- Issued:
- 2011-05-19
- Updated:
- 2011-05-19
RHBA-2011:0646 - Bug Fix Advisory
Synopsis
coreutils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated coreutils packages that fix several bugs are now available.
Description
The coreutils package contains the core GNU utilities. It is the
combination of the old GNU fileutils, sh-utils, and textutils packages.
These updated packages fix the following bugs:
- The su utility was previously not built with PIE and RELRO enabled,
as they were in Red Hat Enterprise Linux 5. In this update, it is built
as a PIE executable and is using RELRO protection. (BZ#630017)
- Previously, when reading a line longer than 16KiB, the tac utility
reallocated its primary buffer. Before exiting, the tac utility tried
to free the already freed original buffer, which caused a utility crash
after a double free error displayed. This was fixed and the tac utility
no longer frees an already freed buffer. (BZ#628212)
- Previously, the hardware control flow, DTRDSR, was implemented via
TC{SG}ETX. This was changed to TC{SG}ET ioctl, which caused the CDTRDSR
support in stty to fail. This was fixed to allow stty to correctly handle
CDTRDSR control flow. (BZ#598631)
- Previously, the internalization patch for coreutils had an unsafe
initialization of char* bufops that left bufops uninitialized or
initialized to NULL on the first usage. This behavior called memmove
from an incorrect address, namely from address 0 and size 0. This is now
fixed and bufops is correctly initialized for the first use. (BZ#683799)
- Previously, when the multibyte LC_TIME differed from LC_CTYPE, an
assertion failure caused the sort utility to crash irrespective of the
parameters provided to it. This is fixed to prevent a crash when the sort
utility is run and now works as expected. (BZ#649224)
- Previously, the information page about 8-bit octal values did not
mention checking if the value was lower than 256. Due to this, when a
command like "/bin/echo -e '\0610'" was used, the results were not
accurate. This is now fixed to provide more accurate information about
the behavior of octal values. (BZ#660033)
- Previously, when the dd utility used pipes, it read and wrote partial
blocks. When the size of the block written was shorter than the specified
maximum output block size, the "oflag=direct" would turn off, which
resulted in degraded I/O performance. The workaround for this behavior,
which involves the addition of "iflag=fullblock" is now available in the
information documentation. (BZ#614605)
- Previously, the coreutils information page was not sufficiently
clear about behavior when multiple parent and leaf node directories are
created. This is now fixed to incorporate additional information in the
coreutils information page about the @option mode and its behavior when
combined with the --parents option. (BZ609262)
- Previously, documentation for tail command's --sleep-interval option
did not outline the results of inotify support. This is now fixed and
the documentation states that with inotify support, the --sleep-interval
option is only relevant when the tail command reverts to the old
polling-based method. (BZ#662900)
All coreutils users are advised to upgrade to these updated packages,
which resolve these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
