisations have struggled to install security updates for all their systems affected by the Heartbleed bug discovered in April 2014. The flaw in some versions of the open-source encryption software OpenSSL put the data of millions of organisations at risk. Anyone exploiting the Bash bug could access and potentially manipulate sensitive information on targeted Unix-based machines At the time the bug was discovered, affected versions of OpenSSL were believed to have been in use by about two-thirds of all websites. The discovery of the bug also forced technology companies to issue security patches for hundreds of mainly networking products that use OpenSSL. Like Heartbleed, the Bash bug affects millions of computers because the bug existed long before it was made public and the Bash software is installed on most Unix-based computers. Some security experts believe warned that devices connected to the internet of things could be at high risk because their software commonly uses Bash scripts, and is unlikely to be patched. According to Alan Woodward of the University of Surrey, the Bash bug may represent a much greater threat than Heartbleed. “What many do not realise is that over 50% of active websites run on a web server called Apache which runs on Unix, and hence is potentially vulnerable. “As we have just passed the point where there are one billion active websites – that means in excess of 500 million sites could be vulnerable to this security flaw, compared with only 500,000 for the Heartbleed bug,” he said. Woodward said although software producers are rushing out patches for the main Unix systems affected, this assumes that their owners know about the problem and apply the fix.  “It also does not reach the many other systems and devices that are potentially affected where Linux runs in the background, nearly always unknown to the owner, such as home Wi-Fi routers,” he said. If these devices are included, Woodward said the number of potentially vulnerable systems is enormous. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK
Could allow attackers to execute code on Linux, Unix, and Mac OS X.
Updated bash Shift_JIS packages that fix one security issue are nowavailable for Red Hat Enterprise Linux 5 and 6.Red Hat Product Security has rated this update as having Critical securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. The GNU Bourne Again shell (Bash) is a shell and command languageinterpreter compatible with the Bourne shell (sh). Bash is the defaultshell for Red Hat Enterprise Linux.Shift_JIS, also known as "SJIS", is a character encoding for the Japaneselanguage. This package provides bash support for the Shift_JIS encoding.A flaw was found in the way Bash evaluated certain specially craftedenvironment variables. An attacker could use this flaw to override orbypass environment restrictions to execute shell commands. Certainservices and applications allow remote unauthenticated attackers toprovide environment variables, allowing them to exploit this issue.(CVE-2014-6271)For additional information on the CVE-2014-6271 flaw, refer to theKnowledgebase article at https://access.redhat.com/articles/1200223Red Hat would like to thank Stephane Chazelas for reporting this issue.All users who require Shift_JIS encoding support with Bash built-infunctions are advised to upgrade to these updated packages, which contain abackported patch to correct this issue. Before applying this update, make sure all previously released errata relevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258Red Hat Enterprise S-JIS Service SRPMS: bash-3.2-33.el5_11.1.sjis.1.src.rpm     MD5: 0ae58c0c1db073e4dd377fb3ab87f5a0SHA-256: e73b2394a61863d39e6fee9181d87c2f8673065e3c8d3a2b7b0f5093eaa97a9f bash-4.1.2-15.el6_5.1.sjis.1.src.rpm     MD5: 289cd49f2344982742bcec50ef3c9de3SHA-256: 013c424a37c75f93471ec86c8e14f103ae9da1b7ac2e34a0913f012b0532f1ee   IA-32: bash-3.2-33.el5_11.1.sjis.1.i386.rpm     MD5: ebae12e60d6d7bdf0539225ec44251f8SHA-256: 65d4d331d7231e85fc7d9899a63897e3e87899fed81de410440cf23dc477ae7f bash-4.1.2-15.el6_5.1.sjis.1.i686.rpm     MD5: f7570840681485a372a4a0b6484105f6SHA-256: c8e3f3871202ee7dbf932771b1517a81462494a103f1e0d016cbce445ca20266 bash-debuginfo-3.2-33.el5_11.1.sjis.1.i386.rpm     MD5: da0bdaf4bcf078b8c4963336f457e432SHA-256: 4f5159e7d5a1794ee6927c54b6c0f3db1f553091a2383e36f31ec2c1d56e61d6 bash-debuginfo-4.1.2-15.el6_5.1.sjis.1.i686.rpm     MD5: 1955b5c6c7d15256fbc78d93ec406f50SHA-256: 2af744c54e9951cd19b8ff8ceb8aac2222378173c801700a3b381dd5d937fcaa bash-doc-4.1.2-15.el6_5.1.sjis.1.i686.rpm     MD5: e9c7f180944c67cf16db0b6e26b59293SHA-256: f0597650a6056b4592dbdf3e122759651a4e02d9eeac72b11299706ef8c09792   IA-64: bash-3.2-33.el5_11.1.sjis.1.i386.rpm     MD5: ebae12e60d6d7bdf0539225ec44251f8SHA-256: 65d4d331d7231e85fc7d9899a63897e3e87899fed81de410440cf23dc477ae7f bash-3.2-33.el5_11.1.sjis.1.ia64.rpm     MD5: 06cc0ade013bea360128aee976887aeaSHA-256: dc2f6368a202af4de60fc9b13ada35ef4cdce26602586fb0c76b8bf509180c2f bash-debuginfo-3.2-33.el5_11.1.sjis.1.i386.rpm     MD5: da0bdaf4bcf078b8c4963336f457e432SHA-256: 4f5159e7d5a1794ee6927c54b6c0f3db1f553091a2383e36f31ec2c1d56e61d6 bash-debuginfo-3.2-33.el5_11.1.sjis.1.ia64.rpm     MD5: 6bed9bfd152bfa1edea26866b5b91c54SHA-256: cbbee113ed5294d371ee7351e9440fc046ba4bae7b925058b00caf31c3d87999   x86_64: bash-3.2-33.el5_11.1.sjis.1.x86_64.rpm     MD5: dda5dc1e683296524aeaa78396fd1a65SHA-256: 610b03375fae5931aa38b3f16ccd591c61186ceac05ebac7ae562bfd9ad65eed bash-4.1.2-15.el6_5.1.sjis.1.x86_64.rpm     MD5: 04821778c2d53440410091cebbce74b5SHA-256: 85733a2b52456106d25e4cdfd2a76eeec2339e400d5f94d0105fe2821d874c12 bash-debuginfo-3.2-33.el5_11.1.sjis.1.x86_64.rpm     MD5: afff781afc66070f2896557cb5bdc4ceSHA-256: e22c3cf8f3d5f063bb9ba204c1f91573f4434956640856225edb0365cd6ac6ed bash-debuginfo-4.1.2-15.el6_5.1.sjis.1.x86_64.rpm     MD5: e89adb8ab04aa898811a5dc3e50f8031SHA-256: 590a4ab0b902312df6f8b98a278732780d5ada846ae5e67795b1e968adf0659b bash-doc-4.1.2-15.el6_5.1.sjis.1.x86_64.rpm     MD5: 0bf97c7b1b9043884ca14f613e46129eSHA-256: fb564593d14b26668dd802a856dc80a41341b72d4b7a0b95221901423e1a31a7   (The unlinked packages above are only available from the Red Hat Network) 1141597 - CVE-2014-6271 bash: specially-crafted environment variables can be used to inject shell commands These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Updated bash packages that fix one security issue are now available for RedHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat EnterpriseLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,Red Hat Enterprise Linux 6.2 Advanced Update Support, and Red HatEnterprise Linux 6.4 Extended Update Support.Red Hat Product Security has rated this update as having Critical securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. The GNU Bourne Again shell (Bash) is a shell and command languageinterpreter compatible with the Bourne shell (sh). Bash is the defaultshell for Red Hat Enterprise Linux.A flaw was found in the way Bash evaluated certain specially craftedenvironment variables. An attacker could use this flaw to override orbypass environment restrictions to execute shell commands. Certainservices and applications allow remote unauthenticated attackers toprovide environment variables, allowing them to exploit this issue.