Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2013:1599 - Bug Fix Advisory
Issued:
2013-11-20
Updated:
2013-11-20

RHBA-2013:1599 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

ksh bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated ksh packages that fix several bugs and add various enhancements are now
available for Red Hat Enterprise Linux 6.

Description

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which is
backward-compatible with the Bourne shell (Bash) and includes many features of
the C shell. The most recent version is KSH-93. KornShell complies with the
POSIX.2 standard (IEEE Std 1003.2-1992).

The ksh package has been upgraded to upstream version 20120801, which provides a
number of bug fixes and enhancements over the previous version. (BZ#840568)

This update also fixes the following bugs:

  • Previously, the ksh shell did not set any editing mode as default, which

caused various usability problems in interactive mode and with shell
auto-completion. This update sets emacs editing mode as default for new users.
As a result, the usability is significantly improved and the shell
auto-completion works as expected. (BZ#761551)

  • Previously, the ksh internal counter of jobs was too small. Consequently, when

a script used a number of subshells in a loop, a counter overflow could occur
causing the ksh shell to terminate unexpectedly with a segmentation fault. This
update modifies ksh to use bigger types for counter variables. As a result, ksh
no longer crashes in the described scenario. (BZ#858263)

  • Previously, the ksh shell did not compute an offset for fixed size variables

correctly. As a consequence, when assigning a right-justified variable with a
fixed width to a smaller variable, the new variable could have an incorrect
content. This update applies a patch to fix this bug and the assignment now
proceeds as expected. (BZ#903750)

  • Previously, the output of command substitutions was not always redirected

properly. Consequently, the output in a here-document could be lost. This update
fixes the redirection code for command substitutions and the here-document now
contains the output as expected. (BZ#913110)

  • Using arrays inside of ksh functions, command aliases, or automatically loaded

functions caused memory leaks to occur. The underlying source code has been
modified to fix this bug and the memory leaks no longer occur in the described
scenario. (BZ#921455, BZ#982142)

  • Previously, the ksh SIGTSTP signal handler could trigger another SIGTSTP

signal. Consequently, ksh could enter an infinite loop. This updated version
fixes the SIGTSTP signal processing and ksh now handles the signal without any
problems. (BZ#922851)

  • Previously, the ksh shell did not resize the file descriptor list every time

it was necessary. This could lead to memory corruption when several file
descriptors were used. As a consequence, ksh terminated unexpectedly. This
updated version resizes the file descriptor list every time it is needed, and
ksh no longer crashes in the described scenario. (BZ#924440)

  • Previously, the ksh shell ignored the "-m" argument specified by the command

line. As a consequence, ksh did not enable monitor mode and the user had to
enable it in a script. With this update, ksh no longer ignores the argument so
that the user is able to enable monitor mode from the command line as expected.
(BZ#960034)

  • The ksh shell did not handle I/O redirections from command substitutions

inside a pipeline correctly. Consequently, the output of certain commands could
be lost. With this update, the redirections have been fixed and data is no
longer missing from the command outputs. (BZ#994251)

Users of ksh are advised to upgrade to these updated packages, which fix these
bugs and add these enhancements.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 761551 - set default editing mode to emacs
  • BZ - 922851 - exec a script causes a fork bomb when receiving SIGTSTP

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
x86_64
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266
i386
ksh-20120801-10.el6.i686.rpm SHA-256: 79ca957c34b46e0e97f8b96c40526419e1cdaaed9fadd1c73c317a594db72e27
ksh-debuginfo-20120801-10.el6.i686.rpm SHA-256: d620eafe0ead4dbb322b3c67fcbc1465997d620bac55aa26b5fdce31bd367f3f

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
i386
ksh-20120801-10.el6.i686.rpm SHA-256: 79ca957c34b46e0e97f8b96c40526419e1cdaaed9fadd1c73c317a594db72e27
ksh-debuginfo-20120801-10.el6.i686.rpm SHA-256: d620eafe0ead4dbb322b3c67fcbc1465997d620bac55aa26b5fdce31bd367f3f
x86_64
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266

