- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0341 - Bug Fix Advisory
Synopsis
openssh bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openssh packages that fix a bug in the sftp client are now available.
Description
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
server.
These updated packages fix a bug in which the SFTP client (the sftp
utility), in batch mode, would transfer files of 0-byte length when the
destination partition was full, and would not properly exit and return a
non-zero exit status. The SFTP client, in batch mode, now immediately stops
attempting to transfer files when the destination is full, and returns a
'1' as its exit status when a write is unsuccessful.
All users of openssh should upgrade to these updated packages, which
contain patches to correct this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 251565 - sftp problem while transferring files to a partition which is 100% full
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
openssh-4.3p2-26.el5.src.rpm | SHA-256: 42aa5515597668a4a5c1ff97b1134a6cd73697a7cfdada882e4c4fd4cfd47b6a |
x86_64 | |
openssh-4.3p2-26.el5.x86_64.rpm | SHA-256: 3185b1b52cb54898a8c056dd3187dd9cc2a37969caaeaaa7045dfebc4feaa734 |
openssh-askpass-4.3p2-26.el5.x86_64.rpm | SHA-256: 08fc16051cc97305245b0997ee21b45c54e68756efc6cd0e1e870664b4a6aae5 |
openssh-clients-4.3p2-26.el5.x86_64.rpm | SHA-256: ac7ceec72c4ddb837a84851922f71b63892b55ad5ac69699bc7911d267f7f9a1 |
openssh-server-4.3p2-26.el5.x86_64.rpm | SHA-256: 848ea19cbadc66fb8356077481e5d1e5c015abbcb24be2c6a2b99909880486af |
ia64 | |
openssh-4.3p2-26.el5.ia64.rpm | SHA-256: 155cd9fb0d024b7ba09d9794cb44abc53ea0948e23e64d0a4154c41bb87c5d63 |
openssh-askpass-4.3p2-26.el5.ia64.rpm | SHA-256: 705c404a171ef997ae4cdefbe3e6c1e3527c9ae6082ff4dd0b0ffd97c1c9d175 |
openssh-clients-4.3p2-26.el5.ia64.rpm | SHA-256: b06ce9040eb5f3706241574b4d9e2c4212c682bf8e47c314ef95c39fed195a09 |
openssh-server-4.3p2-26.el5.ia64.rpm | SHA-256: 79179a9ec307d38d90888d0ec5f70a58abf010cb6a6b70f8197274b57f1ad006 |
i386 | |
openssh-4.3p2-26.el5.i386.rpm | SHA-256: d11153f29b55accefaefb27e7e9edaac85b387abde1bcf801a0a4728bc355344 |
openssh-askpass-4.3p2-26.el5.i386.rpm | SHA-256: e261214303a6e9af5e7959e7b21beb8016f27e1026667040a18274318f82f109 |
openssh-clients-4.3p2-26.el5.i386.rpm | SHA-256: e38d2f6259204b393d4db0c5a4ed04d64c7070d4a3ccea2e5d91b79df064d06c |
openssh-server-4.3p2-26.el5.i386.rpm | SHA-256: b0a25a1cf2f9234463d9a25a2c73b749fff1d0208f26a9706e0f963ead56d89e |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
openssh-4.3p2-26.el5.src.rpm | SHA-256: 42aa5515597668a4a5c1ff97b1134a6cd73697a7cfdada882e4c4fd4cfd47b6a |
x86_64 | |
openssh-4.3p2-26.el5.x86_64.rpm | SHA-256: 3185b1b52cb54898a8c056dd3187dd9cc2a37969caaeaaa7045dfebc4feaa734 |
openssh-askpass-4.3p2-26.el5.x86_64.rpm | SHA-256: 08fc16051cc97305245b0997ee21b45c54e68756efc6cd0e1e870664b4a6aae5 |
openssh-clients-4.3p2-26.el5.x86_64.rpm | SHA-256: ac7ceec72c4ddb837a84851922f71b63892b55ad5ac69699bc7911d267f7f9a1 |
openssh-server-4.3p2-26.el5.x86_64.rpm | SHA-256: 848ea19cbadc66fb8356077481e5d1e5c015abbcb24be2c6a2b99909880486af |
i386 | |
openssh-4.3p2-26.el5.i386.rpm | SHA-256: d11153f29b55accefaefb27e7e9edaac85b387abde1bcf801a0a4728bc355344 |
openssh-askpass-4.3p2-26.el5.i386.rpm | SHA-256: e261214303a6e9af5e7959e7b21beb8016f27e1026667040a18274318f82f109 |
openssh-clients-4.3p2-26.el5.i386.rpm | SHA-256: e38d2f6259204b393d4db0c5a4ed04d64c7070d4a3ccea2e5d91b79df064d06c |
