- Issued:
- 2006-09-14
- Updated:
- 2007-05-01
RHBA-2006:0659 - Bug Fix Advisory
Synopsis
tftp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated tftp packages that fix a crash due to memory corruption is now
available.
Description
The Trivial File Transfer Protocol (TFTP) is normally used only for booting
diskless workstations. The tftp package provides the user interface for
TFTP, which allows users to transfer files to and from a remote machine.
The tftp-server package provides the server for TFTP, which allows users to
transfer files to and from a remote machine.
The TFTP client was crashing upon pressing ^C (signal INT), due to memory
corruption. These updated packages fix this issue.
All users of tftp should upgrade to these updated packages, which resolve
these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 186201 - tftp crashes on ^C
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
tftp-0.39-2.src.rpm | SHA-256: 7323734c45837dea1b1a60b1537d0d16c5c12315ac6f71582042fc2160efb3a8 |
x86_64 | |
tftp-0.39-2.x86_64.rpm | SHA-256: 7318c70eeec23d7c46d9675de878fc88b8db2bd36ed9fa14c6f7ae2eabb0956a |
tftp-0.39-2.x86_64.rpm | SHA-256: 7318c70eeec23d7c46d9675de878fc88b8db2bd36ed9fa14c6f7ae2eabb0956a |
tftp-server-0.39-2.x86_64.rpm | SHA-256: 575ebcb9b438fc9add080474391805a5ba259188607afcc18890294f240259a5 |
tftp-server-0.39-2.x86_64.rpm | SHA-256: 575ebcb9b438fc9add080474391805a5ba259188607afcc18890294f240259a5 |
ia64 | |
tftp-0.39-2.ia64.rpm | SHA-256: 1a51591e7e61d24fc5cc5e70d13c92a39ba3b39e6e55ddad5a907570da036e97 |
tftp-0.39-2.ia64.rpm | SHA-256: 1a51591e7e61d24fc5cc5e70d13c92a39ba3b39e6e55ddad5a907570da036e97 |
tftp-server-0.39-2.ia64.rpm | SHA-256: f7d5a6ce6057f8647bf5be72f94d69d87d833b1d93e4d85e1948ae3af8c51602 |
tftp-server-0.39-2.ia64.rpm | SHA-256: f7d5a6ce6057f8647bf5be72f94d69d87d833b1d93e4d85e1948ae3af8c51602 |
i386 | |
tftp-0.39-2.i386.rpm | SHA-256: 2faab6019bacd8fd2ebd8fb83390a317929afd9bb0de5344f7ae2afe5f7d7172 |
tftp-0.39-2.i386.rpm | SHA-256: 2faab6019bacd8fd2ebd8fb83390a317929afd9bb0de5344f7ae2afe5f7d7172 |
tftp-server-0.39-2.i386.rpm | SHA-256: b3ff9db1ff262b53a41db1cf4542cd0300288afed0711c5093d4f7234ef75c23 |
tftp-server-0.39-2.i386.rpm | SHA-256: b3ff9db1ff262b53a41db1cf4542cd0300288afed0711c5093d4f7234ef75c23 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
tftp-0.39-2.src.rpm | SHA-256: 7323734c45837dea1b1a60b1537d0d16c5c12315ac6f71582042fc2160efb3a8 |
x86_64 | |
tftp-0.39-2.x86_64.rpm | SHA-256: 7318c70eeec23d7c46d9675de878fc88b8db2bd36ed9fa14c6f7ae2eabb0956a |
tftp-server-0.39-2.x86_64.rpm | SHA-256: 575ebcb9b438fc9add080474391805a5ba259188607afcc18890294f240259a5 |
ia64 | |
tftp-0.39-2.ia64.rpm | SHA-256: 1a51591e7e61d24fc5cc5e70d13c92a39ba3b39e6e55ddad5a907570da036e97 |
tftp-server-0.39-2.ia64.rpm | SHA-256: f7d5a6ce6057f8647bf5be72f94d69d87d833b1d93e4d85e1948ae3af8c51602 |
i386 | |
tftp-0.39-2.i386.rpm | SHA-256: 2faab6019bacd8fd2ebd8fb83390a317929afd9bb0de5344f7ae2afe5f7d7172 |
tftp-server-0.39-2.i386.rpm | SHA-256: b3ff9db1ff262b53a41db1cf4542cd0300288afed0711c5093d4f7234ef75c23 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
tftp-0.39-2.src.rpm | SHA-256: 7323734c45837dea1b1a60b1537d0d16c5c12315ac6f71582042fc2160efb3a8 |
x86_64 | |
tftp-0.39-2.x86_64.rpm | SHA-256: 7318c70eeec23d7c46d9675de878fc88b8db2bd36ed9fa14c6f7ae2eabb0956a |
tftp-server-0.39-2.x86_64.rpm | SHA-256: 575ebcb9b438fc9add080474391805a5ba259188607afcc18890294f240259a5 |
i386 | |
tftp-0.39-2.i386.rpm | SHA-256: 2faab6019bacd8fd2ebd8fb83390a317929afd9bb0de5344f7ae2afe5f7d7172 |
tftp-server-0.39-2.i386.rpm | SHA-256: b3ff9db1ff262b53a41db1cf4542cd0300288afed0711c5093d4f7234ef75c23 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
tftp-0.39-2.src.rpm | SHA-256: 7323734c45837dea1b1a60b1537d0d16c5c12315ac6f71582042fc2160efb3a8 |
s390x | |
tftp-0.39-2.s390x.rpm | SHA-256: 7b9fef4af09558a1ad6e1c019be84bbb95351fafeb26e5a2cb42e618b332c3dc |
tftp-server-0.39-2.s390x.rpm | SHA-256: 51ca960e9929f7bf385224620c59e3df210507e2d6581cf57ef4c9edb87daa93 |
s390 | |
tftp-0.39-2.s390.rpm | SHA-256: 8941f3c502d0659b0f96b8a38843cc19333a2fd9d13ec7610f97b46f1e61498e |
tftp-server-0.39-2.s390.rpm | SHA-256: 5d80ed4df90080ee4360a40611a41aa8ca73ea4ec758a797f0d8370f7801f8f2 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
tftp-0.39-2.src.rpm | SHA-256: 7323734c45837dea1b1a60b1537d0d16c5c12315ac6f71582042fc2160efb3a8 |
ppc | |
tftp-0.39-2.ppc.rpm | SHA-256: ed4934f8fd7b9b1226856ddd48314e31effffa939e8702b273de2e3c006b9f15 |
tftp-server-0.39-2.ppc.rpm | SHA-256: 2ac6d627f831ab45c22c3cf5564a00658bd87b651f03302bca1b643676e15fe7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.