Red Hat Enterprise Linux Workstation 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
x86_64
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266
i386
ksh-20120801-10.el6.i686.rpm SHA-256: 79ca957c34b46e0e97f8b96c40526419e1cdaaed9fadd1c73c317a594db72e27
ksh-debuginfo-20120801-10.el6.i686.rpm SHA-256: d620eafe0ead4dbb322b3c67fcbc1465997d620bac55aa26b5fdce31bd367f3f

Red Hat Enterprise Linux Desktop 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
x86_64
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266
i386
ksh-20120801-10.el6.i686.rpm SHA-256: 79ca957c34b46e0e97f8b96c40526419e1cdaaed9fadd1c73c317a594db72e27
ksh-debuginfo-20120801-10.el6.i686.rpm SHA-256: d620eafe0ead4dbb322b3c67fcbc1465997d620bac55aa26b5fdce31bd367f3f

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
s390x
ksh-20120801-10.el6.s390x.rpm SHA-256: b1d91008c4a1545340e20bb2f88095ac51478a9052bcbb003ee35506779c8564
ksh-debuginfo-20120801-10.el6.s390x.rpm SHA-256: 1849f4b46387a1d34e67af9af694b7c0ab524a3c6cd45aba1f15dc4b287f47d0

Red Hat Enterprise Linux for Power, big endian 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
ppc64
ksh-20120801-10.el6.ppc64.rpm SHA-256: 4b4db12464c59f821c9b4cea46b07c7e05d27f13b6ffa371ea0158077cfaeb3e
ksh-debuginfo-20120801-10.el6.ppc64.rpm SHA-256: 22d72e5321ba6a692d325d358e8883f15aed90e9e25adf4722483033fa9e14b5

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
x86_64
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266

Red Hat Enterprise Linux Server from RHUI 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
x86_64
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266
i386
ksh-20120801-10.el6.i686.rpm SHA-256: 79ca957c34b46e0e97f8b96c40526419e1cdaaed9fadd1c73c317a594db72e27
ksh-debuginfo-20120801-10.el6.i686.rpm SHA-256: d620eafe0ead4dbb322b3c67fcbc1465997d620bac55aa26b5fdce31bd367f3f

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
s390x
ksh-20120801-10.el6.s390x.rpm SHA-256: b1d91008c4a1545340e20bb2f88095ac51478a9052bcbb003ee35506779c8564
ksh-debuginfo-20120801-10.el6.s390x.rpm SHA-256: 1849f4b46387a1d34e67af9af694b7c0ab524a3c6cd45aba1f15dc4b287f47d0

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
x86_64
ksh-20120801-10.el6.x86_64.rpm SHA-256: 6613de5a86815781c6d468c89ceab873a3f844ae168e6ae79b9b685c0c620925
ksh-debuginfo-20120801-10.el6.x86_64.rpm SHA-256: 2e64a178617b6dafcb9d1e4faf6ce0e1de234570d3ad2ee089b04282c54fc266
i386
ksh-20120801-10.el6.i686.rpm SHA-256: 79ca957c34b46e0e97f8b96c40526419e1cdaaed9fadd1c73c317a594db72e27
ksh-debuginfo-20120801-10.el6.i686.rpm SHA-256: d620eafe0ead4dbb322b3c67fcbc1465997d620bac55aa26b5fdce31bd367f3f

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
ksh-20120801-10.el6.src.rpm SHA-256: 063b7ec17b4edf9be9d36d002bdd1f72771f08983f1efe30e688402f4e69d610
s390x
ksh-20120801-10.el6.s390x.rpm SHA-256: b1d91008c4a1545340e20bb2f88095ac51478a9052bcbb003ee35506779c8564
ksh-debuginfo-20120801-10.el6.s390x.rpm SHA-256: 1849f4b46387a1d34e67af9af694b7c0ab524a3c6cd45aba1f15dc4b287f47d0

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility