Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2015:1450 - Bug Fix Advisory
Issued:
2015-07-22
Updated:
2015-07-22

RHBA-2015:1450 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

ksh bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated ksh packages that fix several bugs are now available for Red Hat
Enterprise Linux 6.

Description

KornShell (KSH) is a Unix shell developed by AT&T Bell Laboratories, which is
backward-compatible with the Bourne shell (sh) and includes many features of the
C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2
standard (IEEE Std 1003.2-1992).

This update fixes the following bugs:

  • Prior to this update, the result of a command substitution was lost if a file

descriptor used for the substitution was previously explicitly closed. With this
update, ksh no longer reuses file descriptors that were closed during the
execution of a command substitution. Now, command substitutions work as expected
in the described situation. (BZ#1116072)

  • Previously, ksh in some cases terminated unexpectedly when re-setting a trap

inside a function. With this update, ksh no longer uses invalid data for trap
pointers and does not crash in this situation. (BZ#1117404)

  • After the user changed into a directory that lacked execution permissions, ksh

did not recognize that the change did not happen and that the user was instead
still operating in the directory from which the user attempted to change. Also,
the "pwd" utility incorrectly displayed the directory into which the user
attempted to change instead of the directory in which the user was actually
operating. This update modifies ksh to verify whether the directory change was
successful. As a result, ksh reports an error if the necessary execution
permissions are missing. (BZ#1160923)

  • Previously, ksh sometimes incorrectly initialized a variable holding the path

of the working directory. If a program changed the working directory between
forking and ksh execution, then ksh could contain an incorrect value in the
working directory variable. With this update, initialization of the working
directory variable has been corrected, and ksh now contains the correct value in
the aforementioned situation. (BZ#1168611)

  • A nested associative array contained an unexpected extra empty value after the

array was initialized. This update fixes a bug in the associative array
initialization code that was causing this problem. As a result, newly-created
nested associative arrays are empty as expected. (BZ#1173668)

  • Previously, ksh terminated unexpectedly after an alarm occurred during a read

operation with a modified Internal Field Separator (IFS). The ksh alarm built-in
has been modified to preserve the IFS table during execution. As a result, ksh
no longer crashes in this situation. (BZ#1176670)

  • When the user set the export attribute to a variable, ksh in certain cases

ignored some other variable attributes. For example, when the user set a
variable to be both exported and upper-case, ksh did not set the upper-case
option correctly. The typeset utility code has been fixed to respect all options
that the user sets for a variable. As a result, ksh sets all attributes
correctly even if the user sets multiple attributes simultaneously. (BZ#1188377)

  • Previously, after the user unset an associative array, the system did not free

the newly-available memory. Consequently, ksh consumed more and more memory over
time. The underlying source code has been modified to free the memory after the
user unsets an associative array, thus fixing this problem. (BZ#1189294)

Users of ksh are advised to upgrade to these updated packages, which fix these
bugs.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x

Fixes

  • BZ - 1116072 - Close of file descriptor in function called from command substitution prevents return of output
  • BZ - 1117404 - ksh shell segv faults when handling trap
  • BZ - 1138751 - shell hangs if setting variable from command that produces more than 120k and is piped
  • BZ - 1147645 - Bash fix for CVE-2014-7169 breaks ksh scripts that try to clear the environment
  • BZ - 1168611 - ksh: Problem with 'cd' from a forked C program
  • BZ - 1173668 - Issue with initialization of nested associative arrays
  • BZ - 1176670 - Problem with alarm and IFS
  • BZ - 1189294 - Leak on unset of associative array
  • BZ - 1204111 - ksh hangs when executed in from removed directory

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
x86_64
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7
i386
ksh-20120801-28.el6.i686.rpm SHA-256: 56eee68ae196b8d6eec73865c4789ab9c3d63a99eb7dc1ad28df889ac6ac56e9
ksh-debuginfo-20120801-28.el6.i686.rpm SHA-256: 974841bbe602b2c61cb8dac5e0a3d1ca5cd6dbcd30a7df2cb80893e6c281be4a

