Skip to navigation

Bug Fix Advisory lftp bug fix update

Advisory: RHBA-2013:0071-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated lftp packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

LFTP is a file transfer utility for FTP, SFTP, HTTP, and other commonly used
protocols. It uses the readline library for input, and provides support for
bookmarks, built-in monitoring, job control, and parallel transfer of multiple
files at the same time

This update fixes the following bug:

* Due to an incorrect evaluation of the length of an uploaded file, the lftp
tool became unresponsive after a file transfer in ASCII mode. With this update,
the volume of transferred data is recognized correctly and the lftp program no
longer hangs in this scenario. (BZ#810217)

All users of lftp are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
lftp-3.7.11-8.el5.src.rpm     MD5: 95227e1d4e40c2bdb260dca57bbe4029
SHA-256: c1a29f1cf18f0870d4f485101f4b39366c0c2e4e6c89e00e3474b03a32c6a383
 
IA-32:
lftp-3.7.11-8.el5.i386.rpm     MD5: c17acd372746d80eda19956e183099ea
SHA-256: 6b14c4e628cae95ebdff20ae0f85f26340131b33401cf39c740b7dc04ef6b3ed
lftp-debuginfo-3.7.11-8.el5.i386.rpm     MD5: f9ee34b0e015f27d619f63002e37e36d
SHA-256: 3922f2317e8eca92c86c24501a57233d2b3a49ca02041375fa90aee7a2bdfa45
 
IA-64:
lftp-3.7.11-8.el5.ia64.rpm     MD5: 08402b4f89d761b0a5470d9d74c4a46b
SHA-256: a36d8d069d75716da2815a1baf4b4b06b24a15f8ecca3a1d95228c7011f12969
lftp-debuginfo-3.7.11-8.el5.ia64.rpm     MD5: b2f48815a49652a1adeecb01eb7fc542
SHA-256: 5d446219eff152377b648e260262dd12dcaef5a883be5e104c853c8b2bf691b9
 
PPC:
lftp-3.7.11-8.el5.ppc.rpm     MD5: 82cfc63eb0c2f9727d8b162b56f154ac
SHA-256: a950e08f98e9a6c1559cd33f24b1e53380d8e7153e5777c3311418fd261c8e12
lftp-debuginfo-3.7.11-8.el5.ppc.rpm     MD5: 09d1ca9826dd819580dba763b4275edc
SHA-256: d2608dad96c3d1bfa81b73c1e4eda4f328b65f504ce90c076b3f4a902a8056fe
 
s390x:
lftp-3.7.11-8.el5.s390x.rpm     MD5: 7f7a384238e870ecf1b12c15001c9640
SHA-256: 3e9259339be32ffefaa659a800a992739e50bb02ec9b1929a1dabc648c4cf0a8
lftp-debuginfo-3.7.11-8.el5.s390x.rpm     MD5: a7f8b55dc4bac6a1ff15e1df8615ab58
SHA-256: 41fe9c406ef44357f78d05c308a7b319c4161b3d1e40087461d2af4e419d2259
 
x86_64:
lftp-3.7.11-8.el5.x86_64.rpm     MD5: 19366e4702b928c2ab11fab835b102c4
SHA-256: e296cd775a47eda2e7bc809c7de6d4a6a82bdd1a7dbf211bae682c23fbae6426
lftp-debuginfo-3.7.11-8.el5.x86_64.rpm     MD5: a1d407d4b7738bda4c6c497cc0d09357
SHA-256: ad6e659fbf4563882fafe8307efd9a39beb76c7c977234d76690814bfa1eab19
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
lftp-3.7.11-8.el5.src.rpm     MD5: 95227e1d4e40c2bdb260dca57bbe4029
SHA-256: c1a29f1cf18f0870d4f485101f4b39366c0c2e4e6c89e00e3474b03a32c6a383
 
IA-32:
lftp-3.7.11-8.el5.i386.rpm     MD5: c17acd372746d80eda19956e183099ea
SHA-256: 6b14c4e628cae95ebdff20ae0f85f26340131b33401cf39c740b7dc04ef6b3ed
lftp-debuginfo-3.7.11-8.el5.i386.rpm     MD5: f9ee34b0e015f27d619f63002e37e36d
SHA-256: 3922f2317e8eca92c86c24501a57233d2b3a49ca02041375fa90aee7a2bdfa45
 
x86_64:
lftp-3.7.11-8.el5.x86_64.rpm     MD5: 19366e4702b928c2ab11fab835b102c4
SHA-256: e296cd775a47eda2e7bc809c7de6d4a6a82bdd1a7dbf211bae682c23fbae6426
lftp-debuginfo-3.7.11-8.el5.x86_64.rpm     MD5: a1d407d4b7738bda4c6c497cc0d09357
SHA-256: ad6e659fbf4563882fafe8307efd9a39beb76c7c977234d76690814bfa1eab19
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

810217 - lftp hangs using -a ascii mode



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/