- BZ - 598631 - stty incorrectly reports cdtrdsr
- BZ - 609262 - mkdir info page update
- BZ - 614605 - [Intel 6.1 Bug] direct IO with dd seems broken compared to RHEL 5.4
- BZ - 628212 - tac has a double-free bug (input line longer than 16KiB)
- BZ - 649224 - [abrt] sort - segfault with LC_TIME different from other multibyte locales
- BZ - 660033 - "echo -e '\0610'" behaves unexpectedly - info doc change
- BZ - 662900 - [6.0] Document rare usefulness of tail command's option --sleep-interval due inotify support
- BZ - 683799 - Unsafe initialization of bufpos in i18n patch
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
x86_64 | |
coreutils-8.4-13.el6.x86_64.rpm | SHA-256: 79f0f330690b7a568b6947ec5a6f24fbbfd4d44598a5ea6a637a609359ef32d8 |
coreutils-debuginfo-8.4-13.el6.x86_64.rpm | SHA-256: 95d0bb3efd2f6f41c610f98b4bff15c2e8c7e97debea768ad54b55fa412c9f63 |
coreutils-libs-8.4-13.el6.x86_64.rpm | SHA-256: ee8f5d00dcf162d23074926c3002d20a0e481a7572e628cf808f89966cbb0829 |
i386 | |
coreutils-8.4-13.el6.i686.rpm | SHA-256: 91483665c98727909a06ce222a8855844ba40ab2c2f4f089cd242a347454bb4d |
coreutils-debuginfo-8.4-13.el6.i686.rpm | SHA-256: 8be7460f0a2eca9710c37bbc234f56c6d702d3cfeb8f8decec19bf941edd5c37 |
coreutils-libs-8.4-13.el6.i686.rpm | SHA-256: 40a3ebe9e1b3128e4b2617379d1d1dec67cd76a701f5cdba7a2dc74ecbf474f2 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
x86_64 | |
coreutils-8.4-13.el6.x86_64.rpm | SHA-256: 79f0f330690b7a568b6947ec5a6f24fbbfd4d44598a5ea6a637a609359ef32d8 |
coreutils-debuginfo-8.4-13.el6.x86_64.rpm | SHA-256: 95d0bb3efd2f6f41c610f98b4bff15c2e8c7e97debea768ad54b55fa412c9f63 |
coreutils-libs-8.4-13.el6.x86_64.rpm | SHA-256: ee8f5d00dcf162d23074926c3002d20a0e481a7572e628cf808f89966cbb0829 |
i386 | |
coreutils-8.4-13.el6.i686.rpm | SHA-256: 91483665c98727909a06ce222a8855844ba40ab2c2f4f089cd242a347454bb4d |
coreutils-debuginfo-8.4-13.el6.i686.rpm | SHA-256: 8be7460f0a2eca9710c37bbc234f56c6d702d3cfeb8f8decec19bf941edd5c37 |
coreutils-libs-8.4-13.el6.i686.rpm | SHA-256: 40a3ebe9e1b3128e4b2617379d1d1dec67cd76a701f5cdba7a2dc74ecbf474f2 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
x86_64 | |
coreutils-8.4-13.el6.x86_64.rpm | SHA-256: 79f0f330690b7a568b6947ec5a6f24fbbfd4d44598a5ea6a637a609359ef32d8 |
coreutils-debuginfo-8.4-13.el6.x86_64.rpm | SHA-256: 95d0bb3efd2f6f41c610f98b4bff15c2e8c7e97debea768ad54b55fa412c9f63 |
coreutils-libs-8.4-13.el6.x86_64.rpm | SHA-256: ee8f5d00dcf162d23074926c3002d20a0e481a7572e628cf808f89966cbb0829 |
i386 | |
coreutils-8.4-13.el6.i686.rpm | SHA-256: 91483665c98727909a06ce222a8855844ba40ab2c2f4f089cd242a347454bb4d |
coreutils-debuginfo-8.4-13.el6.i686.rpm | SHA-256: 8be7460f0a2eca9710c37bbc234f56c6d702d3cfeb8f8decec19bf941edd5c37 |
coreutils-libs-8.4-13.el6.i686.rpm | SHA-256: 40a3ebe9e1b3128e4b2617379d1d1dec67cd76a701f5cdba7a2dc74ecbf474f2 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
x86_64 | |
coreutils-8.4-13.el6.x86_64.rpm | SHA-256: 79f0f330690b7a568b6947ec5a6f24fbbfd4d44598a5ea6a637a609359ef32d8 |
coreutils-debuginfo-8.4-13.el6.x86_64.rpm | SHA-256: 95d0bb3efd2f6f41c610f98b4bff15c2e8c7e97debea768ad54b55fa412c9f63 |
coreutils-libs-8.4-13.el6.x86_64.rpm | SHA-256: ee8f5d00dcf162d23074926c3002d20a0e481a7572e628cf808f89966cbb0829 |