(CVE-2014-6271)For additional information on the CVE-2014-6271 flaw, refer to theKnowledgebase article at https://access.redhat.com/articles/1200223Red Hat would like to thank Stephane Chazelas for reporting this issue.All bash users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. Before applying this update, make sure all previously released errata relevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258Red Hat Enterprise Linux ELS (v. 4) SRPMS: bash-3.0-27.el4.2.src.rpm     MD5: 46513142d0bcec11c7e1b66b16368ae1SHA-256: ddfa1244deb1d1a7ae90d83ceec291abdbe83f218c0266fabc96b15cc7fa6c2a   IA-32: bash-3.0-27.el4.2.i386.rpm     MD5: 44a88cb076d84c1639cdbc5598d1ffa2SHA-256: 4e9525774fcdd451d71c1940a2276e23ec98b0617a813e1e80ef8de9784d22ad   IA-64: bash-3.0-27.el4.2.i386.rpm     MD5: 44a88cb076d84c1639cdbc5598d1ffa2SHA-256: 4e9525774fcdd451d71c1940a2276e23ec98b0617a813e1e80ef8de9784d22ad bash-3.0-27.el4.2.ia64.rpm     MD5: a7f73c3ebac478456cecb0641bb31838SHA-256: 85aa44707853f5881330b8baf4ddf537a9eea5a323b4bf46238c697d82db82de   x86_64: bash-3.0-27.el4.2.x86_64.rpm     MD5: 9e6774098a4d6fe7b389170b45be828eSHA-256: b5c788167f3fa5fabf9e0efcdb78a391a670b0026ce11ba657ac87a679084a86   Red Hat Enterprise Linux EUS (v. 5.9.z server) SRPMS: bash-3.2-32.el5_9.2.src.rpm     MD5: 91f49bcf5c9b2446d0591848bb7730bdSHA-256: 8b4359d4050424fe967c17455f4434488a1122531e2c909ae4f61a96bc7fca38   IA-32: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5   IA-64: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-3.2-32.el5_9.2.ia64.rpm     MD5: 476f9191b9a1bf27969f04e1194e4658SHA-256: 4637dde859e70feae066fd7ee578fd496e1d3378a5e84c11caafa52884095b95 bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5 bash-debuginfo-3.2-32.el5_9.2.ia64.rpm     MD5: 653aed4c04b0e40a0135365f1ebe4936SHA-256: 75189926eb4077ac6fef9a8c14bd797b0c1df8ea5dde55d3eaef343bb2133e83   PPC: bash-3.2-32.el5_9.2.ppc.rpm     MD5: b2fc481289790fecd97d60ae736a5138SHA-256: d7a436d1fdbc68de6adb09bf242c9ad9829bfdbfa382c9a09d7e4fc5281f93cf bash-debuginfo-3.2-32.el5_9.2.ppc.rpm     MD5: 7a27cde2dc4f35f1d3786a70b6146416SHA-256: 6a5d6e573da12dac02f55d1bd1f550769a3570b29d6455409f1dc339dbb676fe   s390x: bash-3.2-32.el5_9.2.s390x.rpm     MD5: ab46a3621a8b726d43a55d7b814652abSHA-256: 548b97e62a6cdf8ac2094f1d6d23070c8868242ee6a4bc9e1c08334de643748a bash-debuginfo-3.2-32.el5_9.2.s390x.rpm     MD5: 4562850755ede5f685397b7ac5ec36bbSHA-256: 696f50eb41bafd82d14395186748e3f3ac9a5d74fc52081118e20314cc37701b   x86_64: bash-3.2-32.el5_9.2.x86_64.rpm     MD5: 3adf3d9675dabede987d59e633d922edSHA-256: 8a7bc45406007938a390399ce3ec8a9244814eabc04e9ff8dc21a37b66f6bffb bash-debuginfo-3.2-32.el5_9.2.x86_64.rpm     MD5: 6a2b084fdd5d04edaf2a099011a10d33SHA-256: f27907cf3708f48ae92f77cc38711c7f2335d719c9c3ebf550046f769cd66b8f   Red Hat Enterprise Linux Long Life (v. 5.6 server) SRPMS: bash-3.2-24.el5_6.1.src.rpm     MD5: 00d1bf030a43ee2d25619bb6fcd2b527SHA-256: 35d6252f1b01db8d330591d5be2ae41ad6bbdc71939509e68c8fa717f36ed6ca   IA-32: bash-3.2-24.el5_6.1.i386.rpm     MD5: f1e61f3eb2918733ee418fe08eedf4ccSHA-256: e3264238ad7effececabee181433b599941e5c7a1e33a315b0a8b664f6d5e725 bash-debuginfo-3.2-24.el5_6.1.i386.rpm     MD5: 717dbef51bd199fa9642d8caed3a5338SHA-256: 73ea4005c82744684392e35db2d96fd0505cdcc7769e4eb82708880db0b74e1a   IA-64: bash-3.2-24.el5_6.1.i386.rpm     MD5: f1e61f3eb2918733ee418fe08eedf4ccSHA-256: e3264238ad7effececabee181433b599941e5c7a1e33a315b0a8b664f6d5e725 bash-3.2-24.el5_6.1.ia64.rpm     MD5: ee5764456404f2bac2751e4aa812aa2bSHA-256: a2a1beb99735263c01e744a95a19c46ff1b9fc0481f11d7f7ca462d8c1221ebd bash-debuginfo-3.2-24.el5_6.1.i386.rpm     MD5: 717dbef51bd199fa9642d8caed3a5338SHA-256: 73ea4005c82744684392e35db2d96fd0505cdcc7769e4eb82708880db0b74e1a bash-debuginfo-3.2-24.el5_6.1.ia64.rpm     MD5: 984089a0ce85e1e072773f66ada20af4SHA-256: 57db77022719dbc2462c50d7643d3bdd8c1bfed4ed053b0fd011a006e7af5d95   x86_64: bash-3.2-24.el5_6.1.x86_64.rpm     MD5: 78198169084d0e3a44cc80e6bca84d4eSHA-256: f83f3724931258bb01e704e3c696b3731e9cb2577f1d691ffc1b66097b8db854 bash-debuginfo-3.2-24.el5_6.1.x86_64.rpm     MD5: 63cdfc99d680236569506b64d5d01298SHA-256: 68d0b0f7c833a7f6aa90f6fb6b6e69d68a853945da2ce595737870b40bf7a527   Red Hat Enterprise Linux Long Life (v. 5.9 server) SRPMS: bash-3.2-32.el5_9.2.src.rpm     MD5: 91f49bcf5c9b2446d0591848bb7730bdSHA-256: 8b4359d4050424fe967c17455f4434488a1122531e2c909ae4f61a96bc7fca38   IA-32: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5   IA-64: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-3.2-32.el5_9.2.ia64.rpm     MD5: 476f9191b9a1bf27969f04e1194e4658SHA-256: 4637dde859e70feae066fd7ee578fd496e1d3378a5e84c11caafa52884095b95 bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5 bash-debuginfo-3.2-32.el5_9.2.ia64.rpm     MD5: 653aed4c04b0e40a0135365f1ebe4936SHA-256: 75189926eb4077ac6fef9a8c14bd797b0c1df8ea5dde55d3eaef343bb2133e83   x86_64: bash-3.2-32.el5_9.2.x86_64.rpm     MD5: 3adf3d9675dabede987d59e633d922edSHA-256: 8a7bc45406007938a390399ce3ec8a9244814eabc04e9ff8dc21a37b66f6bffb bash-debuginfo-3.2-32.el5_9.2.x86_64.rpm     MD5: 6a2b084fdd5d04edaf2a099011a10d33SHA-256: f27907cf3708f48ae92f77cc38711c7f2335d719c9c3ebf550046f769cd66b8f   Red Hat Enterprise Linux Server AUS (v. 6.2) SRPMS: bash-4.1.2-9.el6_2.1.src.rpm     MD5: a53b3946a8a3aeec8f7ad1ec4c29033fSHA-256: 6090ac4a03c5a01fe8a4202db69367312789ab8f91351a01acdf1e1b2b1efb9d   x86_64: bash-4.1.2-9.el6_2.1.x86_64.rpm     MD5: 0ec1a23c3b9656f05aaa996c8a64c62aSHA-256: 322e5fe859661034fae06051e4e0aedb72f1b2ba4c555a9d70e19f3c48e2c67f bash-debuginfo-4.1.2-9.el6_2.1.x86_64.rpm     MD5: 003b7b678a79320f9eb66ff59969c088SHA-256: dc16b43a27ec4efa5a217be2ea89496bfe62246b02f8c5d9c0e216f6bdca7f89 bash-doc-4.1.2-9.el6_2.1.x86_64.rpm     MD5: 4b7834fc2c19b0010c62a3c70edda69aSHA-256: 9c2c3eb9e77c84d62ea9c28487316b0d326d61bb5278ec7dd84220a522c046aa   Red Hat Enterprise Linux Server AUS (v. 6.4) SRPMS: bash-4.1.2-15.el6_4.1.src.rpm     MD5: 6a9a43ea30ea878f34829f77617e6bcfSHA-256: f36913f96ac8feced1d5583818e953607177287f639798da033b5709d4d814b7   x86_64: bash-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 