Skip to navigation

Bug Fix Advisory busybox bug fix update

Advisory: RHBA-2013:0075-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated busybox packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

BusyBox is a binary that combines a large number of common system utilities into
a single executable. BusyBox provides replacements for most GNU file utilities,
shell utilities, and other command-line tools.

This update fixes the following bug:

* When attempting to mount an NFS file system, the mount command in the busybox
package was using the UDP protocol by default while the standard mount utility
uses the TCP protocol by default. Consequently, directories could not be mounted
from the server. With this update, the mount command in busybox has been fixed
to use TCP by default, thus preventing this bug. (BZ#834277)

All users of busybox are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
busybox-1.2.0-14.el5.src.rpm     MD5: 27444519ec7356e396b538e142a21705
SHA-256: be1a6a32a76bde882702648c6241d7c59e3e6c6bc7c2459808df21d21273974c
 
IA-32:
busybox-1.2.0-14.el5.i386.rpm     MD5: 4839c6d53963b713d72f896fb8cec656
SHA-256: 36770e0ca5bc40b9fbf8f277322f3bca16c7c0c2689d41fb0a501878263e2967
busybox-anaconda-1.2.0-14.el5.i386.rpm     MD5: 5f08bee6fbb528dfd2cb4b2679fc7c84
SHA-256: 423f70a4fee15bf682afbb12d10e135a378d23b04c5ebc526610a51247f52cb1
 
IA-64:
busybox-1.2.0-14.el5.ia64.rpm     MD5: 64b8b23d1da1960d65f78084cdcbdac9
SHA-256: 9636eede832214b2eae454096424904a97ff7286938395fba45ed9a27c67db81
busybox-anaconda-1.2.0-14.el5.ia64.rpm     MD5: e0cd4b55365acf79be2bca8714e7c0c3
SHA-256: adb7439153c365947e7078a59aac080a23fdaa9bd4e01de24a3f8a848ee1e58d
 
PPC:
busybox-1.2.0-14.el5.ppc.rpm     MD5: 37255712f7a26736b91661f2acfe3fe3
SHA-256: 2e132105b4c99e59c0edf4bd5b1299dbadf0efb50e9f7dca33c957688f565ded
busybox-anaconda-1.2.0-14.el5.ppc.rpm     MD5: 958b9a166820e27c25659eb13a366c8b
SHA-256: 177cf5dcfc520db5e9258f7385ad2517001b7ee91456a6d6b29c042db84521ab
 
s390x:
busybox-1.2.0-14.el5.s390x.rpm     MD5: 2d5238a1ea331dc12e0eda33abb7e7d9
SHA-256: 1581573a230c330c3c2e41067905cfe9cd9cd73442eb187ce91e424165e975bd
busybox-anaconda-1.2.0-14.el5.s390x.rpm     MD5: 22dfac0a04bb719749107bd0a9ae7aa2
SHA-256: da45139d27b9c93dd1addc0f06e4073011e1e39771a88fe879271f050c290e9a
 
x86_64:
busybox-1.2.0-14.el5.x86_64.rpm     MD5: 62d31594a339b3b8a79d008775941d19
SHA-256: 9a0ccb6286f832b815347e99f45afabace5b5671ec2149a849d361c878f380c3
busybox-anaconda-1.2.0-14.el5.x86_64.rpm     MD5: f9c12b2dfb22b00cd49322493569753c
SHA-256: 68c88b7f069221285a59160e6fbcaee275ac9f12aeca5e1cff9fbd4fd5f9d1e5
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
busybox-1.2.0-14.el5.src.rpm     MD5: 27444519ec7356e396b538e142a21705
SHA-256: be1a6a32a76bde882702648c6241d7c59e3e6c6bc7c2459808df21d21273974c
 
IA-32:
busybox-1.2.0-14.el5.i386.rpm     MD5: 4839c6d53963b713d72f896fb8cec656
SHA-256: 36770e0ca5bc40b9fbf8f277322f3bca16c7c0c2689d41fb0a501878263e2967
busybox-anaconda-1.2.0-14.el5.i386.rpm     MD5: 5f08bee6fbb528dfd2cb4b2679fc7c84
SHA-256: 423f70a4fee15bf682afbb12d10e135a378d23b04c5ebc526610a51247f52cb1
 
x86_64:
busybox-1.2.0-14.el5.x86_64.rpm     MD5: 62d31594a339b3b8a79d008775941d19
SHA-256: 9a0ccb6286f832b815347e99f45afabace5b5671ec2149a849d361c878f380c3
busybox-anaconda-1.2.0-14.el5.x86_64.rpm     MD5: f9c12b2dfb22b00cd49322493569753c
SHA-256: 68c88b7f069221285a59160e6fbcaee275ac9f12aeca5e1cff9fbd4fd5f9d1e5
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/