openssh-server-4.3p2-26.el5.i386.rpm | SHA-256: b0a25a1cf2f9234463d9a25a2c73b749fff1d0208f26a9706e0f963ead56d89e |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
openssh-4.3p2-26.el5.src.rpm | SHA-256: 42aa5515597668a4a5c1ff97b1134a6cd73697a7cfdada882e4c4fd4cfd47b6a |
x86_64 | |
openssh-4.3p2-26.el5.x86_64.rpm | SHA-256: 3185b1b52cb54898a8c056dd3187dd9cc2a37969caaeaaa7045dfebc4feaa734 |
openssh-askpass-4.3p2-26.el5.x86_64.rpm | SHA-256: 08fc16051cc97305245b0997ee21b45c54e68756efc6cd0e1e870664b4a6aae5 |
openssh-clients-4.3p2-26.el5.x86_64.rpm | SHA-256: ac7ceec72c4ddb837a84851922f71b63892b55ad5ac69699bc7911d267f7f9a1 |
openssh-server-4.3p2-26.el5.x86_64.rpm | SHA-256: 848ea19cbadc66fb8356077481e5d1e5c015abbcb24be2c6a2b99909880486af |
i386 | |
openssh-4.3p2-26.el5.i386.rpm | SHA-256: d11153f29b55accefaefb27e7e9edaac85b387abde1bcf801a0a4728bc355344 |
openssh-askpass-4.3p2-26.el5.i386.rpm | SHA-256: e261214303a6e9af5e7959e7b21beb8016f27e1026667040a18274318f82f109 |
openssh-clients-4.3p2-26.el5.i386.rpm | SHA-256: e38d2f6259204b393d4db0c5a4ed04d64c7070d4a3ccea2e5d91b79df064d06c |
openssh-server-4.3p2-26.el5.i386.rpm | SHA-256: b0a25a1cf2f9234463d9a25a2c73b749fff1d0208f26a9706e0f963ead56d89e |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
openssh-4.3p2-26.el5.src.rpm | SHA-256: 42aa5515597668a4a5c1ff97b1134a6cd73697a7cfdada882e4c4fd4cfd47b6a |
s390x | |
openssh-4.3p2-26.el5.s390x.rpm | SHA-256: 872e3014725292b290aff625914a56a1a5496de66bea450deed2fd0ad1699eb2 |
openssh-askpass-4.3p2-26.el5.s390x.rpm | SHA-256: 76369e13ee8af89fff1763fe540d783a040b25bbb5888be6cfc33bcee4369a1b |
openssh-clients-4.3p2-26.el5.s390x.rpm | SHA-256: 8fb720da41497d05c8aa57d322fd2731e3f310dc50bc925b54dee7cfb0f905c8 |
openssh-server-4.3p2-26.el5.s390x.rpm | SHA-256: 69da2679cd760971100fbe00db420d54afe3f8cab398de555ae97d418dff2edd |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
openssh-4.3p2-26.el5.src.rpm | SHA-256: 42aa5515597668a4a5c1ff97b1134a6cd73697a7cfdada882e4c4fd4cfd47b6a |
ppc | |
openssh-4.3p2-26.el5.ppc.rpm | SHA-256: 070978c6576754832b16f0ea45d2e4995cad549f2a177707e4dc237ccf5619d8 |
openssh-askpass-4.3p2-26.el5.ppc.rpm | SHA-256: c43e4d2426945086456489a39238cfe96292c62984ec6ea80b6491105e34bbf4 |
openssh-clients-4.3p2-26.el5.ppc.rpm | SHA-256: c5ba957ea6fc05db39b363119510f26bfd6736c8f2e4b598d0f08e5299ce648c |
openssh-server-4.3p2-26.el5.ppc.rpm | SHA-256: d4722dd71e2031c306937047b2a90fe014004bcfb3735cb44587f3cd966f8262 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
openssh-4.3p2-26.el5.src.rpm | SHA-256: 42aa5515597668a4a5c1ff97b1134a6cd73697a7cfdada882e4c4fd4cfd47b6a |
x86_64 | |
openssh-4.3p2-26.el5.x86_64.rpm | SHA-256: 3185b1b52cb54898a8c056dd3187dd9cc2a37969caaeaaa7045dfebc4feaa734 |
openssh-askpass-4.3p2-26.el5.x86_64.rpm | SHA-256: 08fc16051cc97305245b0997ee21b45c54e68756efc6cd0e1e870664b4a6aae5 |
openssh-clients-4.3p2-26.el5.x86_64.rpm | SHA-256: ac7ceec72c4ddb837a84851922f71b63892b55ad5ac69699bc7911d267f7f9a1 |
openssh-server-4.3p2-26.el5.x86_64.rpm | SHA-256: 848ea19cbadc66fb8356077481e5d1e5c015abbcb24be2c6a2b99909880486af |
i386 | |
openssh-4.3p2-26.el5.i386.rpm | SHA-256: d11153f29b55accefaefb27e7e9edaac85b387abde1bcf801a0a4728bc355344 |
openssh-askpass-4.3p2-26.el5.i386.rpm | SHA-256: e261214303a6e9af5e7959e7b21beb8016f27e1026667040a18274318f82f109 |
openssh-clients-4.3p2-26.el5.i386.rpm | SHA-256: e38d2f6259204b393d4db0c5a4ed04d64c7070d4a3ccea2e5d91b79df064d06c |
openssh-server-4.3p2-26.el5.i386.rpm | SHA-256: b0a25a1cf2f9234463d9a25a2c73b749fff1d0208f26a9706e0f963ead56d89e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.