2203a61b70470c0d769554f6bb1d5595SHA-256: a5eeb15d911ffea3eec36569ab260e74a34b9c1b53e41fdddebb7d2aa538a3be bash-debuginfo-4.1.2-15.el6_4.1.x86_64.rpm     MD5: cdbc91c3364e6a7b452fcb9cdb5927aaSHA-256: 45a4dad9016ba0ca01dde6039651a6dd67a649463247102de8f37bfaccef0e20 bash-doc-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 6575e7208030b9e516f781494378cfc0SHA-256: 5caea45de01c9d87274bba825e8637ae5605169e0f376e2ca7236c2866e274ac   Red Hat Enterprise Linux Server EUS (v. 6.4.z) SRPMS: bash-4.1.2-15.el6_4.1.src.rpm     MD5: 6a9a43ea30ea878f34829f77617e6bcfSHA-256: f36913f96ac8feced1d5583818e953607177287f639798da033b5709d4d814b7   IA-32: bash-4.1.2-15.el6_4.1.i686.rpm     MD5: e20adee273c65d2e6bde6b762ffbb4c3SHA-256: fee27cdafd664504c36c13ce752d9893eb987e9b16b6705ddd64849ae899d9b8 bash-debuginfo-4.1.2-15.el6_4.1.i686.rpm     MD5: e1cdb8fd8af5f66687614ca80c1e3435SHA-256: e5d67ab0a4d863ecb4ba015d0e1152eb61dbe7082e3bcb757548f1564210ca50 bash-doc-4.1.2-15.el6_4.1.i686.rpm     MD5: fd297708497fa5314b1743607ccef25aSHA-256: f843dbe375c7d0afce2e0d689c38e38465ac709fe254520d29a4113aefa03205   PPC: bash-4.1.2-15.el6_4.1.ppc64.rpm     MD5: a174af1349730837b1ea0c4bab1740cbSHA-256: d89519c8cf33c425d45fccd019d8afccd5c600f197d55ef91431de24975e807a bash-debuginfo-4.1.2-15.el6_4.1.ppc64.rpm     MD5: a11867a584636ba543cdddbc835e2134SHA-256: 9a000c48a2965d334b13419de5cae361d15d13ced0d939c946eebd3fc9bee70f bash-doc-4.1.2-15.el6_4.1.ppc64.rpm     MD5: cb1c5e42b4e5618c5d60312d6fa58af0SHA-256: f1ae58da6cc551644f76fe124b91c4eaf9abdff67eb3ea46de4ae0db3dbbdfec   s390x: bash-4.1.2-15.el6_4.1.s390x.rpm     MD5: 664beaae98005e91c595875633a4c702SHA-256: 4a2c86cd2df099bf887a1f6a599633228fa00c6ae2e9971c0f6055d72a80f1ad bash-debuginfo-4.1.2-15.el6_4.1.s390x.rpm     MD5: bb10e0e05ec8d377cf42c0440856bfaeSHA-256: d4fc1f76ee1764880e09b2b7e0bd7e325058ca2e7d213da9ae7ea147716f5cc7 bash-doc-4.1.2-15.el6_4.1.s390x.rpm     MD5: 652b335a5d0e12e497749fb6f3fdd726SHA-256: 53ed241961a634ff3e7fc39bd1f7877480e3d2deca4ed8957a661c828159f1a8   x86_64: bash-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 2203a61b70470c0d769554f6bb1d5595SHA-256: a5eeb15d911ffea3eec36569ab260e74a34b9c1b53e41fdddebb7d2aa538a3be bash-debuginfo-4.1.2-15.el6_4.1.x86_64.rpm     MD5: cdbc91c3364e6a7b452fcb9cdb5927aaSHA-256: 45a4dad9016ba0ca01dde6039651a6dd67a649463247102de8f37bfaccef0e20 bash-doc-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 6575e7208030b9e516f781494378cfc0SHA-256: 5caea45de01c9d87274bba825e8637ae5605169e0f376e2ca7236c2866e274ac   (The unlinked packages above are only available from the Red Hat Network) 1141597 - CVE-2014-6271 bash: specially-crafted environment variables can be used to inject shell commands These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Updated bash packages that fix one security issue are now available for RedHat Enterprise Linux 5, 6, and 7.Red Hat Product Security has rated this update as having Critical securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. The GNU Bourne Again shell (Bash) is a shell and command languageinterpreter compatible with the Bourne shell (sh). Bash is the defaultshell for Red Hat Enterprise Linux.A flaw was found in the way Bash evaluated certain specially craftedenvironment variables. An attacker could use this flaw to override orbypass environment restrictions to execute shell commands. Certainservices and applications allow remote unauthenticated attackers toprovide environment variables, allowing them to exploit this issue.(CVE-2014-6271)For additional information on the CVE-2014-6271 flaw, refer to theKnowledgebase article at https://access.redhat.com/articles/1200223Red Hat would like to thank Stephane Chazelas for reporting this issue.All bash users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. Red Hat Enterprise Linux (v. 5 server) SRPMS: bash-3.2-33.el5.1.src.rpm     MD5: 277b8da91e6ed93fec8341f8ac0ccdfaSHA-256: 3ea139447e5f3fbd07160a2a0c5e3335595d3058d822901ed16a573fae4f1077   IA-32: bash-3.2-33.el5.1.i386.rpm     MD5: 148ffa69f644ecdda09521f9a2809377SHA-256: 522b2861136e45f47a99b55e2d4c3ab6f0b75a6a3a06efc836a542ba1d97b105 bash-debuginfo-3.2-33.el5.1.i386.rpm     MD5: a35f1322ccf075a781f7261ea24d1116SHA-256: 8cec0648d5ae5c927de58a882c174e2681124ea0a019b1f3acc82dc41ed0f8ce   IA-64: bash-3.2-33.el5.1.i386.rpm     MD5: 148ffa69f644ecdda09521f9a2809377SHA-256: 522b2861136e45f47a99b55e2d4c3ab6f0b75a6a3a06efc836a542ba1d97b105 bash-3.2-33.el5.1.ia64.rpm     MD5: 1ab118721ab182b3e5dfa44bdf464de3SHA-256: a9faad5298d9cc079417e1202e7d320edb9049fb86b217b25bb646eaec600d1d bash-debuginfo-3.2-33.el5.1.i386.rpm     MD5: a35f1322ccf075a781f7261ea24d1116SHA-256: 8cec0648d5ae5c927de58a882c174e2681124ea0a019b1f3acc82dc41ed0f8ce bash-debuginfo-3.2-33.el5.1.ia64.rpm     MD5: 03a5819bf1c0418651ed181b603801f9SHA-256: 39244a0f15d680e7439d81fb9944f090ec124498f26248f96eeae0ea9702ec31   PPC: bash-3.2-33.el5.1.ppc.rpm     MD5: 8988b1063c1f3f4313b5b21e2ea0123dSHA-256: b3bb2d85bb5fa30be8549c2f52419a54073c2e2a4753d4340996c14a0ca55525 bash-debuginfo-3.2-33.el5.1.ppc.rpm     MD5: 4f19e6a6e813b4bb8413c51e9be68ba4SHA-256: 32e22a6aa35419c9e7b1a22f4ef8c0019a558c06bf563dd0e3b8e935307a8465   s390x: bash-3.2-33.el5.1.s390x.rpm     MD5: 5de8c80a855146eca05bd5252a828ce2SHA-256: 6901d5d1f8b76fa5be08bf0c448a18d6c6041c74e430daa19d101281ecb24340 bash-debuginfo-3.2-33.el5.1.s390x.rpm     MD5: 0094fa4df5c6eae11f9d34ceabab8e6eSHA-256: e558b149cb85207d8b1d2f2adeee6221604c4467ba541683588cfd008a34188d   x86_64: bash-3.2-33.el5.1.x86_64.rpm     MD5: 05af42ebf2e6b18ceda4ec68e86d97c4SHA-256: 760393f35d86476ac94147fe66035ca417ee03d5b950baa64084cc5a7edfe46a bash-debuginfo-3.2-33.el5.1.x86_64.rpm     MD5: f0baa6ddd1d0a827b56948fea54e832cSHA-256: fe9ef3e69887cac8a2b50075de4461575f9ac31c97b2c0075c760d2cac837755   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: bash-3.2-33.el5.1.src.rpm     MD5: 277b8da91e6ed93fec8341f8ac0ccdfaSHA-256: 3ea139447e5f3fbd07160a2a0c5e3335595d3058d822901ed16a573fae4f1077   IA-32: bash-3.2-33.el5.1.i386.rpm     MD5: 148ffa69f644ecdda09521f9a2809377SHA-256: 522b2861136e45f47a99b55e2d4c3ab6f0b75a6a3a06efc836a542ba1d97b105 bash-debuginfo-3.2-33.el5.1.i386.rpm     MD5: a35f1322ccf075a781f7261ea24d1116SHA-256: 8cec0648d5ae5c927de58a882c174e2681124ea0a019b1f3acc82dc41ed0f8ce   x86_64: bash-3.2-33.el5.1.x86_64.rpm     MD5: 05af42ebf2e6b18ceda4ec68e86d97c4SHA-256: 760393f35d86476ac94147fe66035ca417ee03d5b950baa64084cc5a7edfe46a bash-debuginfo-3.2-33.el5.1.x86_64.rpm     MD5: f0baa6ddd1d0a827b56948fea54e832cSHA-256: fe9ef3e69887cac8a2b50075de4461575f9ac31c97b2c0075c760d2cac837755   Red Hat Enterprise Linux Desktop (v. 6) SRPMS: bash-4.1.2-15.el6_5.1.src.rpm     MD5: 05be466cb5b282658110dfb714cf1793SHA-256: 