Skip to navigation

Bug Fix Advisory fetchmail bug fix update

Advisory: RHBA-2011:1540-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

An updated fetchmail package that fixes a bug is now available for Red Hat
Enterprise Linux 5.

Fetchmail is a remote mail retrieval and forwarding utility intended for use
over on-demand TCP/IP links, like SLIP or PPP connections.

This updated package fixes the following bug:

* Previously, fetchmail would fail with a socket error when attempting to write
to a BSMTP (Batch Simple Mail Transport Protocol) batch file when downloading
mail. It failed with a socket error after writing the first header to the BSMTP
batch file and displayed, "socket error while fetching from". As a result,
fetchmail could not download mail using BSMTP. With this update to fetchmail,
the fetchmail package will now correctly write to the BSMTP batch file.
(BZ#620640)

All users of fetchmail are advised to upgrade to this updated package, which
resolves this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
fetchmail-6.3.6-4.el5.src.rpm     MD5: 8c3936000bace7b58f30569b7f0eaf63
SHA-256: d0e6af3c51d4f38f7a1f71e9f77c3637e835187210a0e078e87171a80e2aa3a2
 
IA-32:
fetchmail-6.3.6-4.el5.i386.rpm     MD5: 401dff72ee12f837b40d15acb3396262
SHA-256: 3a636669aa98bb77fb97a7eea528dbbe9d0e7217c063df8660ea42739b2acd62
 
x86_64:
fetchmail-6.3.6-4.el5.x86_64.rpm     MD5: 620cab41ff4bb15ca01034996701bfc8
SHA-256: 306f042fa69f88cc27b06f4e4de2ccffab2f2ee810c7a04dd88b7836d08737a1
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
fetchmail-6.3.6-4.el5.src.rpm     MD5: 8c3936000bace7b58f30569b7f0eaf63
SHA-256: d0e6af3c51d4f38f7a1f71e9f77c3637e835187210a0e078e87171a80e2aa3a2
 
IA-32:
fetchmail-6.3.6-4.el5.i386.rpm     MD5: 401dff72ee12f837b40d15acb3396262
SHA-256: 3a636669aa98bb77fb97a7eea528dbbe9d0e7217c063df8660ea42739b2acd62
 
IA-64:
fetchmail-6.3.6-4.el5.ia64.rpm     MD5: d062e4d2ff2da682a3053ca6a637e4c6
SHA-256: db72c6bd57b09ed5a0576ab346f148715516700ae6e65f660a4db08170291977
 
PPC:
fetchmail-6.3.6-4.el5.ppc.rpm     MD5: 87c83b83ead77e2af1b20d48cb4c190f
SHA-256: a54bba072c0f65ac99e90fc4363ebc82077dabf8a4fdc3c0f0482a54d6b538a8
 
s390x:
fetchmail-6.3.6-4.el5.s390x.rpm     MD5: d1dec5a528a7aa36e3563bee545da44a
SHA-256: 7d0fcea021a31fdabcdb0548789ad725ab76345cf54b2f067539d4702ffc523d
 
x86_64:
fetchmail-6.3.6-4.el5.x86_64.rpm     MD5: 620cab41ff4bb15ca01034996701bfc8
SHA-256: 306f042fa69f88cc27b06f4e4de2ccffab2f2ee810c7a04dd88b7836d08737a1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

620640 - fetchmail - bsmtp fails



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/