- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHBA-2009:0985 - Bug Fix Advisory
Synopsis
vsftpd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated vsftpd package that fixes various bugs is now available.
Description
The vsftpd package includes a Very Secure FTP (File Transfer Protocol) daemon.
This updated vsftpd package includes fixes for the following bugs:
- the default value for the location of xferlog_file in the vsftpd.conf
configuration file did not agree with the one stated in the vsftpd.conf(5)
man page. Also, the configuration of logrotate for the vsftpd.conf log
files did not agree with the log file specification. With this update, the
locations of log files are better specified and logrotate rotates the
correct log files. In addition, descriptions in the vsftpd.conf
configuration file have been improved.
- using more than one '*' wildcard (or "globbing") character at vsftpd's
ftp prompt when using the "ls" command to list a directory's contents did
not behave as expected. This update restores the behavior of the '*'
wildcard character so that it matches correctly, thus resolving the issue.
- the vsftpd init script displayed a superfluous "binary operator expected"
message. The syntax error which caused these messages has been corrected in
this update, and the message no longer appears.
All users of vsftpd are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 465216 - 'binary operator expected' occurs in viartual hosting vsftpd
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
vsftpd-2.0.1-8.el4.src.rpm | SHA-256: c75aa389e705d74bde7f5a8acace7b83620fe28d78dea814b97e990f4aae25f4 |
x86_64 | |
vsftpd-2.0.1-8.el4.x86_64.rpm | SHA-256: 10242c93ae1b9aef2b55e2874b13e246db45cb56d338678aa448e128e3972229 |
vsftpd-2.0.1-8.el4.x86_64.rpm | SHA-256: 10242c93ae1b9aef2b55e2874b13e246db45cb56d338678aa448e128e3972229 |
ia64 | |
vsftpd-2.0.1-8.el4.ia64.rpm | SHA-256: 222e53b4c89fee7a37f6451e5ee4440766921ea48bc5d04aa43f20a7af505bc9 |
vsftpd-2.0.1-8.el4.ia64.rpm | SHA-256: 222e53b4c89fee7a37f6451e5ee4440766921ea48bc5d04aa43f20a7af505bc9 |
i386 | |
vsftpd-2.0.1-8.el4.i386.rpm | SHA-256: f58e01366f4ad84be6d3daf8e27053a72fe75c34b1a1ed65bfca8c4ebb3d9f4e |
vsftpd-2.0.1-8.el4.i386.rpm | SHA-256: f58e01366f4ad84be6d3daf8e27053a72fe75c34b1a1ed65bfca8c4ebb3d9f4e |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
vsftpd-2.0.1-8.el4.src.rpm | SHA-256: c75aa389e705d74bde7f5a8acace7b83620fe28d78dea814b97e990f4aae25f4 |
s390x | |
vsftpd-2.0.1-8.el4.s390x.rpm | SHA-256: 07323f36c424dc8468694058585509abb0d8c20fd6c6239a96f2efbec78c01fd |
s390 | |
vsftpd-2.0.1-8.el4.s390.rpm | SHA-256: 0c64d0abbb596946d36618e0d7d5ca54f5cb5e1d7fc9aa1d10947627db6de9b1 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
vsftpd-2.0.1-8.el4.src.rpm | SHA-256: c75aa389e705d74bde7f5a8acace7b83620fe28d78dea814b97e990f4aae25f4 |
ppc | |
vsftpd-2.0.1-8.el4.ppc.rpm | SHA-256: 6ae46b1deb92ae1ac0134af9cb91ca013e9dc0197ad6d32d18173e4d2b81ecf8 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.