Security Advisory Low: busybox security and bug fix update

Advisory: RHSA-2013:1732-2
Type: Security Advisory
Severity: Low
Issued on: 2013-11-21
Last updated on: 2013-11-21
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-1813

Details

Updated busybox packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

BusyBox provides a single binary that includes versions of a large number
of system commands, including a shell. This can be very useful for
recovering from certain types of system failures, particularly those
involving broken shared libraries.

It was found that the mdev BusyBox utility could create certain directories
within /dev with world-writable permissions. A local unprivileged user
could use this flaw to manipulate portions of the /dev directory tree.
(CVE-2013-1813)

This update also fixes the following bugs:

* Previously, due to a too eager string size optimization on the IBM System
z architecture, the "wc" BusyBox command failed after processing standard
input with the following error:

wc: : No such file or directory

This bug was fixed by disabling the string size optimization and the "wc"
command works properly on IBM System z architectures. (BZ#820097)

* Prior to this update, the "mknod" command was unable to create device
nodes with a major or minor number larger than 255. Consequently, the kdump
utility failed to handle such a device. The underlying source code has been
modified, and it is now possible to use the "mknod" command to create
device nodes with a major or minor number larger than 255. (BZ#859817)

* If a network installation from an NFS server was selected, the "mount"
command used the UDP protocol by default. If only TCP mounts were supported
by the server, this led to a failure of the mount command. As a result,
Anaconda could not continue with the installation. This bug is now fixed
and NFS mount operations default to the TCP protocol. (BZ#855832)

All busybox users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
busybox-1.15.1-20.el6.src.rpm
File outdated by:  RHBA-2015:0244
    MD5: d4cc3de264e83003c403cd201a85d1d8
SHA-256: 20e8889763272c1c32b1f4ebf5a5a1912965edec627345abd416e97079d5053b
 
IA-32:
busybox-1.15.1-20.el6.i686.rpm
File outdated by:  RHBA-2015:0244
    MD5: 1596c7fc8f0a9e7b886aff0b90cad906
SHA-256: a72fab8d9ed17876f225b46cf15700585eb32b8f70ebf90122e80e8a74f56b2f
busybox-petitboot-1.15.1-20.el6.i686.rpm
File outdated by:  RHBA-2015:0244
    MD5: 99229eb711dce60d1051c51ec0053d16
SHA-256: 82dc2791429f2e3617af9e4876c1cb8b506640a9650bda0b7edf7322c9a0cc8c
 
x86_64:
busybox-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: c4149ba92a767156fc12cef7c2b01cef
SHA-256: b35205daf97e4056835cbfd50d6cedc63ff2844c8e930577096924b13cc0b6f9
busybox-petitboot-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: 03e6ffdb900d5529b1121a7ed0e1937a
SHA-256: 361fd8016590c2d770ab4ec89d3f9a2f82662f819d1d874f6ae8f2e7413cd0d2
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
busybox-1.15.1-20.el6.src.rpm
File outdated by:  RHBA-2015:0244
    MD5: d4cc3de264e83003c403cd201a85d1d8
SHA-256: 20e8889763272c1c32b1f4ebf5a5a1912965edec627345abd416e97079d5053b
 
x86_64:
busybox-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: c4149ba92a767156fc12cef7c2b01cef
SHA-256: b35205daf97e4056835cbfd50d6cedc63ff2844c8e930577096924b13cc0b6f9
busybox-petitboot-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: 03e6ffdb900d5529b1121a7ed0e1937a
SHA-256: 361fd8016590c2d770ab4ec89d3f9a2f82662f819d1d874f6ae8f2e7413cd0d2
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
busybox-1.15.1-20.el6.src.rpm
File outdated by:  RHBA-2015:0244
    MD5: d4cc3de264e83003c403cd201a85d1d8
SHA-256: 20e8889763272c1c32b1f4ebf5a5a1912965edec627345abd416e97079d5053b
 
IA-32:
busybox-1.15.1-20.el6.i686.rpm
File outdated by:  RHBA-2015:0244
    MD5: 1596c7fc8f0a9e7b886aff0b90cad906
SHA-256: a72fab8d9ed17876f225b46cf15700585eb32b8f70ebf90122e80e8a74f56b2f
busybox-petitboot-1.15.1-20.el6.i686.rpm
File outdated by:  RHBA-2015:0244
    MD5: 99229eb711dce60d1051c51ec0053d16
SHA-256: 82dc2791429f2e3617af9e4876c1cb8b506640a9650bda0b7edf7322c9a0cc8c
 
PPC:
busybox-1.15.1-20.el6.ppc64.rpm
File outdated by:  RHBA-2015:0244
    MD5: e6b9bb48a56891ae8d5c1b3234b15563
SHA-256: e8dd4767dceecb7c1e961d50004717ea9cde6c68e8523fc0e72fd6df5c514b6b
busybox-petitboot-1.15.1-20.el6.ppc64.rpm
File outdated by:  RHBA-2015:0244
    MD5: 9c76915522fd4ccf2cb4b801b518dc64
SHA-256: 6b2f7b5ab98c65192e55a9b2401d60b77a5b60ffaf0fe67d9581475ef59686d2
 
s390x:
busybox-1.15.1-20.el6.s390x.rpm
File outdated by:  RHBA-2015:0244
    MD5: cc9a96f85a3224ac58c3fd32a161bcae
SHA-256: 80513d1a8d580468b2de54378fa0c7b6990b96f087ffdff54fdf418ccc6db9cf
busybox-petitboot-1.15.1-20.el6.s390x.rpm
File outdated by:  RHBA-2015:0244
    MD5: f8753ab9cbc77afd301c3ca9192d5e6d
SHA-256: 18f9693b99fd52999bca64236074e643fa3737ef58eede339a759ee45f24ee8c
 
x86_64:
busybox-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: c4149ba92a767156fc12cef7c2b01cef
SHA-256: b35205daf97e4056835cbfd50d6cedc63ff2844c8e930577096924b13cc0b6f9
busybox-petitboot-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: 03e6ffdb900d5529b1121a7ed0e1937a
SHA-256: 361fd8016590c2d770ab4ec89d3f9a2f82662f819d1d874f6ae8f2e7413cd0d2
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
busybox-1.15.1-20.el6.src.rpm
File outdated by:  RHBA-2015:0244
    MD5: d4cc3de264e83003c403cd201a85d1d8
SHA-256: 20e8889763272c1c32b1f4ebf5a5a1912965edec627345abd416e97079d5053b
 
IA-32:
busybox-1.15.1-20.el6.i686.rpm
File outdated by:  RHBA-2015:0244
    MD5: 1596c7fc8f0a9e7b886aff0b90cad906
SHA-256: a72fab8d9ed17876f225b46cf15700585eb32b8f70ebf90122e80e8a74f56b2f
busybox-petitboot-1.15.1-20.el6.i686.rpm
File outdated by:  RHBA-2015:0244
    MD5: 99229eb711dce60d1051c51ec0053d16
SHA-256: 82dc2791429f2e3617af9e4876c1cb8b506640a9650bda0b7edf7322c9a0cc8c
 
x86_64:
busybox-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: c4149ba92a767156fc12cef7c2b01cef
SHA-256: b35205daf97e4056835cbfd50d6cedc63ff2844c8e930577096924b13cc0b6f9
busybox-petitboot-1.15.1-20.el6.x86_64.rpm
File outdated by:  RHBA-2015:0244
    MD5: 03e6ffdb900d5529b1121a7ed0e1937a
SHA-256: 361fd8016590c2d770ab4ec89d3f9a2f82662f819d1d874f6ae8f2e7413cd0d2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

820097 - s390x: wc: : No such file or directory
919608 - CVE-2013-1813 busybox: insecure directory permissions in /dev


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/