36dce099832a8b0897951a467b1a4f863f7e366b5834de395cb3bc083941927b   IA-32: bash-4.1.2-15.el6_5.1.i686.rpm     MD5: b3d86398f0e1b0ba23b1dce5ed4c7915SHA-256: ab06b132b07804fea0fa00892ef8e93b92af642127602e218584bd5104435262 bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm     MD5: 0a465bcef24f8b63f3c903747b9dd22aSHA-256: 7041f3e9dbb1c5571b682715dd7367f3c0ae3ede494f13a4d099f58c307d2b47 bash-doc-4.1.2-15.el6_5.1.i686.rpm     MD5: 3db81453965f853022eeabe64d608bfdSHA-256: 7f4c1e304471c1b1b59e6960f2952713043d521e8830b2e0c0da52db8ef75e97   x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm     MD5: d35ac7eb24705ef5a444d50ab11ad7e7SHA-256: bedf1ed386b1f2ba951234f640ab674558443232e04aa7602931e31399fd0b98 bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 223b49f4d627495849423f64864d8642SHA-256: 14928dee110e0442283a3e1f510dd9cb675d4528ad241bf9c356cf40875d2c7e bash-doc-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 86ebcf954bf8e0da9e518ff5284e08d7SHA-256: d13218d1b252934ccbf33c92d771608ae26d809e0ef15c6dad40cda5da5d48ba   Red Hat Enterprise Linux Desktop (v. 7) SRPMS: bash-4.2.45-5.el7_0.2.src.rpm     MD5: 5d1739b3069ab69a6c18a9be6f466735SHA-256: be4640f473d67ffea1761a6ff2b5cb06e77b01cd612d317cad6e7723044c0ee8   x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 08692c55361fed4d8bf51190c842cafeSHA-256: f3be9d9ec189ced2096a8b5ce09359e1f8654f7e413683064b1f48aeaaeb0b11 bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 8384ea5761abee2757ae43e114cf7ed6SHA-256: aa4c42549b6ddbee4988d6d4154ee7d8863d4f49975d384d5843c83d5e5181e7 bash-doc-4.2.45-5.el7_0.2.x86_64.rpm     MD5: d4f76db9e5ecfe2a720aecab4504ac6aSHA-256: 53aa8014730d9b1505ed92ca962b0d52e732c4b2b63027471dfdf92d79a27f70   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: bash-4.1.2-15.el6_5.1.src.rpm     MD5: 05be466cb5b282658110dfb714cf1793SHA-256: 36dce099832a8b0897951a467b1a4f863f7e366b5834de395cb3bc083941927b   x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm     MD5: d35ac7eb24705ef5a444d50ab11ad7e7SHA-256: bedf1ed386b1f2ba951234f640ab674558443232e04aa7602931e31399fd0b98 bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 223b49f4d627495849423f64864d8642SHA-256: 14928dee110e0442283a3e1f510dd9cb675d4528ad241bf9c356cf40875d2c7e bash-doc-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 86ebcf954bf8e0da9e518ff5284e08d7SHA-256: d13218d1b252934ccbf33c92d771608ae26d809e0ef15c6dad40cda5da5d48ba   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: bash-4.2.45-5.el7_0.2.src.rpm     MD5: 5d1739b3069ab69a6c18a9be6f466735SHA-256: be4640f473d67ffea1761a6ff2b5cb06e77b01cd612d317cad6e7723044c0ee8   x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 08692c55361fed4d8bf51190c842cafeSHA-256: f3be9d9ec189ced2096a8b5ce09359e1f8654f7e413683064b1f48aeaaeb0b11 bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 8384ea5761abee2757ae43e114cf7ed6SHA-256: aa4c42549b6ddbee4988d6d4154ee7d8863d4f49975d384d5843c83d5e5181e7 bash-doc-4.2.45-5.el7_0.2.x86_64.rpm     MD5: d4f76db9e5ecfe2a720aecab4504ac6aSHA-256: 53aa8014730d9b1505ed92ca962b0d52e732c4b2b63027471dfdf92d79a27f70   Red Hat Enterprise Linux Server (v. 6) SRPMS: bash-4.1.2-15.el6_5.1.src.rpm     MD5: 05be466cb5b282658110dfb714cf1793SHA-256: 36dce099832a8b0897951a467b1a4f863f7e366b5834de395cb3bc083941927b   IA-32: bash-4.1.2-15.el6_5.1.i686.rpm     MD5: b3d86398f0e1b0ba23b1dce5ed4c7915SHA-256: ab06b132b07804fea0fa00892ef8e93b92af642127602e218584bd5104435262 bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm     MD5: 0a465bcef24f8b63f3c903747b9dd22aSHA-256: 7041f3e9dbb1c5571b682715dd7367f3c0ae3ede494f13a4d099f58c307d2b47 bash-doc-4.1.2-15.el6_5.1.i686.rpm     MD5: 3db81453965f853022eeabe64d608bfdSHA-256: 7f4c1e304471c1b1b59e6960f2952713043d521e8830b2e0c0da52db8ef75e97   PPC: bash-4.1.2-15.el6_5.1.ppc64.rpm     MD5: 42291d185fd9e3a1723477750f13f777SHA-256: 039def4a268de4fb23f0d9f2b5996d47f1601cb7e013631f1f7db0ae9303e341 bash-debuginfo-4.1.2-15.el6_5.1.ppc64.rpm     MD5: 9aad7a3627bcd130c4e1979a7892ef7cSHA-256: b959e3af41b162ed2b792c43964caf7135fbfa252b8b81c67c4ee4f600390d20 bash-doc-4.1.2-15.el6_5.1.ppc64.rpm     MD5: 124e110c8b4bf7365400a0e3795e6d1fSHA-256: 55addab114378e40bc9a04e3b98c936b1b1ae1bbc72a1af376569c6fcd414c16   s390x: bash-4.1.2-15.el6_5.1.s390x.rpm     MD5: 6bfb26a993b480de099a83309cf6f194SHA-256: 6b34b21ece549e3579922ed8850a502f78e320ae12b371df8506510462e5ba48 bash-debuginfo-4.1.2-15.el6_5.1.s390x.rpm     MD5: a1af0aa28e9dad6107017c4136e41be5SHA-256: a724c3bcc4ad920bc8073934d8c0d48a0a9a9391d3b90b298a64049cf9a4eb8c bash-doc-4.1.2-15.el6_5.1.s390x.rpm     MD5: 08baf44b9c0d2974041d9c1595ee20faSHA-256: b4c459c4713b42e07727bde675aa96c91f2e1a2fc11a94e0719d476d161ae89c   x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm     MD5: d35ac7eb24705ef5a444d50ab11ad7e7SHA-256: bedf1ed386b1f2ba951234f640ab674558443232e04aa7602931e31399fd0b98 bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 223b49f4d627495849423f64864d8642SHA-256: 14928dee110e0442283a3e1f510dd9cb675d4528ad241bf9c356cf40875d2c7e bash-doc-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 86ebcf954bf8e0da9e518ff5284e08d7SHA-256: d13218d1b252934ccbf33c92d771608ae26d809e0ef15c6dad40cda5da5d48ba   Red Hat Enterprise Linux Server (v. 7) SRPMS: bash-4.2.45-5.el7_0.2.src.rpm     MD5: 5d1739b3069ab69a6c18a9be6f466735SHA-256: be4640f473d67ffea1761a6ff2b5cb06e77b01cd612d317cad6e7723044c0ee8   PPC: bash-4.2.45-5.el7_0.2.ppc64.rpm     MD5: 2b491d5aa458370452b7d8416e308661SHA-256: a04c922dde33890f996e30ccc79b6547dfb46bbc21134613d0fb10b81850a3f2 bash-debuginfo-4.2.45-5.el7_0.2.ppc64.rpm     MD5: 28fb702b32edefa7ebf0073c7cd6aed6SHA-256: 7425e9583197aec67295b9ec64982d691f13ce06572e5ede7c9448c7f8eb0b69 bash-doc-4.2.45-5.el7_0.2.ppc64.rpm     MD5: c87259013e758f65de8e964bcecb22e2SHA-256: 0dea1ef33e7847a7f1f3cce2b27dd904ba9b095f620b7603d5c78a8ca6ddedb8   s390x: bash-4.2.45-5.el7_0.2.s390x.rpm     MD5: 6778b17261de6e047e395ee5ce3d8163SHA-256: bf2fed5e7633193cb26bf84ec2835f70385ee5c7e6640741eafc8ba2e481375d bash-debuginfo-4.2.45-5.el7_0.2.s390x.rpm     MD5: 343220a03ec01f36da590bbb486ddffbSHA-256: 8bf35dfebaf2cf55dc39cbcb3ccdafef864fb84adae8953fd9dfe43005b58008 bash-doc-4.2.45-5.el7_0.2.s390x.rpm     MD5: 5edf81530d52ebca2420cb524a1f7bf9SHA-256: 145466b13a61544ea102eaf7da7c13a0b7d755a5f525d5a2ff4a108963c0459c   x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 08692c55361fed4d8bf51190c842cafeSHA-256: f3be9d9ec189ced2096a8b5ce09359e1f8654f7e413683064b1f48aeaaeb0b11 bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 8384ea5761abee2757ae43e114cf7ed6SHA-256: aa4c42549b6ddbee4988d6d4154ee7d8863d4f49975d384d5843c83d5e5181e7 bash-doc-4.2.45-5.el7_0.2.x86_64.rpm     MD5: d4f76db9e5ecfe2a720aecab4504ac6aSHA-256: 