i386 | |
coreutils-8.4-13.el6.i686.rpm | SHA-256: 91483665c98727909a06ce222a8855844ba40ab2c2f4f089cd242a347454bb4d |
coreutils-debuginfo-8.4-13.el6.i686.rpm | SHA-256: 8be7460f0a2eca9710c37bbc234f56c6d702d3cfeb8f8decec19bf941edd5c37 |
coreutils-libs-8.4-13.el6.i686.rpm | SHA-256: 40a3ebe9e1b3128e4b2617379d1d1dec67cd76a701f5cdba7a2dc74ecbf474f2 |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
s390x | |
coreutils-8.4-13.el6.s390x.rpm | SHA-256: 3881e5112171977f5f18f549f2222f37e694d378f427c5a9c46e87e7eb3a994e |
coreutils-debuginfo-8.4-13.el6.s390x.rpm | SHA-256: 9ade6aa6ad94a4bfa8f2b95f99e357f362f8a2c40ce1ef194261a7b182832234 |
coreutils-libs-8.4-13.el6.s390x.rpm | SHA-256: d7e85a3c15068ab35dd5c762767dfc3db4c40df30b69857cb7169be93ea864f9 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
ppc64 | |
coreutils-8.4-13.el6.ppc64.rpm | SHA-256: 1b73a3f0d6386b47c7d32439771c4ab303fc166b38f728e2b73170a0bfe6c4df |
coreutils-debuginfo-8.4-13.el6.ppc64.rpm | SHA-256: 5da2735a7f920dbe739c4e1dbe676d44439b173c8d450ad19b4236bb29eba79a |
coreutils-libs-8.4-13.el6.ppc64.rpm | SHA-256: c40072930592e9d1157c2e0b5a5fc677b33d917b3b4e54f0292ba85e8ca0d91e |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
x86_64 | |
coreutils-8.4-13.el6.x86_64.rpm | SHA-256: 79f0f330690b7a568b6947ec5a6f24fbbfd4d44598a5ea6a637a609359ef32d8 |
coreutils-debuginfo-8.4-13.el6.x86_64.rpm | SHA-256: 95d0bb3efd2f6f41c610f98b4bff15c2e8c7e97debea768ad54b55fa412c9f63 |
coreutils-libs-8.4-13.el6.x86_64.rpm | SHA-256: ee8f5d00dcf162d23074926c3002d20a0e481a7572e628cf808f89966cbb0829 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
x86_64 | |
coreutils-8.4-13.el6.x86_64.rpm | SHA-256: 79f0f330690b7a568b6947ec5a6f24fbbfd4d44598a5ea6a637a609359ef32d8 |
coreutils-debuginfo-8.4-13.el6.x86_64.rpm | SHA-256: 95d0bb3efd2f6f41c610f98b4bff15c2e8c7e97debea768ad54b55fa412c9f63 |
coreutils-libs-8.4-13.el6.x86_64.rpm | SHA-256: ee8f5d00dcf162d23074926c3002d20a0e481a7572e628cf808f89966cbb0829 |
i386 | |
coreutils-8.4-13.el6.i686.rpm | SHA-256: 91483665c98727909a06ce222a8855844ba40ab2c2f4f089cd242a347454bb4d |
coreutils-debuginfo-8.4-13.el6.i686.rpm | SHA-256: 8be7460f0a2eca9710c37bbc234f56c6d702d3cfeb8f8decec19bf941edd5c37 |
coreutils-libs-8.4-13.el6.i686.rpm | SHA-256: 40a3ebe9e1b3128e4b2617379d1d1dec67cd76a701f5cdba7a2dc74ecbf474f2 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
s390x | |
coreutils-8.4-13.el6.s390x.rpm | SHA-256: 3881e5112171977f5f18f549f2222f37e694d378f427c5a9c46e87e7eb3a994e |
coreutils-debuginfo-8.4-13.el6.s390x.rpm | SHA-256: 9ade6aa6ad94a4bfa8f2b95f99e357f362f8a2c40ce1ef194261a7b182832234 |
coreutils-libs-8.4-13.el6.s390x.rpm | SHA-256: d7e85a3c15068ab35dd5c762767dfc3db4c40df30b69857cb7169be93ea864f9 |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
coreutils-8.4-13.el6.src.rpm | SHA-256: 36b4369d9e144821b93d10849fb769684418b40ecd15ae2a5cbdd28e11b92a46 |
x86_64 | |
coreutils-8.4-13.el6.x86_64.rpm | SHA-256: 79f0f330690b7a568b6947ec5a6f24fbbfd4d44598a5ea6a637a609359ef32d8 |
coreutils-debuginfo-8.4-13.el6.x86_64.rpm | SHA-256: 95d0bb3efd2f6f41c610f98b4bff15c2e8c7e97debea768ad54b55fa412c9f63 |
coreutils-libs-8.4-13.el6.x86_64.rpm | SHA-256: ee8f5d00dcf162d23074926c3002d20a0e481a7572e628cf808f89966cbb0829 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.