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
x86_64
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7
i386
ksh-20120801-28.el6.i686.rpm SHA-256: 56eee68ae196b8d6eec73865c4789ab9c3d63a99eb7dc1ad28df889ac6ac56e9
ksh-debuginfo-20120801-28.el6.i686.rpm SHA-256: 974841bbe602b2c61cb8dac5e0a3d1ca5cd6dbcd30a7df2cb80893e6c281be4a

Red Hat Enterprise Linux Workstation 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
x86_64
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7
i386
ksh-20120801-28.el6.i686.rpm SHA-256: 56eee68ae196b8d6eec73865c4789ab9c3d63a99eb7dc1ad28df889ac6ac56e9
ksh-debuginfo-20120801-28.el6.i686.rpm SHA-256: 974841bbe602b2c61cb8dac5e0a3d1ca5cd6dbcd30a7df2cb80893e6c281be4a

Red Hat Enterprise Linux Desktop 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
x86_64
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7
i386
ksh-20120801-28.el6.i686.rpm SHA-256: 56eee68ae196b8d6eec73865c4789ab9c3d63a99eb7dc1ad28df889ac6ac56e9
ksh-debuginfo-20120801-28.el6.i686.rpm SHA-256: 974841bbe602b2c61cb8dac5e0a3d1ca5cd6dbcd30a7df2cb80893e6c281be4a

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
s390x
ksh-20120801-28.el6.s390x.rpm SHA-256: 40c5aeaf39044fbead9ee2bb5e8925b0578f611b88657051b3ff57a9121f3b9a
ksh-debuginfo-20120801-28.el6.s390x.rpm SHA-256: 563b3eb9bf4b81b11a368761e7a1c0a012bcd9a3cac71a4f21726f1df2915019

Red Hat Enterprise Linux for Power, big endian 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
ppc64
ksh-20120801-28.el6.ppc64.rpm SHA-256: fc09d5fd19989bc33797a5360ab762cc1ec2b35048d8b170b9ec39cc80a0966a
ksh-debuginfo-20120801-28.el6.ppc64.rpm SHA-256: 8226b8f257253401a44c6f6bab9f3d42694d33ef78c68b110bf914faa9ab87d0

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
x86_64
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7

Red Hat Enterprise Linux Server from RHUI 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
x86_64
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7
i386
ksh-20120801-28.el6.i686.rpm SHA-256: 56eee68ae196b8d6eec73865c4789ab9c3d63a99eb7dc1ad28df889ac6ac56e9
ksh-debuginfo-20120801-28.el6.i686.rpm SHA-256: 974841bbe602b2c61cb8dac5e0a3d1ca5cd6dbcd30a7df2cb80893e6c281be4a

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
s390x
ksh-20120801-28.el6.s390x.rpm SHA-256: 40c5aeaf39044fbead9ee2bb5e8925b0578f611b88657051b3ff57a9121f3b9a
ksh-debuginfo-20120801-28.el6.s390x.rpm SHA-256: 563b3eb9bf4b81b11a368761e7a1c0a012bcd9a3cac71a4f21726f1df2915019

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
x86_64
ksh-20120801-28.el6.x86_64.rpm SHA-256: a4a00adc21a9ea315ec6a994f768bd6508a316e254d6c44de8d019a90f4293ce
ksh-debuginfo-20120801-28.el6.x86_64.rpm SHA-256: 32e764283678c61f06eae2f90df5156bde40844f79f996fbef359e23a7b748c7
i386
ksh-20120801-28.el6.i686.rpm SHA-256: 56eee68ae196b8d6eec73865c4789ab9c3d63a99eb7dc1ad28df889ac6ac56e9
ksh-debuginfo-20120801-28.el6.i686.rpm SHA-256: 974841bbe602b2c61cb8dac5e0a3d1ca5cd6dbcd30a7df2cb80893e6c281be4a

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6

SRPM
ksh-20120801-28.el6.src.rpm SHA-256: c48bbf9e2a8a805dcf2a8617f4efd1f5ba7641dc9b6a47cb2cdf67d9ef5284d9
s390x
ksh-20120801-28.el6.s390x.rpm SHA-256: 40c5aeaf39044fbead9ee2bb5e8925b0578f611b88657051b3ff57a9121f3b9a
ksh-debuginfo-20120801-28.el6.s390x.rpm SHA-256: 563b3eb9bf4b81b11a368761e7a1c0a012bcd9a3cac71a4f21726f1df2915019

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility