Skip to navigation

Bug Fix Advisory busybox bug fix update

Advisory: RHBA-2011:0815-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated busybox packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.

busybox is a single binary that includes versions of a large number of system
commands, including a shell. This can be very useful for recovering from certain
types of system failures, particularly those involving broken shared libraries.

[Updated 2 June 2011]
This update fixes a regression in the original fix in which the msh applet was
incorrectly executing while loop with empty body. It never exited the loop even
if the loop condition was false. With this update, this loop construct works
correctly. (BZ#708942)

The original errata update also fixed the following three bugs:

* The grep applet was ignoring the "-i" command line option if the "-F" option
was also used. Consequent to this, the "grep -iF" command incorrectly performed
a case sensitive search instead of the case insensitive one. This update
resolves the problem by ensuring that this combination of command line options
works as expected. (BZ#608927)

* Previously, the msh applet had a severely limited depth of shell source
operations (that is, the ". FILE" built-in commands). Under certain
circumstances, this may have caused it to terminate unexpectedly with the "Shell
input nested too deeply" error message. With this update, the maximum number of
nested source operations is limited only by the number of available file
descriptors and the amount of available memory. (BZ#556845)

* Prior to this update, the msh applet had a limited buffer for the storage of
the results of a process substitution. Consequent to this, an attempt to execute
certain constructs (for example, `cat FILE` with a file larger than 15KB) could
cause it to exit with the "out of string space" error message. With this update,
the buffer size is now limited only by the amount of available memory.
(BZ#678701)

Users are advised to upgrade to these updated busybox packages, which fix these
bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
busybox-1.2.0-10.el5.src.rpm
File outdated by:  RHBA-2013:0075
    MD5: 91d1061b19238ef1a925ee4debdd08a1
SHA-256: 9bf867aee4f908e709ea93d314041a529f197f264fb838e29b29a11d8765aac7
 
IA-32:
busybox-1.2.0-10.el5.i386.rpm
File outdated by:  RHBA-2013:0075
    MD5: 0b8082186a2dd557d46652c309a64edc
SHA-256: 58cf9efe8ddc09bb57aa8e112c75d38f64ff4e5fb0dff5b456539cc387e71b29
busybox-anaconda-1.2.0-10.el5.i386.rpm
File outdated by:  RHBA-2013:0075
    MD5: fde0189b16f3cc8bee583898fcd276f7
SHA-256: 8528c88bf7371a1956dae6322aca63cb3ad8ddc3032271e0a856c12fee036afb
 
IA-64:
busybox-1.2.0-10.el5.ia64.rpm
File outdated by:  RHBA-2013:0075
    MD5: e0a56418f13664d7b0df6205384c10b0
SHA-256: 803587994dec5e34286c3b2a260b55ea8eee1fdb0ba46a88131986440ef8767c
busybox-anaconda-1.2.0-10.el5.ia64.rpm
File outdated by:  RHBA-2013:0075
    MD5: 30efb762cd859920df6a02d4059808d7
SHA-256: b2927e20e2f1e5c0b216545a94d9a3d811930deb7599f24c284a82650e0324b9
 
PPC:
busybox-1.2.0-10.el5.ppc.rpm
File outdated by:  RHBA-2013:0075
    MD5: 2a051c374d31a0e115ba67c8af205888
SHA-256: 3b9f142a9000ac330d019c0c22c1fd929e94480604f1a1ecd10bd96fa500ec9f
busybox-anaconda-1.2.0-10.el5.ppc.rpm
File outdated by:  RHBA-2013:0075
    MD5: dbff353250e1922416072ce7fd750164
SHA-256: 2cc409ce449f3499f0d17311e4f0fef177307d4e14f3f25387bb9340b7548dde
 
s390x:
busybox-1.2.0-10.el5.s390x.rpm
File outdated by:  RHBA-2013:0075
    MD5: 7f68af457eee8e784c45c98be6666183
SHA-256: f0b05b71f2e6f424ccb86776919783cb7317149ea5e512ad76cae57fb13e8c6d
busybox-anaconda-1.2.0-10.el5.s390x.rpm
File outdated by:  RHBA-2013:0075
    MD5: d45a9ba84ca8f297cdb136a10c9860e5
SHA-256: 9c155e804499aa0b4c317d542357a20a3c2c0756d1d50371b40aa25ff8a103ce
 
x86_64:
busybox-1.2.0-10.el5.x86_64.rpm
File outdated by:  RHBA-2013:0075
    MD5: 2c621e6f96c9e5f89647c060cfebd38c
SHA-256: 9966c33d88b8859410c1112094b0f9f51590fb1cca86f02679963eb3f855245c
busybox-anaconda-1.2.0-10.el5.x86_64.rpm
File outdated by:  RHBA-2013:0075
    MD5: 1311955d6435ac763f8663802e0646fc
SHA-256: 303f4d300a70ebb958be4f581a0872e532eb8aef5d84293660e22c10ce37258a
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
busybox-1.2.0-10.el5.src.rpm
File outdated by:  RHBA-2013:0075
    MD5: 91d1061b19238ef1a925ee4debdd08a1
SHA-256: 9bf867aee4f908e709ea93d314041a529f197f264fb838e29b29a11d8765aac7
 
IA-32:
busybox-1.2.0-10.el5.i386.rpm
File outdated by:  RHBA-2013:0075
    MD5: 0b8082186a2dd557d46652c309a64edc
SHA-256: 58cf9efe8ddc09bb57aa8e112c75d38f64ff4e5fb0dff5b456539cc387e71b29
busybox-anaconda-1.2.0-10.el5.i386.rpm
File outdated by:  RHBA-2013:0075
    MD5: fde0189b16f3cc8bee583898fcd276f7
SHA-256: 8528c88bf7371a1956dae6322aca63cb3ad8ddc3032271e0a856c12fee036afb
 
x86_64:
busybox-1.2.0-10.el5.x86_64.rpm
File outdated by:  RHBA-2013:0075
    MD5: 2c621e6f96c9e5f89647c060cfebd38c
SHA-256: 9966c33d88b8859410c1112094b0f9f51590fb1cca86f02679963eb3f855245c
busybox-anaconda-1.2.0-10.el5.x86_64.rpm
File outdated by:  RHBA-2013:0075
    MD5: 1311955d6435ac763f8663802e0646fc
SHA-256: 303f4d300a70ebb958be4f581a0872e532eb8aef5d84293660e22c10ce37258a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

556845 - Shell input nested too deeply
608927 - "busybox grep -Fi" doesn't work as expected



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/