53aa8014730d9b1505ed92ca962b0d52e732c4b2b63027471dfdf92d79a27f70   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: bash-4.1.2-15.el6_5.1.src.rpm     MD5: 05be466cb5b282658110dfb714cf1793SHA-256: 36dce099832a8b0897951a467b1a4f863f7e366b5834de395cb3bc083941927b   x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm     MD5: d35ac7eb24705ef5a444d50ab11ad7e7SHA-256: bedf1ed386b1f2ba951234f640ab674558443232e04aa7602931e31399fd0b98 bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 223b49f4d627495849423f64864d8642SHA-256: 14928dee110e0442283a3e1f510dd9cb675d4528ad241bf9c356cf40875d2c7e bash-doc-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 86ebcf954bf8e0da9e518ff5284e08d7SHA-256: d13218d1b252934ccbf33c92d771608ae26d809e0ef15c6dad40cda5da5d48ba   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: bash-4.1.2-15.el6_5.1.src.rpm     MD5: 05be466cb5b282658110dfb714cf1793SHA-256: 36dce099832a8b0897951a467b1a4f863f7e366b5834de395cb3bc083941927b   IA-32: bash-4.1.2-15.el6_5.1.i686.rpm     MD5: b3d86398f0e1b0ba23b1dce5ed4c7915SHA-256: ab06b132b07804fea0fa00892ef8e93b92af642127602e218584bd5104435262 bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm     MD5: 0a465bcef24f8b63f3c903747b9dd22aSHA-256: 7041f3e9dbb1c5571b682715dd7367f3c0ae3ede494f13a4d099f58c307d2b47 bash-doc-4.1.2-15.el6_5.1.i686.rpm     MD5: 3db81453965f853022eeabe64d608bfdSHA-256: 7f4c1e304471c1b1b59e6960f2952713043d521e8830b2e0c0da52db8ef75e97   PPC: bash-4.1.2-15.el6_5.1.ppc64.rpm     MD5: 42291d185fd9e3a1723477750f13f777SHA-256: 039def4a268de4fb23f0d9f2b5996d47f1601cb7e013631f1f7db0ae9303e341 bash-debuginfo-4.1.2-15.el6_5.1.ppc64.rpm     MD5: 9aad7a3627bcd130c4e1979a7892ef7cSHA-256: b959e3af41b162ed2b792c43964caf7135fbfa252b8b81c67c4ee4f600390d20 bash-doc-4.1.2-15.el6_5.1.ppc64.rpm     MD5: 124e110c8b4bf7365400a0e3795e6d1fSHA-256: 55addab114378e40bc9a04e3b98c936b1b1ae1bbc72a1af376569c6fcd414c16   s390x: bash-4.1.2-15.el6_5.1.s390x.rpm     MD5: 6bfb26a993b480de099a83309cf6f194SHA-256: 6b34b21ece549e3579922ed8850a502f78e320ae12b371df8506510462e5ba48 bash-debuginfo-4.1.2-15.el6_5.1.s390x.rpm     MD5: a1af0aa28e9dad6107017c4136e41be5SHA-256: a724c3bcc4ad920bc8073934d8c0d48a0a9a9391d3b90b298a64049cf9a4eb8c bash-doc-4.1.2-15.el6_5.1.s390x.rpm     MD5: 08baf44b9c0d2974041d9c1595ee20faSHA-256: b4c459c4713b42e07727bde675aa96c91f2e1a2fc11a94e0719d476d161ae89c   x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm     MD5: d35ac7eb24705ef5a444d50ab11ad7e7SHA-256: bedf1ed386b1f2ba951234f640ab674558443232e04aa7602931e31399fd0b98 bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 223b49f4d627495849423f64864d8642SHA-256: 14928dee110e0442283a3e1f510dd9cb675d4528ad241bf9c356cf40875d2c7e bash-doc-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 86ebcf954bf8e0da9e518ff5284e08d7SHA-256: d13218d1b252934ccbf33c92d771608ae26d809e0ef15c6dad40cda5da5d48ba   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: bash-4.1.2-15.el6_5.1.src.rpm     MD5: 05be466cb5b282658110dfb714cf1793SHA-256: 36dce099832a8b0897951a467b1a4f863f7e366b5834de395cb3bc083941927b   IA-32: bash-4.1.2-15.el6_5.1.i686.rpm     MD5: b3d86398f0e1b0ba23b1dce5ed4c7915SHA-256: ab06b132b07804fea0fa00892ef8e93b92af642127602e218584bd5104435262 bash-debuginfo-4.1.2-15.el6_5.1.i686.rpm     MD5: 0a465bcef24f8b63f3c903747b9dd22aSHA-256: 7041f3e9dbb1c5571b682715dd7367f3c0ae3ede494f13a4d099f58c307d2b47 bash-doc-4.1.2-15.el6_5.1.i686.rpm     MD5: 3db81453965f853022eeabe64d608bfdSHA-256: 7f4c1e304471c1b1b59e6960f2952713043d521e8830b2e0c0da52db8ef75e97   x86_64: bash-4.1.2-15.el6_5.1.x86_64.rpm     MD5: d35ac7eb24705ef5a444d50ab11ad7e7SHA-256: bedf1ed386b1f2ba951234f640ab674558443232e04aa7602931e31399fd0b98 bash-debuginfo-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 223b49f4d627495849423f64864d8642SHA-256: 14928dee110e0442283a3e1f510dd9cb675d4528ad241bf9c356cf40875d2c7e bash-doc-4.1.2-15.el6_5.1.x86_64.rpm     MD5: 86ebcf954bf8e0da9e518ff5284e08d7SHA-256: d13218d1b252934ccbf33c92d771608ae26d809e0ef15c6dad40cda5da5d48ba   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: bash-4.2.45-5.el7_0.2.src.rpm     MD5: 5d1739b3069ab69a6c18a9be6f466735SHA-256: be4640f473d67ffea1761a6ff2b5cb06e77b01cd612d317cad6e7723044c0ee8   x86_64: bash-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 08692c55361fed4d8bf51190c842cafeSHA-256: f3be9d9ec189ced2096a8b5ce09359e1f8654f7e413683064b1f48aeaaeb0b11 bash-debuginfo-4.2.45-5.el7_0.2.x86_64.rpm     MD5: 8384ea5761abee2757ae43e114cf7ed6SHA-256: aa4c42549b6ddbee4988d6d4154ee7d8863d4f49975d384d5843c83d5e5181e7 bash-doc-4.2.45-5.el7_0.2.x86_64.rpm     MD5: d4f76db9e5ecfe2a720aecab4504ac6aSHA-256: 53aa8014730d9b1505ed92ca962b0d52e732c4b2b63027471dfdf92d79a27f70   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Businesses are increasingly acquiring software companies to bolster software development expertise, a new report from Vanson Bourne has found. In the global survey of 1,450 senior business executives, 52% of those asked said they were acquiring software companies to obtain critical skills or plan to make a software company acquisition in the next year. In the survey, 19% said they had no plans acquire a software company. The report said bringing more software development back in-house is a recognition that these skills need to be a core part of enterprises’ DNA, but sometimes the pressure to an application footprint means you can’t grow skills fast enough. When this becomes an issue, enterprises are turning to software acquisitions as a way to get the talent and technology they need. CA Europe CTO, Bjarne Rassmussen, said: "Companies are growing their IT at a fast rate. They are insourcing key competencies One way to get expertise quickly is by acquiring software companies." Rassmussen expected that software companies with expertise in API integration would be among the top acquisition targets for businesses that need to bolster their application development skills. Several major companies are running innovation programmes with startups to develop new product ideas. Earlier this month, Diageo launched a global innovation programme to develop applications that support its responsible drinking campaign. Earlier this year, department store John Lewis launched JLab, a startup incubator programme. At the time, John Lewis IT director, Paul Coby, said he hoped the startups would be able to help the retailer understand home automation technology, which is currently making waves in security, music and energy efficiency. In the McKinsey report, Taking a longer-term look at M&A value creation, Werner Rehm, Robert Uhlaner, and Andy West wrote about how technology companies like Microsoft were very successful at tactical M&As.  “Companies using a tactical approach to M&A also do numerous small deals, but those deals do not, combined, make up a large portion of the acquirer’s market capitalisation,” the authors said. As an example, they said Microsoft has acquired many smaller products that are then developed into future releases of Excel. Acquisitions from some tech giants, such as Google, are putting them in direct completion with traditional businesses. In January Google acquired smart thermostat maker Nest Labs in a $3.2bn deal, which puts the search company in the energy market. Non-IT companies will increasingly find that they are facing new competition from the likes of Google as the tech giants extend their reach into new markets. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK
Updated ksh packages that fix two bugs are now available for Red Hat EnterpriseLinux 6. KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bugs:* Due to a regression, using command substitution containing the pipe charactercould return a non-zero exit status, even if the command did not fail. A patchhas been provided to fix this bug, and the exit code from the commandsubstitution is now correct. (BZ#1135405)* Previously, under some circumstances, ksh did not set the exit code whenreturning from a function. As a consequence, it was not possible to reliablytest whether the function has succeeded. With this update, ksh no longer avoidssetting the exit code, and the user can now reliably test whether the functionhas succeeded or not. (BZ#1136318) Users of ksh are advised to upgrade to these updated packages, which fix thesebugs. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: ksh-20120801-10.el6_5.11.src.rpm     MD5: b116b505404b5891a84c2183f8be04acSHA-256: 2d923635caca66426bb021f6ed065783cc58af3a7623e7e59236f255af3c6a1e   IA-32: ksh-20120801-10.el6_5.11.i686.rpm     MD5: e5519b562263cc76e7a4c3624cee989dSHA-256: c72ed02a47cf1cfd8a90f16b19aebc190e9bac3ff49eb1141ccdc9bd0e02188b ksh-debuginfo-20120801-10.el6_5.11.i686.rpm     MD5: 88d43806a0bf6b9266e9bf4255581990SHA-256: a98e963c7e1f0d921f346fcce695460008759971d5e251c1eebdd66065ac360c   x86_64: ksh-20120801-10.el6_5.11.x86_64.rpm     MD5: 9a30eff252426d34e7865d0bfc9f6d03SHA-256: 33c2cdc06e6c53d1259442a30ac48cfbdcd871d3d79c6fe1b92f52be238c1527 ksh-debuginfo-20120801-10.el6_5.11.x86_64.rpm     MD5: 5d3f2ca8812568b0568885ed0d4d3eb9SHA-256: 1d619de8f247e3163d04c73756b9a91af547ca977d36d163f4f7c9450363f32c   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: ksh-20120801-10.el6_5.11.src.rpm     MD5: b116b505404b5891a84c2183f8be04acSHA-256: 2d923635caca66426bb021f6ed065783cc58af3a7623e7e59236f255af3c6a1e   x86_64: ksh-20120801-10.el6_5.11.x86_64.rpm     MD5: 9a30eff252426d34e7865d0bfc9f6d03SHA-256: 33c2cdc06e6c53d1259442a30ac48cfbdcd871d3d79c6fe1b92f52be238c1527 ksh-debuginfo-20120801-10.el6_5.11.x86_64.rpm     MD5: 5d3f2ca8812568b0568885ed0d4d3eb9SHA-256: 1d619de8f247e3163d04c73756b9a91af547ca977d36d163f4f7c9450363f32c   Red Hat Enterprise Linux Server (v. 6) SRPMS: ksh-20120801-10.el6_5.11.src.rpm     MD5: b116b505404b5891a84c2183f8be04acSHA-256: 2d923635caca66426bb021f6ed065783cc58af3a7623e7e59236f255af3c6a1e   IA-32: ksh-20120801-10.el6_5.11.i686.rpm     MD5: e5519b562263cc76e7a4c3624cee989dSHA-256: c72ed02a47cf1cfd8a90f16b19aebc190e9bac3ff49eb1141ccdc9bd0e02188b ksh-debuginfo-20120801-10.el6_5.11.i686.rpm     MD5: 88d43806a0bf6b9266e9bf4255581990SHA-256: a98e963c7e1f0d921f346fcce695460008759971d5e251c1eebdd66065ac360c   PPC: ksh-20120801-10.el6_5.11.ppc64.rpm     MD5: 15b7527b6046b376cac5bc5ac3ea6d59SHA-256: 85efe0b0de1cea007f1e7095e18d5a258bec61d90f387ef22cafefa5c4e889e1 ksh-debuginfo-20120801-10.el6_5.11.ppc64.rpm     MD5: e250d247c832ae15dce0eb67e7fc957fSHA-256: 22a97d78d8ef0b72c757e31e8673adc35efb5fe41367bd84a6888e22dc66b3da   s390x: ksh-20120801-10.el6_5.11.s390x.rpm     MD5: 22c44a1f055fa61388716ff701cd6168SHA-256: c65006034fb86b9504804acf6db8546edeeaf1f80746f83e95c46821b2c89dc9 ksh-debuginfo-20120801-10.el6_5.11.s390x.rpm     MD5: 3a79ec07adffc0ab68e0db375bdde182SHA-256: 3970ef619d0b1e2d0e38de782978b602a8742e1266746c9025ff3bcc106c2e96   x86_64: ksh-20120801-10.el6_5.11.x86_64.rpm     MD5: 9a30eff252426d34e7865d0bfc9f6d03SHA-256: 33c2cdc06e6c53d1259442a30ac48cfbdcd871d3d79c6fe1b92f52be238c1527 ksh-debuginfo-20120801-10.el6_5.11.x86_64.rpm     MD5: 5d3f2ca8812568b0568885ed0d4d3eb9SHA-256: 1d619de8f247e3163d04c73756b9a91af547ca977d36d163f4f7c9450363f32c   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: ksh-20120801-10.el6_5.11.src.rpm     MD5: b116b505404b5891a84c2183f8be04acSHA-256: 2d923635caca66426bb021f6ed065783cc58af3a7623e7e59236f255af3c6a1e   x86_64: ksh-20120801-10.el6_5.11.x86_64.rpm     MD5: 9a30eff252426d34e7865d0bfc9f6d03SHA-256: 33c2cdc06e6c53d1259442a30ac48cfbdcd871d3d79c6fe1b92f52be238c1527 ksh-debuginfo-20120801-10.el6_5.11.x86_64.rpm     MD5: 5d3f2ca8812568b0568885ed0d4d3eb9SHA-256: 1d619de8f247e3163d04c73756b9a91af547ca977d36d163f4f7c9450363f32c   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: ksh-20120801-10.el6_5.11.src.rpm     MD5: b116b505404b5891a84c2183f8be04acSHA-256: 2d923635caca66426bb021f6ed065783cc58af3a7623e7e59236f255af3c6a1e   IA-32: ksh-20120801-10.el6_5.11.i686.rpm     MD5: e5519b562263cc76e7a4c3624cee989dSHA-256: c72ed02a47cf1cfd8a90f16b19aebc190e9bac3ff49eb1141ccdc9bd0e02188b ksh-debuginfo-20120801-10.el6_5.11.i686.rpm     MD5: 88d43806a0bf6b9266e9bf4255581990SHA-256: a98e963c7e1f0d921f346fcce695460008759971d5e251c1eebdd66065ac360c   PPC: ksh-20120801-10.el6_5.11.ppc64.rpm     MD5: 15b7527b6046b376cac5bc5ac3ea6d59SHA-256: 85efe0b0de1cea007f1e7095e18d5a258bec61d90f387ef22cafefa5c4e889e1 ksh-debuginfo-20120801-10.el6_5.11.ppc64.rpm     MD5: e250d247c832ae15dce0eb67e7fc957fSHA-256: 22a97d78d8ef0b72c757e31e8673adc35efb5fe41367bd84a6888e22dc66b3da   s390x: ksh-20120801-10.el6_5.11.s390x.rpm     MD5: 22c44a1f055fa61388716ff701cd6168SHA-256: c65006034fb86b9504804acf6db8546edeeaf1f80746f83e95c46821b2c89dc9 ksh-debuginfo-20120801-10.el6_5.11.s390x.rpm     MD5: 3a79ec07adffc0ab68e0db375bdde182SHA-256: 3970ef619d0b1e2d0e38de782978b602a8742e1266746c9025ff3bcc106c2e96   x86_64: ksh-20120801-10.el6_5.11.x86_64.rpm     MD5: 9a30eff252426d34e7865d0bfc9f6d03SHA-256: 33c2cdc06e6c53d1259442a30ac48cfbdcd871d3d79c6fe1b92f52be238c1527 ksh-debuginfo-20120801-10.el6_5.11.x86_64.rpm     MD5: 5d3f2ca8812568b0568885ed0d4d3eb9SHA-256: 1d619de8f247e3163d04c73756b9a91af547ca977d36d163f4f7c9450363f32c   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: ksh-20120801-10.el6_5.11.src.rpm     MD5: b116b505404b5891a84c2183f8be04acSHA-256: 2d923635caca66426bb021f6ed065783cc58af3a7623e7e59236f255af3c6a1e   IA-32: ksh-20120801-10.el6_5.11.i686.rpm     MD5: e5519b562263cc76e7a4c3624cee989dSHA-256: c72ed02a47cf1cfd8a90f16b19aebc190e9bac3ff49eb1141ccdc9bd0e02188b ksh-debuginfo-20120801-10.el6_5.11.i686.rpm     MD5: 88d43806a0bf6b9266e9bf4255581990SHA-256: a98e963c7e1f0d921f346fcce695460008759971d5e251c1eebdd66065ac360c   x86_64: ksh-20120801-10.el6_5.11.x86_64.rpm     MD5: 9a30eff252426d34e7865d0bfc9f6d03SHA-256: 33c2cdc06e6c53d1259442a30ac48cfbdcd871d3d79c6fe1b92f52be238c1527 ksh-debuginfo-20120801-10.el6_5.11.x86_64.rpm     MD5: 5d3f2ca8812568b0568885ed0d4d3eb9SHA-256: 1d619de8f247e3163d04c73756b9a91af547ca977d36d163f4f7c9450363f32c   (The unlinked packages above are only available from the Red Hat Network) 1135405 - wrong return code from a pipe in command substitution1136318 - wrong return code from a function These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6. KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bug:* When running a command that output a lot of data, and then setting a variablefrom that output, the ksh could become unresponsive. The combination of I/Oredirection and synchronization mechanism has been changed, thus fixing the bug.As a result, commands complete successfully, and the ksh no longer hangs.(BZ#1128585)Users of ksh are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously-released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Server (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   PPC: ksh-20120801-10.el6_5.9.ppc64.rpm     MD5: 05cdb195154d5a0d9fdd9bce2d0d9886SHA-256: 33303d811f3dfc3244179e39e4e43ce6fc1100902970b5be2b532d4fb0d65e51 ksh-debuginfo-20120801-10.el6_5.9.ppc64.rpm     MD5: fdd51487c0903837b9ff66dc22a075f0SHA-256: 12dab2bcb5d2eb643af92853e843d2201045cab4a7a9320143e79c687adf098b   s390x: ksh-20120801-10.el6_5.9.s390x.rpm     MD5: 6023856ae0b6b3af2d3d06d6cb1bb6d6SHA-256: bb980d3495392fd758d7520fe687b04c151f6b978090b4aace4950871c9eb870 ksh-debuginfo-20120801-10.el6_5.9.s390x.rpm     MD5: f4122d2ad0c123cce7f5bb9e9321f95dSHA-256: ef8b991298f4f0fc4f4ae03f1af1950ac9a7293cc57ccaf987dfb01d0e1c82df   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   PPC: ksh-20120801-10.el6_5.9.ppc64.rpm     MD5: 05cdb195154d5a0d9fdd9bce2d0d9886SHA-256: 33303d811f3dfc3244179e39e4e43ce6fc1100902970b5be2b532d4fb0d65e51 ksh-debuginfo-20120801-10.el6_5.9.ppc64.rpm     MD5: fdd51487c0903837b9ff66dc22a075f0SHA-256: 12dab2bcb5d2eb643af92853e843d2201045cab4a7a9320143e79c687adf098b   s390x: ksh-20120801-10.el6_5.9.s390x.rpm     MD5: 6023856ae0b6b3af2d3d06d6cb1bb6d6SHA-256: bb980d3495392fd758d7520fe687b04c151f6b978090b4aace4950871c9eb870 ksh-debuginfo-20120801-10.el6_5.9.s390x.rpm     MD5: f4122d2ad0c123cce7f5bb9e9321f95dSHA-256: ef8b991298f4f0fc4f4ae03f1af1950ac9a7293cc57ccaf987dfb01d0e1c82df   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: ksh-20120801-10.el6_5.9.src.rpm     MD5: ee10da27a5d9d856e42ae489f2abf551SHA-256: e9e6ba6bb92e7973dc19b034679dd3d32df741d56b9c8b5fcd99dc1175c93657   IA-32: ksh-20120801-10.el6_5.9.i686.rpm     MD5: 022ae91e787022561788fae8322565e8SHA-256: 61b1e3ac30888774398a76086c409dce5ea18b6e2927f58b1f7757e700ce7f8e ksh-debuginfo-20120801-10.el6_5.9.i686.rpm     MD5: 82d73eefc1fe43157da56e85eba26c27SHA-256: b7a66579013c3aa306f899b0e33c6e2b1cc9107723150795541266e7aa8cfbc0   x86_64: ksh-20120801-10.el6_5.9.x86_64.rpm     MD5: 426527cd44a4b0f6571fcd8e58db1768SHA-256: 937405cc1a12124aa7c769ae15e8ec84accdd3f157b94aee245b97a960da4778 ksh-debuginfo-20120801-10.el6_5.9.x86_64.rpm     MD5: bdabd8ba54554ca89364f2beee1b3abeSHA-256: f2c9ffc1f569a93802b28f2745e223e1c7bbbea01bf6f55c0ecbe377e7e43efa   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Updated ksh packages that fix one bug are now available for Red Hat EnterpriseLinux 6. KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which isbackward-compatible with the Bourne shell (Bash) and includes many features ofthe C shell. The most recent version is KSH-93. KornShell complies with thePOSIX.2 standard (IEEE Std 1003.2-1992).This update fixes the following bug:* Prior to this update, the compiler optimization dropped parts from the ksh joblocking mechanism from the binary code. As a consequence, ksh could terminateunexpectedly with a segmentation fault after it received the SIGCHLD signal.This update implements a fix to ensure the compiler does not drop parts of theksh mechanism and the crash no longer occurs. (BZ#1112306)Users of ksh are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously-released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: ksh-20120801-10.el6_5.8.src.rpm     MD5: 8db01b7131d03b92c649d820da2d725cSHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1   IA-32: ksh-20120801-10.el6_5.8.i686.rpm     MD5: e5e0b1f89323f2000fb485b87ec414feSHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15 ksh-debuginfo-20120801-10.el6_5.8.i686.rpm     MD5: 5d8c5784d85d023401c00328690d4645SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1   x86_64: ksh-20120801-10.el6_5.8.x86_64.rpm     MD5: 064764175dea70ad75faa777bb658791SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530 ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm     MD5: 15d3dfad0df23d1090803add31849668SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: ksh-20120801-10.el6_5.8.src.rpm     MD5: 8db01b7131d03b92c649d820da2d725cSHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1   x86_64: ksh-20120801-10.el6_5.8.x86_64.rpm     MD5: 064764175dea70ad75faa777bb658791SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530 ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm     MD5: 15d3dfad0df23d1090803add31849668SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60   Red Hat Enterprise Linux Server (v. 6) SRPMS: ksh-20120801-10.el6_5.8.src.rpm     MD5: 8db01b7131d03b92c649d820da2d725cSHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1   IA-32: ksh-20120801-10.el6_5.8.i686.rpm     MD5: e5e0b1f89323f2000fb485b87ec414feSHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15 ksh-debuginfo-20120801-10.el6_5.8.i686.rpm     MD5: 5d8c5784d85d023401c00328690d4645SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1   PPC: ksh-20120801-10.el6_5.8.ppc64.rpm     MD5: 96d0341193d34cefb0cca642912dd968SHA-256: 3fb7fdcfa786bc33580ab8f9e9b724d3170d8349187f0b05d5a4973375d53670 ksh-debuginfo-20120801-10.el6_5.8.ppc64.rpm     MD5: 6d1382b06f8e6ac201570a30d3ad3fadSHA-256: daef216387b8a8a8bc8fd298a0a7293648f126404c5cd76e946ea14d6d8ab045   s390x: ksh-20120801-10.el6_5.8.s390x.rpm     MD5: da389d1091afef82231111d86cc08817SHA-256: 7ec3ff35596b97b15e6f984c874a1a26d47e012a4450f74bf315ece63876b25b ksh-debuginfo-20120801-10.el6_5.8.s390x.rpm     MD5: 707b3a28c3187febf0b122d5067df931SHA-256: 1ea2777186b193f8eb5b4df307401c890835605cc631b3cf324ede8fa2ff1a85   x86_64: ksh-20120801-10.el6_5.8.x86_64.rpm     MD5: 064764175dea70ad75faa777bb658791SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530 ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm     MD5: 15d3dfad0df23d1090803add31849668SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: ksh-20120801-10.el6_5.8.src.rpm     MD5: 8db01b7131d03b92c649d820da2d725cSHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1   x86_64: ksh-20120801-10.el6_5.8.x86_64.rpm     MD5: 064764175dea70ad75faa777bb658791SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530 ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm     MD5: 15d3dfad0df23d1090803add31849668SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: ksh-20120801-10.el6_5.8.src.rpm     MD5: 8db01b7131d03b92c649d820da2d725cSHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1   IA-32: ksh-20120801-10.el6_5.8.i686.rpm     MD5: e5e0b1f89323f2000fb485b87ec414feSHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15 ksh-debuginfo-20120801-10.el6_5.8.i686.rpm     MD5: 5d8c5784d85d023401c00328690d4645SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1   PPC: ksh-20120801-10.el6_5.8.ppc64.rpm     MD5: 96d0341193d34cefb0cca642912dd968SHA-256: 3fb7fdcfa786bc33580ab8f9e9b724d3170d8349187f0b05d5a4973375d53670 ksh-debuginfo-20120801-10.el6_5.8.ppc64.rpm     MD5: 6d1382b06f8e6ac201570a30d3ad3fadSHA-256: daef216387b8a8a8bc8fd298a0a7293648f126404c5cd76e946ea14d6d8ab045   s390x: ksh-20120801-10.el6_5.8.s390x.rpm     MD5: da389d1091afef82231111d86cc08817SHA-256: 7ec3ff35596b97b15e6f984c874a1a26d47e012a4450f74bf315ece63876b25b ksh-debuginfo-20120801-10.el6_5.8.s390x.rpm     MD5: 707b3a28c3187febf0b122d5067df931SHA-256: 1ea2777186b193f8eb5b4df307401c890835605cc631b3cf324ede8fa2ff1a85   x86_64: ksh-20120801-10.el6_5.8.x86_64.rpm     MD5: 064764175dea70ad75faa777bb658791SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530 ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm     MD5: 15d3dfad0df23d1090803add31849668SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: ksh-20120801-10.el6_5.8.src.rpm     MD5: 8db01b7131d03b92c649d820da2d725cSHA-256: 6fcff314849dfb8553dfedc4fa968ec27c6938e75cb2127e69c151289e22fab1   IA-32: ksh-20120801-10.el6_5.8.i686.rpm     MD5: e5e0b1f89323f2000fb485b87ec414feSHA-256: cb9dc044f1f824100547b9c0ec87edfbbd3d13ed0730bdea8be8505e3f6d4a15 ksh-debuginfo-20120801-10.el6_5.8.i686.rpm     MD5: 5d8c5784d85d023401c00328690d4645SHA-256: 447a0f169d21c291ce1eab5b308bf459c14e1402c86117987c54ee7e30f152b1   x86_64: ksh-20120801-10.el6_5.8.x86_64.rpm     MD5: 064764175dea70ad75faa777bb658791SHA-256: 74c78a5ef47ae97a6d4c02644be4a0005a98b9ccfce9e5ca5cf99896b0f67530 ksh-debuginfo-20120801-10.el6_5.8.x86_64.rpm     MD5: 15d3dfad0df23d1090803add31849668SHA-256: 4d0f3c40b0a9a9c8482ac2d060b279761d183c6f8b2de3ef8e55df6442dceb60   (The unlinked packages above are only available from the Red Hat Network) 1123467 - ksh crashes because job locking mechanism does not survive compiler optimization These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Virtualisation and cloud provider VMware has launched its second UK datacentre in London’s Chessington to expand its infrastructure as a service (IaaS) services, vCloud Hybrid Service, in Europe. The new datacentre is VMware’s second IaaS datacentre in the UK. Earlier it opened its cloud datacentre in Slough to provide services to organisations that need to keep their data in the UK. The new datacentre strategy comes after a majority of its enterprise customers (86%) said it is important to ensure their business-critical data is stored with a UK-based cloud service provider. A Vanson Bourne study, commissioned by VMware, found that more than half of the respondents said they are required to follow industry data residency regulations and/or compliance standards. VMware launched vCloud Hybrid Service (vCHS), an IaaS service based on its virtualistaion platform vSphere in Europe in February this year. The cloud service features three IaaS services: dedicated cloud, virtual private cloud and disaster recovery as a service (DRaaS). It allows customers to extend applications, networking, management, operations and tools over on and off-premise environments. Since VMware launched vCHS in the UK, more than 800 individuals at partner organisations have been accredited in EMEA, according to the company. The Vanson Bourne study also revealed that 65% of VMware’s UK customers said hybrid cloud could help meet business demands more quickly. Another 81% said they needed a solution that makes their public cloud as easy to manage as their own infrastructure, while 85% said their public cloud is not integrated or only partly integrated with their datacentre. The research highlights data sovereignty as having a large influence in whether organisations move to the public cloud, said Gavin Jackson, vice president and general manager of EMEA Cloud Services, VMware. “Hybrid Service can fill a big gap in the market by providing customers with swift and easy access to the public cloud – helping them reduce capital expenses and also tackle data sovereignty issues,” Jackson said. Since launching vCHS, VMware has also added data protection services on it to make disaster recovery and security services “easier, more cost effective and accessible for organisations,” according to VMware.  It also added support for Pivotal CF – the private platform as a service (PaaS) based on Cloud Foundry on vCHS platform. “The service provides seamless integration from a customers’ datacentre out to the public cloud so IT services can be easily and consistently consumed from both resource pools,” said Nick Henry, head of transformation and cloud services, Computacenter. Henry will use the service to help Computacenter’s customers transform their IT infrastructures. Another VMware customer Bluefin Solutions aims to move everything – including business-critical applications – to a hybrid-cloud environment with VMware – after it makes its core on-premises infrastructure cloud-ready. “With VMware vCloud Hybrid Service, we can now seamlessly move data and applications freely across private and public cloud environments, without having to learn a new set of tools,” said Kevin Turnbull, head of IT, at Bluefin. The Chessington datacentre will become part of VMware’s cloud datacentre portfolio in the US, Japan and the UK. VMware is the second company to build a cloud-specific datacentre in London. Earlier this month IBM opened its SoftLayer datacentre in Chessington for its European cloud customers. The new datacentre is IBM’s second cloud-focused facility in Europe, adding to its existing Amsterdam facility. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK